Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.977625] ================================================================== [ 16.978203] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.978571] Read of size 1 at addr fff00000c638bd7f by task kunit_try_catch/194 [ 16.978656] [ 16.978774] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.978916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.979060] Hardware name: linux,dummy-virt (DT) [ 16.979260] Call trace: [ 16.979289] show_stack+0x20/0x38 (C) [ 16.979342] dump_stack_lvl+0x8c/0xd0 [ 16.979393] print_report+0x118/0x608 [ 16.979440] kasan_report+0xdc/0x128 [ 16.979618] __asan_report_load1_noabort+0x20/0x30 [ 16.979685] ksize_unpoisons_memory+0x690/0x740 [ 16.979754] kunit_try_run_case+0x170/0x3f0 [ 16.979802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.979853] kthread+0x328/0x630 [ 16.979894] ret_from_fork+0x10/0x20 [ 16.979943] [ 16.979961] Allocated by task 194: [ 16.979989] kasan_save_stack+0x3c/0x68 [ 16.980041] kasan_save_track+0x20/0x40 [ 16.980077] kasan_save_alloc_info+0x40/0x58 [ 16.980131] __kasan_kmalloc+0xd4/0xd8 [ 16.980167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.980207] ksize_unpoisons_memory+0xc0/0x740 [ 16.980245] kunit_try_run_case+0x170/0x3f0 [ 16.980282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.980324] kthread+0x328/0x630 [ 16.980355] ret_from_fork+0x10/0x20 [ 16.980390] [ 16.980409] The buggy address belongs to the object at fff00000c638bd00 [ 16.980409] which belongs to the cache kmalloc-128 of size 128 [ 16.980467] The buggy address is located 12 bytes to the right of [ 16.980467] allocated 115-byte region [fff00000c638bd00, fff00000c638bd73) [ 16.980540] [ 16.980569] The buggy address belongs to the physical page: [ 16.980601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b [ 16.980660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.980718] page_type: f5(slab) [ 16.980758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.980814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.980854] page dumped because: kasan: bad access detected [ 16.980885] [ 16.980901] Memory state around the buggy address: [ 16.980933] fff00000c638bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.980975] fff00000c638bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.981015] >fff00000c638bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.981063] ^ [ 16.981104] fff00000c638bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.982252] fff00000c638be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.982327] ================================================================== [ 16.958752] ================================================================== [ 16.959138] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.959217] Read of size 1 at addr fff00000c638bd73 by task kunit_try_catch/194 [ 16.959376] [ 16.959453] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.959655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.960095] Hardware name: linux,dummy-virt (DT) [ 16.960215] Call trace: [ 16.960373] show_stack+0x20/0x38 (C) [ 16.960631] dump_stack_lvl+0x8c/0xd0 [ 16.960721] print_report+0x118/0x608 [ 16.961035] kasan_report+0xdc/0x128 [ 16.961250] __asan_report_load1_noabort+0x20/0x30 [ 16.961434] ksize_unpoisons_memory+0x628/0x740 [ 16.961880] kunit_try_run_case+0x170/0x3f0 [ 16.961981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.962064] kthread+0x328/0x630 [ 16.962224] ret_from_fork+0x10/0x20 [ 16.962328] [ 16.962473] Allocated by task 194: [ 16.962514] kasan_save_stack+0x3c/0x68 [ 16.962603] kasan_save_track+0x20/0x40 [ 16.963150] kasan_save_alloc_info+0x40/0x58 [ 16.963244] __kasan_kmalloc+0xd4/0xd8 [ 16.963431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.963477] ksize_unpoisons_memory+0xc0/0x740 [ 16.963691] kunit_try_run_case+0x170/0x3f0 [ 16.963876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.964204] kthread+0x328/0x630 [ 16.964380] ret_from_fork+0x10/0x20 [ 16.964432] [ 16.964451] The buggy address belongs to the object at fff00000c638bd00 [ 16.964451] which belongs to the cache kmalloc-128 of size 128 [ 16.964520] The buggy address is located 0 bytes to the right of [ 16.964520] allocated 115-byte region [fff00000c638bd00, fff00000c638bd73) [ 16.964901] [ 16.964991] The buggy address belongs to the physical page: [ 16.965183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b [ 16.965339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.965395] page_type: f5(slab) [ 16.965436] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.965507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.966002] page dumped because: kasan: bad access detected [ 16.966068] [ 16.966196] Memory state around the buggy address: [ 16.966264] fff00000c638bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.966732] fff00000c638bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.966801] >fff00000c638bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.966949] ^ [ 16.967097] fff00000c638bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.967152] fff00000c638be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.967325] ================================================================== [ 16.969368] ================================================================== [ 16.969608] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.969672] Read of size 1 at addr fff00000c638bd78 by task kunit_try_catch/194 [ 16.969722] [ 16.969755] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.969880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.969910] Hardware name: linux,dummy-virt (DT) [ 16.969942] Call trace: [ 16.969964] show_stack+0x20/0x38 (C) [ 16.970015] dump_stack_lvl+0x8c/0xd0 [ 16.970086] print_report+0x118/0x608 [ 16.970147] kasan_report+0xdc/0x128 [ 16.970193] __asan_report_load1_noabort+0x20/0x30 [ 16.970245] ksize_unpoisons_memory+0x618/0x740 [ 16.970979] kunit_try_run_case+0x170/0x3f0 [ 16.971285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.971354] kthread+0x328/0x630 [ 16.971398] ret_from_fork+0x10/0x20 [ 16.971471] [ 16.971502] Allocated by task 194: [ 16.971541] kasan_save_stack+0x3c/0x68 [ 16.971584] kasan_save_track+0x20/0x40 [ 16.971621] kasan_save_alloc_info+0x40/0x58 [ 16.971662] __kasan_kmalloc+0xd4/0xd8 [ 16.971697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.971736] ksize_unpoisons_memory+0xc0/0x740 [ 16.972305] kunit_try_run_case+0x170/0x3f0 [ 16.972364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.972700] kthread+0x328/0x630 [ 16.972861] ret_from_fork+0x10/0x20 [ 16.972959] [ 16.973089] The buggy address belongs to the object at fff00000c638bd00 [ 16.973089] which belongs to the cache kmalloc-128 of size 128 [ 16.973519] The buggy address is located 5 bytes to the right of [ 16.973519] allocated 115-byte region [fff00000c638bd00, fff00000c638bd73) [ 16.973596] [ 16.973616] The buggy address belongs to the physical page: [ 16.973947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b [ 16.974048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.974099] page_type: f5(slab) [ 16.974348] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.974446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.974596] page dumped because: kasan: bad access detected [ 16.974836] [ 16.975020] Memory state around the buggy address: [ 16.975224] fff00000c638bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.975298] fff00000c638bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.975473] >fff00000c638bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.975557] ^ [ 16.975676] fff00000c638bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.976005] fff00000c638be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.976248] ==================================================================
[ 12.975363] ================================================================== [ 12.976420] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.976812] Read of size 1 at addr ffff8881031dbb78 by task kunit_try_catch/211 [ 12.977215] [ 12.977325] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.977366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.977377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.977407] Call Trace: [ 12.977418] <TASK> [ 12.977432] dump_stack_lvl+0x73/0xb0 [ 12.977460] print_report+0xd1/0x650 [ 12.977491] ? __virt_addr_valid+0x1db/0x2d0 [ 12.977512] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.977535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.977568] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.977592] kasan_report+0x141/0x180 [ 12.977613] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.977648] __asan_report_load1_noabort+0x18/0x20 [ 12.977672] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.977696] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.977737] ? finish_task_switch.isra.0+0x153/0x700 [ 12.977759] ? __switch_to+0x47/0xf50 [ 12.977784] ? __schedule+0x10cc/0x2b60 [ 12.977805] ? __pfx_read_tsc+0x10/0x10 [ 12.977826] ? ktime_get_ts64+0x86/0x230 [ 12.977849] kunit_try_run_case+0x1a5/0x480 [ 12.977872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.977895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.977928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.977952] ? __kthread_parkme+0x82/0x180 [ 12.977972] ? preempt_count_sub+0x50/0x80 [ 12.978005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.978045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.978069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.978094] kthread+0x337/0x6f0 [ 12.978112] ? trace_preempt_on+0x20/0xc0 [ 12.978136] ? __pfx_kthread+0x10/0x10 [ 12.978156] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.978177] ? calculate_sigpending+0x7b/0xa0 [ 12.978201] ? __pfx_kthread+0x10/0x10 [ 12.978222] ret_from_fork+0x116/0x1d0 [ 12.978240] ? __pfx_kthread+0x10/0x10 [ 12.978260] ret_from_fork_asm+0x1a/0x30 [ 12.978289] </TASK> [ 12.978388] [ 12.986389] Allocated by task 211: [ 12.986677] kasan_save_stack+0x45/0x70 [ 12.986908] kasan_save_track+0x18/0x40 [ 12.987258] kasan_save_alloc_info+0x3b/0x50 [ 12.987469] __kasan_kmalloc+0xb7/0xc0 [ 12.987668] __kmalloc_cache_noprof+0x189/0x420 [ 12.987892] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.988184] kunit_try_run_case+0x1a5/0x480 [ 12.988399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.988647] kthread+0x337/0x6f0 [ 12.988829] ret_from_fork+0x116/0x1d0 [ 12.989006] ret_from_fork_asm+0x1a/0x30 [ 12.989201] [ 12.989271] The buggy address belongs to the object at ffff8881031dbb00 [ 12.989271] which belongs to the cache kmalloc-128 of size 128 [ 12.989611] The buggy address is located 5 bytes to the right of [ 12.989611] allocated 115-byte region [ffff8881031dbb00, ffff8881031dbb73) [ 12.990332] [ 12.990434] The buggy address belongs to the physical page: [ 12.990683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db [ 12.991039] flags: 0x200000000000000(node=0|zone=2) [ 12.991406] page_type: f5(slab) [ 12.991531] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.991800] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.992132] page dumped because: kasan: bad access detected [ 12.992392] [ 12.992520] Memory state around the buggy address: [ 12.992750] ffff8881031dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.992964] ffff8881031dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.993355] >ffff8881031dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.993645] ^ [ 12.993928] ffff8881031dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.994415] ffff8881031dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.994632] ================================================================== [ 12.955773] ================================================================== [ 12.956264] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.956717] Read of size 1 at addr ffff8881031dbb73 by task kunit_try_catch/211 [ 12.957023] [ 12.957239] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.957285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.957308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.957328] Call Trace: [ 12.957340] <TASK> [ 12.957356] dump_stack_lvl+0x73/0xb0 [ 12.957399] print_report+0xd1/0x650 [ 12.957420] ? __virt_addr_valid+0x1db/0x2d0 [ 12.957443] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.957475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.957498] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.957521] kasan_report+0x141/0x180 [ 12.957553] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.957581] __asan_report_load1_noabort+0x18/0x20 [ 12.957606] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.957630] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.957654] ? finish_task_switch.isra.0+0x153/0x700 [ 12.957677] ? __switch_to+0x47/0xf50 [ 12.957713] ? __schedule+0x10cc/0x2b60 [ 12.957735] ? __pfx_read_tsc+0x10/0x10 [ 12.957756] ? ktime_get_ts64+0x86/0x230 [ 12.957780] kunit_try_run_case+0x1a5/0x480 [ 12.957805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.957827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.957850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.957874] ? __kthread_parkme+0x82/0x180 [ 12.957903] ? preempt_count_sub+0x50/0x80 [ 12.957925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.957949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.957979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.958004] kthread+0x337/0x6f0 [ 12.958022] ? trace_preempt_on+0x20/0xc0 [ 12.958211] ? __pfx_kthread+0x10/0x10 [ 12.958242] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.958264] ? calculate_sigpending+0x7b/0xa0 [ 12.958288] ? __pfx_kthread+0x10/0x10 [ 12.958309] ret_from_fork+0x116/0x1d0 [ 12.958328] ? __pfx_kthread+0x10/0x10 [ 12.958348] ret_from_fork_asm+0x1a/0x30 [ 12.958379] </TASK> [ 12.958389] [ 12.966797] Allocated by task 211: [ 12.966973] kasan_save_stack+0x45/0x70 [ 12.967289] kasan_save_track+0x18/0x40 [ 12.967476] kasan_save_alloc_info+0x3b/0x50 [ 12.967657] __kasan_kmalloc+0xb7/0xc0 [ 12.967854] __kmalloc_cache_noprof+0x189/0x420 [ 12.968124] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.968312] kunit_try_run_case+0x1a5/0x480 [ 12.968509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.968711] kthread+0x337/0x6f0 [ 12.968876] ret_from_fork+0x116/0x1d0 [ 12.969110] ret_from_fork_asm+0x1a/0x30 [ 12.969272] [ 12.969342] The buggy address belongs to the object at ffff8881031dbb00 [ 12.969342] which belongs to the cache kmalloc-128 of size 128 [ 12.969695] The buggy address is located 0 bytes to the right of [ 12.969695] allocated 115-byte region [ffff8881031dbb00, ffff8881031dbb73) [ 12.970253] [ 12.970347] The buggy address belongs to the physical page: [ 12.970598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db [ 12.971181] flags: 0x200000000000000(node=0|zone=2) [ 12.971410] page_type: f5(slab) [ 12.971557] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.971824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.972329] page dumped because: kasan: bad access detected [ 12.972568] [ 12.972651] Memory state around the buggy address: [ 12.972891] ffff8881031dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.973242] ffff8881031dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.973517] >ffff8881031dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.973804] ^ [ 12.974270] ffff8881031dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.974575] ffff8881031dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.974840] ================================================================== [ 12.995074] ================================================================== [ 12.995609] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.996253] Read of size 1 at addr ffff8881031dbb7f by task kunit_try_catch/211 [ 12.996490] [ 12.996576] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.996614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.996625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.996644] Call Trace: [ 12.996656] <TASK> [ 12.996669] dump_stack_lvl+0x73/0xb0 [ 12.996697] print_report+0xd1/0x650 [ 12.996733] ? __virt_addr_valid+0x1db/0x2d0 [ 12.996755] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.996778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.996800] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.996824] kasan_report+0x141/0x180 [ 12.996845] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.996872] __asan_report_load1_noabort+0x18/0x20 [ 12.996897] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.996935] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.996958] ? finish_task_switch.isra.0+0x153/0x700 [ 12.996980] ? __switch_to+0x47/0xf50 [ 12.997016] ? __schedule+0x10cc/0x2b60 [ 12.997037] ? __pfx_read_tsc+0x10/0x10 [ 12.997057] ? ktime_get_ts64+0x86/0x230 [ 12.997080] kunit_try_run_case+0x1a5/0x480 [ 12.997104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.997126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.997150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.997173] ? __kthread_parkme+0x82/0x180 [ 12.997193] ? preempt_count_sub+0x50/0x80 [ 12.997216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.997239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.997263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.997288] kthread+0x337/0x6f0 [ 12.997307] ? trace_preempt_on+0x20/0xc0 [ 12.997329] ? __pfx_kthread+0x10/0x10 [ 12.997349] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.997370] ? calculate_sigpending+0x7b/0xa0 [ 12.997393] ? __pfx_kthread+0x10/0x10 [ 12.997477] ret_from_fork+0x116/0x1d0 [ 12.997496] ? __pfx_kthread+0x10/0x10 [ 12.997516] ret_from_fork_asm+0x1a/0x30 [ 12.997557] </TASK> [ 12.997566] [ 13.006403] Allocated by task 211: [ 13.006531] kasan_save_stack+0x45/0x70 [ 13.006732] kasan_save_track+0x18/0x40 [ 13.007104] kasan_save_alloc_info+0x3b/0x50 [ 13.007605] __kasan_kmalloc+0xb7/0xc0 [ 13.007754] __kmalloc_cache_noprof+0x189/0x420 [ 13.007911] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.008357] kunit_try_run_case+0x1a5/0x480 [ 13.008596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.008918] kthread+0x337/0x6f0 [ 13.009168] ret_from_fork+0x116/0x1d0 [ 13.009359] ret_from_fork_asm+0x1a/0x30 [ 13.009548] [ 13.009646] The buggy address belongs to the object at ffff8881031dbb00 [ 13.009646] which belongs to the cache kmalloc-128 of size 128 [ 13.010161] The buggy address is located 12 bytes to the right of [ 13.010161] allocated 115-byte region [ffff8881031dbb00, ffff8881031dbb73) [ 13.010524] [ 13.010747] The buggy address belongs to the physical page: [ 13.011037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db [ 13.011634] flags: 0x200000000000000(node=0|zone=2) [ 13.011888] page_type: f5(slab) [ 13.012017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.012331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.012829] page dumped because: kasan: bad access detected [ 13.013227] [ 13.013335] Memory state around the buggy address: [ 13.013554] ffff8881031dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.013850] ffff8881031dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.014194] >ffff8881031dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.014572] ^ [ 13.014886] ffff8881031dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.015280] ffff8881031dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.015508] ==================================================================