Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.849976] ================================================================== [ 16.850038] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.850091] Read of size 1 at addr fff00000c669197f by task kunit_try_catch/194 [ 16.850460] [ 16.850509] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.850743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.850881] Hardware name: linux,dummy-virt (DT) [ 16.850917] Call trace: [ 16.850941] show_stack+0x20/0x38 (C) [ 16.851117] dump_stack_lvl+0x8c/0xd0 [ 16.851339] print_report+0x118/0x5d0 [ 16.851400] kasan_report+0xdc/0x128 [ 16.851494] __asan_report_load1_noabort+0x20/0x30 [ 16.851548] ksize_unpoisons_memory+0x690/0x740 [ 16.851621] kunit_try_run_case+0x170/0x3f0 [ 16.851948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.852083] kthread+0x328/0x630 [ 16.852190] ret_from_fork+0x10/0x20 [ 16.852244] [ 16.852262] Allocated by task 194: [ 16.852290] kasan_save_stack+0x3c/0x68 [ 16.852560] kasan_save_track+0x20/0x40 [ 16.852983] kasan_save_alloc_info+0x40/0x58 [ 16.853119] __kasan_kmalloc+0xd4/0xd8 [ 16.853233] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.853320] ksize_unpoisons_memory+0xc0/0x740 [ 16.853360] kunit_try_run_case+0x170/0x3f0 [ 16.853806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.853976] kthread+0x328/0x630 [ 16.854129] ret_from_fork+0x10/0x20 [ 16.854212] [ 16.854302] The buggy address belongs to the object at fff00000c6691900 [ 16.854302] which belongs to the cache kmalloc-128 of size 128 [ 16.854560] The buggy address is located 12 bytes to the right of [ 16.854560] allocated 115-byte region [fff00000c6691900, fff00000c6691973) [ 16.855017] [ 16.855090] The buggy address belongs to the physical page: [ 16.855182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.855273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.855324] page_type: f5(slab) [ 16.855373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.855424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.855461] page dumped because: kasan: bad access detected [ 16.855492] [ 16.855511] Memory state around the buggy address: [ 16.855547] fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.855604] fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855657] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.855696] ^ [ 16.855737] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.856316] fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.856372] ================================================================== [ 16.841341] ================================================================== [ 16.841423] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.841478] Read of size 1 at addr fff00000c6691978 by task kunit_try_catch/194 [ 16.841854] [ 16.841944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.842094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.842135] Hardware name: linux,dummy-virt (DT) [ 16.842167] Call trace: [ 16.842217] show_stack+0x20/0x38 (C) [ 16.842577] dump_stack_lvl+0x8c/0xd0 [ 16.842877] print_report+0x118/0x5d0 [ 16.843099] kasan_report+0xdc/0x128 [ 16.843200] __asan_report_load1_noabort+0x20/0x30 [ 16.843469] ksize_unpoisons_memory+0x618/0x740 [ 16.843675] kunit_try_run_case+0x170/0x3f0 [ 16.843951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.844251] kthread+0x328/0x630 [ 16.844383] ret_from_fork+0x10/0x20 [ 16.844439] [ 16.844467] Allocated by task 194: [ 16.844494] kasan_save_stack+0x3c/0x68 [ 16.844537] kasan_save_track+0x20/0x40 [ 16.844575] kasan_save_alloc_info+0x40/0x58 [ 16.844613] __kasan_kmalloc+0xd4/0xd8 [ 16.844659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.844714] ksize_unpoisons_memory+0xc0/0x740 [ 16.844752] kunit_try_run_case+0x170/0x3f0 [ 16.844790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.844842] kthread+0x328/0x630 [ 16.844897] ret_from_fork+0x10/0x20 [ 16.844934] [ 16.844952] The buggy address belongs to the object at fff00000c6691900 [ 16.844952] which belongs to the cache kmalloc-128 of size 128 [ 16.845009] The buggy address is located 5 bytes to the right of [ 16.845009] allocated 115-byte region [fff00000c6691900, fff00000c6691973) [ 16.845082] [ 16.845102] The buggy address belongs to the physical page: [ 16.845151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.845204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.845253] page_type: f5(slab) [ 16.845290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.845356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.845396] page dumped because: kasan: bad access detected [ 16.845435] [ 16.845456] Memory state around the buggy address: [ 16.845495] fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.845548] fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845600] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.845639] ^ [ 16.845695] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845738] fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845791] ================================================================== [ 16.831240] ================================================================== [ 16.831311] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.831817] Read of size 1 at addr fff00000c6691973 by task kunit_try_catch/194 [ 16.832368] [ 16.832788] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.833099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.833159] Hardware name: linux,dummy-virt (DT) [ 16.833194] Call trace: [ 16.833219] show_stack+0x20/0x38 (C) [ 16.833426] dump_stack_lvl+0x8c/0xd0 [ 16.833950] print_report+0x118/0x5d0 [ 16.834054] kasan_report+0xdc/0x128 [ 16.834105] __asan_report_load1_noabort+0x20/0x30 [ 16.834315] ksize_unpoisons_memory+0x628/0x740 [ 16.834474] kunit_try_run_case+0x170/0x3f0 [ 16.835046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.835206] kthread+0x328/0x630 [ 16.835369] ret_from_fork+0x10/0x20 [ 16.835557] [ 16.835632] Allocated by task 194: [ 16.835681] kasan_save_stack+0x3c/0x68 [ 16.835882] kasan_save_track+0x20/0x40 [ 16.836077] kasan_save_alloc_info+0x40/0x58 [ 16.836194] __kasan_kmalloc+0xd4/0xd8 [ 16.836235] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.836274] ksize_unpoisons_memory+0xc0/0x740 [ 16.836339] kunit_try_run_case+0x170/0x3f0 [ 16.836537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.836830] kthread+0x328/0x630 [ 16.836895] ret_from_fork+0x10/0x20 [ 16.837092] [ 16.837218] The buggy address belongs to the object at fff00000c6691900 [ 16.837218] which belongs to the cache kmalloc-128 of size 128 [ 16.837613] The buggy address is located 0 bytes to the right of [ 16.837613] allocated 115-byte region [fff00000c6691900, fff00000c6691973) [ 16.837872] [ 16.837910] The buggy address belongs to the physical page: [ 16.838111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.838204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.838371] page_type: f5(slab) [ 16.838416] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.838601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.838656] page dumped because: kasan: bad access detected [ 16.838685] [ 16.838703] Memory state around the buggy address: [ 16.838747] fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.838791] fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.838844] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.838912] ^ [ 16.838960] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.839001] fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.839039] ==================================================================
[ 12.740548] ================================================================== [ 12.740805] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.741544] Read of size 1 at addr ffff888102f4217f by task kunit_try_catch/211 [ 12.742025] [ 12.742137] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.742295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.742307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.742330] Call Trace: [ 12.742347] <TASK> [ 12.742366] dump_stack_lvl+0x73/0xb0 [ 12.742396] print_report+0xd1/0x610 [ 12.742418] ? __virt_addr_valid+0x1db/0x2d0 [ 12.742508] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.742532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.742554] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.742577] kasan_report+0x141/0x180 [ 12.742654] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.742684] __asan_report_load1_noabort+0x18/0x20 [ 12.742707] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.742731] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.742752] ? finish_task_switch.isra.0+0x153/0x700 [ 12.742776] ? __switch_to+0x47/0xf50 [ 12.742802] ? __schedule+0x10cc/0x2b60 [ 12.742825] ? __pfx_read_tsc+0x10/0x10 [ 12.742845] ? ktime_get_ts64+0x86/0x230 [ 12.742869] kunit_try_run_case+0x1a5/0x480 [ 12.742893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.742915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.742938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.742961] ? __kthread_parkme+0x82/0x180 [ 12.742981] ? preempt_count_sub+0x50/0x80 [ 12.743004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.743027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.743061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.743084] kthread+0x337/0x6f0 [ 12.743103] ? trace_preempt_on+0x20/0xc0 [ 12.743126] ? __pfx_kthread+0x10/0x10 [ 12.743145] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.743167] ? calculate_sigpending+0x7b/0xa0 [ 12.743190] ? __pfx_kthread+0x10/0x10 [ 12.743213] ret_from_fork+0x116/0x1d0 [ 12.743230] ? __pfx_kthread+0x10/0x10 [ 12.743250] ret_from_fork_asm+0x1a/0x30 [ 12.743286] </TASK> [ 12.743298] [ 12.754608] Allocated by task 211: [ 12.754787] kasan_save_stack+0x45/0x70 [ 12.755233] kasan_save_track+0x18/0x40 [ 12.755436] kasan_save_alloc_info+0x3b/0x50 [ 12.755794] __kasan_kmalloc+0xb7/0xc0 [ 12.756276] __kmalloc_cache_noprof+0x189/0x420 [ 12.756497] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.756878] kunit_try_run_case+0x1a5/0x480 [ 12.757217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.757526] kthread+0x337/0x6f0 [ 12.757700] ret_from_fork+0x116/0x1d0 [ 12.757884] ret_from_fork_asm+0x1a/0x30 [ 12.758339] [ 12.758417] The buggy address belongs to the object at ffff888102f42100 [ 12.758417] which belongs to the cache kmalloc-128 of size 128 [ 12.759190] The buggy address is located 12 bytes to the right of [ 12.759190] allocated 115-byte region [ffff888102f42100, ffff888102f42173) [ 12.760195] [ 12.760299] The buggy address belongs to the physical page: [ 12.760512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42 [ 12.761143] flags: 0x200000000000000(node=0|zone=2) [ 12.761456] page_type: f5(slab) [ 12.761593] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.762174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.762472] page dumped because: kasan: bad access detected [ 12.763040] [ 12.763150] Memory state around the buggy address: [ 12.763351] ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.763648] ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.764330] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.764793] ^ [ 12.765180] ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.765558] ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.765867] ================================================================== [ 12.682744] ================================================================== [ 12.683763] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.684133] Read of size 1 at addr ffff888102f42173 by task kunit_try_catch/211 [ 12.684649] [ 12.684779] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.684830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.684841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.684864] Call Trace: [ 12.684876] <TASK> [ 12.684894] dump_stack_lvl+0x73/0xb0 [ 12.684927] print_report+0xd1/0x610 [ 12.684950] ? __virt_addr_valid+0x1db/0x2d0 [ 12.684973] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.684996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.685018] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.685041] kasan_report+0x141/0x180 [ 12.685076] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.685351] __asan_report_load1_noabort+0x18/0x20 [ 12.685381] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.685406] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.685428] ? finish_task_switch.isra.0+0x153/0x700 [ 12.685451] ? __switch_to+0x47/0xf50 [ 12.685478] ? __schedule+0x10cc/0x2b60 [ 12.685501] ? __pfx_read_tsc+0x10/0x10 [ 12.685522] ? ktime_get_ts64+0x86/0x230 [ 12.685547] kunit_try_run_case+0x1a5/0x480 [ 12.685572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.685611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.685636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.685659] ? __kthread_parkme+0x82/0x180 [ 12.685680] ? preempt_count_sub+0x50/0x80 [ 12.685703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.685726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.685749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.685772] kthread+0x337/0x6f0 [ 12.685790] ? trace_preempt_on+0x20/0xc0 [ 12.685822] ? __pfx_kthread+0x10/0x10 [ 12.685841] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.685862] ? calculate_sigpending+0x7b/0xa0 [ 12.685887] ? __pfx_kthread+0x10/0x10 [ 12.685907] ret_from_fork+0x116/0x1d0 [ 12.685925] ? __pfx_kthread+0x10/0x10 [ 12.685945] ret_from_fork_asm+0x1a/0x30 [ 12.685977] </TASK> [ 12.685987] [ 12.696422] Allocated by task 211: [ 12.696814] kasan_save_stack+0x45/0x70 [ 12.697095] kasan_save_track+0x18/0x40 [ 12.697300] kasan_save_alloc_info+0x3b/0x50 [ 12.697492] __kasan_kmalloc+0xb7/0xc0 [ 12.697683] __kmalloc_cache_noprof+0x189/0x420 [ 12.698227] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.698408] kunit_try_run_case+0x1a5/0x480 [ 12.698774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.699268] kthread+0x337/0x6f0 [ 12.699449] ret_from_fork+0x116/0x1d0 [ 12.699817] ret_from_fork_asm+0x1a/0x30 [ 12.700200] [ 12.700296] The buggy address belongs to the object at ffff888102f42100 [ 12.700296] which belongs to the cache kmalloc-128 of size 128 [ 12.701016] The buggy address is located 0 bytes to the right of [ 12.701016] allocated 115-byte region [ffff888102f42100, ffff888102f42173) [ 12.701565] [ 12.701880] The buggy address belongs to the physical page: [ 12.702226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42 [ 12.702616] flags: 0x200000000000000(node=0|zone=2) [ 12.702979] page_type: f5(slab) [ 12.703165] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.703497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.704710] page dumped because: kasan: bad access detected [ 12.704908] [ 12.704983] Memory state around the buggy address: [ 12.705155] ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.705375] ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.705594] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.705808] ^ [ 12.706015] ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.707252] ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.707487] ================================================================== [ 12.709222] ================================================================== [ 12.710139] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.711171] Read of size 1 at addr ffff888102f42178 by task kunit_try_catch/211 [ 12.712135] [ 12.712244] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.712290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.712301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.712323] Call Trace: [ 12.712341] <TASK> [ 12.712358] dump_stack_lvl+0x73/0xb0 [ 12.712391] print_report+0xd1/0x610 [ 12.712413] ? __virt_addr_valid+0x1db/0x2d0 [ 12.712436] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.712458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.712480] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.712503] kasan_report+0x141/0x180 [ 12.712525] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.712553] __asan_report_load1_noabort+0x18/0x20 [ 12.712840] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.712884] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.712908] ? finish_task_switch.isra.0+0x153/0x700 [ 12.712978] ? __switch_to+0x47/0xf50 [ 12.713005] ? __schedule+0x10cc/0x2b60 [ 12.713028] ? __pfx_read_tsc+0x10/0x10 [ 12.713048] ? ktime_get_ts64+0x86/0x230 [ 12.713084] kunit_try_run_case+0x1a5/0x480 [ 12.713108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.713130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.713153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.713176] ? __kthread_parkme+0x82/0x180 [ 12.713196] ? preempt_count_sub+0x50/0x80 [ 12.713218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.713241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.713264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.713287] kthread+0x337/0x6f0 [ 12.713306] ? trace_preempt_on+0x20/0xc0 [ 12.713329] ? __pfx_kthread+0x10/0x10 [ 12.713349] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.713370] ? calculate_sigpending+0x7b/0xa0 [ 12.713393] ? __pfx_kthread+0x10/0x10 [ 12.713414] ret_from_fork+0x116/0x1d0 [ 12.713431] ? __pfx_kthread+0x10/0x10 [ 12.713451] ret_from_fork_asm+0x1a/0x30 [ 12.713482] </TASK> [ 12.713491] [ 12.728498] Allocated by task 211: [ 12.728698] kasan_save_stack+0x45/0x70 [ 12.729327] kasan_save_track+0x18/0x40 [ 12.729482] kasan_save_alloc_info+0x3b/0x50 [ 12.729821] __kasan_kmalloc+0xb7/0xc0 [ 12.730204] __kmalloc_cache_noprof+0x189/0x420 [ 12.730411] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.730626] kunit_try_run_case+0x1a5/0x480 [ 12.731276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.731502] kthread+0x337/0x6f0 [ 12.731835] ret_from_fork+0x116/0x1d0 [ 12.732177] ret_from_fork_asm+0x1a/0x30 [ 12.732374] [ 12.732449] The buggy address belongs to the object at ffff888102f42100 [ 12.732449] which belongs to the cache kmalloc-128 of size 128 [ 12.733240] The buggy address is located 5 bytes to the right of [ 12.733240] allocated 115-byte region [ffff888102f42100, ffff888102f42173) [ 12.733916] [ 12.734237] The buggy address belongs to the physical page: [ 12.734492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42 [ 12.735039] flags: 0x200000000000000(node=0|zone=2) [ 12.735392] page_type: f5(slab) [ 12.735631] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.736233] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.736644] page dumped because: kasan: bad access detected [ 12.737048] [ 12.737147] Memory state around the buggy address: [ 12.737357] ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.737665] ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.738289] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.738605] ^ [ 12.739123] ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.739485] ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.739963] ==================================================================