Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.829881] ================================================================== [ 15.829932] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.829984] Read of size 1 at addr fff00000c592ce78 by task kunit_try_catch/195 [ 15.830033] [ 15.830064] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.831526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.831573] Hardware name: linux,dummy-virt (DT) [ 15.831870] Call trace: [ 15.832007] show_stack+0x20/0x38 (C) [ 15.832061] dump_stack_lvl+0x8c/0xd0 [ 15.832384] print_report+0x118/0x5d0 [ 15.832540] kasan_report+0xdc/0x128 [ 15.832588] __asan_report_load1_noabort+0x20/0x30 [ 15.832864] ksize_unpoisons_memory+0x618/0x740 [ 15.833200] kunit_try_run_case+0x170/0x3f0 [ 15.833547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.833833] kthread+0x328/0x630 [ 15.834077] ret_from_fork+0x10/0x20 [ 15.834131] [ 15.834270] Allocated by task 195: [ 15.834343] kasan_save_stack+0x3c/0x68 [ 15.834721] kasan_save_track+0x20/0x40 [ 15.834763] kasan_save_alloc_info+0x40/0x58 [ 15.834915] __kasan_kmalloc+0xd4/0xd8 [ 15.835134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.835494] ksize_unpoisons_memory+0xc0/0x740 [ 15.835541] kunit_try_run_case+0x170/0x3f0 [ 15.835776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.835826] kthread+0x328/0x630 [ 15.836253] ret_from_fork+0x10/0x20 [ 15.836370] [ 15.836389] The buggy address belongs to the object at fff00000c592ce00 [ 15.836389] which belongs to the cache kmalloc-128 of size 128 [ 15.836948] The buggy address is located 5 bytes to the right of [ 15.836948] allocated 115-byte region [fff00000c592ce00, fff00000c592ce73) [ 15.837220] [ 15.837244] The buggy address belongs to the physical page: [ 15.837419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.837512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.837914] page_type: f5(slab) [ 15.838325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.838624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.838896] page dumped because: kasan: bad access detected [ 15.839273] [ 15.839360] Memory state around the buggy address: [ 15.839815] fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.839989] fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840239] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.840283] ^ [ 15.840326] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840370] fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840410] ================================================================== [ 15.816405] ================================================================== [ 15.816479] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.816537] Read of size 1 at addr fff00000c592ce73 by task kunit_try_catch/195 [ 15.816589] [ 15.816624] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.816706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.818730] Hardware name: linux,dummy-virt (DT) [ 15.818784] Call trace: [ 15.818853] show_stack+0x20/0x38 (C) [ 15.818911] dump_stack_lvl+0x8c/0xd0 [ 15.818961] print_report+0x118/0x5d0 [ 15.819008] kasan_report+0xdc/0x128 [ 15.819053] __asan_report_load1_noabort+0x20/0x30 [ 15.819104] ksize_unpoisons_memory+0x628/0x740 [ 15.819152] kunit_try_run_case+0x170/0x3f0 [ 15.819297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.819683] kthread+0x328/0x630 [ 15.819968] ret_from_fork+0x10/0x20 [ 15.820023] [ 15.820042] Allocated by task 195: [ 15.820455] kasan_save_stack+0x3c/0x68 [ 15.820554] kasan_save_track+0x20/0x40 [ 15.820812] kasan_save_alloc_info+0x40/0x58 [ 15.820910] __kasan_kmalloc+0xd4/0xd8 [ 15.821275] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.821618] ksize_unpoisons_memory+0xc0/0x740 [ 15.821944] kunit_try_run_case+0x170/0x3f0 [ 15.822398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.822551] kthread+0x328/0x630 [ 15.822954] ret_from_fork+0x10/0x20 [ 15.823431] [ 15.823510] The buggy address belongs to the object at fff00000c592ce00 [ 15.823510] which belongs to the cache kmalloc-128 of size 128 [ 15.823572] The buggy address is located 0 bytes to the right of [ 15.823572] allocated 115-byte region [fff00000c592ce00, fff00000c592ce73) [ 15.823646] [ 15.823993] The buggy address belongs to the physical page: [ 15.824208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.824839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.824944] page_type: f5(slab) [ 15.825515] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.825647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.825899] page dumped because: kasan: bad access detected [ 15.826072] [ 15.826089] Memory state around the buggy address: [ 15.826518] fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.826685] fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.826969] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.827212] ^ [ 15.827413] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827640] fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827882] ================================================================== [ 15.841903] ================================================================== [ 15.841956] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.842009] Read of size 1 at addr fff00000c592ce7f by task kunit_try_catch/195 [ 15.842060] [ 15.843241] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.843382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.843410] Hardware name: linux,dummy-virt (DT) [ 15.843900] Call trace: [ 15.843937] show_stack+0x20/0x38 (C) [ 15.844166] dump_stack_lvl+0x8c/0xd0 [ 15.844391] print_report+0x118/0x5d0 [ 15.844613] kasan_report+0xdc/0x128 [ 15.845031] __asan_report_load1_noabort+0x20/0x30 [ 15.845399] ksize_unpoisons_memory+0x690/0x740 [ 15.845656] kunit_try_run_case+0x170/0x3f0 [ 15.845818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.845874] kthread+0x328/0x630 [ 15.846252] ret_from_fork+0x10/0x20 [ 15.846680] [ 15.846785] Allocated by task 195: [ 15.846820] kasan_save_stack+0x3c/0x68 [ 15.847327] kasan_save_track+0x20/0x40 [ 15.847897] kasan_save_alloc_info+0x40/0x58 [ 15.848004] __kasan_kmalloc+0xd4/0xd8 [ 15.848333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.848388] ksize_unpoisons_memory+0xc0/0x740 [ 15.848751] kunit_try_run_case+0x170/0x3f0 [ 15.848795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.848838] kthread+0x328/0x630 [ 15.848869] ret_from_fork+0x10/0x20 [ 15.848905] [ 15.848925] The buggy address belongs to the object at fff00000c592ce00 [ 15.848925] which belongs to the cache kmalloc-128 of size 128 [ 15.848993] The buggy address is located 12 bytes to the right of [ 15.848993] allocated 115-byte region [fff00000c592ce00, fff00000c592ce73) [ 15.849699] [ 15.849723] The buggy address belongs to the physical page: [ 15.849767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.850003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.850054] page_type: f5(slab) [ 15.850386] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.850462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.850540] page dumped because: kasan: bad access detected [ 15.850584] [ 15.850663] Memory state around the buggy address: [ 15.850696] fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.850743] fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.850788] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.850827] ^ [ 15.851383] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.851946] fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.851991] ==================================================================
[ 12.998970] ================================================================== [ 12.999957] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.000739] Read of size 1 at addr ffff888102afc47f by task kunit_try_catch/211 [ 13.001439] [ 13.001729] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.001785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.001797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.001816] Call Trace: [ 13.001843] <TASK> [ 13.001859] dump_stack_lvl+0x73/0xb0 [ 13.001889] print_report+0xd1/0x610 [ 13.001923] ? __virt_addr_valid+0x1db/0x2d0 [ 13.001946] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.001970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.001994] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.002018] kasan_report+0x141/0x180 [ 13.002039] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.002068] __asan_report_load1_noabort+0x18/0x20 [ 13.002092] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.002117] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.002140] ? finish_task_switch.isra.0+0x153/0x700 [ 13.002162] ? __switch_to+0x47/0xf50 [ 13.002187] ? __schedule+0x10cc/0x2b60 [ 13.002210] ? __pfx_read_tsc+0x10/0x10 [ 13.002231] ? ktime_get_ts64+0x86/0x230 [ 13.002256] kunit_try_run_case+0x1a5/0x480 [ 13.002280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.002303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.002344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.002368] ? __kthread_parkme+0x82/0x180 [ 13.002395] ? preempt_count_sub+0x50/0x80 [ 13.002418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.002511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.002538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.002563] kthread+0x337/0x6f0 [ 13.002583] ? trace_preempt_on+0x20/0xc0 [ 13.002606] ? __pfx_kthread+0x10/0x10 [ 13.002626] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.002648] ? calculate_sigpending+0x7b/0xa0 [ 13.002672] ? __pfx_kthread+0x10/0x10 [ 13.002693] ret_from_fork+0x116/0x1d0 [ 13.002711] ? __pfx_kthread+0x10/0x10 [ 13.002732] ret_from_fork_asm+0x1a/0x30 [ 13.002776] </TASK> [ 13.002786] [ 13.015570] Allocated by task 211: [ 13.016055] kasan_save_stack+0x45/0x70 [ 13.016548] kasan_save_track+0x18/0x40 [ 13.016933] kasan_save_alloc_info+0x3b/0x50 [ 13.017270] __kasan_kmalloc+0xb7/0xc0 [ 13.017618] __kmalloc_cache_noprof+0x189/0x420 [ 13.018121] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.018568] kunit_try_run_case+0x1a5/0x480 [ 13.018922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.019105] kthread+0x337/0x6f0 [ 13.019228] ret_from_fork+0x116/0x1d0 [ 13.019576] ret_from_fork_asm+0x1a/0x30 [ 13.020099] [ 13.020260] The buggy address belongs to the object at ffff888102afc400 [ 13.020260] which belongs to the cache kmalloc-128 of size 128 [ 13.021635] The buggy address is located 12 bytes to the right of [ 13.021635] allocated 115-byte region [ffff888102afc400, ffff888102afc473) [ 13.022767] [ 13.022954] The buggy address belongs to the physical page: [ 13.023292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.023965] flags: 0x200000000000000(node=0|zone=2) [ 13.024136] page_type: f5(slab) [ 13.024258] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.024970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.025769] page dumped because: kasan: bad access detected [ 13.026435] [ 13.026639] Memory state around the buggy address: [ 13.027110] ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.027529] ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.027750] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.027978] ^ [ 13.028191] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.028556] ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.028862] ================================================================== [ 12.964941] ================================================================== [ 12.965242] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.966674] Read of size 1 at addr ffff888102afc478 by task kunit_try_catch/211 [ 12.967452] [ 12.967886] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.967933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.967958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.967978] Call Trace: [ 12.967993] <TASK> [ 12.968036] dump_stack_lvl+0x73/0xb0 [ 12.968069] print_report+0xd1/0x610 [ 12.968091] ? __virt_addr_valid+0x1db/0x2d0 [ 12.968113] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.968137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.968160] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.968184] kasan_report+0x141/0x180 [ 12.968206] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.968234] __asan_report_load1_noabort+0x18/0x20 [ 12.968259] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.968284] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.968307] ? finish_task_switch.isra.0+0x153/0x700 [ 12.968518] ? __switch_to+0x47/0xf50 [ 12.968551] ? __schedule+0x10cc/0x2b60 [ 12.968574] ? __pfx_read_tsc+0x10/0x10 [ 12.968595] ? ktime_get_ts64+0x86/0x230 [ 12.968618] kunit_try_run_case+0x1a5/0x480 [ 12.968643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.968666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.968690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.968714] ? __kthread_parkme+0x82/0x180 [ 12.968733] ? preempt_count_sub+0x50/0x80 [ 12.968771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.968796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.968821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.968847] kthread+0x337/0x6f0 [ 12.968866] ? trace_preempt_on+0x20/0xc0 [ 12.968889] ? __pfx_kthread+0x10/0x10 [ 12.968909] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.968931] ? calculate_sigpending+0x7b/0xa0 [ 12.968955] ? __pfx_kthread+0x10/0x10 [ 12.968976] ret_from_fork+0x116/0x1d0 [ 12.968994] ? __pfx_kthread+0x10/0x10 [ 12.969015] ret_from_fork_asm+0x1a/0x30 [ 12.969045] </TASK> [ 12.969054] [ 12.983637] Allocated by task 211: [ 12.984140] kasan_save_stack+0x45/0x70 [ 12.984630] kasan_save_track+0x18/0x40 [ 12.985035] kasan_save_alloc_info+0x3b/0x50 [ 12.985606] __kasan_kmalloc+0xb7/0xc0 [ 12.985751] __kmalloc_cache_noprof+0x189/0x420 [ 12.985924] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.986078] kunit_try_run_case+0x1a5/0x480 [ 12.986225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.986726] kthread+0x337/0x6f0 [ 12.987088] ret_from_fork+0x116/0x1d0 [ 12.987593] ret_from_fork_asm+0x1a/0x30 [ 12.988094] [ 12.988254] The buggy address belongs to the object at ffff888102afc400 [ 12.988254] which belongs to the cache kmalloc-128 of size 128 [ 12.989676] The buggy address is located 5 bytes to the right of [ 12.989676] allocated 115-byte region [ffff888102afc400, ffff888102afc473) [ 12.990983] [ 12.991188] The buggy address belongs to the physical page: [ 12.991560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 12.992163] flags: 0x200000000000000(node=0|zone=2) [ 12.992404] page_type: f5(slab) [ 12.992784] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.993466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.994367] page dumped because: kasan: bad access detected [ 12.994611] [ 12.994682] Memory state around the buggy address: [ 12.994850] ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.995068] ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.995288] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.995839] ^ [ 12.996482] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.997273] ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.998096] ================================================================== [ 12.943176] ================================================================== [ 12.943565] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.943858] Read of size 1 at addr ffff888102afc473 by task kunit_try_catch/211 [ 12.944416] [ 12.944643] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.944689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.944701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.944721] Call Trace: [ 12.944731] <TASK> [ 12.944747] dump_stack_lvl+0x73/0xb0 [ 12.944788] print_report+0xd1/0x610 [ 12.944810] ? __virt_addr_valid+0x1db/0x2d0 [ 12.944833] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.944856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.944880] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.944905] kasan_report+0x141/0x180 [ 12.944926] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.944955] __asan_report_load1_noabort+0x18/0x20 [ 12.944980] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.945005] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.945028] ? finish_task_switch.isra.0+0x153/0x700 [ 12.945051] ? __switch_to+0x47/0xf50 [ 12.945078] ? __schedule+0x10cc/0x2b60 [ 12.945099] ? __pfx_read_tsc+0x10/0x10 [ 12.945119] ? ktime_get_ts64+0x86/0x230 [ 12.945143] kunit_try_run_case+0x1a5/0x480 [ 12.945169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.945191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.945215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.945239] ? __kthread_parkme+0x82/0x180 [ 12.945260] ? preempt_count_sub+0x50/0x80 [ 12.945282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.945307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.945338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.945363] kthread+0x337/0x6f0 [ 12.945382] ? trace_preempt_on+0x20/0xc0 [ 12.945406] ? __pfx_kthread+0x10/0x10 [ 12.945426] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.945448] ? calculate_sigpending+0x7b/0xa0 [ 12.945472] ? __pfx_kthread+0x10/0x10 [ 12.945493] ret_from_fork+0x116/0x1d0 [ 12.945511] ? __pfx_kthread+0x10/0x10 [ 12.945531] ret_from_fork_asm+0x1a/0x30 [ 12.945562] </TASK> [ 12.945572] [ 12.953706] Allocated by task 211: [ 12.953904] kasan_save_stack+0x45/0x70 [ 12.954108] kasan_save_track+0x18/0x40 [ 12.954299] kasan_save_alloc_info+0x3b/0x50 [ 12.954586] __kasan_kmalloc+0xb7/0xc0 [ 12.954771] __kmalloc_cache_noprof+0x189/0x420 [ 12.954967] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.955163] kunit_try_run_case+0x1a5/0x480 [ 12.955450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.955704] kthread+0x337/0x6f0 [ 12.955880] ret_from_fork+0x116/0x1d0 [ 12.956056] ret_from_fork_asm+0x1a/0x30 [ 12.956225] [ 12.956501] The buggy address belongs to the object at ffff888102afc400 [ 12.956501] which belongs to the cache kmalloc-128 of size 128 [ 12.957030] The buggy address is located 0 bytes to the right of [ 12.957030] allocated 115-byte region [ffff888102afc400, ffff888102afc473) [ 12.957619] [ 12.957717] The buggy address belongs to the physical page: [ 12.957976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 12.958249] flags: 0x200000000000000(node=0|zone=2) [ 12.958578] page_type: f5(slab) [ 12.958742] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.959068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.959407] page dumped because: kasan: bad access detected [ 12.959653] [ 12.959751] Memory state around the buggy address: [ 12.959934] ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.960152] ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.960534] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.960887] ^ [ 12.961193] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.961619] ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.961961] ==================================================================