Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.620538] ================================================================== [ 15.620595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.620651] Read of size 1 at addr fff00000c3f5617f by task kunit_try_catch/194 [ 15.621142] [ 15.621567] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.622192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.622348] Hardware name: linux,dummy-virt (DT) [ 15.622503] Call trace: [ 15.622531] show_stack+0x20/0x38 (C) [ 15.622718] dump_stack_lvl+0x8c/0xd0 [ 15.623019] print_report+0x118/0x5d0 [ 15.623096] kasan_report+0xdc/0x128 [ 15.623386] __asan_report_load1_noabort+0x20/0x30 [ 15.623487] ksize_unpoisons_memory+0x690/0x740 [ 15.623732] kunit_try_run_case+0x170/0x3f0 [ 15.623821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.624011] kthread+0x328/0x630 [ 15.624257] ret_from_fork+0x10/0x20 [ 15.624517] [ 15.624617] Allocated by task 194: [ 15.624654] kasan_save_stack+0x3c/0x68 [ 15.624938] kasan_save_track+0x20/0x40 [ 15.625138] kasan_save_alloc_info+0x40/0x58 [ 15.625359] __kasan_kmalloc+0xd4/0xd8 [ 15.625588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.625656] ksize_unpoisons_memory+0xc0/0x740 [ 15.625700] kunit_try_run_case+0x170/0x3f0 [ 15.625740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.626074] kthread+0x328/0x630 [ 15.626210] ret_from_fork+0x10/0x20 [ 15.626257] [ 15.626303] The buggy address belongs to the object at fff00000c3f56100 [ 15.626303] which belongs to the cache kmalloc-128 of size 128 [ 15.626386] The buggy address is located 12 bytes to the right of [ 15.626386] allocated 115-byte region [fff00000c3f56100, fff00000c3f56173) [ 15.626468] [ 15.626499] The buggy address belongs to the physical page: [ 15.626539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56 [ 15.626619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.626680] page_type: f5(slab) [ 15.626746] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.626802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.626843] page dumped because: kasan: bad access detected [ 15.626876] [ 15.626896] Memory state around the buggy address: [ 15.626951] fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.627022] fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.627067] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.627108] ^ [ 15.627153] fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.627199] fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.627240] ================================================================== [ 15.611712] ================================================================== [ 15.612086] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.612160] Read of size 1 at addr fff00000c3f56178 by task kunit_try_catch/194 [ 15.612217] [ 15.612436] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.612606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.612652] Hardware name: linux,dummy-virt (DT) [ 15.612703] Call trace: [ 15.612729] show_stack+0x20/0x38 (C) [ 15.612782] dump_stack_lvl+0x8c/0xd0 [ 15.613130] print_report+0x118/0x5d0 [ 15.613278] kasan_report+0xdc/0x128 [ 15.613380] __asan_report_load1_noabort+0x20/0x30 [ 15.613481] ksize_unpoisons_memory+0x618/0x740 [ 15.613636] kunit_try_run_case+0x170/0x3f0 [ 15.613866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.614091] kthread+0x328/0x630 [ 15.614231] ret_from_fork+0x10/0x20 [ 15.614449] [ 15.614511] Allocated by task 194: [ 15.614581] kasan_save_stack+0x3c/0x68 [ 15.614717] kasan_save_track+0x20/0x40 [ 15.614891] kasan_save_alloc_info+0x40/0x58 [ 15.614997] __kasan_kmalloc+0xd4/0xd8 [ 15.615300] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.615431] ksize_unpoisons_memory+0xc0/0x740 [ 15.615542] kunit_try_run_case+0x170/0x3f0 [ 15.615990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.616066] kthread+0x328/0x630 [ 15.616165] ret_from_fork+0x10/0x20 [ 15.616253] [ 15.616308] The buggy address belongs to the object at fff00000c3f56100 [ 15.616308] which belongs to the cache kmalloc-128 of size 128 [ 15.616493] The buggy address is located 5 bytes to the right of [ 15.616493] allocated 115-byte region [fff00000c3f56100, fff00000c3f56173) [ 15.616581] [ 15.616611] The buggy address belongs to the physical page: [ 15.616851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56 [ 15.617058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.617209] page_type: f5(slab) [ 15.617290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.617444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.617489] page dumped because: kasan: bad access detected [ 15.617523] [ 15.617541] Memory state around the buggy address: [ 15.617959] fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.618175] fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618266] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.618404] ^ [ 15.618479] fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618533] fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618794] ================================================================== [ 15.604173] ================================================================== [ 15.604238] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.604295] Read of size 1 at addr fff00000c3f56173 by task kunit_try_catch/194 [ 15.604370] [ 15.604403] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.604485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.604511] Hardware name: linux,dummy-virt (DT) [ 15.604543] Call trace: [ 15.604573] show_stack+0x20/0x38 (C) [ 15.604626] dump_stack_lvl+0x8c/0xd0 [ 15.604674] print_report+0x118/0x5d0 [ 15.604722] kasan_report+0xdc/0x128 [ 15.604769] __asan_report_load1_noabort+0x20/0x30 [ 15.604834] ksize_unpoisons_memory+0x628/0x740 [ 15.604885] kunit_try_run_case+0x170/0x3f0 [ 15.604941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.605005] kthread+0x328/0x630 [ 15.605049] ret_from_fork+0x10/0x20 [ 15.605097] [ 15.605114] Allocated by task 194: [ 15.605143] kasan_save_stack+0x3c/0x68 [ 15.605192] kasan_save_track+0x20/0x40 [ 15.605230] kasan_save_alloc_info+0x40/0x58 [ 15.605271] __kasan_kmalloc+0xd4/0xd8 [ 15.605619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.605881] ksize_unpoisons_memory+0xc0/0x740 [ 15.606276] kunit_try_run_case+0x170/0x3f0 [ 15.606755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.606854] kthread+0x328/0x630 [ 15.606907] ret_from_fork+0x10/0x20 [ 15.607022] [ 15.607103] The buggy address belongs to the object at fff00000c3f56100 [ 15.607103] which belongs to the cache kmalloc-128 of size 128 [ 15.607571] The buggy address is located 0 bytes to the right of [ 15.607571] allocated 115-byte region [fff00000c3f56100, fff00000c3f56173) [ 15.607694] [ 15.607745] The buggy address belongs to the physical page: [ 15.607861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56 [ 15.607958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.608132] page_type: f5(slab) [ 15.608212] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.608606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.608847] page dumped because: kasan: bad access detected [ 15.608920] [ 15.609053] Memory state around the buggy address: [ 15.609124] fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.609224] fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609467] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.609643] ^ [ 15.609819] fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609900] fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.610054] ==================================================================
[ 12.579870] ================================================================== [ 12.581424] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.581912] Read of size 1 at addr ffff8881029ce373 by task kunit_try_catch/213 [ 12.582388] [ 12.582481] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.582525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.582536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.582555] Call Trace: [ 12.582567] <TASK> [ 12.582581] dump_stack_lvl+0x73/0xb0 [ 12.582611] print_report+0xd1/0x610 [ 12.582632] ? __virt_addr_valid+0x1db/0x2d0 [ 12.582654] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.582677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.582698] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.582721] kasan_report+0x141/0x180 [ 12.582742] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.582770] __asan_report_load1_noabort+0x18/0x20 [ 12.582794] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.582817] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.582839] ? finish_task_switch.isra.0+0x153/0x700 [ 12.582861] ? __switch_to+0x47/0xf50 [ 12.582886] ? __schedule+0x10cc/0x2b60 [ 12.582908] ? __pfx_read_tsc+0x10/0x10 [ 12.582927] ? ktime_get_ts64+0x86/0x230 [ 12.582950] kunit_try_run_case+0x1a5/0x480 [ 12.582974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.582996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.583031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.583055] ? __kthread_parkme+0x82/0x180 [ 12.583076] ? preempt_count_sub+0x50/0x80 [ 12.583099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.583121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.583144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.583168] kthread+0x337/0x6f0 [ 12.583187] ? trace_preempt_on+0x20/0xc0 [ 12.583210] ? __pfx_kthread+0x10/0x10 [ 12.583229] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.583250] ? calculate_sigpending+0x7b/0xa0 [ 12.583273] ? __pfx_kthread+0x10/0x10 [ 12.583308] ret_from_fork+0x116/0x1d0 [ 12.583326] ? __pfx_kthread+0x10/0x10 [ 12.583345] ret_from_fork_asm+0x1a/0x30 [ 12.583375] </TASK> [ 12.583385] [ 12.598582] Allocated by task 213: [ 12.598725] kasan_save_stack+0x45/0x70 [ 12.598880] kasan_save_track+0x18/0x40 [ 12.599077] kasan_save_alloc_info+0x3b/0x50 [ 12.599471] __kasan_kmalloc+0xb7/0xc0 [ 12.599860] __kmalloc_cache_noprof+0x189/0x420 [ 12.600365] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.600821] kunit_try_run_case+0x1a5/0x480 [ 12.601273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.601785] kthread+0x337/0x6f0 [ 12.602079] ret_from_fork+0x116/0x1d0 [ 12.602345] ret_from_fork_asm+0x1a/0x30 [ 12.602720] [ 12.603089] The buggy address belongs to the object at ffff8881029ce300 [ 12.603089] which belongs to the cache kmalloc-128 of size 128 [ 12.604310] The buggy address is located 0 bytes to the right of [ 12.604310] allocated 115-byte region [ffff8881029ce300, ffff8881029ce373) [ 12.605088] [ 12.605252] The buggy address belongs to the physical page: [ 12.605747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce [ 12.606628] flags: 0x200000000000000(node=0|zone=2) [ 12.606805] page_type: f5(slab) [ 12.606928] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.607535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.608242] page dumped because: kasan: bad access detected [ 12.608781] [ 12.609010] Memory state around the buggy address: [ 12.609554] ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.609988] ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.610793] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.611334] ^ [ 12.611657] ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.612302] ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.612913] ================================================================== [ 12.613590] ================================================================== [ 12.614459] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.615138] Read of size 1 at addr ffff8881029ce378 by task kunit_try_catch/213 [ 12.615608] [ 12.615789] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.615831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.615842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.615861] Call Trace: [ 12.615872] <TASK> [ 12.615886] dump_stack_lvl+0x73/0xb0 [ 12.615915] print_report+0xd1/0x610 [ 12.615936] ? __virt_addr_valid+0x1db/0x2d0 [ 12.615957] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.615980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.616002] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.616025] kasan_report+0x141/0x180 [ 12.616046] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.616074] __asan_report_load1_noabort+0x18/0x20 [ 12.616098] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.616121] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.616143] ? finish_task_switch.isra.0+0x153/0x700 [ 12.616186] ? __switch_to+0x47/0xf50 [ 12.616211] ? __schedule+0x10cc/0x2b60 [ 12.616241] ? __pfx_read_tsc+0x10/0x10 [ 12.616260] ? ktime_get_ts64+0x86/0x230 [ 12.616293] kunit_try_run_case+0x1a5/0x480 [ 12.616317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.616338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.616362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.616385] ? __kthread_parkme+0x82/0x180 [ 12.616405] ? preempt_count_sub+0x50/0x80 [ 12.616427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.616450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.616475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.616498] kthread+0x337/0x6f0 [ 12.616517] ? trace_preempt_on+0x20/0xc0 [ 12.616540] ? __pfx_kthread+0x10/0x10 [ 12.616559] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.616580] ? calculate_sigpending+0x7b/0xa0 [ 12.616604] ? __pfx_kthread+0x10/0x10 [ 12.616633] ret_from_fork+0x116/0x1d0 [ 12.616650] ? __pfx_kthread+0x10/0x10 [ 12.616670] ret_from_fork_asm+0x1a/0x30 [ 12.616700] </TASK> [ 12.616709] [ 12.631267] Allocated by task 213: [ 12.631412] kasan_save_stack+0x45/0x70 [ 12.631595] kasan_save_track+0x18/0x40 [ 12.631969] kasan_save_alloc_info+0x3b/0x50 [ 12.632524] __kasan_kmalloc+0xb7/0xc0 [ 12.632883] __kmalloc_cache_noprof+0x189/0x420 [ 12.633389] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.633585] kunit_try_run_case+0x1a5/0x480 [ 12.633991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.634560] kthread+0x337/0x6f0 [ 12.634852] ret_from_fork+0x116/0x1d0 [ 12.635271] ret_from_fork_asm+0x1a/0x30 [ 12.635603] [ 12.635770] The buggy address belongs to the object at ffff8881029ce300 [ 12.635770] which belongs to the cache kmalloc-128 of size 128 [ 12.636787] The buggy address is located 5 bytes to the right of [ 12.636787] allocated 115-byte region [ffff8881029ce300, ffff8881029ce373) [ 12.637779] [ 12.637856] The buggy address belongs to the physical page: [ 12.638081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce [ 12.638930] flags: 0x200000000000000(node=0|zone=2) [ 12.639476] page_type: f5(slab) [ 12.639792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.640404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.641044] page dumped because: kasan: bad access detected [ 12.641533] [ 12.641719] Memory state around the buggy address: [ 12.642010] ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.642231] ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.642639] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.643343] ^ [ 12.643843] ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.644119] ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.644815] ================================================================== [ 12.645976] ================================================================== [ 12.646535] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.646775] Read of size 1 at addr ffff8881029ce37f by task kunit_try_catch/213 [ 12.646998] [ 12.647270] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.647325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.647345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.647365] Call Trace: [ 12.647378] <TASK> [ 12.647391] dump_stack_lvl+0x73/0xb0 [ 12.647431] print_report+0xd1/0x610 [ 12.647452] ? __virt_addr_valid+0x1db/0x2d0 [ 12.647474] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.647496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.647518] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.647541] kasan_report+0x141/0x180 [ 12.647562] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.647591] __asan_report_load1_noabort+0x18/0x20 [ 12.647615] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.647638] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.647660] ? finish_task_switch.isra.0+0x153/0x700 [ 12.647682] ? __switch_to+0x47/0xf50 [ 12.647706] ? __schedule+0x10cc/0x2b60 [ 12.647727] ? __pfx_read_tsc+0x10/0x10 [ 12.647746] ? ktime_get_ts64+0x86/0x230 [ 12.647769] kunit_try_run_case+0x1a5/0x480 [ 12.647792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.647813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.647836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.647858] ? __kthread_parkme+0x82/0x180 [ 12.647878] ? preempt_count_sub+0x50/0x80 [ 12.647900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.647923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.647946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.647969] kthread+0x337/0x6f0 [ 12.647989] ? trace_preempt_on+0x20/0xc0 [ 12.648010] ? __pfx_kthread+0x10/0x10 [ 12.648078] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.648113] ? calculate_sigpending+0x7b/0xa0 [ 12.648136] ? __pfx_kthread+0x10/0x10 [ 12.648156] ret_from_fork+0x116/0x1d0 [ 12.648174] ? __pfx_kthread+0x10/0x10 [ 12.648194] ret_from_fork_asm+0x1a/0x30 [ 12.648223] </TASK> [ 12.648232] [ 12.663901] Allocated by task 213: [ 12.664054] kasan_save_stack+0x45/0x70 [ 12.664204] kasan_save_track+0x18/0x40 [ 12.664481] kasan_save_alloc_info+0x3b/0x50 [ 12.664862] __kasan_kmalloc+0xb7/0xc0 [ 12.665454] __kmalloc_cache_noprof+0x189/0x420 [ 12.665895] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.666407] kunit_try_run_case+0x1a5/0x480 [ 12.666814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.667329] kthread+0x337/0x6f0 [ 12.667679] ret_from_fork+0x116/0x1d0 [ 12.668034] ret_from_fork_asm+0x1a/0x30 [ 12.668467] [ 12.668665] The buggy address belongs to the object at ffff8881029ce300 [ 12.668665] which belongs to the cache kmalloc-128 of size 128 [ 12.669196] The buggy address is located 12 bytes to the right of [ 12.669196] allocated 115-byte region [ffff8881029ce300, ffff8881029ce373) [ 12.670468] [ 12.670634] The buggy address belongs to the physical page: [ 12.671181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce [ 12.671691] flags: 0x200000000000000(node=0|zone=2) [ 12.671857] page_type: f5(slab) [ 12.671976] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.672721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.673613] page dumped because: kasan: bad access detected [ 12.674000] [ 12.674169] Memory state around the buggy address: [ 12.674551] ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.674775] ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.674990] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.675812] ^ [ 12.676483] ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.677296] ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.677930] ==================================================================