Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.631701] ================================================================== [ 19.631815] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.631945] Read of size 1 at addr fff00000c6408278 by task kunit_try_catch/203 [ 19.632063] [ 19.632141] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.632430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.632514] Hardware name: linux,dummy-virt (DT) [ 19.632592] Call trace: [ 19.632644] show_stack+0x20/0x38 (C) [ 19.632761] dump_stack_lvl+0x8c/0xd0 [ 19.633970] print_report+0x118/0x608 [ 19.634221] kasan_report+0xdc/0x128 [ 19.634457] __asan_report_load1_noabort+0x20/0x30 [ 19.634693] ksize_unpoisons_memory+0x618/0x740 [ 19.635121] kunit_try_run_case+0x170/0x3f0 [ 19.635303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.635661] kthread+0x328/0x630 [ 19.635799] ret_from_fork+0x10/0x20 [ 19.635978] [ 19.636049] Allocated by task 203: [ 19.636127] kasan_save_stack+0x3c/0x68 [ 19.636226] kasan_save_track+0x20/0x40 [ 19.636321] kasan_save_alloc_info+0x40/0x58 [ 19.636428] __kasan_kmalloc+0xd4/0xd8 [ 19.636556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.636663] ksize_unpoisons_memory+0xc0/0x740 [ 19.636832] kunit_try_run_case+0x170/0x3f0 [ 19.636933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637045] kthread+0x328/0x630 [ 19.637136] ret_from_fork+0x10/0x20 [ 19.637230] [ 19.637392] The buggy address belongs to the object at fff00000c6408200 [ 19.637392] which belongs to the cache kmalloc-128 of size 128 [ 19.637664] The buggy address is located 5 bytes to the right of [ 19.637664] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.637884] [ 19.637942] The buggy address belongs to the physical page: [ 19.638056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.638183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638316] page_type: f5(slab) [ 19.638547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.638698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.638768] page dumped because: kasan: bad access detected [ 19.638812] [ 19.638856] Memory state around the buggy address: [ 19.638938] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.639097] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639247] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.639456] ^ [ 19.639617] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639764] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.639885] ================================================================== [ 19.623333] ================================================================== [ 19.623489] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.623626] Read of size 1 at addr fff00000c6408273 by task kunit_try_catch/203 [ 19.623755] [ 19.623864] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.624388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.624623] Hardware name: linux,dummy-virt (DT) [ 19.624826] Call trace: [ 19.624931] show_stack+0x20/0x38 (C) [ 19.625096] dump_stack_lvl+0x8c/0xd0 [ 19.625254] print_report+0x118/0x608 [ 19.625377] kasan_report+0xdc/0x128 [ 19.625503] __asan_report_load1_noabort+0x20/0x30 [ 19.625656] ksize_unpoisons_memory+0x628/0x740 [ 19.625777] kunit_try_run_case+0x170/0x3f0 [ 19.626165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.626322] kthread+0x328/0x630 [ 19.626469] ret_from_fork+0x10/0x20 [ 19.626622] [ 19.626683] Allocated by task 203: [ 19.626758] kasan_save_stack+0x3c/0x68 [ 19.626997] kasan_save_track+0x20/0x40 [ 19.627125] kasan_save_alloc_info+0x40/0x58 [ 19.627233] __kasan_kmalloc+0xd4/0xd8 [ 19.627328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.627430] ksize_unpoisons_memory+0xc0/0x740 [ 19.627559] kunit_try_run_case+0x170/0x3f0 [ 19.627680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627813] kthread+0x328/0x630 [ 19.627923] ret_from_fork+0x10/0x20 [ 19.628004] [ 19.628055] The buggy address belongs to the object at fff00000c6408200 [ 19.628055] which belongs to the cache kmalloc-128 of size 128 [ 19.628253] The buggy address is located 0 bytes to the right of [ 19.628253] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.628425] [ 19.628490] The buggy address belongs to the physical page: [ 19.628589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.628751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.628876] page_type: f5(slab) [ 19.628967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.629282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.629526] page dumped because: kasan: bad access detected [ 19.629612] [ 19.629656] Memory state around the buggy address: [ 19.629740] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.630111] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630238] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.630372] ^ [ 19.630517] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630645] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630750] ================================================================== [ 19.640794] ================================================================== [ 19.640918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.641044] Read of size 1 at addr fff00000c640827f by task kunit_try_catch/203 [ 19.641175] [ 19.641255] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 19.641461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.641536] Hardware name: linux,dummy-virt (DT) [ 19.641618] Call trace: [ 19.641677] show_stack+0x20/0x38 (C) [ 19.641795] dump_stack_lvl+0x8c/0xd0 [ 19.642394] print_report+0x118/0x608 [ 19.642702] kasan_report+0xdc/0x128 [ 19.642844] __asan_report_load1_noabort+0x20/0x30 [ 19.642954] ksize_unpoisons_memory+0x690/0x740 [ 19.643494] kunit_try_run_case+0x170/0x3f0 [ 19.643831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.644132] kthread+0x328/0x630 [ 19.644334] ret_from_fork+0x10/0x20 [ 19.644584] [ 19.644637] Allocated by task 203: [ 19.644826] kasan_save_stack+0x3c/0x68 [ 19.645174] kasan_save_track+0x20/0x40 [ 19.645418] kasan_save_alloc_info+0x40/0x58 [ 19.645537] __kasan_kmalloc+0xd4/0xd8 [ 19.645631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.645733] ksize_unpoisons_memory+0xc0/0x740 [ 19.646151] kunit_try_run_case+0x170/0x3f0 [ 19.646561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.646896] kthread+0x328/0x630 [ 19.647239] ret_from_fork+0x10/0x20 [ 19.647646] [ 19.647765] The buggy address belongs to the object at fff00000c6408200 [ 19.647765] which belongs to the cache kmalloc-128 of size 128 [ 19.648409] The buggy address is located 12 bytes to the right of [ 19.648409] allocated 115-byte region [fff00000c6408200, fff00000c6408273) [ 19.648700] [ 19.648771] The buggy address belongs to the physical page: [ 19.648854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 19.649027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.649780] page_type: f5(slab) [ 19.649923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.650052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.650140] page dumped because: kasan: bad access detected [ 19.650209] [ 19.650248] Memory state around the buggy address: [ 19.650326] fff00000c6408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.650440] fff00000c6408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650602] >fff00000c6408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.650804] ^ [ 19.650967] fff00000c6408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651177] fff00000c6408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651381] ==================================================================
[ 11.890823] ================================================================== [ 11.891841] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.892555] Read of size 1 at addr ffff8881028e2578 by task kunit_try_catch/219 [ 11.893261] [ 11.893469] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.893532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.893543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.893564] Call Trace: [ 11.893577] <TASK> [ 11.893596] dump_stack_lvl+0x73/0xb0 [ 11.893627] print_report+0xd1/0x650 [ 11.893725] ? __virt_addr_valid+0x1db/0x2d0 [ 11.893749] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.893771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.893793] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.893815] kasan_report+0x141/0x180 [ 11.893836] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.893863] __asan_report_load1_noabort+0x18/0x20 [ 11.893886] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.893908] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.893938] ? finish_task_switch.isra.0+0x153/0x700 [ 11.893960] ? __switch_to+0x47/0xf50 [ 11.893985] ? __schedule+0x10cc/0x2b60 [ 11.894006] ? __pfx_read_tsc+0x10/0x10 [ 11.894027] ? ktime_get_ts64+0x86/0x230 [ 11.894052] kunit_try_run_case+0x1a5/0x480 [ 11.894076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.894097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.894118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.894139] ? __kthread_parkme+0x82/0x180 [ 11.894159] ? preempt_count_sub+0x50/0x80 [ 11.894181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.894203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.894225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.894246] kthread+0x337/0x6f0 [ 11.894265] ? trace_preempt_on+0x20/0xc0 [ 11.894288] ? __pfx_kthread+0x10/0x10 [ 11.894307] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.894327] ? calculate_sigpending+0x7b/0xa0 [ 11.894350] ? __pfx_kthread+0x10/0x10 [ 11.894371] ret_from_fork+0x116/0x1d0 [ 11.894630] ? __pfx_kthread+0x10/0x10 [ 11.894654] ret_from_fork_asm+0x1a/0x30 [ 11.894684] </TASK> [ 11.894696] [ 11.907013] Allocated by task 219: [ 11.907142] kasan_save_stack+0x45/0x70 [ 11.907303] kasan_save_track+0x18/0x40 [ 11.907432] kasan_save_alloc_info+0x3b/0x50 [ 11.907614] __kasan_kmalloc+0xb7/0xc0 [ 11.907942] __kmalloc_cache_noprof+0x189/0x420 [ 11.908171] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.908361] kunit_try_run_case+0x1a5/0x480 [ 11.908570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.908775] kthread+0x337/0x6f0 [ 11.908978] ret_from_fork+0x116/0x1d0 [ 11.909165] ret_from_fork_asm+0x1a/0x30 [ 11.909355] [ 11.909421] The buggy address belongs to the object at ffff8881028e2500 [ 11.909421] which belongs to the cache kmalloc-128 of size 128 [ 11.910113] The buggy address is located 5 bytes to the right of [ 11.910113] allocated 115-byte region [ffff8881028e2500, ffff8881028e2573) [ 11.911055] [ 11.911169] The buggy address belongs to the physical page: [ 11.911966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e2 [ 11.912237] flags: 0x200000000000000(node=0|zone=2) [ 11.912406] page_type: f5(slab) [ 11.912522] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.912743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.913085] page dumped because: kasan: bad access detected [ 11.913303] [ 11.913369] Memory state around the buggy address: [ 11.913872] ffff8881028e2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.914242] ffff8881028e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.914801] >ffff8881028e2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.915511] ^ [ 11.915857] ffff8881028e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.916080] ffff8881028e2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.916284] ================================================================== [ 11.860057] ================================================================== [ 11.860753] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.861067] Read of size 1 at addr ffff8881028e2573 by task kunit_try_catch/219 [ 11.861369] [ 11.861572] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.861623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.861635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.861656] Call Trace: [ 11.861669] <TASK> [ 11.861695] dump_stack_lvl+0x73/0xb0 [ 11.861728] print_report+0xd1/0x650 [ 11.861750] ? __virt_addr_valid+0x1db/0x2d0 [ 11.861774] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.861795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.861815] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.861837] kasan_report+0x141/0x180 [ 11.861857] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.861883] __asan_report_load1_noabort+0x18/0x20 [ 11.861907] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.861942] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.861963] ? finish_task_switch.isra.0+0x153/0x700 [ 11.861986] ? __switch_to+0x47/0xf50 [ 11.862012] ? __schedule+0x10cc/0x2b60 [ 11.862034] ? __pfx_read_tsc+0x10/0x10 [ 11.862056] ? ktime_get_ts64+0x86/0x230 [ 11.862081] kunit_try_run_case+0x1a5/0x480 [ 11.862106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.862126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.862148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.862169] ? __kthread_parkme+0x82/0x180 [ 11.862189] ? preempt_count_sub+0x50/0x80 [ 11.862210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.862232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.862254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.862276] kthread+0x337/0x6f0 [ 11.862294] ? trace_preempt_on+0x20/0xc0 [ 11.862319] ? __pfx_kthread+0x10/0x10 [ 11.862339] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.862358] ? calculate_sigpending+0x7b/0xa0 [ 11.862381] ? __pfx_kthread+0x10/0x10 [ 11.862458] ret_from_fork+0x116/0x1d0 [ 11.862477] ? __pfx_kthread+0x10/0x10 [ 11.862497] ret_from_fork_asm+0x1a/0x30 [ 11.862527] </TASK> [ 11.862539] [ 11.871765] Allocated by task 219: [ 11.871919] kasan_save_stack+0x45/0x70 [ 11.873792] kasan_save_track+0x18/0x40 [ 11.874761] kasan_save_alloc_info+0x3b/0x50 [ 11.875533] __kasan_kmalloc+0xb7/0xc0 [ 11.876187] __kmalloc_cache_noprof+0x189/0x420 [ 11.877012] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.877619] kunit_try_run_case+0x1a5/0x480 [ 11.878214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.879130] kthread+0x337/0x6f0 [ 11.879682] ret_from_fork+0x116/0x1d0 [ 11.880232] ret_from_fork_asm+0x1a/0x30 [ 11.880701] [ 11.880875] The buggy address belongs to the object at ffff8881028e2500 [ 11.880875] which belongs to the cache kmalloc-128 of size 128 [ 11.882040] The buggy address is located 0 bytes to the right of [ 11.882040] allocated 115-byte region [ffff8881028e2500, ffff8881028e2573) [ 11.882949] [ 11.883036] The buggy address belongs to the physical page: [ 11.883208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e2 [ 11.883695] flags: 0x200000000000000(node=0|zone=2) [ 11.884185] page_type: f5(slab) [ 11.884786] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.885550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.886221] page dumped because: kasan: bad access detected [ 11.886777] [ 11.886894] Memory state around the buggy address: [ 11.887180] ffff8881028e2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.887715] ffff8881028e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.887946] >ffff8881028e2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.888624] ^ [ 11.889219] ffff8881028e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.889685] ffff8881028e2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.889895] ================================================================== [ 11.918008] ================================================================== [ 11.918302] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.918628] Read of size 1 at addr ffff8881028e257f by task kunit_try_catch/219 [ 11.919067] [ 11.919156] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 11.919200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.919210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.919229] Call Trace: [ 11.919241] <TASK> [ 11.919255] dump_stack_lvl+0x73/0xb0 [ 11.919285] print_report+0xd1/0x650 [ 11.919305] ? __virt_addr_valid+0x1db/0x2d0 [ 11.919329] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.919352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.919375] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.919732] kasan_report+0x141/0x180 [ 11.919764] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.919806] __asan_report_load1_noabort+0x18/0x20 [ 11.919830] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.919853] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.919874] ? finish_task_switch.isra.0+0x153/0x700 [ 11.919898] ? __switch_to+0x47/0xf50 [ 11.919924] ? __schedule+0x10cc/0x2b60 [ 11.919963] ? __pfx_read_tsc+0x10/0x10 [ 11.919983] ? ktime_get_ts64+0x86/0x230 [ 11.920009] kunit_try_run_case+0x1a5/0x480 [ 11.920044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.920065] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.920086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.920118] ? __kthread_parkme+0x82/0x180 [ 11.920138] ? preempt_count_sub+0x50/0x80 [ 11.920160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.920193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.920215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.920236] kthread+0x337/0x6f0 [ 11.920266] ? trace_preempt_on+0x20/0xc0 [ 11.920289] ? __pfx_kthread+0x10/0x10 [ 11.920309] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.920339] ? calculate_sigpending+0x7b/0xa0 [ 11.920362] ? __pfx_kthread+0x10/0x10 [ 11.920383] ret_from_fork+0x116/0x1d0 [ 11.920425] ? __pfx_kthread+0x10/0x10 [ 11.920444] ret_from_fork_asm+0x1a/0x30 [ 11.920474] </TASK> [ 11.920518] [ 11.933817] Allocated by task 219: [ 11.933960] kasan_save_stack+0x45/0x70 [ 11.934102] kasan_save_track+0x18/0x40 [ 11.934227] kasan_save_alloc_info+0x3b/0x50 [ 11.934364] __kasan_kmalloc+0xb7/0xc0 [ 11.934981] __kmalloc_cache_noprof+0x189/0x420 [ 11.935485] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.936119] kunit_try_run_case+0x1a5/0x480 [ 11.936570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.937065] kthread+0x337/0x6f0 [ 11.937382] ret_from_fork+0x116/0x1d0 [ 11.937825] ret_from_fork_asm+0x1a/0x30 [ 11.938214] [ 11.938390] The buggy address belongs to the object at ffff8881028e2500 [ 11.938390] which belongs to the cache kmalloc-128 of size 128 [ 11.939247] The buggy address is located 12 bytes to the right of [ 11.939247] allocated 115-byte region [ffff8881028e2500, ffff8881028e2573) [ 11.940224] [ 11.940410] The buggy address belongs to the physical page: [ 11.940969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e2 [ 11.941246] flags: 0x200000000000000(node=0|zone=2) [ 11.941475] page_type: f5(slab) [ 11.941794] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.942610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.943202] page dumped because: kasan: bad access detected [ 11.943362] [ 11.943577] Memory state around the buggy address: [ 11.943998] ffff8881028e2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.944673] ffff8881028e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.944927] >ffff8881028e2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.945136] ^ [ 11.945332] ffff8881028e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.945536] ffff8881028e2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.946240] ==================================================================