Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.244146] ================================================================== [ 17.244405] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.244491] Read of size 1 at addr fff00000c5733b7f by task kunit_try_catch/195 [ 17.244544] [ 17.244652] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.244766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.244879] Hardware name: linux,dummy-virt (DT) [ 17.244926] Call trace: [ 17.244967] show_stack+0x20/0x38 (C) [ 17.245033] dump_stack_lvl+0x8c/0xd0 [ 17.245089] print_report+0x118/0x608 [ 17.245136] kasan_report+0xdc/0x128 [ 17.245180] __asan_report_load1_noabort+0x20/0x30 [ 17.245614] ksize_unpoisons_memory+0x690/0x740 [ 17.245718] kunit_try_run_case+0x170/0x3f0 [ 17.245790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.245986] kthread+0x328/0x630 [ 17.246203] ret_from_fork+0x10/0x20 [ 17.246415] [ 17.246463] Allocated by task 195: [ 17.246552] kasan_save_stack+0x3c/0x68 [ 17.246674] kasan_save_track+0x20/0x40 [ 17.246750] kasan_save_alloc_info+0x40/0x58 [ 17.246904] __kasan_kmalloc+0xd4/0xd8 [ 17.247093] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.247169] ksize_unpoisons_memory+0xc0/0x740 [ 17.247209] kunit_try_run_case+0x170/0x3f0 [ 17.247584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.248155] kthread+0x328/0x630 [ 17.248419] ret_from_fork+0x10/0x20 [ 17.248500] [ 17.248537] The buggy address belongs to the object at fff00000c5733b00 [ 17.248537] which belongs to the cache kmalloc-128 of size 128 [ 17.248727] The buggy address is located 12 bytes to the right of [ 17.248727] allocated 115-byte region [fff00000c5733b00, fff00000c5733b73) [ 17.248811] [ 17.248839] The buggy address belongs to the physical page: [ 17.248891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 17.248950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.249002] page_type: f5(slab) [ 17.249040] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.249102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.249153] page dumped because: kasan: bad access detected [ 17.249185] [ 17.249210] Memory state around the buggy address: [ 17.249251] fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.249304] fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.249710] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.249945] ^ [ 17.250162] fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.250218] fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.250335] ================================================================== [ 17.229912] ================================================================== [ 17.229995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.230082] Read of size 1 at addr fff00000c5733b73 by task kunit_try_catch/195 [ 17.230134] [ 17.230217] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.230304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.230330] Hardware name: linux,dummy-virt (DT) [ 17.230501] Call trace: [ 17.230525] show_stack+0x20/0x38 (C) [ 17.230676] dump_stack_lvl+0x8c/0xd0 [ 17.230841] print_report+0x118/0x608 [ 17.231000] kasan_report+0xdc/0x128 [ 17.231087] __asan_report_load1_noabort+0x20/0x30 [ 17.231224] ksize_unpoisons_memory+0x628/0x740 [ 17.231300] kunit_try_run_case+0x170/0x3f0 [ 17.231447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.231536] kthread+0x328/0x630 [ 17.231593] ret_from_fork+0x10/0x20 [ 17.231797] [ 17.231960] Allocated by task 195: [ 17.232025] kasan_save_stack+0x3c/0x68 [ 17.232190] kasan_save_track+0x20/0x40 [ 17.232281] kasan_save_alloc_info+0x40/0x58 [ 17.232431] __kasan_kmalloc+0xd4/0xd8 [ 17.232501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.232550] ksize_unpoisons_memory+0xc0/0x740 [ 17.232926] kunit_try_run_case+0x170/0x3f0 [ 17.233218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.233345] kthread+0x328/0x630 [ 17.233507] ret_from_fork+0x10/0x20 [ 17.233579] [ 17.233648] The buggy address belongs to the object at fff00000c5733b00 [ 17.233648] which belongs to the cache kmalloc-128 of size 128 [ 17.233757] The buggy address is located 0 bytes to the right of [ 17.233757] allocated 115-byte region [fff00000c5733b00, fff00000c5733b73) [ 17.233911] [ 17.233970] The buggy address belongs to the physical page: [ 17.234157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 17.234224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.234277] page_type: f5(slab) [ 17.234447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.234611] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.234699] page dumped because: kasan: bad access detected [ 17.234826] [ 17.234888] Memory state around the buggy address: [ 17.234947] fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.235067] fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.235121] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.235184] ^ [ 17.235227] fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.235548] fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.235673] ================================================================== [ 17.236862] ================================================================== [ 17.236949] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.237004] Read of size 1 at addr fff00000c5733b78 by task kunit_try_catch/195 [ 17.237216] [ 17.237255] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.237694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.237795] Hardware name: linux,dummy-virt (DT) [ 17.237853] Call trace: [ 17.237960] show_stack+0x20/0x38 (C) [ 17.238088] dump_stack_lvl+0x8c/0xd0 [ 17.238191] print_report+0x118/0x608 [ 17.238242] kasan_report+0xdc/0x128 [ 17.238289] __asan_report_load1_noabort+0x20/0x30 [ 17.238341] ksize_unpoisons_memory+0x618/0x740 [ 17.238389] kunit_try_run_case+0x170/0x3f0 [ 17.238765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.238917] kthread+0x328/0x630 [ 17.239057] ret_from_fork+0x10/0x20 [ 17.239159] [ 17.239265] Allocated by task 195: [ 17.239363] kasan_save_stack+0x3c/0x68 [ 17.239408] kasan_save_track+0x20/0x40 [ 17.239453] kasan_save_alloc_info+0x40/0x58 [ 17.239671] __kasan_kmalloc+0xd4/0xd8 [ 17.239718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.239760] ksize_unpoisons_memory+0xc0/0x740 [ 17.239852] kunit_try_run_case+0x170/0x3f0 [ 17.239894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.239949] kthread+0x328/0x630 [ 17.239992] ret_from_fork+0x10/0x20 [ 17.240038] [ 17.240058] The buggy address belongs to the object at fff00000c5733b00 [ 17.240058] which belongs to the cache kmalloc-128 of size 128 [ 17.240134] The buggy address is located 5 bytes to the right of [ 17.240134] allocated 115-byte region [fff00000c5733b00, fff00000c5733b73) [ 17.240210] [ 17.240244] The buggy address belongs to the physical page: [ 17.240284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 17.240359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.240409] page_type: f5(slab) [ 17.240471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.240524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.240577] page dumped because: kasan: bad access detected [ 17.241091] [ 17.241138] Memory state around the buggy address: [ 17.241225] fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.241276] fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.241693] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.241779] ^ [ 17.241870] fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.242031] fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.242118] ==================================================================
[ 12.066288] ================================================================== [ 12.066846] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.067207] Read of size 1 at addr ffff8881027c2a7f by task kunit_try_catch/211 [ 12.067503] [ 12.067615] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.067656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.067667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.067687] Call Trace: [ 12.067704] <TASK> [ 12.067720] dump_stack_lvl+0x73/0xb0 [ 12.067746] print_report+0xd1/0x650 [ 12.067767] ? __virt_addr_valid+0x1db/0x2d0 [ 12.067812] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.067833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.067854] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.067876] kasan_report+0x141/0x180 [ 12.067896] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.067923] __asan_report_load1_noabort+0x18/0x20 [ 12.067945] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.067967] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.067988] ? finish_task_switch.isra.0+0x153/0x700 [ 12.068009] ? __switch_to+0x47/0xf50 [ 12.068042] ? __schedule+0x10cc/0x2b60 [ 12.068063] ? __pfx_read_tsc+0x10/0x10 [ 12.068083] ? ktime_get_ts64+0x86/0x230 [ 12.068106] kunit_try_run_case+0x1a5/0x480 [ 12.068128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.068152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.068174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.068195] ? __kthread_parkme+0x82/0x180 [ 12.068215] ? preempt_count_sub+0x50/0x80 [ 12.068236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.068258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.068279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.068300] kthread+0x337/0x6f0 [ 12.068318] ? trace_preempt_on+0x20/0xc0 [ 12.068340] ? __pfx_kthread+0x10/0x10 [ 12.068359] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.068379] ? calculate_sigpending+0x7b/0xa0 [ 12.068401] ? __pfx_kthread+0x10/0x10 [ 12.068421] ret_from_fork+0x116/0x1d0 [ 12.068457] ? __pfx_kthread+0x10/0x10 [ 12.068478] ret_from_fork_asm+0x1a/0x30 [ 12.068508] </TASK> [ 12.068519] [ 12.076488] Allocated by task 211: [ 12.076635] kasan_save_stack+0x45/0x70 [ 12.076841] kasan_save_track+0x18/0x40 [ 12.077040] kasan_save_alloc_info+0x3b/0x50 [ 12.077253] __kasan_kmalloc+0xb7/0xc0 [ 12.077422] __kmalloc_cache_noprof+0x189/0x420 [ 12.077579] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.077825] kunit_try_run_case+0x1a5/0x480 [ 12.078013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.078245] kthread+0x337/0x6f0 [ 12.078366] ret_from_fork+0x116/0x1d0 [ 12.078552] ret_from_fork_asm+0x1a/0x30 [ 12.078887] [ 12.078973] The buggy address belongs to the object at ffff8881027c2a00 [ 12.078973] which belongs to the cache kmalloc-128 of size 128 [ 12.079355] The buggy address is located 12 bytes to the right of [ 12.079355] allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73) [ 12.079898] [ 12.079970] The buggy address belongs to the physical page: [ 12.080157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2 [ 12.080798] flags: 0x200000000000000(node=0|zone=2) [ 12.081051] page_type: f5(slab) [ 12.081196] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.081503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.081737] page dumped because: kasan: bad access detected [ 12.082141] [ 12.082224] Memory state around the buggy address: [ 12.082422] ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.082696] ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.083005] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.083312] ^ [ 12.083563] ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.083834] ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.084159] ================================================================== [ 12.047222] ================================================================== [ 12.047535] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.048122] Read of size 1 at addr ffff8881027c2a78 by task kunit_try_catch/211 [ 12.048783] [ 12.048934] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.048981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.048992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.049013] Call Trace: [ 12.049038] <TASK> [ 12.049055] dump_stack_lvl+0x73/0xb0 [ 12.049106] print_report+0xd1/0x650 [ 12.049128] ? __virt_addr_valid+0x1db/0x2d0 [ 12.049152] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.049173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.049195] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.049216] kasan_report+0x141/0x180 [ 12.049255] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.049282] __asan_report_load1_noabort+0x18/0x20 [ 12.049305] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.049327] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.049348] ? finish_task_switch.isra.0+0x153/0x700 [ 12.049369] ? __switch_to+0x47/0xf50 [ 12.049393] ? __schedule+0x10cc/0x2b60 [ 12.049414] ? __pfx_read_tsc+0x10/0x10 [ 12.049435] ? ktime_get_ts64+0x86/0x230 [ 12.049460] kunit_try_run_case+0x1a5/0x480 [ 12.049483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.049504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.049526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.049567] ? __kthread_parkme+0x82/0x180 [ 12.049588] ? preempt_count_sub+0x50/0x80 [ 12.049609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.049631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.049652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.049674] kthread+0x337/0x6f0 [ 12.049692] ? trace_preempt_on+0x20/0xc0 [ 12.049715] ? __pfx_kthread+0x10/0x10 [ 12.049735] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.049755] ? calculate_sigpending+0x7b/0xa0 [ 12.049777] ? __pfx_kthread+0x10/0x10 [ 12.049797] ret_from_fork+0x116/0x1d0 [ 12.049814] ? __pfx_kthread+0x10/0x10 [ 12.049833] ret_from_fork_asm+0x1a/0x30 [ 12.049864] </TASK> [ 12.049875] [ 12.057213] Allocated by task 211: [ 12.057341] kasan_save_stack+0x45/0x70 [ 12.057750] kasan_save_track+0x18/0x40 [ 12.057942] kasan_save_alloc_info+0x3b/0x50 [ 12.058184] __kasan_kmalloc+0xb7/0xc0 [ 12.058376] __kmalloc_cache_noprof+0x189/0x420 [ 12.058597] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.058890] kunit_try_run_case+0x1a5/0x480 [ 12.059048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.059286] kthread+0x337/0x6f0 [ 12.059407] ret_from_fork+0x116/0x1d0 [ 12.059537] ret_from_fork_asm+0x1a/0x30 [ 12.059676] [ 12.059790] The buggy address belongs to the object at ffff8881027c2a00 [ 12.059790] which belongs to the cache kmalloc-128 of size 128 [ 12.060329] The buggy address is located 5 bytes to the right of [ 12.060329] allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73) [ 12.060861] [ 12.060936] The buggy address belongs to the physical page: [ 12.061160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2 [ 12.061518] flags: 0x200000000000000(node=0|zone=2) [ 12.061787] page_type: f5(slab) [ 12.061912] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.062232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.062561] page dumped because: kasan: bad access detected [ 12.062872] [ 12.062948] Memory state around the buggy address: [ 12.063120] ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.063341] ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.063553] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.064117] ^ [ 12.064651] ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.064991] ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.065267] ================================================================== [ 12.028608] ================================================================== [ 12.029123] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.029467] Read of size 1 at addr ffff8881027c2a73 by task kunit_try_catch/211 [ 12.029753] [ 12.029882] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.029928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.029939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.029960] Call Trace: [ 12.029972] <TASK> [ 12.029990] dump_stack_lvl+0x73/0xb0 [ 12.030019] print_report+0xd1/0x650 [ 12.030053] ? __virt_addr_valid+0x1db/0x2d0 [ 12.030098] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.030120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.030141] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.030163] kasan_report+0x141/0x180 [ 12.030183] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.030209] __asan_report_load1_noabort+0x18/0x20 [ 12.030232] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.030254] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.030275] ? finish_task_switch.isra.0+0x153/0x700 [ 12.030296] ? __switch_to+0x47/0xf50 [ 12.030321] ? __schedule+0x10cc/0x2b60 [ 12.030343] ? __pfx_read_tsc+0x10/0x10 [ 12.030363] ? ktime_get_ts64+0x86/0x230 [ 12.030386] kunit_try_run_case+0x1a5/0x480 [ 12.030430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.030450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.030474] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.030495] ? __kthread_parkme+0x82/0x180 [ 12.030515] ? preempt_count_sub+0x50/0x80 [ 12.030536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.030558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.030580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.030601] kthread+0x337/0x6f0 [ 12.030619] ? trace_preempt_on+0x20/0xc0 [ 12.030641] ? __pfx_kthread+0x10/0x10 [ 12.030660] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.030680] ? calculate_sigpending+0x7b/0xa0 [ 12.030702] ? __pfx_kthread+0x10/0x10 [ 12.030724] ret_from_fork+0x116/0x1d0 [ 12.030741] ? __pfx_kthread+0x10/0x10 [ 12.030760] ret_from_fork_asm+0x1a/0x30 [ 12.030790] </TASK> [ 12.030801] [ 12.038383] Allocated by task 211: [ 12.038566] kasan_save_stack+0x45/0x70 [ 12.038860] kasan_save_track+0x18/0x40 [ 12.038997] kasan_save_alloc_info+0x3b/0x50 [ 12.039155] __kasan_kmalloc+0xb7/0xc0 [ 12.039342] __kmalloc_cache_noprof+0x189/0x420 [ 12.039570] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.039934] kunit_try_run_case+0x1a5/0x480 [ 12.040090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.040267] kthread+0x337/0x6f0 [ 12.040437] ret_from_fork+0x116/0x1d0 [ 12.040623] ret_from_fork_asm+0x1a/0x30 [ 12.040831] [ 12.040926] The buggy address belongs to the object at ffff8881027c2a00 [ 12.040926] which belongs to the cache kmalloc-128 of size 128 [ 12.041408] The buggy address is located 0 bytes to the right of [ 12.041408] allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73) [ 12.041813] [ 12.041914] The buggy address belongs to the physical page: [ 12.042188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2 [ 12.042546] flags: 0x200000000000000(node=0|zone=2) [ 12.042946] page_type: f5(slab) [ 12.043152] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.043453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.043766] page dumped because: kasan: bad access detected [ 12.043931] [ 12.043999] Memory state around the buggy address: [ 12.044168] ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.044377] ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.044584] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.045235] ^ [ 12.045557] ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.045875] ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.046222] ==================================================================