Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.944767] ================================================================== [ 19.944821] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.944891] Read of size 1 at addr fff00000c64b5278 by task kunit_try_catch/195 [ 19.944946] [ 19.944992] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.945086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.945115] Hardware name: linux,dummy-virt (DT) [ 19.945153] Call trace: [ 19.945188] show_stack+0x20/0x38 (C) [ 19.945238] dump_stack_lvl+0x8c/0xd0 [ 19.945284] print_report+0x118/0x608 [ 19.945331] kasan_report+0xdc/0x128 [ 19.945442] __asan_report_load1_noabort+0x20/0x30 [ 19.945705] ksize_unpoisons_memory+0x618/0x740 [ 19.945754] kunit_try_run_case+0x170/0x3f0 [ 19.945804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.945858] kthread+0x328/0x630 [ 19.945903] ret_from_fork+0x10/0x20 [ 19.945950] [ 19.945967] Allocated by task 195: [ 19.945994] kasan_save_stack+0x3c/0x68 [ 19.946035] kasan_save_track+0x20/0x40 [ 19.946072] kasan_save_alloc_info+0x40/0x58 [ 19.946114] __kasan_kmalloc+0xd4/0xd8 [ 19.946151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.946190] ksize_unpoisons_memory+0xc0/0x740 [ 19.946229] kunit_try_run_case+0x170/0x3f0 [ 19.946267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.946309] kthread+0x328/0x630 [ 19.946341] ret_from_fork+0x10/0x20 [ 19.946376] [ 19.946394] The buggy address belongs to the object at fff00000c64b5200 [ 19.946394] which belongs to the cache kmalloc-128 of size 128 [ 19.946471] The buggy address is located 5 bytes to the right of [ 19.946471] allocated 115-byte region [fff00000c64b5200, fff00000c64b5273) [ 19.946537] [ 19.946555] The buggy address belongs to the physical page: [ 19.946586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5 [ 19.946640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.946688] page_type: f5(slab) [ 19.946725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.946776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.946829] page dumped because: kasan: bad access detected [ 19.946871] [ 19.946891] Memory state around the buggy address: [ 19.946922] fff00000c64b5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.946974] fff00000c64b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.947027] >fff00000c64b5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.947065] ^ [ 19.947115] fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.947181] fff00000c64b5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.947220] ================================================================== [ 19.939700] ================================================================== [ 19.939794] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.939864] Read of size 1 at addr fff00000c64b5273 by task kunit_try_catch/195 [ 19.939917] [ 19.939957] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.940044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.941118] Hardware name: linux,dummy-virt (DT) [ 19.941155] Call trace: [ 19.941182] show_stack+0x20/0x38 (C) [ 19.941244] dump_stack_lvl+0x8c/0xd0 [ 19.941294] print_report+0x118/0x608 [ 19.941343] kasan_report+0xdc/0x128 [ 19.941390] __asan_report_load1_noabort+0x20/0x30 [ 19.941458] ksize_unpoisons_memory+0x628/0x740 [ 19.941548] kunit_try_run_case+0x170/0x3f0 [ 19.941656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.941736] kthread+0x328/0x630 [ 19.941815] ret_from_fork+0x10/0x20 [ 19.941913] [ 19.941985] Allocated by task 195: [ 19.942069] kasan_save_stack+0x3c/0x68 [ 19.942141] kasan_save_track+0x20/0x40 [ 19.942180] kasan_save_alloc_info+0x40/0x58 [ 19.942222] __kasan_kmalloc+0xd4/0xd8 [ 19.942259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.942301] ksize_unpoisons_memory+0xc0/0x740 [ 19.942341] kunit_try_run_case+0x170/0x3f0 [ 19.942380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.942444] kthread+0x328/0x630 [ 19.942479] ret_from_fork+0x10/0x20 [ 19.942563] [ 19.942631] The buggy address belongs to the object at fff00000c64b5200 [ 19.942631] which belongs to the cache kmalloc-128 of size 128 [ 19.942745] The buggy address is located 0 bytes to the right of [ 19.942745] allocated 115-byte region [fff00000c64b5200, fff00000c64b5273) [ 19.942848] [ 19.942893] The buggy address belongs to the physical page: [ 19.942962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5 [ 19.943038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.943093] page_type: f5(slab) [ 19.943354] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.943500] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.943555] page dumped because: kasan: bad access detected [ 19.943587] [ 19.943615] Memory state around the buggy address: [ 19.943657] fff00000c64b5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.943719] fff00000c64b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.943776] >fff00000c64b5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.943817] ^ [ 19.943858] fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.943915] fff00000c64b5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.943956] ================================================================== [ 19.947357] ================================================================== [ 19.947419] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.947466] Read of size 1 at addr fff00000c64b527f by task kunit_try_catch/195 [ 19.947517] [ 19.947555] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.947638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.947672] Hardware name: linux,dummy-virt (DT) [ 19.947703] Call trace: [ 19.947732] show_stack+0x20/0x38 (C) [ 19.947783] dump_stack_lvl+0x8c/0xd0 [ 19.947829] print_report+0x118/0x608 [ 19.947887] kasan_report+0xdc/0x128 [ 19.947933] __asan_report_load1_noabort+0x20/0x30 [ 19.947993] ksize_unpoisons_memory+0x690/0x740 [ 19.948081] kunit_try_run_case+0x170/0x3f0 [ 19.948132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.948187] kthread+0x328/0x630 [ 19.948229] ret_from_fork+0x10/0x20 [ 19.948278] [ 19.948297] Allocated by task 195: [ 19.948325] kasan_save_stack+0x3c/0x68 [ 19.948365] kasan_save_track+0x20/0x40 [ 19.948421] kasan_save_alloc_info+0x40/0x58 [ 19.948462] __kasan_kmalloc+0xd4/0xd8 [ 19.948500] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.948540] ksize_unpoisons_memory+0xc0/0x740 [ 19.948580] kunit_try_run_case+0x170/0x3f0 [ 19.948619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.948702] kthread+0x328/0x630 [ 19.948758] ret_from_fork+0x10/0x20 [ 19.948794] [ 19.948813] The buggy address belongs to the object at fff00000c64b5200 [ 19.948813] which belongs to the cache kmalloc-128 of size 128 [ 19.948872] The buggy address is located 12 bytes to the right of [ 19.948872] allocated 115-byte region [fff00000c64b5200, fff00000c64b5273) [ 19.948939] [ 19.948959] The buggy address belongs to the physical page: [ 19.948989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5 [ 19.949041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.949095] page_type: f5(slab) [ 19.949154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.949230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.949308] page dumped because: kasan: bad access detected [ 19.949367] [ 19.949478] Memory state around the buggy address: [ 19.949546] fff00000c64b5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.949624] fff00000c64b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.949685] >fff00000c64b5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.949752] ^ [ 19.949812] fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.949881] fff00000c64b5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.949940] ==================================================================
[ 13.076266] ================================================================== [ 13.076622] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.077014] Read of size 1 at addr ffff8881026ad178 by task kunit_try_catch/211 [ 13.077847] [ 13.078286] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.078335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.078346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.078366] Call Trace: [ 13.078384] <TASK> [ 13.078401] dump_stack_lvl+0x73/0xb0 [ 13.078433] print_report+0xd1/0x650 [ 13.078455] ? __virt_addr_valid+0x1db/0x2d0 [ 13.078477] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.078500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.078523] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.078546] kasan_report+0x141/0x180 [ 13.078567] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.078594] __asan_report_load1_noabort+0x18/0x20 [ 13.078618] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.078642] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.078665] ? finish_task_switch.isra.0+0x153/0x700 [ 13.078687] ? __switch_to+0x47/0xf50 [ 13.078717] ? __schedule+0x10cc/0x2b60 [ 13.078739] ? __pfx_read_tsc+0x10/0x10 [ 13.078760] ? ktime_get_ts64+0x86/0x230 [ 13.078783] kunit_try_run_case+0x1a5/0x480 [ 13.078807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.078829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.078853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.078876] ? __kthread_parkme+0x82/0x180 [ 13.078897] ? preempt_count_sub+0x50/0x80 [ 13.078919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.079017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.079042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.079069] kthread+0x337/0x6f0 [ 13.079088] ? trace_preempt_on+0x20/0xc0 [ 13.079112] ? __pfx_kthread+0x10/0x10 [ 13.079132] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.079154] ? calculate_sigpending+0x7b/0xa0 [ 13.079177] ? __pfx_kthread+0x10/0x10 [ 13.079198] ret_from_fork+0x116/0x1d0 [ 13.079216] ? __pfx_kthread+0x10/0x10 [ 13.079236] ret_from_fork_asm+0x1a/0x30 [ 13.079285] </TASK> [ 13.079295] [ 13.089786] Allocated by task 211: [ 13.089982] kasan_save_stack+0x45/0x70 [ 13.090147] kasan_save_track+0x18/0x40 [ 13.090343] kasan_save_alloc_info+0x3b/0x50 [ 13.090546] __kasan_kmalloc+0xb7/0xc0 [ 13.090746] __kmalloc_cache_noprof+0x189/0x420 [ 13.091646] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.091845] kunit_try_run_case+0x1a5/0x480 [ 13.092108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.092553] kthread+0x337/0x6f0 [ 13.092718] ret_from_fork+0x116/0x1d0 [ 13.093294] ret_from_fork_asm+0x1a/0x30 [ 13.093469] [ 13.093548] The buggy address belongs to the object at ffff8881026ad100 [ 13.093548] which belongs to the cache kmalloc-128 of size 128 [ 13.094441] The buggy address is located 5 bytes to the right of [ 13.094441] allocated 115-byte region [ffff8881026ad100, ffff8881026ad173) [ 13.095133] [ 13.095236] The buggy address belongs to the physical page: [ 13.095677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ad [ 13.096115] flags: 0x200000000000000(node=0|zone=2) [ 13.096340] page_type: f5(slab) [ 13.096481] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.096824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.097156] page dumped because: kasan: bad access detected [ 13.097388] [ 13.097470] Memory state around the buggy address: [ 13.097676] ffff8881026ad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.098428] ffff8881026ad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.098690] >ffff8881026ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.099360] ^ [ 13.099673] ffff8881026ad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.100232] ffff8881026ad200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.100654] ================================================================== [ 13.101532] ================================================================== [ 13.101845] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.102404] Read of size 1 at addr ffff8881026ad17f by task kunit_try_catch/211 [ 13.102733] [ 13.103127] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.103178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.103190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.103211] Call Trace: [ 13.103224] <TASK> [ 13.103242] dump_stack_lvl+0x73/0xb0 [ 13.103275] print_report+0xd1/0x650 [ 13.103320] ? __virt_addr_valid+0x1db/0x2d0 [ 13.103343] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.103366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.103389] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.103412] kasan_report+0x141/0x180 [ 13.103433] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.103460] __asan_report_load1_noabort+0x18/0x20 [ 13.103485] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.103508] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.103531] ? finish_task_switch.isra.0+0x153/0x700 [ 13.103554] ? __switch_to+0x47/0xf50 [ 13.103579] ? __schedule+0x10cc/0x2b60 [ 13.103601] ? __pfx_read_tsc+0x10/0x10 [ 13.103622] ? ktime_get_ts64+0x86/0x230 [ 13.103645] kunit_try_run_case+0x1a5/0x480 [ 13.103669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.103691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.103715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.103738] ? __kthread_parkme+0x82/0x180 [ 13.103759] ? preempt_count_sub+0x50/0x80 [ 13.103782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.103805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.103829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.103854] kthread+0x337/0x6f0 [ 13.103872] ? trace_preempt_on+0x20/0xc0 [ 13.103895] ? __pfx_kthread+0x10/0x10 [ 13.103915] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.104013] ? calculate_sigpending+0x7b/0xa0 [ 13.104040] ? __pfx_kthread+0x10/0x10 [ 13.104061] ret_from_fork+0x116/0x1d0 [ 13.104079] ? __pfx_kthread+0x10/0x10 [ 13.104099] ret_from_fork_asm+0x1a/0x30 [ 13.104129] </TASK> [ 13.104140] [ 13.114351] Allocated by task 211: [ 13.114550] kasan_save_stack+0x45/0x70 [ 13.114759] kasan_save_track+0x18/0x40 [ 13.115418] kasan_save_alloc_info+0x3b/0x50 [ 13.115624] __kasan_kmalloc+0xb7/0xc0 [ 13.115765] __kmalloc_cache_noprof+0x189/0x420 [ 13.116210] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.116518] kunit_try_run_case+0x1a5/0x480 [ 13.116732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.117177] kthread+0x337/0x6f0 [ 13.117453] ret_from_fork+0x116/0x1d0 [ 13.117604] ret_from_fork_asm+0x1a/0x30 [ 13.117917] [ 13.118173] The buggy address belongs to the object at ffff8881026ad100 [ 13.118173] which belongs to the cache kmalloc-128 of size 128 [ 13.118759] The buggy address is located 12 bytes to the right of [ 13.118759] allocated 115-byte region [ffff8881026ad100, ffff8881026ad173) [ 13.119833] [ 13.120011] The buggy address belongs to the physical page: [ 13.120384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ad [ 13.120686] flags: 0x200000000000000(node=0|zone=2) [ 13.120916] page_type: f5(slab) [ 13.121348] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.121642] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.122168] page dumped because: kasan: bad access detected [ 13.122439] [ 13.122520] Memory state around the buggy address: [ 13.122740] ffff8881026ad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.123050] ffff8881026ad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.123348] >ffff8881026ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.123640] ^ [ 13.124399] ffff8881026ad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.124683] ffff8881026ad200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.125426] ================================================================== [ 13.049719] ================================================================== [ 13.050204] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.050530] Read of size 1 at addr ffff8881026ad173 by task kunit_try_catch/211 [ 13.050831] [ 13.051270] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.051325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.051337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.051360] Call Trace: [ 13.051373] <TASK> [ 13.051497] dump_stack_lvl+0x73/0xb0 [ 13.051532] print_report+0xd1/0x650 [ 13.051555] ? __virt_addr_valid+0x1db/0x2d0 [ 13.051580] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.051603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.051626] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.051649] kasan_report+0x141/0x180 [ 13.051670] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.051698] __asan_report_load1_noabort+0x18/0x20 [ 13.051722] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.051745] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.051768] ? finish_task_switch.isra.0+0x153/0x700 [ 13.051793] ? __switch_to+0x47/0xf50 [ 13.051819] ? __schedule+0x10cc/0x2b60 [ 13.051841] ? __pfx_read_tsc+0x10/0x10 [ 13.051863] ? ktime_get_ts64+0x86/0x230 [ 13.051888] kunit_try_run_case+0x1a5/0x480 [ 13.051915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.051967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.051993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.052016] ? __kthread_parkme+0x82/0x180 [ 13.052037] ? preempt_count_sub+0x50/0x80 [ 13.052059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.052083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.052107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.052132] kthread+0x337/0x6f0 [ 13.052150] ? trace_preempt_on+0x20/0xc0 [ 13.052174] ? __pfx_kthread+0x10/0x10 [ 13.052193] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.052215] ? calculate_sigpending+0x7b/0xa0 [ 13.052239] ? __pfx_kthread+0x10/0x10 [ 13.052275] ret_from_fork+0x116/0x1d0 [ 13.052292] ? __pfx_kthread+0x10/0x10 [ 13.052312] ret_from_fork_asm+0x1a/0x30 [ 13.052343] </TASK> [ 13.052354] [ 13.062385] Allocated by task 211: [ 13.062591] kasan_save_stack+0x45/0x70 [ 13.062760] kasan_save_track+0x18/0x40 [ 13.063594] kasan_save_alloc_info+0x3b/0x50 [ 13.063783] __kasan_kmalloc+0xb7/0xc0 [ 13.064198] __kmalloc_cache_noprof+0x189/0x420 [ 13.064541] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.064723] kunit_try_run_case+0x1a5/0x480 [ 13.065134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.065486] kthread+0x337/0x6f0 [ 13.065671] ret_from_fork+0x116/0x1d0 [ 13.066217] ret_from_fork_asm+0x1a/0x30 [ 13.066398] [ 13.066594] The buggy address belongs to the object at ffff8881026ad100 [ 13.066594] which belongs to the cache kmalloc-128 of size 128 [ 13.067287] The buggy address is located 0 bytes to the right of [ 13.067287] allocated 115-byte region [ffff8881026ad100, ffff8881026ad173) [ 13.068127] [ 13.068214] The buggy address belongs to the physical page: [ 13.068593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ad [ 13.069091] flags: 0x200000000000000(node=0|zone=2) [ 13.069315] page_type: f5(slab) [ 13.069482] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.069791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.070109] page dumped because: kasan: bad access detected [ 13.070343] [ 13.070412] Memory state around the buggy address: [ 13.070618] ffff8881026ad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.071429] ffff8881026ad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.071722] >ffff8881026ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.072423] ^ [ 13.072665] ffff8881026ad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.073201] ffff8881026ad200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.073623] ==================================================================