Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.805504] ================================================================== [ 17.805642] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.805691] Read of size 1 at addr fff00000c7767878 by task kunit_try_catch/194 [ 17.805742] [ 17.805770] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.805855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.805884] Hardware name: linux,dummy-virt (DT) [ 17.805913] Call trace: [ 17.805935] show_stack+0x20/0x38 (C) [ 17.805983] dump_stack_lvl+0x8c/0xd0 [ 17.806049] print_report+0x118/0x608 [ 17.806120] kasan_report+0xdc/0x128 [ 17.806288] __asan_report_load1_noabort+0x20/0x30 [ 17.806393] ksize_unpoisons_memory+0x618/0x740 [ 17.806504] kunit_try_run_case+0x170/0x3f0 [ 17.806571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.806680] kthread+0x328/0x630 [ 17.806722] ret_from_fork+0x10/0x20 [ 17.806771] [ 17.806788] Allocated by task 194: [ 17.806814] kasan_save_stack+0x3c/0x68 [ 17.806855] kasan_save_track+0x20/0x40 [ 17.806894] kasan_save_alloc_info+0x40/0x58 [ 17.806933] __kasan_kmalloc+0xd4/0xd8 [ 17.807041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.807107] ksize_unpoisons_memory+0xc0/0x740 [ 17.807146] kunit_try_run_case+0x170/0x3f0 [ 17.807186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.807229] kthread+0x328/0x630 [ 17.807265] ret_from_fork+0x10/0x20 [ 17.807300] [ 17.807318] The buggy address belongs to the object at fff00000c7767800 [ 17.807318] which belongs to the cache kmalloc-128 of size 128 [ 17.807375] The buggy address is located 5 bytes to the right of [ 17.807375] allocated 115-byte region [fff00000c7767800, fff00000c7767873) [ 17.807533] [ 17.807627] The buggy address belongs to the physical page: [ 17.807735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 17.807787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.807836] page_type: f5(slab) [ 17.807873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.808008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.808121] page dumped because: kasan: bad access detected [ 17.808152] [ 17.808170] Memory state around the buggy address: [ 17.808201] fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.808246] fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.808288] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.808328] ^ [ 17.808369] fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.808452] fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.808493] ================================================================== [ 17.801848] ================================================================== [ 17.801909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.801966] Read of size 1 at addr fff00000c7767873 by task kunit_try_catch/194 [ 17.802108] [ 17.802153] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.802241] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.802272] Hardware name: linux,dummy-virt (DT) [ 17.802313] Call trace: [ 17.802362] show_stack+0x20/0x38 (C) [ 17.802414] dump_stack_lvl+0x8c/0xd0 [ 17.802485] print_report+0x118/0x608 [ 17.802533] kasan_report+0xdc/0x128 [ 17.802580] __asan_report_load1_noabort+0x20/0x30 [ 17.802633] ksize_unpoisons_memory+0x628/0x740 [ 17.802683] kunit_try_run_case+0x170/0x3f0 [ 17.802733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.802796] kthread+0x328/0x630 [ 17.802941] ret_from_fork+0x10/0x20 [ 17.802992] [ 17.803012] Allocated by task 194: [ 17.803041] kasan_save_stack+0x3c/0x68 [ 17.803081] kasan_save_track+0x20/0x40 [ 17.803130] kasan_save_alloc_info+0x40/0x58 [ 17.803169] __kasan_kmalloc+0xd4/0xd8 [ 17.803206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.803254] ksize_unpoisons_memory+0xc0/0x740 [ 17.803294] kunit_try_run_case+0x170/0x3f0 [ 17.803333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.803376] kthread+0x328/0x630 [ 17.803408] ret_from_fork+0x10/0x20 [ 17.803445] [ 17.803463] The buggy address belongs to the object at fff00000c7767800 [ 17.803463] which belongs to the cache kmalloc-128 of size 128 [ 17.803673] The buggy address is located 0 bytes to the right of [ 17.803673] allocated 115-byte region [fff00000c7767800, fff00000c7767873) [ 17.803753] [ 17.803822] The buggy address belongs to the physical page: [ 17.803854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 17.803911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.803962] page_type: f5(slab) [ 17.804003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.804066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.804265] page dumped because: kasan: bad access detected [ 17.804308] [ 17.804397] Memory state around the buggy address: [ 17.804431] fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.804475] fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804526] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.804718] ^ [ 17.804764] fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804920] fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804977] ================================================================== [ 17.809441] ================================================================== [ 17.809508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.809560] Read of size 1 at addr fff00000c776787f by task kunit_try_catch/194 [ 17.809639] [ 17.809670] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.809755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.809841] Hardware name: linux,dummy-virt (DT) [ 17.809878] Call trace: [ 17.809991] show_stack+0x20/0x38 (C) [ 17.810043] dump_stack_lvl+0x8c/0xd0 [ 17.810175] print_report+0x118/0x608 [ 17.810225] kasan_report+0xdc/0x128 [ 17.810271] __asan_report_load1_noabort+0x20/0x30 [ 17.810332] ksize_unpoisons_memory+0x690/0x740 [ 17.810380] kunit_try_run_case+0x170/0x3f0 [ 17.810476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.810532] kthread+0x328/0x630 [ 17.810576] ret_from_fork+0x10/0x20 [ 17.810624] [ 17.810671] Allocated by task 194: [ 17.810699] kasan_save_stack+0x3c/0x68 [ 17.810759] kasan_save_track+0x20/0x40 [ 17.810967] kasan_save_alloc_info+0x40/0x58 [ 17.811008] __kasan_kmalloc+0xd4/0xd8 [ 17.811047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.811095] ksize_unpoisons_memory+0xc0/0x740 [ 17.811134] kunit_try_run_case+0x170/0x3f0 [ 17.811171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.811215] kthread+0x328/0x630 [ 17.811246] ret_from_fork+0x10/0x20 [ 17.811283] [ 17.811300] The buggy address belongs to the object at fff00000c7767800 [ 17.811300] which belongs to the cache kmalloc-128 of size 128 [ 17.811360] The buggy address is located 12 bytes to the right of [ 17.811360] allocated 115-byte region [fff00000c7767800, fff00000c7767873) [ 17.811425] [ 17.811455] The buggy address belongs to the physical page: [ 17.811484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 17.811536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.811583] page_type: f5(slab) [ 17.811619] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.811672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.811713] page dumped because: kasan: bad access detected [ 17.811758] [ 17.811819] Memory state around the buggy address: [ 17.811987] fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.812040] fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.812094] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.812133] ^ [ 17.812185] fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.812423] fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.812465] ==================================================================
[ 13.169761] ================================================================== [ 13.170625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.171229] Read of size 1 at addr ffff888102c29f73 by task kunit_try_catch/211 [ 13.171565] [ 13.171677] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.171725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.171736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.171757] Call Trace: [ 13.171768] <TASK> [ 13.171785] dump_stack_lvl+0x73/0xb0 [ 13.171819] print_report+0xd1/0x650 [ 13.171841] ? __virt_addr_valid+0x1db/0x2d0 [ 13.171864] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.171887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.171909] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.171932] kasan_report+0x141/0x180 [ 13.171953] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.171981] __asan_report_load1_noabort+0x18/0x20 [ 13.172005] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.172029] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.172051] ? finish_task_switch.isra.0+0x153/0x700 [ 13.172074] ? __switch_to+0x47/0xf50 [ 13.172100] ? __schedule+0x10cc/0x2b60 [ 13.172122] ? __pfx_read_tsc+0x10/0x10 [ 13.172143] ? ktime_get_ts64+0x86/0x230 [ 13.172167] kunit_try_run_case+0x1a5/0x480 [ 13.172192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.172214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.172238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.172262] ? __kthread_parkme+0x82/0x180 [ 13.172294] ? preempt_count_sub+0x50/0x80 [ 13.172324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.172348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.172372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.172396] kthread+0x337/0x6f0 [ 13.172414] ? trace_preempt_on+0x20/0xc0 [ 13.172437] ? __pfx_kthread+0x10/0x10 [ 13.172457] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.172478] ? calculate_sigpending+0x7b/0xa0 [ 13.172503] ? __pfx_kthread+0x10/0x10 [ 13.172523] ret_from_fork+0x116/0x1d0 [ 13.172541] ? __pfx_kthread+0x10/0x10 [ 13.172561] ret_from_fork_asm+0x1a/0x30 [ 13.172592] </TASK> [ 13.172614] [ 13.185036] Allocated by task 211: [ 13.185434] kasan_save_stack+0x45/0x70 [ 13.186117] kasan_save_track+0x18/0x40 [ 13.186343] kasan_save_alloc_info+0x3b/0x50 [ 13.186517] __kasan_kmalloc+0xb7/0xc0 [ 13.186782] __kmalloc_cache_noprof+0x189/0x420 [ 13.187283] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.187538] kunit_try_run_case+0x1a5/0x480 [ 13.187788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.188172] kthread+0x337/0x6f0 [ 13.188348] ret_from_fork+0x116/0x1d0 [ 13.188539] ret_from_fork_asm+0x1a/0x30 [ 13.188745] [ 13.188880] The buggy address belongs to the object at ffff888102c29f00 [ 13.188880] which belongs to the cache kmalloc-128 of size 128 [ 13.189359] The buggy address is located 0 bytes to the right of [ 13.189359] allocated 115-byte region [ffff888102c29f00, ffff888102c29f73) [ 13.190097] [ 13.190230] The buggy address belongs to the physical page: [ 13.190497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 13.191146] flags: 0x200000000000000(node=0|zone=2) [ 13.191350] page_type: f5(slab) [ 13.191525] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.191888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.192359] page dumped because: kasan: bad access detected [ 13.192622] [ 13.192719] Memory state around the buggy address: [ 13.193087] ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.193407] ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.193747] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.194219] ^ [ 13.194535] ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.195124] ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.195432] ================================================================== [ 13.196093] ================================================================== [ 13.196464] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.196998] Read of size 1 at addr ffff888102c29f78 by task kunit_try_catch/211 [ 13.197360] [ 13.197474] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.197518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.197529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.197576] Call Trace: [ 13.197612] <TASK> [ 13.197656] dump_stack_lvl+0x73/0xb0 [ 13.197687] print_report+0xd1/0x650 [ 13.197710] ? __virt_addr_valid+0x1db/0x2d0 [ 13.197744] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.197786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.197929] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.197953] kasan_report+0x141/0x180 [ 13.197987] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.198015] __asan_report_load1_noabort+0x18/0x20 [ 13.198039] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.198062] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.198085] ? finish_task_switch.isra.0+0x153/0x700 [ 13.198108] ? __switch_to+0x47/0xf50 [ 13.198161] ? __schedule+0x10cc/0x2b60 [ 13.198183] ? __pfx_read_tsc+0x10/0x10 [ 13.198204] ? ktime_get_ts64+0x86/0x230 [ 13.198239] kunit_try_run_case+0x1a5/0x480 [ 13.198263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.198312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.198337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.198359] ? __kthread_parkme+0x82/0x180 [ 13.198390] ? preempt_count_sub+0x50/0x80 [ 13.198413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.198436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.198460] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.198484] kthread+0x337/0x6f0 [ 13.198502] ? trace_preempt_on+0x20/0xc0 [ 13.198526] ? __pfx_kthread+0x10/0x10 [ 13.198545] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.198567] ? calculate_sigpending+0x7b/0xa0 [ 13.198591] ? __pfx_kthread+0x10/0x10 [ 13.198620] ret_from_fork+0x116/0x1d0 [ 13.198638] ? __pfx_kthread+0x10/0x10 [ 13.198657] ret_from_fork_asm+0x1a/0x30 [ 13.198688] </TASK> [ 13.198698] [ 13.207796] Allocated by task 211: [ 13.208027] kasan_save_stack+0x45/0x70 [ 13.208382] kasan_save_track+0x18/0x40 [ 13.208571] kasan_save_alloc_info+0x3b/0x50 [ 13.208890] __kasan_kmalloc+0xb7/0xc0 [ 13.209132] __kmalloc_cache_noprof+0x189/0x420 [ 13.209355] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.209571] kunit_try_run_case+0x1a5/0x480 [ 13.209930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.210216] kthread+0x337/0x6f0 [ 13.210384] ret_from_fork+0x116/0x1d0 [ 13.210613] ret_from_fork_asm+0x1a/0x30 [ 13.210750] [ 13.211164] The buggy address belongs to the object at ffff888102c29f00 [ 13.211164] which belongs to the cache kmalloc-128 of size 128 [ 13.211643] The buggy address is located 5 bytes to the right of [ 13.211643] allocated 115-byte region [ffff888102c29f00, ffff888102c29f73) [ 13.212173] [ 13.212260] The buggy address belongs to the physical page: [ 13.212494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 13.212811] flags: 0x200000000000000(node=0|zone=2) [ 13.212970] page_type: f5(slab) [ 13.213086] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.213484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.213963] page dumped because: kasan: bad access detected [ 13.214387] [ 13.214474] Memory state around the buggy address: [ 13.214742] ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.215237] ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.215566] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.216175] ^ [ 13.216500] ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.216933] ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.217286] ================================================================== [ 13.218095] ================================================================== [ 13.219099] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.219451] Read of size 1 at addr ffff888102c29f7f by task kunit_try_catch/211 [ 13.219972] [ 13.220082] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.220164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.220175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.220196] Call Trace: [ 13.220208] <TASK> [ 13.220237] dump_stack_lvl+0x73/0xb0 [ 13.220270] print_report+0xd1/0x650 [ 13.220292] ? __virt_addr_valid+0x1db/0x2d0 [ 13.220344] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.220366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.220388] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.220423] kasan_report+0x141/0x180 [ 13.220444] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.220471] __asan_report_load1_noabort+0x18/0x20 [ 13.220523] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.220546] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.220606] ? finish_task_switch.isra.0+0x153/0x700 [ 13.220630] ? __switch_to+0x47/0xf50 [ 13.220654] ? __schedule+0x10cc/0x2b60 [ 13.220677] ? __pfx_read_tsc+0x10/0x10 [ 13.220699] ? ktime_get_ts64+0x86/0x230 [ 13.220722] kunit_try_run_case+0x1a5/0x480 [ 13.220747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.220769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.220861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.220887] ? __kthread_parkme+0x82/0x180 [ 13.220908] ? preempt_count_sub+0x50/0x80 [ 13.220931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.220954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.220978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.221002] kthread+0x337/0x6f0 [ 13.221020] ? trace_preempt_on+0x20/0xc0 [ 13.221044] ? __pfx_kthread+0x10/0x10 [ 13.221064] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.221085] ? calculate_sigpending+0x7b/0xa0 [ 13.221109] ? __pfx_kthread+0x10/0x10 [ 13.221129] ret_from_fork+0x116/0x1d0 [ 13.221147] ? __pfx_kthread+0x10/0x10 [ 13.221168] ret_from_fork_asm+0x1a/0x30 [ 13.221198] </TASK> [ 13.221209] [ 13.232763] Allocated by task 211: [ 13.233063] kasan_save_stack+0x45/0x70 [ 13.233566] kasan_save_track+0x18/0x40 [ 13.233884] kasan_save_alloc_info+0x3b/0x50 [ 13.234299] __kasan_kmalloc+0xb7/0xc0 [ 13.234665] __kmalloc_cache_noprof+0x189/0x420 [ 13.235224] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.235584] kunit_try_run_case+0x1a5/0x480 [ 13.236036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.236279] kthread+0x337/0x6f0 [ 13.236550] ret_from_fork+0x116/0x1d0 [ 13.236828] ret_from_fork_asm+0x1a/0x30 [ 13.237137] [ 13.237213] The buggy address belongs to the object at ffff888102c29f00 [ 13.237213] which belongs to the cache kmalloc-128 of size 128 [ 13.237743] The buggy address is located 12 bytes to the right of [ 13.237743] allocated 115-byte region [ffff888102c29f00, ffff888102c29f73) [ 13.238787] [ 13.239196] The buggy address belongs to the physical page: [ 13.239407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 13.240042] flags: 0x200000000000000(node=0|zone=2) [ 13.240502] page_type: f5(slab) [ 13.240873] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.241248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.241698] page dumped because: kasan: bad access detected [ 13.242231] [ 13.242316] Memory state around the buggy address: [ 13.242705] ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.243329] ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.243762] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.244288] ^ [ 13.244700] ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.245162] ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.245574] ==================================================================