Date
July 8, 2025, 7:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.493249] ================================================================== [ 19.493325] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.493649] Read of size 1 at addr fff00000c5708378 by task kunit_try_catch/194 [ 19.494111] [ 19.494193] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.494317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.494616] Hardware name: linux,dummy-virt (DT) [ 19.494683] Call trace: [ 19.494707] show_stack+0x20/0x38 (C) [ 19.494768] dump_stack_lvl+0x8c/0xd0 [ 19.494947] print_report+0x118/0x608 [ 19.495138] kasan_report+0xdc/0x128 [ 19.495247] __asan_report_load1_noabort+0x20/0x30 [ 19.495300] ksize_unpoisons_memory+0x618/0x740 [ 19.495346] kunit_try_run_case+0x170/0x3f0 [ 19.495390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.495676] kthread+0x328/0x630 [ 19.495739] ret_from_fork+0x10/0x20 [ 19.495938] [ 19.495962] Allocated by task 194: [ 19.495991] kasan_save_stack+0x3c/0x68 [ 19.496181] kasan_save_track+0x20/0x40 [ 19.496287] kasan_save_alloc_info+0x40/0x58 [ 19.496454] __kasan_kmalloc+0xd4/0xd8 [ 19.496524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.496630] ksize_unpoisons_memory+0xc0/0x740 [ 19.497050] kunit_try_run_case+0x170/0x3f0 [ 19.497123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.497242] kthread+0x328/0x630 [ 19.497306] ret_from_fork+0x10/0x20 [ 19.497341] [ 19.497393] The buggy address belongs to the object at fff00000c5708300 [ 19.497393] which belongs to the cache kmalloc-128 of size 128 [ 19.497609] The buggy address is located 5 bytes to the right of [ 19.497609] allocated 115-byte region [fff00000c5708300, fff00000c5708373) [ 19.497827] [ 19.497868] The buggy address belongs to the physical page: [ 19.497898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.498299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.498370] page_type: f5(slab) [ 19.498490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.498724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.498945] page dumped because: kasan: bad access detected [ 19.499025] [ 19.499094] Memory state around the buggy address: [ 19.499228] fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.499522] fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499718] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.499767] ^ [ 19.500065] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500160] fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500306] ================================================================== [ 19.486369] ================================================================== [ 19.486440] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.486514] Read of size 1 at addr fff00000c5708373 by task kunit_try_catch/194 [ 19.486629] [ 19.486722] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.486858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.486895] Hardware name: linux,dummy-virt (DT) [ 19.486927] Call trace: [ 19.486949] show_stack+0x20/0x38 (C) [ 19.487233] dump_stack_lvl+0x8c/0xd0 [ 19.487393] print_report+0x118/0x608 [ 19.487540] kasan_report+0xdc/0x128 [ 19.487722] __asan_report_load1_noabort+0x20/0x30 [ 19.487827] ksize_unpoisons_memory+0x628/0x740 [ 19.487892] kunit_try_run_case+0x170/0x3f0 [ 19.487939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487990] kthread+0x328/0x630 [ 19.488418] ret_from_fork+0x10/0x20 [ 19.488553] [ 19.488632] Allocated by task 194: [ 19.488787] kasan_save_stack+0x3c/0x68 [ 19.488884] kasan_save_track+0x20/0x40 [ 19.488950] kasan_save_alloc_info+0x40/0x58 [ 19.489560] __kasan_kmalloc+0xd4/0xd8 [ 19.489621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.490047] ksize_unpoisons_memory+0xc0/0x740 [ 19.490243] kunit_try_run_case+0x170/0x3f0 [ 19.490320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490374] kthread+0x328/0x630 [ 19.490413] ret_from_fork+0x10/0x20 [ 19.490458] [ 19.490502] The buggy address belongs to the object at fff00000c5708300 [ 19.490502] which belongs to the cache kmalloc-128 of size 128 [ 19.490586] The buggy address is located 0 bytes to the right of [ 19.490586] allocated 115-byte region [fff00000c5708300, fff00000c5708373) [ 19.490661] [ 19.490682] The buggy address belongs to the physical page: [ 19.490723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.490786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.490849] page_type: f5(slab) [ 19.490894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.490945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.490994] page dumped because: kasan: bad access detected [ 19.491030] [ 19.491049] Memory state around the buggy address: [ 19.491080] fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.491153] fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.491211] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.491249] ^ [ 19.491297] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.491340] fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.491379] ================================================================== [ 19.501742] ================================================================== [ 19.501832] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.502069] Read of size 1 at addr fff00000c570837f by task kunit_try_catch/194 [ 19.502253] [ 19.502299] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.502381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.502424] Hardware name: linux,dummy-virt (DT) [ 19.502801] Call trace: [ 19.502843] show_stack+0x20/0x38 (C) [ 19.502925] dump_stack_lvl+0x8c/0xd0 [ 19.502975] print_report+0x118/0x608 [ 19.503021] kasan_report+0xdc/0x128 [ 19.503064] __asan_report_load1_noabort+0x20/0x30 [ 19.503273] ksize_unpoisons_memory+0x690/0x740 [ 19.503466] kunit_try_run_case+0x170/0x3f0 [ 19.503517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503570] kthread+0x328/0x630 [ 19.503642] ret_from_fork+0x10/0x20 [ 19.503821] [ 19.503981] Allocated by task 194: [ 19.504057] kasan_save_stack+0x3c/0x68 [ 19.504269] kasan_save_track+0x20/0x40 [ 19.504467] kasan_save_alloc_info+0x40/0x58 [ 19.504538] __kasan_kmalloc+0xd4/0xd8 [ 19.504694] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.504797] ksize_unpoisons_memory+0xc0/0x740 [ 19.504842] kunit_try_run_case+0x170/0x3f0 [ 19.504880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.504923] kthread+0x328/0x630 [ 19.504983] ret_from_fork+0x10/0x20 [ 19.505033] [ 19.505062] The buggy address belongs to the object at fff00000c5708300 [ 19.505062] which belongs to the cache kmalloc-128 of size 128 [ 19.505122] The buggy address is located 12 bytes to the right of [ 19.505122] allocated 115-byte region [fff00000c5708300, fff00000c5708373) [ 19.505188] [ 19.505208] The buggy address belongs to the physical page: [ 19.505247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.505309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.505355] page_type: f5(slab) [ 19.505402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.505461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.505510] page dumped because: kasan: bad access detected [ 19.505548] [ 19.505573] Memory state around the buggy address: [ 19.505620] fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.505662] fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505704] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.506585] ^ [ 19.507142] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.507191] fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.507582] ==================================================================
[ 13.327733] ================================================================== [ 13.329202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.330304] Read of size 1 at addr ffff888102602a73 by task kunit_try_catch/211 [ 13.331112] [ 13.331438] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.331489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.331501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.331522] Call Trace: [ 13.331537] <TASK> [ 13.331555] dump_stack_lvl+0x73/0xb0 [ 13.331588] print_report+0xd1/0x650 [ 13.331610] ? __virt_addr_valid+0x1db/0x2d0 [ 13.331632] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.331653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.331678] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.331699] kasan_report+0x141/0x180 [ 13.331720] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.331746] __asan_report_load1_noabort+0x18/0x20 [ 13.331768] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.331790] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.331810] ? finish_task_switch.isra.0+0x153/0x700 [ 13.331832] ? __switch_to+0x47/0xf50 [ 13.331857] ? __schedule+0x10cc/0x2b60 [ 13.331879] ? __pfx_read_tsc+0x10/0x10 [ 13.331899] ? ktime_get_ts64+0x86/0x230 [ 13.331922] kunit_try_run_case+0x1a5/0x480 [ 13.331946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.331966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.331989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.332010] ? __kthread_parkme+0x82/0x180 [ 13.332029] ? preempt_count_sub+0x50/0x80 [ 13.332164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.332190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.332213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.332234] kthread+0x337/0x6f0 [ 13.332253] ? trace_preempt_on+0x20/0xc0 [ 13.332277] ? __pfx_kthread+0x10/0x10 [ 13.332338] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.332359] ? calculate_sigpending+0x7b/0xa0 [ 13.332384] ? __pfx_kthread+0x10/0x10 [ 13.332416] ret_from_fork+0x116/0x1d0 [ 13.332433] ? __pfx_kthread+0x10/0x10 [ 13.332452] ret_from_fork_asm+0x1a/0x30 [ 13.332482] </TASK> [ 13.332494] [ 13.347207] Allocated by task 211: [ 13.347449] kasan_save_stack+0x45/0x70 [ 13.347771] kasan_save_track+0x18/0x40 [ 13.348221] kasan_save_alloc_info+0x3b/0x50 [ 13.348427] __kasan_kmalloc+0xb7/0xc0 [ 13.348796] __kmalloc_cache_noprof+0x189/0x420 [ 13.349307] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.349703] kunit_try_run_case+0x1a5/0x480 [ 13.349990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.350524] kthread+0x337/0x6f0 [ 13.350673] ret_from_fork+0x116/0x1d0 [ 13.350966] ret_from_fork_asm+0x1a/0x30 [ 13.351400] [ 13.351567] The buggy address belongs to the object at ffff888102602a00 [ 13.351567] which belongs to the cache kmalloc-128 of size 128 [ 13.352682] The buggy address is located 0 bytes to the right of [ 13.352682] allocated 115-byte region [ffff888102602a00, ffff888102602a73) [ 13.353872] [ 13.354125] The buggy address belongs to the physical page: [ 13.354712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.355280] flags: 0x200000000000000(node=0|zone=2) [ 13.355824] page_type: f5(slab) [ 13.356201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.356879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.357281] page dumped because: kasan: bad access detected [ 13.357784] [ 13.357856] Memory state around the buggy address: [ 13.358058] ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.358419] ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.359197] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.359929] ^ [ 13.360385] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.360854] ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.361086] ================================================================== [ 13.362079] ================================================================== [ 13.362750] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.363644] Read of size 1 at addr ffff888102602a78 by task kunit_try_catch/211 [ 13.364414] [ 13.364575] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.364620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.364631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.364651] Call Trace: [ 13.364670] <TASK> [ 13.364689] dump_stack_lvl+0x73/0xb0 [ 13.364715] print_report+0xd1/0x650 [ 13.364737] ? __virt_addr_valid+0x1db/0x2d0 [ 13.364758] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.364779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.364803] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.364825] kasan_report+0x141/0x180 [ 13.364845] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.364872] __asan_report_load1_noabort+0x18/0x20 [ 13.364895] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.364917] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.364938] ? finish_task_switch.isra.0+0x153/0x700 [ 13.364959] ? __switch_to+0x47/0xf50 [ 13.364984] ? __schedule+0x10cc/0x2b60 [ 13.365016] ? __pfx_read_tsc+0x10/0x10 [ 13.365036] ? ktime_get_ts64+0x86/0x230 [ 13.365078] kunit_try_run_case+0x1a5/0x480 [ 13.365101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.365121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.365144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.365165] ? __kthread_parkme+0x82/0x180 [ 13.365184] ? preempt_count_sub+0x50/0x80 [ 13.365205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.365227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.365249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.365270] kthread+0x337/0x6f0 [ 13.365288] ? trace_preempt_on+0x20/0xc0 [ 13.365309] ? __pfx_kthread+0x10/0x10 [ 13.365329] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.365348] ? calculate_sigpending+0x7b/0xa0 [ 13.365371] ? __pfx_kthread+0x10/0x10 [ 13.365391] ret_from_fork+0x116/0x1d0 [ 13.365407] ? __pfx_kthread+0x10/0x10 [ 13.365427] ret_from_fork_asm+0x1a/0x30 [ 13.365458] </TASK> [ 13.365468] [ 13.378831] Allocated by task 211: [ 13.378969] kasan_save_stack+0x45/0x70 [ 13.379198] kasan_save_track+0x18/0x40 [ 13.379590] kasan_save_alloc_info+0x3b/0x50 [ 13.380007] __kasan_kmalloc+0xb7/0xc0 [ 13.380426] __kmalloc_cache_noprof+0x189/0x420 [ 13.380902] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.381497] kunit_try_run_case+0x1a5/0x480 [ 13.381915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.382500] kthread+0x337/0x6f0 [ 13.382907] ret_from_fork+0x116/0x1d0 [ 13.383209] ret_from_fork_asm+0x1a/0x30 [ 13.383592] [ 13.383750] The buggy address belongs to the object at ffff888102602a00 [ 13.383750] which belongs to the cache kmalloc-128 of size 128 [ 13.384413] The buggy address is located 5 bytes to the right of [ 13.384413] allocated 115-byte region [ffff888102602a00, ffff888102602a73) [ 13.385414] [ 13.385637] The buggy address belongs to the physical page: [ 13.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.387034] flags: 0x200000000000000(node=0|zone=2) [ 13.387587] page_type: f5(slab) [ 13.387831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.388348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.388736] page dumped because: kasan: bad access detected [ 13.389260] [ 13.389505] Memory state around the buggy address: [ 13.389943] ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.390253] ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.390473] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.391122] ^ [ 13.391948] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.392727] ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.393573] ================================================================== [ 13.393982] ================================================================== [ 13.394679] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.395534] Read of size 1 at addr ffff888102602a7f by task kunit_try_catch/211 [ 13.396372] [ 13.396666] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.396738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.396750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.396792] Call Trace: [ 13.396810] <TASK> [ 13.396825] dump_stack_lvl+0x73/0xb0 [ 13.396866] print_report+0xd1/0x650 [ 13.396887] ? __virt_addr_valid+0x1db/0x2d0 [ 13.396909] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.396930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.396954] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.396976] kasan_report+0x141/0x180 [ 13.396996] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.397023] __asan_report_load1_noabort+0x18/0x20 [ 13.397056] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.397079] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.397099] ? finish_task_switch.isra.0+0x153/0x700 [ 13.397120] ? __switch_to+0x47/0xf50 [ 13.397144] ? __schedule+0x10cc/0x2b60 [ 13.397166] ? __pfx_read_tsc+0x10/0x10 [ 13.397185] ? ktime_get_ts64+0x86/0x230 [ 13.397208] kunit_try_run_case+0x1a5/0x480 [ 13.397231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.397251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.397274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.397295] ? __kthread_parkme+0x82/0x180 [ 13.397314] ? preempt_count_sub+0x50/0x80 [ 13.397335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.397357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.397379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.397400] kthread+0x337/0x6f0 [ 13.397418] ? trace_preempt_on+0x20/0xc0 [ 13.397440] ? __pfx_kthread+0x10/0x10 [ 13.397460] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.397479] ? calculate_sigpending+0x7b/0xa0 [ 13.397502] ? __pfx_kthread+0x10/0x10 [ 13.397522] ret_from_fork+0x116/0x1d0 [ 13.397540] ? __pfx_kthread+0x10/0x10 [ 13.397568] ret_from_fork_asm+0x1a/0x30 [ 13.397598] </TASK> [ 13.397608] [ 13.412038] Allocated by task 211: [ 13.412196] kasan_save_stack+0x45/0x70 [ 13.412345] kasan_save_track+0x18/0x40 [ 13.412480] kasan_save_alloc_info+0x3b/0x50 [ 13.413107] __kasan_kmalloc+0xb7/0xc0 [ 13.413494] __kmalloc_cache_noprof+0x189/0x420 [ 13.413942] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.414618] kunit_try_run_case+0x1a5/0x480 [ 13.415115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.415650] kthread+0x337/0x6f0 [ 13.415982] ret_from_fork+0x116/0x1d0 [ 13.416457] ret_from_fork_asm+0x1a/0x30 [ 13.416884] [ 13.417148] The buggy address belongs to the object at ffff888102602a00 [ 13.417148] which belongs to the cache kmalloc-128 of size 128 [ 13.417956] The buggy address is located 12 bytes to the right of [ 13.417956] allocated 115-byte region [ffff888102602a00, ffff888102602a73) [ 13.418618] [ 13.418841] The buggy address belongs to the physical page: [ 13.419419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.420342] flags: 0x200000000000000(node=0|zone=2) [ 13.420783] page_type: f5(slab) [ 13.420999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.421559] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.422390] page dumped because: kasan: bad access detected [ 13.422597] [ 13.422806] Memory state around the buggy address: [ 13.423398] ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.424161] ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.424382] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.424630] ^ [ 13.425337] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.426255] ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.426928] ==================================================================