Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.802329] ================================================================== [ 16.802625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.802684] Read of size 1 at addr fff00000c6554f73 by task kunit_try_catch/194 [ 16.802770] [ 16.802802] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.802913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.802974] Hardware name: linux,dummy-virt (DT) [ 16.803011] Call trace: [ 16.803040] show_stack+0x20/0x38 (C) [ 16.803090] dump_stack_lvl+0x8c/0xd0 [ 16.803139] print_report+0x118/0x5d0 [ 16.803186] kasan_report+0xdc/0x128 [ 16.803231] __asan_report_load1_noabort+0x20/0x30 [ 16.803326] ksize_unpoisons_memory+0x628/0x740 [ 16.803468] kunit_try_run_case+0x170/0x3f0 [ 16.803590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.803684] kthread+0x328/0x630 [ 16.803769] ret_from_fork+0x10/0x20 [ 16.803891] [ 16.803948] Allocated by task 194: [ 16.803976] kasan_save_stack+0x3c/0x68 [ 16.804019] kasan_save_track+0x20/0x40 [ 16.804057] kasan_save_alloc_info+0x40/0x58 [ 16.804097] __kasan_kmalloc+0xd4/0xd8 [ 16.804134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.804259] ksize_unpoisons_memory+0xc0/0x740 [ 16.804308] kunit_try_run_case+0x170/0x3f0 [ 16.804347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.804447] kthread+0x328/0x630 [ 16.804528] ret_from_fork+0x10/0x20 [ 16.804628] [ 16.804721] The buggy address belongs to the object at fff00000c6554f00 [ 16.804721] which belongs to the cache kmalloc-128 of size 128 [ 16.804784] The buggy address is located 0 bytes to the right of [ 16.804784] allocated 115-byte region [fff00000c6554f00, fff00000c6554f73) [ 16.805095] [ 16.805123] The buggy address belongs to the physical page: [ 16.805210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.805272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.805372] page_type: f5(slab) [ 16.805449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.805513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.805554] page dumped because: kasan: bad access detected [ 16.805620] [ 16.805638] Memory state around the buggy address: [ 16.805667] fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.805722] fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.805766] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.805936] ^ [ 16.806069] fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806141] fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc [ 16.806191] ================================================================== [ 16.811444] ================================================================== [ 16.811487] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.811532] Read of size 1 at addr fff00000c6554f7f by task kunit_try_catch/194 [ 16.811581] [ 16.811609] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.811689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.811729] Hardware name: linux,dummy-virt (DT) [ 16.811760] Call trace: [ 16.811779] show_stack+0x20/0x38 (C) [ 16.811827] dump_stack_lvl+0x8c/0xd0 [ 16.811874] print_report+0x118/0x5d0 [ 16.811934] kasan_report+0xdc/0x128 [ 16.812169] __asan_report_load1_noabort+0x20/0x30 [ 16.812237] ksize_unpoisons_memory+0x690/0x740 [ 16.812285] kunit_try_run_case+0x170/0x3f0 [ 16.812333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.812384] kthread+0x328/0x630 [ 16.812597] ret_from_fork+0x10/0x20 [ 16.812673] [ 16.812690] Allocated by task 194: [ 16.812728] kasan_save_stack+0x3c/0x68 [ 16.812768] kasan_save_track+0x20/0x40 [ 16.812804] kasan_save_alloc_info+0x40/0x58 [ 16.812845] __kasan_kmalloc+0xd4/0xd8 [ 16.812971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.813057] ksize_unpoisons_memory+0xc0/0x740 [ 16.813154] kunit_try_run_case+0x170/0x3f0 [ 16.813269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.813377] kthread+0x328/0x630 [ 16.813420] ret_from_fork+0x10/0x20 [ 16.813457] [ 16.813721] The buggy address belongs to the object at fff00000c6554f00 [ 16.813721] which belongs to the cache kmalloc-128 of size 128 [ 16.813818] The buggy address is located 12 bytes to the right of [ 16.813818] allocated 115-byte region [fff00000c6554f00, fff00000c6554f73) [ 16.813944] [ 16.814032] The buggy address belongs to the physical page: [ 16.814121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.814175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.814230] page_type: f5(slab) [ 16.814507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.814616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.814719] page dumped because: kasan: bad access detected [ 16.814804] [ 16.814890] Memory state around the buggy address: [ 16.814922] fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.815219] fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.815266] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.815353] ^ [ 16.815488] fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.815571] fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc [ 16.815692] ================================================================== [ 16.808276] ================================================================== [ 16.808370] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.808423] Read of size 1 at addr fff00000c6554f78 by task kunit_try_catch/194 [ 16.808489] [ 16.808542] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.808643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.808696] Hardware name: linux,dummy-virt (DT) [ 16.808741] Call trace: [ 16.808788] show_stack+0x20/0x38 (C) [ 16.808841] dump_stack_lvl+0x8c/0xd0 [ 16.808906] print_report+0x118/0x5d0 [ 16.809156] kasan_report+0xdc/0x128 [ 16.809237] __asan_report_load1_noabort+0x20/0x30 [ 16.809311] ksize_unpoisons_memory+0x618/0x740 [ 16.809386] kunit_try_run_case+0x170/0x3f0 [ 16.809451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.809506] kthread+0x328/0x630 [ 16.809586] ret_from_fork+0x10/0x20 [ 16.809635] [ 16.809652] Allocated by task 194: [ 16.809680] kasan_save_stack+0x3c/0x68 [ 16.809740] kasan_save_track+0x20/0x40 [ 16.809846] kasan_save_alloc_info+0x40/0x58 [ 16.809967] __kasan_kmalloc+0xd4/0xd8 [ 16.810028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.810072] ksize_unpoisons_memory+0xc0/0x740 [ 16.810118] kunit_try_run_case+0x170/0x3f0 [ 16.810160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.810212] kthread+0x328/0x630 [ 16.810251] ret_from_fork+0x10/0x20 [ 16.810286] [ 16.810312] The buggy address belongs to the object at fff00000c6554f00 [ 16.810312] which belongs to the cache kmalloc-128 of size 128 [ 16.810373] The buggy address is located 5 bytes to the right of [ 16.810373] allocated 115-byte region [fff00000c6554f00, fff00000c6554f73) [ 16.810575] [ 16.810600] The buggy address belongs to the physical page: [ 16.810638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.810750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.810801] page_type: f5(slab) [ 16.810839] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.810891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.810932] page dumped because: kasan: bad access detected [ 16.810975] [ 16.810993] Memory state around the buggy address: [ 16.811025] fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.811084] fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.811137] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.811185] ^ [ 16.811236] fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.811280] fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc [ 16.811319] ==================================================================
[ 13.034103] ================================================================== [ 13.034438] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.034784] Read of size 1 at addr ffff88810305be7f by task kunit_try_catch/211 [ 13.035251] [ 13.035368] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.035410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.035421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.035440] Call Trace: [ 13.035455] <TASK> [ 13.035468] dump_stack_lvl+0x73/0xb0 [ 13.035497] print_report+0xd1/0x610 [ 13.035520] ? __virt_addr_valid+0x1db/0x2d0 [ 13.035543] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.035567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.035592] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.035616] kasan_report+0x141/0x180 [ 13.035638] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.035667] __asan_report_load1_noabort+0x18/0x20 [ 13.035692] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.035717] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.035741] ? finish_task_switch.isra.0+0x153/0x700 [ 13.035781] ? __switch_to+0x47/0xf50 [ 13.035806] ? __schedule+0x10cc/0x2b60 [ 13.035828] ? __pfx_read_tsc+0x10/0x10 [ 13.035849] ? ktime_get_ts64+0x86/0x230 [ 13.035872] kunit_try_run_case+0x1a5/0x480 [ 13.035897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.035920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.035944] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.035968] ? __kthread_parkme+0x82/0x180 [ 13.036048] ? preempt_count_sub+0x50/0x80 [ 13.036072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.036097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.036122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.036148] kthread+0x337/0x6f0 [ 13.036168] ? trace_preempt_on+0x20/0xc0 [ 13.036191] ? __pfx_kthread+0x10/0x10 [ 13.036211] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.036233] ? calculate_sigpending+0x7b/0xa0 [ 13.036257] ? __pfx_kthread+0x10/0x10 [ 13.036279] ret_from_fork+0x116/0x1d0 [ 13.036298] ? __pfx_kthread+0x10/0x10 [ 13.036318] ret_from_fork_asm+0x1a/0x30 [ 13.036349] </TASK> [ 13.036359] [ 13.044742] Allocated by task 211: [ 13.044886] kasan_save_stack+0x45/0x70 [ 13.045233] kasan_save_track+0x18/0x40 [ 13.045377] kasan_save_alloc_info+0x3b/0x50 [ 13.045563] __kasan_kmalloc+0xb7/0xc0 [ 13.045770] __kmalloc_cache_noprof+0x189/0x420 [ 13.045998] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.046186] kunit_try_run_case+0x1a5/0x480 [ 13.046334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.046511] kthread+0x337/0x6f0 [ 13.046631] ret_from_fork+0x116/0x1d0 [ 13.046772] ret_from_fork_asm+0x1a/0x30 [ 13.046913] [ 13.047139] The buggy address belongs to the object at ffff88810305be00 [ 13.047139] which belongs to the cache kmalloc-128 of size 128 [ 13.047807] The buggy address is located 12 bytes to the right of [ 13.047807] allocated 115-byte region [ffff88810305be00, ffff88810305be73) [ 13.048786] [ 13.048870] The buggy address belongs to the physical page: [ 13.049049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 13.049290] flags: 0x200000000000000(node=0|zone=2) [ 13.049452] page_type: f5(slab) [ 13.049671] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.050113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.050479] page dumped because: kasan: bad access detected [ 13.050735] [ 13.050844] Memory state around the buggy address: [ 13.051413] ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.051770] ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.052046] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.052331] ^ [ 13.052835] ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.053323] ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.053742] ================================================================== [ 12.995592] ================================================================== [ 12.996119] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.996685] Read of size 1 at addr ffff88810305be73 by task kunit_try_catch/211 [ 12.997061] [ 12.997195] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.997242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.997254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.997275] Call Trace: [ 12.997289] <TASK> [ 12.997306] dump_stack_lvl+0x73/0xb0 [ 12.997339] print_report+0xd1/0x610 [ 12.997366] ? __virt_addr_valid+0x1db/0x2d0 [ 12.997392] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.997417] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.997440] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.997464] kasan_report+0x141/0x180 [ 12.997487] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.997516] __asan_report_load1_noabort+0x18/0x20 [ 12.997541] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.997566] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.997590] ? finish_task_switch.isra.0+0x153/0x700 [ 12.997630] ? __switch_to+0x47/0xf50 [ 12.997657] ? __schedule+0x10cc/0x2b60 [ 12.997680] ? __pfx_read_tsc+0x10/0x10 [ 12.997702] ? ktime_get_ts64+0x86/0x230 [ 12.997727] kunit_try_run_case+0x1a5/0x480 [ 12.997765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.997789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.997814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.997838] ? __kthread_parkme+0x82/0x180 [ 12.997860] ? preempt_count_sub+0x50/0x80 [ 12.997883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.997908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.997933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.997959] kthread+0x337/0x6f0 [ 12.997997] ? trace_preempt_on+0x20/0xc0 [ 12.998022] ? __pfx_kthread+0x10/0x10 [ 12.998043] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.998065] ? calculate_sigpending+0x7b/0xa0 [ 12.998091] ? __pfx_kthread+0x10/0x10 [ 12.998112] ret_from_fork+0x116/0x1d0 [ 12.998132] ? __pfx_kthread+0x10/0x10 [ 12.998152] ret_from_fork_asm+0x1a/0x30 [ 12.998183] </TASK> [ 12.998193] [ 13.006069] Allocated by task 211: [ 13.006375] kasan_save_stack+0x45/0x70 [ 13.006550] kasan_save_track+0x18/0x40 [ 13.006810] kasan_save_alloc_info+0x3b/0x50 [ 13.007091] __kasan_kmalloc+0xb7/0xc0 [ 13.007269] __kmalloc_cache_noprof+0x189/0x420 [ 13.007492] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.007660] kunit_try_run_case+0x1a5/0x480 [ 13.007876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.008241] kthread+0x337/0x6f0 [ 13.008372] ret_from_fork+0x116/0x1d0 [ 13.008506] ret_from_fork_asm+0x1a/0x30 [ 13.008646] [ 13.008741] The buggy address belongs to the object at ffff88810305be00 [ 13.008741] which belongs to the cache kmalloc-128 of size 128 [ 13.009408] The buggy address is located 0 bytes to the right of [ 13.009408] allocated 115-byte region [ffff88810305be00, ffff88810305be73) [ 13.009843] [ 13.009918] The buggy address belongs to the physical page: [ 13.010126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 13.010528] flags: 0x200000000000000(node=0|zone=2) [ 13.010776] page_type: f5(slab) [ 13.010946] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.011292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.011661] page dumped because: kasan: bad access detected [ 13.011881] [ 13.011951] Memory state around the buggy address: [ 13.012105] ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.012325] ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.012642] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.012963] ^ [ 13.013203] ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.013419] ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.013896] ================================================================== [ 13.014845] ================================================================== [ 13.015193] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.015469] Read of size 1 at addr ffff88810305be78 by task kunit_try_catch/211 [ 13.016049] [ 13.016166] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.016207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.016218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.016237] Call Trace: [ 13.016248] <TASK> [ 13.016261] dump_stack_lvl+0x73/0xb0 [ 13.016288] print_report+0xd1/0x610 [ 13.016311] ? __virt_addr_valid+0x1db/0x2d0 [ 13.016333] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.016357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.016380] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.016405] kasan_report+0x141/0x180 [ 13.016427] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.016465] __asan_report_load1_noabort+0x18/0x20 [ 13.016491] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.016515] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.016539] ? finish_task_switch.isra.0+0x153/0x700 [ 13.016562] ? __switch_to+0x47/0xf50 [ 13.016587] ? __schedule+0x10cc/0x2b60 [ 13.016609] ? __pfx_read_tsc+0x10/0x10 [ 13.016630] ? ktime_get_ts64+0x86/0x230 [ 13.016653] kunit_try_run_case+0x1a5/0x480 [ 13.016678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.016701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.016725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.016750] ? __kthread_parkme+0x82/0x180 [ 13.016785] ? preempt_count_sub+0x50/0x80 [ 13.016808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.016833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.016858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.016884] kthread+0x337/0x6f0 [ 13.016903] ? trace_preempt_on+0x20/0xc0 [ 13.016926] ? __pfx_kthread+0x10/0x10 [ 13.016947] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.016969] ? calculate_sigpending+0x7b/0xa0 [ 13.017141] ? __pfx_kthread+0x10/0x10 [ 13.017164] ret_from_fork+0x116/0x1d0 [ 13.017183] ? __pfx_kthread+0x10/0x10 [ 13.017204] ret_from_fork_asm+0x1a/0x30 [ 13.017235] </TASK> [ 13.017245] [ 13.024981] Allocated by task 211: [ 13.025353] kasan_save_stack+0x45/0x70 [ 13.025559] kasan_save_track+0x18/0x40 [ 13.025750] kasan_save_alloc_info+0x3b/0x50 [ 13.025973] __kasan_kmalloc+0xb7/0xc0 [ 13.026430] __kmalloc_cache_noprof+0x189/0x420 [ 13.026625] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.026829] kunit_try_run_case+0x1a5/0x480 [ 13.027159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.027414] kthread+0x337/0x6f0 [ 13.027566] ret_from_fork+0x116/0x1d0 [ 13.027743] ret_from_fork_asm+0x1a/0x30 [ 13.027946] [ 13.028120] The buggy address belongs to the object at ffff88810305be00 [ 13.028120] which belongs to the cache kmalloc-128 of size 128 [ 13.028658] The buggy address is located 5 bytes to the right of [ 13.028658] allocated 115-byte region [ffff88810305be00, ffff88810305be73) [ 13.029250] [ 13.029350] The buggy address belongs to the physical page: [ 13.029599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 13.029912] flags: 0x200000000000000(node=0|zone=2) [ 13.030357] page_type: f5(slab) [ 13.030567] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.030889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.031221] page dumped because: kasan: bad access detected [ 13.031485] [ 13.031581] Memory state around the buggy address: [ 13.031780] ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.032148] ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.032368] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.032581] ^ [ 13.032827] ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.033142] ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.033741] ==================================================================