Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.970098] ================================================================== [ 16.970176] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.970415] Write of size 128 at addr fff00000c595ef00 by task kunit_try_catch/170 [ 16.970490] [ 16.970532] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.970623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.970658] Hardware name: linux,dummy-virt (DT) [ 16.970697] Call trace: [ 16.970721] show_stack+0x20/0x38 (C) [ 16.970773] dump_stack_lvl+0x8c/0xd0 [ 16.970831] print_report+0x118/0x5d0 [ 16.970892] kasan_report+0xdc/0x128 [ 16.970948] kasan_check_range+0x100/0x1a8 [ 16.970998] __asan_memset+0x34/0x78 [ 16.971052] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.971100] kunit_try_run_case+0x170/0x3f0 [ 16.971157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.971209] kthread+0x328/0x630 [ 16.971253] ret_from_fork+0x10/0x20 [ 16.971563] [ 16.971588] Allocated by task 170: [ 16.971644] kasan_save_stack+0x3c/0x68 [ 16.971692] kasan_save_track+0x20/0x40 [ 16.971730] kasan_save_alloc_info+0x40/0x58 [ 16.971795] __kasan_kmalloc+0xd4/0xd8 [ 16.971873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.971922] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.971959] kunit_try_run_case+0x170/0x3f0 [ 16.972008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.972052] kthread+0x328/0x630 [ 16.972085] ret_from_fork+0x10/0x20 [ 16.973149] [ 16.973239] The buggy address belongs to the object at fff00000c595ef00 [ 16.973239] which belongs to the cache kmalloc-128 of size 128 [ 16.974798] The buggy address is located 0 bytes inside of [ 16.974798] allocated 120-byte region [fff00000c595ef00, fff00000c595ef78) [ 16.975238] [ 16.975276] The buggy address belongs to the physical page: [ 16.975364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.975810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.975905] page_type: f5(slab) [ 16.976067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.976422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.976487] page dumped because: kasan: bad access detected [ 16.976540] [ 16.977263] Memory state around the buggy address: [ 16.977327] fff00000c595ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.977384] fff00000c595ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.977446] >fff00000c595ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.977512] ^ [ 16.977563] fff00000c595ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.977904] fff00000c595f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.978441] ==================================================================
[ 16.639074] ================================================================== [ 16.639146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.639198] Write of size 128 at addr fff00000c5b7d800 by task kunit_try_catch/170 [ 16.639359] [ 16.639398] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.639983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.640313] Hardware name: linux,dummy-virt (DT) [ 16.640366] Call trace: [ 16.640391] show_stack+0x20/0x38 (C) [ 16.640441] dump_stack_lvl+0x8c/0xd0 [ 16.640487] print_report+0x118/0x5d0 [ 16.640539] kasan_report+0xdc/0x128 [ 16.640615] kasan_check_range+0x100/0x1a8 [ 16.641317] __asan_memset+0x34/0x78 [ 16.641435] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.641484] kunit_try_run_case+0x170/0x3f0 [ 16.641557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.641610] kthread+0x328/0x630 [ 16.641812] ret_from_fork+0x10/0x20 [ 16.642066] [ 16.642295] Allocated by task 170: [ 16.642507] kasan_save_stack+0x3c/0x68 [ 16.642603] kasan_save_track+0x20/0x40 [ 16.642746] kasan_save_alloc_info+0x40/0x58 [ 16.642907] __kasan_kmalloc+0xd4/0xd8 [ 16.642994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.643102] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.643204] kunit_try_run_case+0x170/0x3f0 [ 16.643247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.643445] kthread+0x328/0x630 [ 16.643625] ret_from_fork+0x10/0x20 [ 16.643719] [ 16.643795] The buggy address belongs to the object at fff00000c5b7d800 [ 16.643795] which belongs to the cache kmalloc-128 of size 128 [ 16.644040] The buggy address is located 0 bytes inside of [ 16.644040] allocated 120-byte region [fff00000c5b7d800, fff00000c5b7d878) [ 16.644254] [ 16.644379] The buggy address belongs to the physical page: [ 16.644455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.644881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.644937] page_type: f5(slab) [ 16.645259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.645374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.645498] page dumped because: kasan: bad access detected [ 16.645533] [ 16.645552] Memory state around the buggy address: [ 16.645852] fff00000c5b7d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.645935] fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646000] >fff00000c5b7d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.646066] ^ [ 16.646107] fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646278] fff00000c5b7d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646434] ==================================================================
[ 16.656698] ================================================================== [ 16.656779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.657021] Write of size 128 at addr fff00000c576cf00 by task kunit_try_catch/170 [ 16.657514] [ 16.657576] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.657856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.658012] Hardware name: linux,dummy-virt (DT) [ 16.658049] Call trace: [ 16.658212] show_stack+0x20/0x38 (C) [ 16.658538] dump_stack_lvl+0x8c/0xd0 [ 16.658793] print_report+0x118/0x5d0 [ 16.658893] kasan_report+0xdc/0x128 [ 16.658939] kasan_check_range+0x100/0x1a8 [ 16.659224] __asan_memset+0x34/0x78 [ 16.659539] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.659952] kunit_try_run_case+0x170/0x3f0 [ 16.660101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.660365] kthread+0x328/0x630 [ 16.660581] ret_from_fork+0x10/0x20 [ 16.660722] [ 16.660750] Allocated by task 170: [ 16.660780] kasan_save_stack+0x3c/0x68 [ 16.661189] kasan_save_track+0x20/0x40 [ 16.661311] kasan_save_alloc_info+0x40/0x58 [ 16.661559] __kasan_kmalloc+0xd4/0xd8 [ 16.661864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.662189] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.662287] kunit_try_run_case+0x170/0x3f0 [ 16.662447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.662734] kthread+0x328/0x630 [ 16.662957] ret_from_fork+0x10/0x20 [ 16.663264] [ 16.663387] The buggy address belongs to the object at fff00000c576cf00 [ 16.663387] which belongs to the cache kmalloc-128 of size 128 [ 16.664055] The buggy address is located 0 bytes inside of [ 16.664055] allocated 120-byte region [fff00000c576cf00, fff00000c576cf78) [ 16.664279] [ 16.664332] The buggy address belongs to the physical page: [ 16.664590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.664825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.665304] page_type: f5(slab) [ 16.665368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.665498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.665547] page dumped because: kasan: bad access detected [ 16.665601] [ 16.665627] Memory state around the buggy address: [ 16.665660] fff00000c576ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.665702] fff00000c576ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.665769] >fff00000c576cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.665806] ^ [ 16.665846] fff00000c576cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.665888] fff00000c576d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.665924] ==================================================================
[ 12.302517] ================================================================== [ 12.303025] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 12.303425] Write of size 128 at addr ffff888102e24300 by task kunit_try_catch/187 [ 12.303986] [ 12.304100] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.304147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.304158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.304180] Call Trace: [ 12.304192] <TASK> [ 12.304209] dump_stack_lvl+0x73/0xb0 [ 12.304243] print_report+0xd1/0x610 [ 12.304265] ? __virt_addr_valid+0x1db/0x2d0 [ 12.304289] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.304310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.304332] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.304354] kasan_report+0x141/0x180 [ 12.304375] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.304403] kasan_check_range+0x10c/0x1c0 [ 12.304426] __asan_memset+0x27/0x50 [ 12.304444] kmalloc_oob_in_memset+0x15f/0x320 [ 12.304467] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 12.304490] ? __schedule+0x10cc/0x2b60 [ 12.304513] ? __pfx_read_tsc+0x10/0x10 [ 12.304598] ? ktime_get_ts64+0x86/0x230 [ 12.304626] kunit_try_run_case+0x1a5/0x480 [ 12.304651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.304673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.304698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.304721] ? __kthread_parkme+0x82/0x180 [ 12.304741] ? preempt_count_sub+0x50/0x80 [ 12.304766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.304790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.304813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.304837] kthread+0x337/0x6f0 [ 12.304855] ? trace_preempt_on+0x20/0xc0 [ 12.304878] ? __pfx_kthread+0x10/0x10 [ 12.304910] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.304931] ? calculate_sigpending+0x7b/0xa0 [ 12.304956] ? __pfx_kthread+0x10/0x10 [ 12.304977] ret_from_fork+0x116/0x1d0 [ 12.305006] ? __pfx_kthread+0x10/0x10 [ 12.305026] ret_from_fork_asm+0x1a/0x30 [ 12.305058] </TASK> [ 12.305069] [ 12.314976] Allocated by task 187: [ 12.315170] kasan_save_stack+0x45/0x70 [ 12.315790] kasan_save_track+0x18/0x40 [ 12.316084] kasan_save_alloc_info+0x3b/0x50 [ 12.316296] __kasan_kmalloc+0xb7/0xc0 [ 12.316477] __kmalloc_cache_noprof+0x189/0x420 [ 12.316974] kmalloc_oob_in_memset+0xac/0x320 [ 12.317341] kunit_try_run_case+0x1a5/0x480 [ 12.317583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.318226] kthread+0x337/0x6f0 [ 12.318432] ret_from_fork+0x116/0x1d0 [ 12.318821] ret_from_fork_asm+0x1a/0x30 [ 12.319091] [ 12.319177] The buggy address belongs to the object at ffff888102e24300 [ 12.319177] which belongs to the cache kmalloc-128 of size 128 [ 12.320188] The buggy address is located 0 bytes inside of [ 12.320188] allocated 120-byte region [ffff888102e24300, ffff888102e24378) [ 12.320803] [ 12.321082] The buggy address belongs to the physical page: [ 12.321347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 12.321932] flags: 0x200000000000000(node=0|zone=2) [ 12.322363] page_type: f5(slab) [ 12.322610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.323295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.323786] page dumped because: kasan: bad access detected [ 12.324110] [ 12.324216] Memory state around the buggy address: [ 12.324469] ffff888102e24200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.324977] ffff888102e24280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.325501] >ffff888102e24300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.326090] ^ [ 12.326382] ffff888102e24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.326750] ffff888102e24400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.327052] ==================================================================
[ 12.053076] ================================================================== [ 12.053705] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 12.054159] Write of size 128 at addr ffff8881026ce800 by task kunit_try_catch/188 [ 12.054582] [ 12.054701] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.054745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.054756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.054841] Call Trace: [ 12.054855] <TASK> [ 12.054869] dump_stack_lvl+0x73/0xb0 [ 12.054900] print_report+0xd1/0x610 [ 12.054922] ? __virt_addr_valid+0x1db/0x2d0 [ 12.054945] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.054966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.054989] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.055011] kasan_report+0x141/0x180 [ 12.055033] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.055060] kasan_check_range+0x10c/0x1c0 [ 12.055084] __asan_memset+0x27/0x50 [ 12.055125] kmalloc_oob_in_memset+0x15f/0x320 [ 12.055148] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 12.055171] ? __schedule+0x10cc/0x2b60 [ 12.055194] ? __pfx_read_tsc+0x10/0x10 [ 12.055231] ? ktime_get_ts64+0x86/0x230 [ 12.055256] kunit_try_run_case+0x1a5/0x480 [ 12.055281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.055302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.055325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.055348] ? __kthread_parkme+0x82/0x180 [ 12.055368] ? preempt_count_sub+0x50/0x80 [ 12.055392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.055416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.055505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.055529] kthread+0x337/0x6f0 [ 12.055549] ? trace_preempt_on+0x20/0xc0 [ 12.055572] ? __pfx_kthread+0x10/0x10 [ 12.055592] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.055613] ? calculate_sigpending+0x7b/0xa0 [ 12.055637] ? __pfx_kthread+0x10/0x10 [ 12.055658] ret_from_fork+0x116/0x1d0 [ 12.055676] ? __pfx_kthread+0x10/0x10 [ 12.055696] ret_from_fork_asm+0x1a/0x30 [ 12.055728] </TASK> [ 12.055738] [ 12.063506] Allocated by task 188: [ 12.063715] kasan_save_stack+0x45/0x70 [ 12.063887] kasan_save_track+0x18/0x40 [ 12.064100] kasan_save_alloc_info+0x3b/0x50 [ 12.064312] __kasan_kmalloc+0xb7/0xc0 [ 12.064553] __kmalloc_cache_noprof+0x189/0x420 [ 12.064767] kmalloc_oob_in_memset+0xac/0x320 [ 12.064993] kunit_try_run_case+0x1a5/0x480 [ 12.065171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.065404] kthread+0x337/0x6f0 [ 12.065665] ret_from_fork+0x116/0x1d0 [ 12.065855] ret_from_fork_asm+0x1a/0x30 [ 12.066068] [ 12.066180] The buggy address belongs to the object at ffff8881026ce800 [ 12.066180] which belongs to the cache kmalloc-128 of size 128 [ 12.066739] The buggy address is located 0 bytes inside of [ 12.066739] allocated 120-byte region [ffff8881026ce800, ffff8881026ce878) [ 12.067260] [ 12.067332] The buggy address belongs to the physical page: [ 12.067700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 12.068339] flags: 0x200000000000000(node=0|zone=2) [ 12.068581] page_type: f5(slab) [ 12.068764] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.069108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.069475] page dumped because: kasan: bad access detected [ 12.069800] [ 12.070053] Memory state around the buggy address: [ 12.070278] ffff8881026ce700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.070867] ffff8881026ce780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.071173] >ffff8881026ce800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.071487] ^ [ 12.071709] ffff8881026ce880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.071917] ffff8881026ce900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.072121] ==================================================================
[ 12.217239] ================================================================== [ 12.218042] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 12.218719] Write of size 128 at addr ffff8881029a6600 by task kunit_try_catch/187 [ 12.219348] [ 12.219501] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.219551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.219562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.219584] Call Trace: [ 12.219598] <TASK> [ 12.219617] dump_stack_lvl+0x73/0xb0 [ 12.219650] print_report+0xd1/0x610 [ 12.219674] ? __virt_addr_valid+0x1db/0x2d0 [ 12.219699] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.219720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.219743] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.219765] kasan_report+0x141/0x180 [ 12.219786] ? kmalloc_oob_in_memset+0x15f/0x320 [ 12.219812] kasan_check_range+0x10c/0x1c0 [ 12.219836] __asan_memset+0x27/0x50 [ 12.219855] kmalloc_oob_in_memset+0x15f/0x320 [ 12.219876] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 12.219899] ? __schedule+0x10cc/0x2b60 [ 12.219921] ? __pfx_read_tsc+0x10/0x10 [ 12.219941] ? ktime_get_ts64+0x86/0x230 [ 12.219967] kunit_try_run_case+0x1a5/0x480 [ 12.219991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.220023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.220197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.220222] ? __kthread_parkme+0x82/0x180 [ 12.220244] ? preempt_count_sub+0x50/0x80 [ 12.220268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.220328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.220353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.220377] kthread+0x337/0x6f0 [ 12.220396] ? trace_preempt_on+0x20/0xc0 [ 12.220419] ? __pfx_kthread+0x10/0x10 [ 12.220438] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.220459] ? calculate_sigpending+0x7b/0xa0 [ 12.220483] ? __pfx_kthread+0x10/0x10 [ 12.220503] ret_from_fork+0x116/0x1d0 [ 12.220521] ? __pfx_kthread+0x10/0x10 [ 12.220540] ret_from_fork_asm+0x1a/0x30 [ 12.220572] </TASK> [ 12.220581] [ 12.233999] Allocated by task 187: [ 12.234284] kasan_save_stack+0x45/0x70 [ 12.234729] kasan_save_track+0x18/0x40 [ 12.234939] kasan_save_alloc_info+0x3b/0x50 [ 12.235546] __kasan_kmalloc+0xb7/0xc0 [ 12.236075] __kmalloc_cache_noprof+0x189/0x420 [ 12.236294] kmalloc_oob_in_memset+0xac/0x320 [ 12.236669] kunit_try_run_case+0x1a5/0x480 [ 12.237081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.237335] kthread+0x337/0x6f0 [ 12.237690] ret_from_fork+0x116/0x1d0 [ 12.237888] ret_from_fork_asm+0x1a/0x30 [ 12.238383] [ 12.238541] The buggy address belongs to the object at ffff8881029a6600 [ 12.238541] which belongs to the cache kmalloc-128 of size 128 [ 12.239360] The buggy address is located 0 bytes inside of [ 12.239360] allocated 120-byte region [ffff8881029a6600, ffff8881029a6678) [ 12.240539] [ 12.240797] The buggy address belongs to the physical page: [ 12.241129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 12.241506] flags: 0x200000000000000(node=0|zone=2) [ 12.241727] page_type: f5(slab) [ 12.241883] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.242844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.243569] page dumped because: kasan: bad access detected [ 12.243812] [ 12.243901] Memory state around the buggy address: [ 12.244414] ffff8881029a6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.244912] ffff8881029a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.245745] >ffff8881029a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.246341] ^ [ 12.246673] ffff8881029a6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.246968] ffff8881029a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.247329] ==================================================================