Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.060368] ================================================================== [ 17.060457] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 17.060525] Write of size 16 at addr fff00000c7892369 by task kunit_try_catch/178 [ 17.060576] [ 17.060619] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.060702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.060728] Hardware name: linux,dummy-virt (DT) [ 17.060760] Call trace: [ 17.060783] show_stack+0x20/0x38 (C) [ 17.061688] dump_stack_lvl+0x8c/0xd0 [ 17.062082] print_report+0x118/0x5d0 [ 17.062659] kasan_report+0xdc/0x128 [ 17.062852] kasan_check_range+0x100/0x1a8 [ 17.062901] __asan_memset+0x34/0x78 [ 17.062943] kmalloc_oob_memset_16+0x150/0x2f8 [ 17.062988] kunit_try_run_case+0x170/0x3f0 [ 17.063459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.063582] kthread+0x328/0x630 [ 17.063626] ret_from_fork+0x10/0x20 [ 17.063818] [ 17.063869] Allocated by task 178: [ 17.063903] kasan_save_stack+0x3c/0x68 [ 17.064208] kasan_save_track+0x20/0x40 [ 17.064269] kasan_save_alloc_info+0x40/0x58 [ 17.064849] __kasan_kmalloc+0xd4/0xd8 [ 17.064974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.065135] kmalloc_oob_memset_16+0xb0/0x2f8 [ 17.065449] kunit_try_run_case+0x170/0x3f0 [ 17.065521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.065565] kthread+0x328/0x630 [ 17.066149] ret_from_fork+0x10/0x20 [ 17.066431] [ 17.066523] The buggy address belongs to the object at fff00000c7892300 [ 17.066523] which belongs to the cache kmalloc-128 of size 128 [ 17.066583] The buggy address is located 105 bytes inside of [ 17.066583] allocated 120-byte region [fff00000c7892300, fff00000c7892378) [ 17.067022] [ 17.067049] The buggy address belongs to the physical page: [ 17.067367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 17.067430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.067482] page_type: f5(slab) [ 17.067862] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.067939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.067978] page dumped because: kasan: bad access detected [ 17.068009] [ 17.068028] Memory state around the buggy address: [ 17.068062] fff00000c7892200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.068103] fff00000c7892280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.068144] >fff00000c7892300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.068181] ^ [ 17.068220] fff00000c7892380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.068261] fff00000c7892400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.068960] ==================================================================
[ 16.709031] ================================================================== [ 16.709147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.709396] Write of size 16 at addr fff00000c5b7dc69 by task kunit_try_catch/178 [ 16.709513] [ 16.709591] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.709694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.710063] Hardware name: linux,dummy-virt (DT) [ 16.710218] Call trace: [ 16.710385] show_stack+0x20/0x38 (C) [ 16.710530] dump_stack_lvl+0x8c/0xd0 [ 16.710648] print_report+0x118/0x5d0 [ 16.711002] kasan_report+0xdc/0x128 [ 16.711096] kasan_check_range+0x100/0x1a8 [ 16.711244] __asan_memset+0x34/0x78 [ 16.711299] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.711357] kunit_try_run_case+0x170/0x3f0 [ 16.711410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.711498] kthread+0x328/0x630 [ 16.711539] ret_from_fork+0x10/0x20 [ 16.711598] [ 16.711628] Allocated by task 178: [ 16.711665] kasan_save_stack+0x3c/0x68 [ 16.711707] kasan_save_track+0x20/0x40 [ 16.711753] kasan_save_alloc_info+0x40/0x58 [ 16.711806] __kasan_kmalloc+0xd4/0xd8 [ 16.711842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.711881] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.711917] kunit_try_run_case+0x170/0x3f0 [ 16.711954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.711996] kthread+0x328/0x630 [ 16.712027] ret_from_fork+0x10/0x20 [ 16.712063] [ 16.712083] The buggy address belongs to the object at fff00000c5b7dc00 [ 16.712083] which belongs to the cache kmalloc-128 of size 128 [ 16.712138] The buggy address is located 105 bytes inside of [ 16.712138] allocated 120-byte region [fff00000c5b7dc00, fff00000c5b7dc78) [ 16.712213] [ 16.712240] The buggy address belongs to the physical page: [ 16.712281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.712903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.713004] page_type: f5(slab) [ 16.713067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.713168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.713254] page dumped because: kasan: bad access detected [ 16.713284] [ 16.713310] Memory state around the buggy address: [ 16.713716] fff00000c5b7db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.713788] fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.713861] >fff00000c5b7dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.713939] ^ [ 16.714066] fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714159] fff00000c5b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714298] ==================================================================
[ 16.749487] ================================================================== [ 16.749548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.749602] Write of size 16 at addr fff00000c771d369 by task kunit_try_catch/178 [ 16.749649] [ 16.749685] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.750923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.751330] Hardware name: linux,dummy-virt (DT) [ 16.751369] Call trace: [ 16.751393] show_stack+0x20/0x38 (C) [ 16.751772] dump_stack_lvl+0x8c/0xd0 [ 16.752141] print_report+0x118/0x5d0 [ 16.752310] kasan_report+0xdc/0x128 [ 16.752678] kasan_check_range+0x100/0x1a8 [ 16.752917] __asan_memset+0x34/0x78 [ 16.753189] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.753463] kunit_try_run_case+0x170/0x3f0 [ 16.753598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.753794] kthread+0x328/0x630 [ 16.753891] ret_from_fork+0x10/0x20 [ 16.754176] [ 16.754380] Allocated by task 178: [ 16.754443] kasan_save_stack+0x3c/0x68 [ 16.754620] kasan_save_track+0x20/0x40 [ 16.754801] kasan_save_alloc_info+0x40/0x58 [ 16.754939] __kasan_kmalloc+0xd4/0xd8 [ 16.754986] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.755369] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.755660] kunit_try_run_case+0x170/0x3f0 [ 16.755838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.755997] kthread+0x328/0x630 [ 16.756034] ret_from_fork+0x10/0x20 [ 16.756117] [ 16.756188] The buggy address belongs to the object at fff00000c771d300 [ 16.756188] which belongs to the cache kmalloc-128 of size 128 [ 16.756425] The buggy address is located 105 bytes inside of [ 16.756425] allocated 120-byte region [fff00000c771d300, fff00000c771d378) [ 16.756593] [ 16.756815] The buggy address belongs to the physical page: [ 16.756985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d [ 16.757446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.757630] page_type: f5(slab) [ 16.757909] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.758396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.758512] page dumped because: kasan: bad access detected [ 16.758665] [ 16.758816] Memory state around the buggy address: [ 16.758880] fff00000c771d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.759324] fff00000c771d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.759366] >fff00000c771d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.759404] ^ [ 16.759445] fff00000c771d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.759485] fff00000c771d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.759522] ==================================================================
[ 12.408949] ================================================================== [ 12.410076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 12.410912] Write of size 16 at addr ffff888102e24669 by task kunit_try_catch/195 [ 12.411757] [ 12.411969] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.412020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.412031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.412053] Call Trace: [ 12.412064] <TASK> [ 12.412082] dump_stack_lvl+0x73/0xb0 [ 12.412114] print_report+0xd1/0x610 [ 12.412155] ? __virt_addr_valid+0x1db/0x2d0 [ 12.412178] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.412200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.412222] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.412244] kasan_report+0x141/0x180 [ 12.412266] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.412294] kasan_check_range+0x10c/0x1c0 [ 12.412317] __asan_memset+0x27/0x50 [ 12.412336] kmalloc_oob_memset_16+0x166/0x330 [ 12.412358] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 12.412380] ? __schedule+0x10cc/0x2b60 [ 12.412403] ? __pfx_read_tsc+0x10/0x10 [ 12.412423] ? ktime_get_ts64+0x86/0x230 [ 12.412448] kunit_try_run_case+0x1a5/0x480 [ 12.412473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.412494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.412518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.412541] ? __kthread_parkme+0x82/0x180 [ 12.412561] ? preempt_count_sub+0x50/0x80 [ 12.412586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.412609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.412632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.412655] kthread+0x337/0x6f0 [ 12.412674] ? trace_preempt_on+0x20/0xc0 [ 12.412697] ? __pfx_kthread+0x10/0x10 [ 12.412717] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.412738] ? calculate_sigpending+0x7b/0xa0 [ 12.412762] ? __pfx_kthread+0x10/0x10 [ 12.412783] ret_from_fork+0x116/0x1d0 [ 12.412800] ? __pfx_kthread+0x10/0x10 [ 12.412820] ret_from_fork_asm+0x1a/0x30 [ 12.412852] </TASK> [ 12.412864] [ 12.424799] Allocated by task 195: [ 12.425233] kasan_save_stack+0x45/0x70 [ 12.425620] kasan_save_track+0x18/0x40 [ 12.425971] kasan_save_alloc_info+0x3b/0x50 [ 12.426378] __kasan_kmalloc+0xb7/0xc0 [ 12.426790] __kmalloc_cache_noprof+0x189/0x420 [ 12.427269] kmalloc_oob_memset_16+0xac/0x330 [ 12.427680] kunit_try_run_case+0x1a5/0x480 [ 12.428110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.428592] kthread+0x337/0x6f0 [ 12.428804] ret_from_fork+0x116/0x1d0 [ 12.428949] ret_from_fork_asm+0x1a/0x30 [ 12.429185] [ 12.429258] The buggy address belongs to the object at ffff888102e24600 [ 12.429258] which belongs to the cache kmalloc-128 of size 128 [ 12.429622] The buggy address is located 105 bytes inside of [ 12.429622] allocated 120-byte region [ffff888102e24600, ffff888102e24678) [ 12.430000] [ 12.430075] The buggy address belongs to the physical page: [ 12.430324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 12.430680] flags: 0x200000000000000(node=0|zone=2) [ 12.430935] page_type: f5(slab) [ 12.431170] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.431463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.431736] page dumped because: kasan: bad access detected [ 12.431932] [ 12.432021] Memory state around the buggy address: [ 12.432251] ffff888102e24500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.432660] ffff888102e24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.432935] >ffff888102e24600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.433161] ^ [ 12.433480] ffff888102e24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.433804] ffff888102e24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.434252] ==================================================================
[ 12.150694] ================================================================== [ 12.151163] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 12.151930] Write of size 16 at addr ffff888102ae1269 by task kunit_try_catch/196 [ 12.152265] [ 12.153014] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.153064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.153076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.153097] Call Trace: [ 12.153108] <TASK> [ 12.153122] dump_stack_lvl+0x73/0xb0 [ 12.153158] print_report+0xd1/0x610 [ 12.153182] ? __virt_addr_valid+0x1db/0x2d0 [ 12.153204] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.153225] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.153247] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.153269] kasan_report+0x141/0x180 [ 12.153290] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.153318] kasan_check_range+0x10c/0x1c0 [ 12.153341] __asan_memset+0x27/0x50 [ 12.153360] kmalloc_oob_memset_16+0x166/0x330 [ 12.153382] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 12.153486] ? __schedule+0x10cc/0x2b60 [ 12.153512] ? __pfx_read_tsc+0x10/0x10 [ 12.153533] ? ktime_get_ts64+0x86/0x230 [ 12.153563] kunit_try_run_case+0x1a5/0x480 [ 12.153587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.153608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.153633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.153656] ? __kthread_parkme+0x82/0x180 [ 12.153676] ? preempt_count_sub+0x50/0x80 [ 12.153701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.153724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.153747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.153770] kthread+0x337/0x6f0 [ 12.153788] ? trace_preempt_on+0x20/0xc0 [ 12.153811] ? __pfx_kthread+0x10/0x10 [ 12.153831] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.153851] ? calculate_sigpending+0x7b/0xa0 [ 12.153875] ? __pfx_kthread+0x10/0x10 [ 12.153895] ret_from_fork+0x116/0x1d0 [ 12.153913] ? __pfx_kthread+0x10/0x10 [ 12.153932] ret_from_fork_asm+0x1a/0x30 [ 12.153964] </TASK> [ 12.153974] [ 12.165313] Allocated by task 196: [ 12.165627] kasan_save_stack+0x45/0x70 [ 12.166081] kasan_save_track+0x18/0x40 [ 12.166296] kasan_save_alloc_info+0x3b/0x50 [ 12.166805] __kasan_kmalloc+0xb7/0xc0 [ 12.166973] __kmalloc_cache_noprof+0x189/0x420 [ 12.167321] kmalloc_oob_memset_16+0xac/0x330 [ 12.167718] kunit_try_run_case+0x1a5/0x480 [ 12.168094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.168347] kthread+0x337/0x6f0 [ 12.168843] ret_from_fork+0x116/0x1d0 [ 12.169026] ret_from_fork_asm+0x1a/0x30 [ 12.169427] [ 12.169748] The buggy address belongs to the object at ffff888102ae1200 [ 12.169748] which belongs to the cache kmalloc-128 of size 128 [ 12.170395] The buggy address is located 105 bytes inside of [ 12.170395] allocated 120-byte region [ffff888102ae1200, ffff888102ae1278) [ 12.171071] [ 12.171176] The buggy address belongs to the physical page: [ 12.171715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1 [ 12.172149] flags: 0x200000000000000(node=0|zone=2) [ 12.172398] page_type: f5(slab) [ 12.172924] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.173348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.173813] page dumped because: kasan: bad access detected [ 12.174050] [ 12.174128] Memory state around the buggy address: [ 12.174349] ffff888102ae1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.175032] ffff888102ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.175430] >ffff888102ae1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.175789] ^ [ 12.176252] ffff888102ae1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.176869] ffff888102ae1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.177311] ==================================================================
[ 12.343001] ================================================================== [ 12.343483] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 12.343784] Write of size 16 at addr ffff8881029a6869 by task kunit_try_catch/195 [ 12.344441] [ 12.344573] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.344624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.344636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.344659] Call Trace: [ 12.344672] <TASK> [ 12.344691] dump_stack_lvl+0x73/0xb0 [ 12.344724] print_report+0xd1/0x610 [ 12.344747] ? __virt_addr_valid+0x1db/0x2d0 [ 12.344772] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.344793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.344816] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.344839] kasan_report+0x141/0x180 [ 12.344869] ? kmalloc_oob_memset_16+0x166/0x330 [ 12.344895] kasan_check_range+0x10c/0x1c0 [ 12.344918] __asan_memset+0x27/0x50 [ 12.344937] kmalloc_oob_memset_16+0x166/0x330 [ 12.344959] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 12.344982] ? __schedule+0x10cc/0x2b60 [ 12.345005] ? __pfx_read_tsc+0x10/0x10 [ 12.345051] ? ktime_get_ts64+0x86/0x230 [ 12.345076] kunit_try_run_case+0x1a5/0x480 [ 12.345102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.345124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.345148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.345171] ? __kthread_parkme+0x82/0x180 [ 12.345193] ? preempt_count_sub+0x50/0x80 [ 12.345217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.345241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.345264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.345288] kthread+0x337/0x6f0 [ 12.345307] ? trace_preempt_on+0x20/0xc0 [ 12.345330] ? __pfx_kthread+0x10/0x10 [ 12.345349] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.345370] ? calculate_sigpending+0x7b/0xa0 [ 12.345395] ? __pfx_kthread+0x10/0x10 [ 12.345415] ret_from_fork+0x116/0x1d0 [ 12.345446] ? __pfx_kthread+0x10/0x10 [ 12.345466] ret_from_fork_asm+0x1a/0x30 [ 12.345498] </TASK> [ 12.345508] [ 12.353734] Allocated by task 195: [ 12.353943] kasan_save_stack+0x45/0x70 [ 12.354321] kasan_save_track+0x18/0x40 [ 12.354530] kasan_save_alloc_info+0x3b/0x50 [ 12.354736] __kasan_kmalloc+0xb7/0xc0 [ 12.354896] __kmalloc_cache_noprof+0x189/0x420 [ 12.355420] kmalloc_oob_memset_16+0xac/0x330 [ 12.355622] kunit_try_run_case+0x1a5/0x480 [ 12.355829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.356110] kthread+0x337/0x6f0 [ 12.356270] ret_from_fork+0x116/0x1d0 [ 12.356406] ret_from_fork_asm+0x1a/0x30 [ 12.356588] [ 12.356681] The buggy address belongs to the object at ffff8881029a6800 [ 12.356681] which belongs to the cache kmalloc-128 of size 128 [ 12.357758] The buggy address is located 105 bytes inside of [ 12.357758] allocated 120-byte region [ffff8881029a6800, ffff8881029a6878) [ 12.358331] [ 12.358410] The buggy address belongs to the physical page: [ 12.358583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 12.358829] flags: 0x200000000000000(node=0|zone=2) [ 12.358999] page_type: f5(slab) [ 12.359181] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.359759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.360135] page dumped because: kasan: bad access detected [ 12.360434] [ 12.360526] Memory state around the buggy address: [ 12.360714] ffff8881029a6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.360939] ffff8881029a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.361226] >ffff8881029a6800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.361964] ^ [ 12.362315] ffff8881029a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.362680] ffff8881029a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.362964] ==================================================================