Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.990109] ================================================================== [ 16.990188] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.990254] Write of size 2 at addr fff00000c7892077 by task kunit_try_catch/172 [ 16.990304] [ 16.990346] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.990430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.990456] Hardware name: linux,dummy-virt (DT) [ 16.990487] Call trace: [ 16.990511] show_stack+0x20/0x38 (C) [ 16.990562] dump_stack_lvl+0x8c/0xd0 [ 16.990611] print_report+0x118/0x5d0 [ 16.990660] kasan_report+0xdc/0x128 [ 16.990707] kasan_check_range+0x100/0x1a8 [ 16.990757] __asan_memset+0x34/0x78 [ 16.990800] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.991183] kunit_try_run_case+0x170/0x3f0 [ 16.991277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.991596] kthread+0x328/0x630 [ 16.991894] ret_from_fork+0x10/0x20 [ 16.992240] [ 16.992260] Allocated by task 172: [ 16.992292] kasan_save_stack+0x3c/0x68 [ 16.992388] kasan_save_track+0x20/0x40 [ 16.992428] kasan_save_alloc_info+0x40/0x58 [ 16.992970] __kasan_kmalloc+0xd4/0xd8 [ 16.993099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.993169] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.993282] kunit_try_run_case+0x170/0x3f0 [ 16.993324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.993378] kthread+0x328/0x630 [ 16.993440] ret_from_fork+0x10/0x20 [ 16.993752] [ 16.993816] The buggy address belongs to the object at fff00000c7892000 [ 16.993816] which belongs to the cache kmalloc-128 of size 128 [ 16.994006] The buggy address is located 119 bytes inside of [ 16.994006] allocated 120-byte region [fff00000c7892000, fff00000c7892078) [ 16.994249] [ 16.994444] The buggy address belongs to the physical page: [ 16.994591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892 [ 16.994714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.994935] page_type: f5(slab) [ 16.995311] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.995509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.995585] page dumped because: kasan: bad access detected [ 16.995706] [ 16.995744] Memory state around the buggy address: [ 16.995778] fff00000c7891f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.995827] fff00000c7891f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.996421] >fff00000c7892000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.996557] ^ [ 16.996645] fff00000c7892080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.996809] fff00000c7892100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.996907] ==================================================================
[ 16.654416] ================================================================== [ 16.654546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.654601] Write of size 2 at addr fff00000c5b7d977 by task kunit_try_catch/172 [ 16.655127] [ 16.655235] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.655336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.655363] Hardware name: linux,dummy-virt (DT) [ 16.655666] Call trace: [ 16.655738] show_stack+0x20/0x38 (C) [ 16.655793] dump_stack_lvl+0x8c/0xd0 [ 16.655839] print_report+0x118/0x5d0 [ 16.656239] kasan_report+0xdc/0x128 [ 16.656332] kasan_check_range+0x100/0x1a8 [ 16.656548] __asan_memset+0x34/0x78 [ 16.656610] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.656656] kunit_try_run_case+0x170/0x3f0 [ 16.656932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.657169] kthread+0x328/0x630 [ 16.657366] ret_from_fork+0x10/0x20 [ 16.657481] [ 16.657818] Allocated by task 172: [ 16.657948] kasan_save_stack+0x3c/0x68 [ 16.658092] kasan_save_track+0x20/0x40 [ 16.658172] kasan_save_alloc_info+0x40/0x58 [ 16.658419] __kasan_kmalloc+0xd4/0xd8 [ 16.658619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.658697] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.658771] kunit_try_run_case+0x170/0x3f0 [ 16.658959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.659075] kthread+0x328/0x630 [ 16.659382] ret_from_fork+0x10/0x20 [ 16.659620] [ 16.659663] The buggy address belongs to the object at fff00000c5b7d900 [ 16.659663] which belongs to the cache kmalloc-128 of size 128 [ 16.659799] The buggy address is located 119 bytes inside of [ 16.659799] allocated 120-byte region [fff00000c5b7d900, fff00000c5b7d978) [ 16.659929] [ 16.660075] The buggy address belongs to the physical page: [ 16.660108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.660466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.660833] page_type: f5(slab) [ 16.660895] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.661058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.661125] page dumped because: kasan: bad access detected [ 16.661164] [ 16.661182] Memory state around the buggy address: [ 16.661556] fff00000c5b7d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.661634] fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.661782] >fff00000c5b7d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.661956] ^ [ 16.662030] fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662085] fff00000c5b7da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662177] ==================================================================
[ 16.678180] ================================================================== [ 16.678241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.678295] Write of size 2 at addr fff00000c771d077 by task kunit_try_catch/172 [ 16.678667] [ 16.679185] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.679469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.679612] Hardware name: linux,dummy-virt (DT) [ 16.679654] Call trace: [ 16.679679] show_stack+0x20/0x38 (C) [ 16.679742] dump_stack_lvl+0x8c/0xd0 [ 16.680449] print_report+0x118/0x5d0 [ 16.680668] kasan_report+0xdc/0x128 [ 16.680764] kasan_check_range+0x100/0x1a8 [ 16.680835] __asan_memset+0x34/0x78 [ 16.681225] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.681369] kunit_try_run_case+0x170/0x3f0 [ 16.681554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.681731] kthread+0x328/0x630 [ 16.681798] ret_from_fork+0x10/0x20 [ 16.682040] [ 16.682066] Allocated by task 172: [ 16.682099] kasan_save_stack+0x3c/0x68 [ 16.682187] kasan_save_track+0x20/0x40 [ 16.682349] kasan_save_alloc_info+0x40/0x58 [ 16.682396] __kasan_kmalloc+0xd4/0xd8 [ 16.682443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.682482] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.682518] kunit_try_run_case+0x170/0x3f0 [ 16.682555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.682596] kthread+0x328/0x630 [ 16.682628] ret_from_fork+0x10/0x20 [ 16.682672] [ 16.682692] The buggy address belongs to the object at fff00000c771d000 [ 16.682692] which belongs to the cache kmalloc-128 of size 128 [ 16.682769] The buggy address is located 119 bytes inside of [ 16.682769] allocated 120-byte region [fff00000c771d000, fff00000c771d078) [ 16.683269] [ 16.683494] The buggy address belongs to the physical page: [ 16.683533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d [ 16.683783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.683966] page_type: f5(slab) [ 16.684160] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.684252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.684443] page dumped because: kasan: bad access detected [ 16.684477] [ 16.684518] Memory state around the buggy address: [ 16.684852] fff00000c771cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.685019] fff00000c771cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.685124] >fff00000c771d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.685219] ^ [ 16.685343] fff00000c771d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.685459] fff00000c771d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.685947] ==================================================================
[ 12.331887] ================================================================== [ 12.332389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 12.333001] Write of size 2 at addr ffff888102e24477 by task kunit_try_catch/189 [ 12.333293] [ 12.333426] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.333472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.333483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.333504] Call Trace: [ 12.333516] <TASK> [ 12.333575] dump_stack_lvl+0x73/0xb0 [ 12.333609] print_report+0xd1/0x610 [ 12.333631] ? __virt_addr_valid+0x1db/0x2d0 [ 12.333654] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.333697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.333719] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.333756] kasan_report+0x141/0x180 [ 12.333778] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.333805] kasan_check_range+0x10c/0x1c0 [ 12.333829] __asan_memset+0x27/0x50 [ 12.333848] kmalloc_oob_memset_2+0x166/0x330 [ 12.333870] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 12.333903] ? __schedule+0x10cc/0x2b60 [ 12.333926] ? __pfx_read_tsc+0x10/0x10 [ 12.333947] ? ktime_get_ts64+0x86/0x230 [ 12.333972] kunit_try_run_case+0x1a5/0x480 [ 12.334008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.334029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.334053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.334077] ? __kthread_parkme+0x82/0x180 [ 12.334097] ? preempt_count_sub+0x50/0x80 [ 12.334121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.334145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.334168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.334192] kthread+0x337/0x6f0 [ 12.334210] ? trace_preempt_on+0x20/0xc0 [ 12.334234] ? __pfx_kthread+0x10/0x10 [ 12.334254] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.334274] ? calculate_sigpending+0x7b/0xa0 [ 12.334298] ? __pfx_kthread+0x10/0x10 [ 12.334319] ret_from_fork+0x116/0x1d0 [ 12.334337] ? __pfx_kthread+0x10/0x10 [ 12.334357] ret_from_fork_asm+0x1a/0x30 [ 12.334388] </TASK> [ 12.334399] [ 12.342413] Allocated by task 189: [ 12.342600] kasan_save_stack+0x45/0x70 [ 12.342751] kasan_save_track+0x18/0x40 [ 12.342889] kasan_save_alloc_info+0x3b/0x50 [ 12.343044] __kasan_kmalloc+0xb7/0xc0 [ 12.343475] __kmalloc_cache_noprof+0x189/0x420 [ 12.343967] kmalloc_oob_memset_2+0xac/0x330 [ 12.344211] kunit_try_run_case+0x1a5/0x480 [ 12.344372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.344557] kthread+0x337/0x6f0 [ 12.344720] ret_from_fork+0x116/0x1d0 [ 12.344921] ret_from_fork_asm+0x1a/0x30 [ 12.345327] [ 12.345425] The buggy address belongs to the object at ffff888102e24400 [ 12.345425] which belongs to the cache kmalloc-128 of size 128 [ 12.345875] The buggy address is located 119 bytes inside of [ 12.345875] allocated 120-byte region [ffff888102e24400, ffff888102e24478) [ 12.346682] [ 12.346787] The buggy address belongs to the physical page: [ 12.347031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 12.347375] flags: 0x200000000000000(node=0|zone=2) [ 12.347615] page_type: f5(slab) [ 12.347817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.348169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.348484] page dumped because: kasan: bad access detected [ 12.348812] [ 12.348990] Memory state around the buggy address: [ 12.349469] ffff888102e24300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.350156] ffff888102e24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.350463] >ffff888102e24400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.350727] ^ [ 12.350951] ffff888102e24480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.351593] ffff888102e24500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.351830] ==================================================================
[ 12.080572] ================================================================== [ 12.081249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 12.081502] Write of size 2 at addr ffff888102ae1177 by task kunit_try_catch/190 [ 12.081726] [ 12.081812] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.081853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.082091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.082119] Call Trace: [ 12.082130] <TASK> [ 12.082145] dump_stack_lvl+0x73/0xb0 [ 12.082175] print_report+0xd1/0x610 [ 12.082197] ? __virt_addr_valid+0x1db/0x2d0 [ 12.082218] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.082240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.082262] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.082284] kasan_report+0x141/0x180 [ 12.082388] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.082482] kasan_check_range+0x10c/0x1c0 [ 12.082509] __asan_memset+0x27/0x50 [ 12.082528] kmalloc_oob_memset_2+0x166/0x330 [ 12.082558] ? __kasan_check_write+0x18/0x20 [ 12.082602] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 12.082623] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.082648] ? trace_hardirqs_on+0x37/0xe0 [ 12.082672] ? __pfx_read_tsc+0x10/0x10 [ 12.082692] ? ktime_get_ts64+0x86/0x230 [ 12.082716] kunit_try_run_case+0x1a5/0x480 [ 12.082740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.082764] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.082806] ? __kthread_parkme+0x82/0x180 [ 12.082825] ? preempt_count_sub+0x50/0x80 [ 12.082849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.082872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.082895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.082918] kthread+0x337/0x6f0 [ 12.082937] ? trace_preempt_on+0x20/0xc0 [ 12.082958] ? __pfx_kthread+0x10/0x10 [ 12.082978] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.083010] ? calculate_sigpending+0x7b/0xa0 [ 12.083034] ? __pfx_kthread+0x10/0x10 [ 12.083055] ret_from_fork+0x116/0x1d0 [ 12.083091] ? __pfx_kthread+0x10/0x10 [ 12.083111] ret_from_fork_asm+0x1a/0x30 [ 12.083144] </TASK> [ 12.083153] [ 12.093118] Allocated by task 190: [ 12.093315] kasan_save_stack+0x45/0x70 [ 12.093937] kasan_save_track+0x18/0x40 [ 12.094199] kasan_save_alloc_info+0x3b/0x50 [ 12.094366] __kasan_kmalloc+0xb7/0xc0 [ 12.094687] __kmalloc_cache_noprof+0x189/0x420 [ 12.095130] kmalloc_oob_memset_2+0xac/0x330 [ 12.095385] kunit_try_run_case+0x1a5/0x480 [ 12.095737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.096046] kthread+0x337/0x6f0 [ 12.096192] ret_from_fork+0x116/0x1d0 [ 12.096382] ret_from_fork_asm+0x1a/0x30 [ 12.096694] [ 12.096778] The buggy address belongs to the object at ffff888102ae1100 [ 12.096778] which belongs to the cache kmalloc-128 of size 128 [ 12.097708] The buggy address is located 119 bytes inside of [ 12.097708] allocated 120-byte region [ffff888102ae1100, ffff888102ae1178) [ 12.098231] [ 12.098325] The buggy address belongs to the physical page: [ 12.098533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1 [ 12.099330] flags: 0x200000000000000(node=0|zone=2) [ 12.099761] page_type: f5(slab) [ 12.099937] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.100361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.100857] page dumped because: kasan: bad access detected [ 12.101266] [ 12.101371] Memory state around the buggy address: [ 12.101763] ffff888102ae1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.102127] ffff888102ae1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.102549] >ffff888102ae1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.102959] ^ [ 12.103218] ffff888102ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.103810] ffff888102ae1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.104203] ==================================================================
[ 12.252931] ================================================================== [ 12.253519] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 12.253952] Write of size 2 at addr ffff8881029a6777 by task kunit_try_catch/189 [ 12.254241] [ 12.254336] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.254384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.254395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.254417] Call Trace: [ 12.254429] <TASK> [ 12.254447] dump_stack_lvl+0x73/0xb0 [ 12.254531] print_report+0xd1/0x610 [ 12.254554] ? __virt_addr_valid+0x1db/0x2d0 [ 12.254577] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.254598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.254620] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.254642] kasan_report+0x141/0x180 [ 12.254664] ? kmalloc_oob_memset_2+0x166/0x330 [ 12.254691] kasan_check_range+0x10c/0x1c0 [ 12.254714] __asan_memset+0x27/0x50 [ 12.254732] kmalloc_oob_memset_2+0x166/0x330 [ 12.254754] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 12.254776] ? __schedule+0x10cc/0x2b60 [ 12.254833] ? __pfx_read_tsc+0x10/0x10 [ 12.254854] ? ktime_get_ts64+0x86/0x230 [ 12.254903] kunit_try_run_case+0x1a5/0x480 [ 12.254928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.254950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.254973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.254996] ? __kthread_parkme+0x82/0x180 [ 12.255026] ? preempt_count_sub+0x50/0x80 [ 12.255051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.255073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.255096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.255119] kthread+0x337/0x6f0 [ 12.255138] ? trace_preempt_on+0x20/0xc0 [ 12.255161] ? __pfx_kthread+0x10/0x10 [ 12.255180] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.255201] ? calculate_sigpending+0x7b/0xa0 [ 12.255256] ? __pfx_kthread+0x10/0x10 [ 12.255301] ret_from_fork+0x116/0x1d0 [ 12.255320] ? __pfx_kthread+0x10/0x10 [ 12.255339] ret_from_fork_asm+0x1a/0x30 [ 12.255370] </TASK> [ 12.255380] [ 12.268637] Allocated by task 189: [ 12.268828] kasan_save_stack+0x45/0x70 [ 12.269395] kasan_save_track+0x18/0x40 [ 12.269761] kasan_save_alloc_info+0x3b/0x50 [ 12.269966] __kasan_kmalloc+0xb7/0xc0 [ 12.270610] __kmalloc_cache_noprof+0x189/0x420 [ 12.270932] kmalloc_oob_memset_2+0xac/0x330 [ 12.271201] kunit_try_run_case+0x1a5/0x480 [ 12.271383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.271869] kthread+0x337/0x6f0 [ 12.272341] ret_from_fork+0x116/0x1d0 [ 12.272609] ret_from_fork_asm+0x1a/0x30 [ 12.272795] [ 12.272894] The buggy address belongs to the object at ffff8881029a6700 [ 12.272894] which belongs to the cache kmalloc-128 of size 128 [ 12.274270] The buggy address is located 119 bytes inside of [ 12.274270] allocated 120-byte region [ffff8881029a6700, ffff8881029a6778) [ 12.275234] [ 12.275477] The buggy address belongs to the physical page: [ 12.275723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 12.276365] flags: 0x200000000000000(node=0|zone=2) [ 12.276829] page_type: f5(slab) [ 12.277223] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.277890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.278560] page dumped because: kasan: bad access detected [ 12.278934] [ 12.279265] Memory state around the buggy address: [ 12.279693] ffff8881029a6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.280001] ffff8881029a6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.280295] >ffff8881029a6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 12.281081] ^ [ 12.281649] ffff8881029a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.282120] ffff8881029a6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.283113] ==================================================================