Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.626410] ================================================================== [ 17.626508] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.626580] Read of size 1 at addr fff00000c78840c8 by task kunit_try_catch/207 [ 17.626632] [ 17.626676] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.626760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.626788] Hardware name: linux,dummy-virt (DT) [ 17.626821] Call trace: [ 17.626861] show_stack+0x20/0x38 (C) [ 17.627101] dump_stack_lvl+0x8c/0xd0 [ 17.627152] print_report+0x118/0x5d0 [ 17.627557] kasan_report+0xdc/0x128 [ 17.627893] __asan_report_load1_noabort+0x20/0x30 [ 17.628161] kmem_cache_oob+0x344/0x430 [ 17.628878] kunit_try_run_case+0x170/0x3f0 [ 17.628965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.629043] kthread+0x328/0x630 [ 17.629255] ret_from_fork+0x10/0x20 [ 17.629537] [ 17.629583] Allocated by task 207: [ 17.629663] kasan_save_stack+0x3c/0x68 [ 17.630143] kasan_save_track+0x20/0x40 [ 17.630245] kasan_save_alloc_info+0x40/0x58 [ 17.630317] __kasan_slab_alloc+0xa8/0xb0 [ 17.630354] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.630642] kmem_cache_oob+0x12c/0x430 [ 17.630779] kunit_try_run_case+0x170/0x3f0 [ 17.630908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.631044] kthread+0x328/0x630 [ 17.631357] ret_from_fork+0x10/0x20 [ 17.631498] [ 17.631588] The buggy address belongs to the object at fff00000c7884000 [ 17.631588] which belongs to the cache test_cache of size 200 [ 17.631673] The buggy address is located 0 bytes to the right of [ 17.631673] allocated 200-byte region [fff00000c7884000, fff00000c78840c8) [ 17.631857] [ 17.632003] The buggy address belongs to the physical page: [ 17.632040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.632106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.632433] page_type: f5(slab) [ 17.632508] raw: 0bfffe0000000000 fff00000c4557b40 dead000000000122 0000000000000000 [ 17.632584] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.632656] page dumped because: kasan: bad access detected [ 17.633009] [ 17.633083] Memory state around the buggy address: [ 17.633181] fff00000c7883f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.633408] fff00000c7884000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.633467] >fff00000c7884080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.633657] ^ [ 17.633783] fff00000c7884100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.633963] fff00000c7884180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.634038] ==================================================================
[ 17.015542] ================================================================== [ 17.015600] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.015681] Read of size 1 at addr fff00000c79900c8 by task kunit_try_catch/207 [ 17.015741] [ 17.015776] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.015877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.015920] Hardware name: linux,dummy-virt (DT) [ 17.015969] Call trace: [ 17.016027] show_stack+0x20/0x38 (C) [ 17.016080] dump_stack_lvl+0x8c/0xd0 [ 17.016181] print_report+0x118/0x5d0 [ 17.016236] kasan_report+0xdc/0x128 [ 17.016283] __asan_report_load1_noabort+0x20/0x30 [ 17.016348] kmem_cache_oob+0x344/0x430 [ 17.016393] kunit_try_run_case+0x170/0x3f0 [ 17.016439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.016492] kthread+0x328/0x630 [ 17.016533] ret_from_fork+0x10/0x20 [ 17.016609] [ 17.016627] Allocated by task 207: [ 17.016813] kasan_save_stack+0x3c/0x68 [ 17.016945] kasan_save_track+0x20/0x40 [ 17.017044] kasan_save_alloc_info+0x40/0x58 [ 17.017098] __kasan_slab_alloc+0xa8/0xb0 [ 17.017204] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.017265] kmem_cache_oob+0x12c/0x430 [ 17.017391] kunit_try_run_case+0x170/0x3f0 [ 17.017455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.017552] kthread+0x328/0x630 [ 17.017675] ret_from_fork+0x10/0x20 [ 17.017761] [ 17.017781] The buggy address belongs to the object at fff00000c7990000 [ 17.017781] which belongs to the cache test_cache of size 200 [ 17.017890] The buggy address is located 0 bytes to the right of [ 17.017890] allocated 200-byte region [fff00000c7990000, fff00000c79900c8) [ 17.017966] [ 17.017986] The buggy address belongs to the physical page: [ 17.018016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107990 [ 17.018094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.018143] page_type: f5(slab) [ 17.018183] raw: 0bfffe0000000000 fff00000c598d140 dead000000000122 0000000000000000 [ 17.018233] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.018273] page dumped because: kasan: bad access detected [ 17.018304] [ 17.018357] Memory state around the buggy address: [ 17.018391] fff00000c798ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018436] fff00000c7990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.018479] >fff00000c7990080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.018562] ^ [ 17.018676] fff00000c7990100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018718] fff00000c7990180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018780] ==================================================================
[ 17.061941] ================================================================== [ 17.062073] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.062394] Read of size 1 at addr fff00000c775a0c8 by task kunit_try_catch/207 [ 17.062446] [ 17.062488] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.063117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.063150] Hardware name: linux,dummy-virt (DT) [ 17.063185] Call trace: [ 17.063210] show_stack+0x20/0x38 (C) [ 17.063263] dump_stack_lvl+0x8c/0xd0 [ 17.063313] print_report+0x118/0x5d0 [ 17.063361] kasan_report+0xdc/0x128 [ 17.063409] __asan_report_load1_noabort+0x20/0x30 [ 17.064088] kmem_cache_oob+0x344/0x430 [ 17.064145] kunit_try_run_case+0x170/0x3f0 [ 17.064197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.064248] kthread+0x328/0x630 [ 17.064291] ret_from_fork+0x10/0x20 [ 17.064341] [ 17.064360] Allocated by task 207: [ 17.064400] kasan_save_stack+0x3c/0x68 [ 17.064442] kasan_save_track+0x20/0x40 [ 17.064480] kasan_save_alloc_info+0x40/0x58 [ 17.064872] __kasan_slab_alloc+0xa8/0xb0 [ 17.065039] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.065080] kmem_cache_oob+0x12c/0x430 [ 17.065116] kunit_try_run_case+0x170/0x3f0 [ 17.065532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.065644] kthread+0x328/0x630 [ 17.065696] ret_from_fork+0x10/0x20 [ 17.065816] [ 17.065836] The buggy address belongs to the object at fff00000c775a000 [ 17.065836] which belongs to the cache test_cache of size 200 [ 17.065894] The buggy address is located 0 bytes to the right of [ 17.065894] allocated 200-byte region [fff00000c775a000, fff00000c775a0c8) [ 17.065957] [ 17.065979] The buggy address belongs to the physical page: [ 17.066011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a [ 17.066079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.066130] page_type: f5(slab) [ 17.066588] raw: 0bfffe0000000000 fff00000c56bd500 dead000000000122 0000000000000000 [ 17.066644] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.066686] page dumped because: kasan: bad access detected [ 17.066731] [ 17.066759] Memory state around the buggy address: [ 17.066791] fff00000c7759f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.066842] fff00000c775a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.067268] >fff00000c775a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.067374] ^ [ 17.067439] fff00000c775a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067542] fff00000c775a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067581] ==================================================================
[ 12.882502] ================================================================== [ 12.882998] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 12.883355] Read of size 1 at addr ffff8881029a20c8 by task kunit_try_catch/224 [ 12.883664] [ 12.883807] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.883853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.883863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.883884] Call Trace: [ 12.883906] <TASK> [ 12.883923] dump_stack_lvl+0x73/0xb0 [ 12.883954] print_report+0xd1/0x610 [ 12.883975] ? __virt_addr_valid+0x1db/0x2d0 [ 12.884008] ? kmem_cache_oob+0x402/0x530 [ 12.884029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.884052] ? kmem_cache_oob+0x402/0x530 [ 12.884076] kasan_report+0x141/0x180 [ 12.884097] ? kmem_cache_oob+0x402/0x530 [ 12.884125] __asan_report_load1_noabort+0x18/0x20 [ 12.884149] kmem_cache_oob+0x402/0x530 [ 12.884169] ? trace_hardirqs_on+0x37/0xe0 [ 12.884193] ? __pfx_kmem_cache_oob+0x10/0x10 [ 12.884217] ? __kasan_check_write+0x18/0x20 [ 12.884235] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.884259] ? irqentry_exit+0x2a/0x60 [ 12.884282] ? trace_hardirqs_on+0x37/0xe0 [ 12.884303] ? __pfx_read_tsc+0x10/0x10 [ 12.884323] ? ktime_get_ts64+0x86/0x230 [ 12.884348] kunit_try_run_case+0x1a5/0x480 [ 12.884372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.884396] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.884419] ? __kthread_parkme+0x82/0x180 [ 12.884438] ? preempt_count_sub+0x50/0x80 [ 12.884462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.884485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.884508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.884544] kthread+0x337/0x6f0 [ 12.884563] ? trace_preempt_on+0x20/0xc0 [ 12.884584] ? __pfx_kthread+0x10/0x10 [ 12.884604] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.884624] ? calculate_sigpending+0x7b/0xa0 [ 12.884648] ? __pfx_kthread+0x10/0x10 [ 12.884668] ret_from_fork+0x116/0x1d0 [ 12.884687] ? __pfx_kthread+0x10/0x10 [ 12.884706] ret_from_fork_asm+0x1a/0x30 [ 12.884738] </TASK> [ 12.884749] [ 12.892843] Allocated by task 224: [ 12.893040] kasan_save_stack+0x45/0x70 [ 12.893260] kasan_save_track+0x18/0x40 [ 12.893424] kasan_save_alloc_info+0x3b/0x50 [ 12.893574] __kasan_slab_alloc+0x91/0xa0 [ 12.893713] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.893951] kmem_cache_oob+0x157/0x530 [ 12.894313] kunit_try_run_case+0x1a5/0x480 [ 12.894523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.895006] kthread+0x337/0x6f0 [ 12.895180] ret_from_fork+0x116/0x1d0 [ 12.895337] ret_from_fork_asm+0x1a/0x30 [ 12.895582] [ 12.895666] The buggy address belongs to the object at ffff8881029a2000 [ 12.895666] which belongs to the cache test_cache of size 200 [ 12.896218] The buggy address is located 0 bytes to the right of [ 12.896218] allocated 200-byte region [ffff8881029a2000, ffff8881029a20c8) [ 12.896754] [ 12.896847] The buggy address belongs to the physical page: [ 12.897109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a2 [ 12.897382] flags: 0x200000000000000(node=0|zone=2) [ 12.897652] page_type: f5(slab) [ 12.897824] raw: 0200000000000000 ffff888100fb8780 dead000000000122 0000000000000000 [ 12.898203] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 12.898441] page dumped because: kasan: bad access detected [ 12.898617] [ 12.898693] Memory state around the buggy address: [ 12.898856] ffff8881029a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.899087] ffff8881029a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.899403] >ffff8881029a2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 12.899717] ^ [ 12.899977] ffff8881029a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.900344] ffff8881029a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.900832] ==================================================================
[ 12.690458] ================================================================== [ 12.690928] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 12.691230] Read of size 1 at addr ffff8881026e70c8 by task kunit_try_catch/225 [ 12.691527] [ 12.691657] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.691704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.691715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.691737] Call Trace: [ 12.691749] <TASK> [ 12.691765] dump_stack_lvl+0x73/0xb0 [ 12.691796] print_report+0xd1/0x610 [ 12.691818] ? __virt_addr_valid+0x1db/0x2d0 [ 12.691841] ? kmem_cache_oob+0x402/0x530 [ 12.691862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.691884] ? kmem_cache_oob+0x402/0x530 [ 12.691907] kasan_report+0x141/0x180 [ 12.691928] ? kmem_cache_oob+0x402/0x530 [ 12.691955] __asan_report_load1_noabort+0x18/0x20 [ 12.691979] kmem_cache_oob+0x402/0x530 [ 12.692000] ? trace_hardirqs_on+0x37/0xe0 [ 12.692023] ? __pfx_kmem_cache_oob+0x10/0x10 [ 12.692047] ? __kasan_check_write+0x18/0x20 [ 12.692067] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.692092] ? irqentry_exit+0x2a/0x60 [ 12.692125] ? trace_hardirqs_on+0x37/0xe0 [ 12.692146] ? __pfx_read_tsc+0x10/0x10 [ 12.692167] ? ktime_get_ts64+0x86/0x230 [ 12.692191] kunit_try_run_case+0x1a5/0x480 [ 12.692215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.692240] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.692262] ? __kthread_parkme+0x82/0x180 [ 12.692283] ? preempt_count_sub+0x50/0x80 [ 12.692309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.692332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.692357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.692380] kthread+0x337/0x6f0 [ 12.692399] ? trace_preempt_on+0x20/0xc0 [ 12.692442] ? __pfx_kthread+0x10/0x10 [ 12.692462] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.692483] ? calculate_sigpending+0x7b/0xa0 [ 12.692506] ? __pfx_kthread+0x10/0x10 [ 12.692527] ret_from_fork+0x116/0x1d0 [ 12.692545] ? __pfx_kthread+0x10/0x10 [ 12.692564] ret_from_fork_asm+0x1a/0x30 [ 12.692605] </TASK> [ 12.692614] [ 12.700471] Allocated by task 225: [ 12.700804] kasan_save_stack+0x45/0x70 [ 12.701011] kasan_save_track+0x18/0x40 [ 12.701212] kasan_save_alloc_info+0x3b/0x50 [ 12.701472] __kasan_slab_alloc+0x91/0xa0 [ 12.701883] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.702118] kmem_cache_oob+0x157/0x530 [ 12.702298] kunit_try_run_case+0x1a5/0x480 [ 12.702627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.702861] kthread+0x337/0x6f0 [ 12.703015] ret_from_fork+0x116/0x1d0 [ 12.703170] ret_from_fork_asm+0x1a/0x30 [ 12.703346] [ 12.703505] The buggy address belongs to the object at ffff8881026e7000 [ 12.703505] which belongs to the cache test_cache of size 200 [ 12.703983] The buggy address is located 0 bytes to the right of [ 12.703983] allocated 200-byte region [ffff8881026e7000, ffff8881026e70c8) [ 12.704673] [ 12.704778] The buggy address belongs to the physical page: [ 12.704987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026e7 [ 12.705276] flags: 0x200000000000000(node=0|zone=2) [ 12.705596] page_type: f5(slab) [ 12.705776] raw: 0200000000000000 ffff8881015ea500 dead000000000122 0000000000000000 [ 12.706059] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 12.706378] page dumped because: kasan: bad access detected [ 12.706706] [ 12.706803] Memory state around the buggy address: [ 12.706986] ffff8881026e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.707245] ffff8881026e7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.707472] >ffff8881026e7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 12.707686] ^ [ 12.707858] ffff8881026e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.708072] ffff8881026e7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.708384] ==================================================================
[ 12.888585] ================================================================== [ 12.889085] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 12.889734] Read of size 1 at addr ffff8881034190c8 by task kunit_try_catch/224 [ 12.890423] [ 12.890726] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.890795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.890808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.890830] Call Trace: [ 12.890843] <TASK> [ 12.890860] dump_stack_lvl+0x73/0xb0 [ 12.890904] print_report+0xd1/0x610 [ 12.890927] ? __virt_addr_valid+0x1db/0x2d0 [ 12.890950] ? kmem_cache_oob+0x402/0x530 [ 12.890983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.891006] ? kmem_cache_oob+0x402/0x530 [ 12.891037] kasan_report+0x141/0x180 [ 12.891058] ? kmem_cache_oob+0x402/0x530 [ 12.891094] __asan_report_load1_noabort+0x18/0x20 [ 12.891133] kmem_cache_oob+0x402/0x530 [ 12.891208] ? trace_hardirqs_on+0x37/0xe0 [ 12.891236] ? __pfx_kmem_cache_oob+0x10/0x10 [ 12.891259] ? finish_task_switch.isra.0+0x153/0x700 [ 12.891281] ? __switch_to+0x47/0xf50 [ 12.891309] ? __pfx_read_tsc+0x10/0x10 [ 12.891330] ? ktime_get_ts64+0x86/0x230 [ 12.891354] kunit_try_run_case+0x1a5/0x480 [ 12.891381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.891403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.891428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.891451] ? __kthread_parkme+0x82/0x180 [ 12.891472] ? preempt_count_sub+0x50/0x80 [ 12.891495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.891519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.891543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.891566] kthread+0x337/0x6f0 [ 12.891585] ? trace_preempt_on+0x20/0xc0 [ 12.891606] ? __pfx_kthread+0x10/0x10 [ 12.891626] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.891647] ? calculate_sigpending+0x7b/0xa0 [ 12.891671] ? __pfx_kthread+0x10/0x10 [ 12.891693] ret_from_fork+0x116/0x1d0 [ 12.891711] ? __pfx_kthread+0x10/0x10 [ 12.891730] ret_from_fork_asm+0x1a/0x30 [ 12.891761] </TASK> [ 12.891772] [ 12.904591] Allocated by task 224: [ 12.904978] kasan_save_stack+0x45/0x70 [ 12.905464] kasan_save_track+0x18/0x40 [ 12.905740] kasan_save_alloc_info+0x3b/0x50 [ 12.905893] __kasan_slab_alloc+0x91/0xa0 [ 12.906121] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.906575] kmem_cache_oob+0x157/0x530 [ 12.907037] kunit_try_run_case+0x1a5/0x480 [ 12.907473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.908052] kthread+0x337/0x6f0 [ 12.908339] ret_from_fork+0x116/0x1d0 [ 12.908706] ret_from_fork_asm+0x1a/0x30 [ 12.909190] [ 12.909354] The buggy address belongs to the object at ffff888103419000 [ 12.909354] which belongs to the cache test_cache of size 200 [ 12.910121] The buggy address is located 0 bytes to the right of [ 12.910121] allocated 200-byte region [ffff888103419000, ffff8881034190c8) [ 12.910835] [ 12.910909] The buggy address belongs to the physical page: [ 12.911215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103419 [ 12.911992] flags: 0x200000000000000(node=0|zone=2) [ 12.912650] page_type: f5(slab) [ 12.913088] raw: 0200000000000000 ffff888100fa1a00 dead000000000122 0000000000000000 [ 12.913765] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 12.913996] page dumped because: kasan: bad access detected [ 12.914633] [ 12.914826] Memory state around the buggy address: [ 12.915337] ffff888103418f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.915852] ffff888103419000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.916474] >ffff888103419080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 12.917149] ^ [ 12.917708] ffff888103419100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.917934] ffff888103419180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.918459] ==================================================================