Date
July 20, 2025, 8:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.407262] ================================================================== [ 15.407341] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.407396] Read of size 1 at addr fff00000c6094f7f by task kunit_try_catch/195 [ 15.407631] [ 15.407684] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.407882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.408058] Hardware name: linux,dummy-virt (DT) [ 15.408135] Call trace: [ 15.408161] show_stack+0x20/0x38 (C) [ 15.408225] dump_stack_lvl+0x8c/0xd0 [ 15.408449] print_report+0x118/0x5d0 [ 15.408691] kasan_report+0xdc/0x128 [ 15.408811] __asan_report_load1_noabort+0x20/0x30 [ 15.408905] ksize_unpoisons_memory+0x690/0x740 [ 15.409055] kunit_try_run_case+0x170/0x3f0 [ 15.409143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.409368] kthread+0x328/0x630 [ 15.409596] ret_from_fork+0x10/0x20 [ 15.409763] [ 15.409832] Allocated by task 195: [ 15.409988] kasan_save_stack+0x3c/0x68 [ 15.410093] kasan_save_track+0x20/0x40 [ 15.410231] kasan_save_alloc_info+0x40/0x58 [ 15.410659] __kasan_kmalloc+0xd4/0xd8 [ 15.410729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.410812] ksize_unpoisons_memory+0xc0/0x740 [ 15.410861] kunit_try_run_case+0x170/0x3f0 [ 15.410899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.410951] kthread+0x328/0x630 [ 15.410983] ret_from_fork+0x10/0x20 [ 15.411018] [ 15.411039] The buggy address belongs to the object at fff00000c6094f00 [ 15.411039] which belongs to the cache kmalloc-128 of size 128 [ 15.411096] The buggy address is located 12 bytes to the right of [ 15.411096] allocated 115-byte region [fff00000c6094f00, fff00000c6094f73) [ 15.411161] [ 15.411180] The buggy address belongs to the physical page: [ 15.411223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 15.411285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.411331] page_type: f5(slab) [ 15.411372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.411424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.411485] page dumped because: kasan: bad access detected [ 15.411516] [ 15.411536] Memory state around the buggy address: [ 15.411575] fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.411628] fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411680] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.411729] ^ [ 15.411771] fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411813] fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.411862] ================================================================== [ 15.391029] ================================================================== [ 15.391816] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.391937] Read of size 1 at addr fff00000c6094f73 by task kunit_try_catch/195 [ 15.392032] [ 15.392069] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.392429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.392553] Hardware name: linux,dummy-virt (DT) [ 15.392909] Call trace: [ 15.392950] show_stack+0x20/0x38 (C) [ 15.393059] dump_stack_lvl+0x8c/0xd0 [ 15.393133] print_report+0x118/0x5d0 [ 15.393322] kasan_report+0xdc/0x128 [ 15.393381] __asan_report_load1_noabort+0x20/0x30 [ 15.393545] ksize_unpoisons_memory+0x628/0x740 [ 15.393782] kunit_try_run_case+0x170/0x3f0 [ 15.393935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.394002] kthread+0x328/0x630 [ 15.394201] ret_from_fork+0x10/0x20 [ 15.394426] [ 15.394468] Allocated by task 195: [ 15.394542] kasan_save_stack+0x3c/0x68 [ 15.394747] kasan_save_track+0x20/0x40 [ 15.394928] kasan_save_alloc_info+0x40/0x58 [ 15.395020] __kasan_kmalloc+0xd4/0xd8 [ 15.395068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.395109] ksize_unpoisons_memory+0xc0/0x740 [ 15.395148] kunit_try_run_case+0x170/0x3f0 [ 15.395218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.395277] kthread+0x328/0x630 [ 15.395328] ret_from_fork+0x10/0x20 [ 15.395366] [ 15.395388] The buggy address belongs to the object at fff00000c6094f00 [ 15.395388] which belongs to the cache kmalloc-128 of size 128 [ 15.395451] The buggy address is located 0 bytes to the right of [ 15.395451] allocated 115-byte region [fff00000c6094f00, fff00000c6094f73) [ 15.395515] [ 15.395536] The buggy address belongs to the physical page: [ 15.395585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 15.395648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.395696] page_type: f5(slab) [ 15.395735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.395786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.395834] page dumped because: kasan: bad access detected [ 15.395879] [ 15.395897] Memory state around the buggy address: [ 15.395930] fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.395981] fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.396022] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.396078] ^ [ 15.396116] fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.396173] fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.396221] ================================================================== [ 15.399296] ================================================================== [ 15.399391] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.399515] Read of size 1 at addr fff00000c6094f78 by task kunit_try_catch/195 [ 15.399569] [ 15.399628] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.400051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.400216] Hardware name: linux,dummy-virt (DT) [ 15.400262] Call trace: [ 15.400318] show_stack+0x20/0x38 (C) [ 15.400391] dump_stack_lvl+0x8c/0xd0 [ 15.400437] print_report+0x118/0x5d0 [ 15.400726] kasan_report+0xdc/0x128 [ 15.400797] __asan_report_load1_noabort+0x20/0x30 [ 15.400851] ksize_unpoisons_memory+0x618/0x740 [ 15.401157] kunit_try_run_case+0x170/0x3f0 [ 15.401276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.401378] kthread+0x328/0x630 [ 15.401477] ret_from_fork+0x10/0x20 [ 15.401629] [ 15.401649] Allocated by task 195: [ 15.401677] kasan_save_stack+0x3c/0x68 [ 15.401719] kasan_save_track+0x20/0x40 [ 15.401764] kasan_save_alloc_info+0x40/0x58 [ 15.402106] __kasan_kmalloc+0xd4/0xd8 [ 15.402213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.402308] ksize_unpoisons_memory+0xc0/0x740 [ 15.402396] kunit_try_run_case+0x170/0x3f0 [ 15.402482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.402615] kthread+0x328/0x630 [ 15.402690] ret_from_fork+0x10/0x20 [ 15.402735] [ 15.402894] The buggy address belongs to the object at fff00000c6094f00 [ 15.402894] which belongs to the cache kmalloc-128 of size 128 [ 15.403129] The buggy address is located 5 bytes to the right of [ 15.403129] allocated 115-byte region [fff00000c6094f00, fff00000c6094f73) [ 15.403329] [ 15.403405] The buggy address belongs to the physical page: [ 15.403551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 15.403649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.403994] page_type: f5(slab) [ 15.404298] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.404573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.404628] page dumped because: kasan: bad access detected [ 15.404764] [ 15.404854] Memory state around the buggy address: [ 15.405027] fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.405112] fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405157] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.405398] ^ [ 15.405645] fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405811] fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.405919] ==================================================================
[ 13.364993] ================================================================== [ 13.366390] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.366669] Read of size 1 at addr ffff888103249673 by task kunit_try_catch/212 [ 13.367243] [ 13.367608] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.367661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.367672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.367695] Call Trace: [ 13.367708] <TASK> [ 13.367726] dump_stack_lvl+0x73/0xb0 [ 13.367759] print_report+0xd1/0x610 [ 13.367782] ? __virt_addr_valid+0x1db/0x2d0 [ 13.367806] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.367829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.367851] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.367874] kasan_report+0x141/0x180 [ 13.367895] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.367923] __asan_report_load1_noabort+0x18/0x20 [ 13.367947] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.367970] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.367992] ? finish_task_switch.isra.0+0x153/0x700 [ 13.368016] ? __switch_to+0x47/0xf50 [ 13.368043] ? __schedule+0x10c6/0x2b60 [ 13.368148] ? __pfx_read_tsc+0x10/0x10 [ 13.368171] ? ktime_get_ts64+0x86/0x230 [ 13.368195] kunit_try_run_case+0x1a5/0x480 [ 13.368221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.368243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.368267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.368290] ? __kthread_parkme+0x82/0x180 [ 13.368311] ? preempt_count_sub+0x50/0x80 [ 13.368333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.368356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.368379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.368402] kthread+0x337/0x6f0 [ 13.368422] ? trace_preempt_on+0x20/0xc0 [ 13.368445] ? __pfx_kthread+0x10/0x10 [ 13.368466] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.368499] ? calculate_sigpending+0x7b/0xa0 [ 13.368524] ? __pfx_kthread+0x10/0x10 [ 13.368546] ret_from_fork+0x116/0x1d0 [ 13.368564] ? __pfx_kthread+0x10/0x10 [ 13.368585] ret_from_fork_asm+0x1a/0x30 [ 13.368615] </TASK> [ 13.368625] [ 13.382448] Allocated by task 212: [ 13.382614] kasan_save_stack+0x45/0x70 [ 13.382770] kasan_save_track+0x18/0x40 [ 13.383128] kasan_save_alloc_info+0x3b/0x50 [ 13.383585] __kasan_kmalloc+0xb7/0xc0 [ 13.383991] __kmalloc_cache_noprof+0x189/0x420 [ 13.384450] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.384912] kunit_try_run_case+0x1a5/0x480 [ 13.385341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.386087] kthread+0x337/0x6f0 [ 13.386302] ret_from_fork+0x116/0x1d0 [ 13.386622] ret_from_fork_asm+0x1a/0x30 [ 13.387007] [ 13.387175] The buggy address belongs to the object at ffff888103249600 [ 13.387175] which belongs to the cache kmalloc-128 of size 128 [ 13.387724] The buggy address is located 0 bytes to the right of [ 13.387724] allocated 115-byte region [ffff888103249600, ffff888103249673) [ 13.388882] [ 13.389137] The buggy address belongs to the physical page: [ 13.389648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 13.390529] flags: 0x200000000000000(node=0|zone=2) [ 13.390760] page_type: f5(slab) [ 13.391067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.391916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.392483] page dumped because: kasan: bad access detected [ 13.392973] [ 13.393201] Memory state around the buggy address: [ 13.393381] ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.393620] ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.393887] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.394185] ^ [ 13.394478] ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.394854] ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.395130] ================================================================== [ 13.395860] ================================================================== [ 13.396401] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.396713] Read of size 1 at addr ffff888103249678 by task kunit_try_catch/212 [ 13.397116] [ 13.397250] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.397297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.397308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.397330] Call Trace: [ 13.397342] <TASK> [ 13.397357] dump_stack_lvl+0x73/0xb0 [ 13.397386] print_report+0xd1/0x610 [ 13.397409] ? __virt_addr_valid+0x1db/0x2d0 [ 13.397433] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.397457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.397490] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.397514] kasan_report+0x141/0x180 [ 13.397536] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.397563] __asan_report_load1_noabort+0x18/0x20 [ 13.397587] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.397611] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.397634] ? finish_task_switch.isra.0+0x153/0x700 [ 13.397657] ? __switch_to+0x47/0xf50 [ 13.397682] ? __schedule+0x10c6/0x2b60 [ 13.397705] ? __pfx_read_tsc+0x10/0x10 [ 13.397726] ? ktime_get_ts64+0x86/0x230 [ 13.397751] kunit_try_run_case+0x1a5/0x480 [ 13.397775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.397797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.397841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.397865] ? __kthread_parkme+0x82/0x180 [ 13.397886] ? preempt_count_sub+0x50/0x80 [ 13.397908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.397932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.397955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.397979] kthread+0x337/0x6f0 [ 13.397998] ? trace_preempt_on+0x20/0xc0 [ 13.398021] ? __pfx_kthread+0x10/0x10 [ 13.398044] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.398066] ? calculate_sigpending+0x7b/0xa0 [ 13.398091] ? __pfx_kthread+0x10/0x10 [ 13.398118] ret_from_fork+0x116/0x1d0 [ 13.398137] ? __pfx_kthread+0x10/0x10 [ 13.398157] ret_from_fork_asm+0x1a/0x30 [ 13.398187] </TASK> [ 13.398197] [ 13.406442] Allocated by task 212: [ 13.406720] kasan_save_stack+0x45/0x70 [ 13.406998] kasan_save_track+0x18/0x40 [ 13.407416] kasan_save_alloc_info+0x3b/0x50 [ 13.407646] __kasan_kmalloc+0xb7/0xc0 [ 13.407836] __kmalloc_cache_noprof+0x189/0x420 [ 13.408024] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.408182] kunit_try_run_case+0x1a5/0x480 [ 13.408429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.408710] kthread+0x337/0x6f0 [ 13.409015] ret_from_fork+0x116/0x1d0 [ 13.409398] ret_from_fork_asm+0x1a/0x30 [ 13.409607] [ 13.409710] The buggy address belongs to the object at ffff888103249600 [ 13.409710] which belongs to the cache kmalloc-128 of size 128 [ 13.410087] The buggy address is located 5 bytes to the right of [ 13.410087] allocated 115-byte region [ffff888103249600, ffff888103249673) [ 13.410482] [ 13.410556] The buggy address belongs to the physical page: [ 13.410805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 13.411194] flags: 0x200000000000000(node=0|zone=2) [ 13.411432] page_type: f5(slab) [ 13.411618] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.412019] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.412377] page dumped because: kasan: bad access detected [ 13.412573] [ 13.412647] Memory state around the buggy address: [ 13.412933] ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.413614] ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.413968] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.414363] ^ [ 13.414660] ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.414994] ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.415543] ================================================================== [ 13.416156] ================================================================== [ 13.416508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.417066] Read of size 1 at addr ffff88810324967f by task kunit_try_catch/212 [ 13.417505] [ 13.417625] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.417671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.417682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.417703] Call Trace: [ 13.417715] <TASK> [ 13.417731] dump_stack_lvl+0x73/0xb0 [ 13.417762] print_report+0xd1/0x610 [ 13.417794] ? __virt_addr_valid+0x1db/0x2d0 [ 13.417816] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.417839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.417862] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.417885] kasan_report+0x141/0x180 [ 13.417907] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.417935] __asan_report_load1_noabort+0x18/0x20 [ 13.417959] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.417982] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.418005] ? finish_task_switch.isra.0+0x153/0x700 [ 13.418027] ? __switch_to+0x47/0xf50 [ 13.418052] ? __schedule+0x10c6/0x2b60 [ 13.418075] ? __pfx_read_tsc+0x10/0x10 [ 13.418096] ? ktime_get_ts64+0x86/0x230 [ 13.418125] kunit_try_run_case+0x1a5/0x480 [ 13.418149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.418172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.418195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.418219] ? __kthread_parkme+0x82/0x180 [ 13.418239] ? preempt_count_sub+0x50/0x80 [ 13.418315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.418339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.418363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.418387] kthread+0x337/0x6f0 [ 13.418409] ? trace_preempt_on+0x20/0xc0 [ 13.418432] ? __pfx_kthread+0x10/0x10 [ 13.418453] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.418487] ? calculate_sigpending+0x7b/0xa0 [ 13.418512] ? __pfx_kthread+0x10/0x10 [ 13.418534] ret_from_fork+0x116/0x1d0 [ 13.418553] ? __pfx_kthread+0x10/0x10 [ 13.418574] ret_from_fork_asm+0x1a/0x30 [ 13.418605] </TASK> [ 13.418614] [ 13.427376] Allocated by task 212: [ 13.427571] kasan_save_stack+0x45/0x70 [ 13.427831] kasan_save_track+0x18/0x40 [ 13.428012] kasan_save_alloc_info+0x3b/0x50 [ 13.428414] __kasan_kmalloc+0xb7/0xc0 [ 13.428594] __kmalloc_cache_noprof+0x189/0x420 [ 13.428868] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.429037] kunit_try_run_case+0x1a5/0x480 [ 13.429190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.429373] kthread+0x337/0x6f0 [ 13.429511] ret_from_fork+0x116/0x1d0 [ 13.429652] ret_from_fork_asm+0x1a/0x30 [ 13.429798] [ 13.429873] The buggy address belongs to the object at ffff888103249600 [ 13.429873] which belongs to the cache kmalloc-128 of size 128 [ 13.430280] The buggy address is located 12 bytes to the right of [ 13.430280] allocated 115-byte region [ffff888103249600, ffff888103249673) [ 13.431133] [ 13.431234] The buggy address belongs to the physical page: [ 13.431504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 13.432028] flags: 0x200000000000000(node=0|zone=2) [ 13.432206] page_type: f5(slab) [ 13.432334] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.432589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.432828] page dumped because: kasan: bad access detected [ 13.433050] [ 13.433149] Memory state around the buggy address: [ 13.433385] ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.433742] ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.434523] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.434858] ^ [ 13.435214] ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435460] ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435727] ==================================================================