Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.302598] ================================================================== [ 18.302647] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.302699] Read of size 1 at addr fff00000c7742078 by task kunit_try_catch/194 [ 18.302747] [ 18.302779] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.302873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.302900] Hardware name: linux,dummy-virt (DT) [ 18.302945] Call trace: [ 18.302968] show_stack+0x20/0x38 (C) [ 18.303017] dump_stack_lvl+0x8c/0xd0 [ 18.303062] print_report+0x118/0x608 [ 18.303108] kasan_report+0xdc/0x128 [ 18.303152] __asan_report_load1_noabort+0x20/0x30 [ 18.303260] ksize_unpoisons_memory+0x618/0x740 [ 18.303836] kunit_try_run_case+0x170/0x3f0 [ 18.303988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304164] kthread+0x328/0x630 [ 18.304256] ret_from_fork+0x10/0x20 [ 18.304353] [ 18.304393] Allocated by task 194: [ 18.304463] kasan_save_stack+0x3c/0x68 [ 18.304546] kasan_save_track+0x20/0x40 [ 18.304625] kasan_save_alloc_info+0x40/0x58 [ 18.304682] __kasan_kmalloc+0xd4/0xd8 [ 18.304771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.304831] ksize_unpoisons_memory+0xc0/0x740 [ 18.304870] kunit_try_run_case+0x170/0x3f0 [ 18.304907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304950] kthread+0x328/0x630 [ 18.304983] ret_from_fork+0x10/0x20 [ 18.305018] [ 18.305038] The buggy address belongs to the object at fff00000c7742000 [ 18.305038] which belongs to the cache kmalloc-128 of size 128 [ 18.305378] The buggy address is located 5 bytes to the right of [ 18.305378] allocated 115-byte region [fff00000c7742000, fff00000c7742073) [ 18.305477] [ 18.305529] The buggy address belongs to the physical page: [ 18.305597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742 [ 18.305688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.305747] page_type: f5(slab) [ 18.305786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.306116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.306243] page dumped because: kasan: bad access detected [ 18.306329] [ 18.306381] Memory state around the buggy address: [ 18.306450] fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.306495] fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.306538] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.306694] ^ [ 18.306882] fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.306976] fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307021] ================================================================== [ 18.297186] ================================================================== [ 18.297258] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.297314] Read of size 1 at addr fff00000c7742073 by task kunit_try_catch/194 [ 18.297369] [ 18.297404] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.297487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.297564] Hardware name: linux,dummy-virt (DT) [ 18.297602] Call trace: [ 18.297625] show_stack+0x20/0x38 (C) [ 18.297672] dump_stack_lvl+0x8c/0xd0 [ 18.297726] print_report+0x118/0x608 [ 18.297772] kasan_report+0xdc/0x128 [ 18.298377] __asan_report_load1_noabort+0x20/0x30 [ 18.298462] ksize_unpoisons_memory+0x628/0x740 [ 18.298511] kunit_try_run_case+0x170/0x3f0 [ 18.298563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.298616] kthread+0x328/0x630 [ 18.298658] ret_from_fork+0x10/0x20 [ 18.298706] [ 18.298724] Allocated by task 194: [ 18.298752] kasan_save_stack+0x3c/0x68 [ 18.298792] kasan_save_track+0x20/0x40 [ 18.298842] kasan_save_alloc_info+0x40/0x58 [ 18.298880] __kasan_kmalloc+0xd4/0xd8 [ 18.298915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.299633] ksize_unpoisons_memory+0xc0/0x740 [ 18.299675] kunit_try_run_case+0x170/0x3f0 [ 18.299713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.299756] kthread+0x328/0x630 [ 18.299787] ret_from_fork+0x10/0x20 [ 18.299836] [ 18.299857] The buggy address belongs to the object at fff00000c7742000 [ 18.299857] which belongs to the cache kmalloc-128 of size 128 [ 18.299919] The buggy address is located 0 bytes to the right of [ 18.299919] allocated 115-byte region [fff00000c7742000, fff00000c7742073) [ 18.299990] [ 18.300012] The buggy address belongs to the physical page: [ 18.300043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742 [ 18.300096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.300146] page_type: f5(slab) [ 18.300189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.300239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.300283] page dumped because: kasan: bad access detected [ 18.300315] [ 18.300335] Memory state around the buggy address: [ 18.300367] fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.300412] fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.300457] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.300494] ^ [ 18.300534] fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300577] fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300614] ================================================================== [ 18.307566] ================================================================== [ 18.307631] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.307698] Read of size 1 at addr fff00000c774207f by task kunit_try_catch/194 [ 18.307753] [ 18.307789] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.307895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.307940] Hardware name: linux,dummy-virt (DT) [ 18.307976] Call trace: [ 18.308004] show_stack+0x20/0x38 (C) [ 18.308067] dump_stack_lvl+0x8c/0xd0 [ 18.308124] print_report+0x118/0x608 [ 18.308179] kasan_report+0xdc/0x128 [ 18.308233] __asan_report_load1_noabort+0x20/0x30 [ 18.308283] ksize_unpoisons_memory+0x690/0x740 [ 18.308348] kunit_try_run_case+0x170/0x3f0 [ 18.308403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.308454] kthread+0x328/0x630 [ 18.308495] ret_from_fork+0x10/0x20 [ 18.308654] [ 18.308674] Allocated by task 194: [ 18.308832] kasan_save_stack+0x3c/0x68 [ 18.308883] kasan_save_track+0x20/0x40 [ 18.308919] kasan_save_alloc_info+0x40/0x58 [ 18.308989] __kasan_kmalloc+0xd4/0xd8 [ 18.309035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.309080] ksize_unpoisons_memory+0xc0/0x740 [ 18.309131] kunit_try_run_case+0x170/0x3f0 [ 18.309182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.309224] kthread+0x328/0x630 [ 18.309259] ret_from_fork+0x10/0x20 [ 18.309295] [ 18.309314] The buggy address belongs to the object at fff00000c7742000 [ 18.309314] which belongs to the cache kmalloc-128 of size 128 [ 18.309480] The buggy address is located 12 bytes to the right of [ 18.309480] allocated 115-byte region [fff00000c7742000, fff00000c7742073) [ 18.309636] [ 18.309664] The buggy address belongs to the physical page: [ 18.309759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742 [ 18.309828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.309894] page_type: f5(slab) [ 18.309941] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.309993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.310033] page dumped because: kasan: bad access detected [ 18.310064] [ 18.310090] Memory state around the buggy address: [ 18.310122] fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.310178] fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.310225] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.310271] ^ [ 18.310312] fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310358] fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310404] ==================================================================
[ 12.380740] ================================================================== [ 12.381182] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.382250] Read of size 1 at addr ffff88810262fd73 by task kunit_try_catch/211 [ 12.383330] [ 12.383671] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.383727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.383739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.383882] Call Trace: [ 12.383902] <TASK> [ 12.383925] dump_stack_lvl+0x73/0xb0 [ 12.383967] print_report+0xd1/0x650 [ 12.383990] ? __virt_addr_valid+0x1db/0x2d0 [ 12.384014] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.384036] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.384056] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.384078] kasan_report+0x141/0x180 [ 12.384099] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.384125] __asan_report_load1_noabort+0x18/0x20 [ 12.384147] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.384170] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.384191] ? finish_task_switch.isra.0+0x153/0x700 [ 12.384213] ? __switch_to+0x47/0xf50 [ 12.384252] ? __schedule+0x10cc/0x2b60 [ 12.384273] ? __pfx_read_tsc+0x10/0x10 [ 12.384294] ? ktime_get_ts64+0x86/0x230 [ 12.384314] ? irqentry_exit+0x2a/0x60 [ 12.384337] kunit_try_run_case+0x1a5/0x480 [ 12.384362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.384383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.384406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.384427] ? __kthread_parkme+0x82/0x180 [ 12.384447] ? preempt_count_sub+0x50/0x80 [ 12.384468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.384492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.384513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.384534] kthread+0x337/0x6f0 [ 12.384552] ? trace_preempt_on+0x20/0xc0 [ 12.384574] ? __pfx_kthread+0x10/0x10 [ 12.384594] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.384614] ? calculate_sigpending+0x7b/0xa0 [ 12.384638] ? __pfx_kthread+0x10/0x10 [ 12.384658] ret_from_fork+0x116/0x1d0 [ 12.384674] ? __pfx_kthread+0x10/0x10 [ 12.384693] ret_from_fork_asm+0x1a/0x30 [ 12.384723] </TASK> [ 12.384734] [ 12.400849] Allocated by task 211: [ 12.401022] kasan_save_stack+0x45/0x70 [ 12.401186] kasan_save_track+0x18/0x40 [ 12.401338] kasan_save_alloc_info+0x3b/0x50 [ 12.401486] __kasan_kmalloc+0xb7/0xc0 [ 12.402032] __kmalloc_cache_noprof+0x189/0x420 [ 12.402205] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.402729] kunit_try_run_case+0x1a5/0x480 [ 12.403114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.403676] kthread+0x337/0x6f0 [ 12.403966] ret_from_fork+0x116/0x1d0 [ 12.404099] ret_from_fork_asm+0x1a/0x30 [ 12.404611] [ 12.404776] The buggy address belongs to the object at ffff88810262fd00 [ 12.404776] which belongs to the cache kmalloc-128 of size 128 [ 12.406150] The buggy address is located 0 bytes to the right of [ 12.406150] allocated 115-byte region [ffff88810262fd00, ffff88810262fd73) [ 12.406998] [ 12.407078] The buggy address belongs to the physical page: [ 12.407352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 12.408064] flags: 0x200000000000000(node=0|zone=2) [ 12.408581] page_type: f5(slab) [ 12.408970] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.409855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.410698] page dumped because: kasan: bad access detected [ 12.410881] [ 12.410951] Memory state around the buggy address: [ 12.411112] ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.411720] ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.412483] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.413388] ^ [ 12.413996] ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.414950] ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.415178] ================================================================== [ 12.441419] ================================================================== [ 12.441761] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.442077] Read of size 1 at addr ffff88810262fd7f by task kunit_try_catch/211 [ 12.442785] [ 12.442910] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.442957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.442969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.442990] Call Trace: [ 12.443005] <TASK> [ 12.443023] dump_stack_lvl+0x73/0xb0 [ 12.443056] print_report+0xd1/0x650 [ 12.443078] ? __virt_addr_valid+0x1db/0x2d0 [ 12.443100] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.443121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.443142] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.443163] kasan_report+0x141/0x180 [ 12.443184] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.443282] __asan_report_load1_noabort+0x18/0x20 [ 12.443309] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.443332] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.443353] ? finish_task_switch.isra.0+0x153/0x700 [ 12.443376] ? __switch_to+0x47/0xf50 [ 12.443400] ? __schedule+0x10cc/0x2b60 [ 12.443421] ? __pfx_read_tsc+0x10/0x10 [ 12.443441] ? ktime_get_ts64+0x86/0x230 [ 12.443461] ? irqentry_exit+0x2a/0x60 [ 12.443483] kunit_try_run_case+0x1a5/0x480 [ 12.443507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.443528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.443550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.443571] ? __kthread_parkme+0x82/0x180 [ 12.443591] ? preempt_count_sub+0x50/0x80 [ 12.443612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.443633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.443654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.443675] kthread+0x337/0x6f0 [ 12.443693] ? trace_preempt_on+0x20/0xc0 [ 12.443715] ? __pfx_kthread+0x10/0x10 [ 12.443734] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.443754] ? calculate_sigpending+0x7b/0xa0 [ 12.443777] ? __pfx_kthread+0x10/0x10 [ 12.443797] ret_from_fork+0x116/0x1d0 [ 12.443814] ? __pfx_kthread+0x10/0x10 [ 12.443833] ret_from_fork_asm+0x1a/0x30 [ 12.443863] </TASK> [ 12.443874] [ 12.452469] Allocated by task 211: [ 12.452631] kasan_save_stack+0x45/0x70 [ 12.452854] kasan_save_track+0x18/0x40 [ 12.453050] kasan_save_alloc_info+0x3b/0x50 [ 12.453326] __kasan_kmalloc+0xb7/0xc0 [ 12.453496] __kmalloc_cache_noprof+0x189/0x420 [ 12.453714] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.453865] kunit_try_run_case+0x1a5/0x480 [ 12.454061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.454322] kthread+0x337/0x6f0 [ 12.454470] ret_from_fork+0x116/0x1d0 [ 12.454611] ret_from_fork_asm+0x1a/0x30 [ 12.454814] [ 12.454912] The buggy address belongs to the object at ffff88810262fd00 [ 12.454912] which belongs to the cache kmalloc-128 of size 128 [ 12.455401] The buggy address is located 12 bytes to the right of [ 12.455401] allocated 115-byte region [ffff88810262fd00, ffff88810262fd73) [ 12.455830] [ 12.455903] The buggy address belongs to the physical page: [ 12.456077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 12.456411] flags: 0x200000000000000(node=0|zone=2) [ 12.456646] page_type: f5(slab) [ 12.456821] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.457165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.457685] page dumped because: kasan: bad access detected [ 12.457855] [ 12.457925] Memory state around the buggy address: [ 12.458083] ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.458873] ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.459301] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.459632] ^ [ 12.459946] ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.460387] ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.460701] ================================================================== [ 12.416450] ================================================================== [ 12.417323] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.418110] Read of size 1 at addr ffff88810262fd78 by task kunit_try_catch/211 [ 12.418357] [ 12.418491] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.418540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.418552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.418573] Call Trace: [ 12.418586] <TASK> [ 12.418605] dump_stack_lvl+0x73/0xb0 [ 12.418638] print_report+0xd1/0x650 [ 12.418661] ? __virt_addr_valid+0x1db/0x2d0 [ 12.418683] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.418705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.418726] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.418748] kasan_report+0x141/0x180 [ 12.418768] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.418795] __asan_report_load1_noabort+0x18/0x20 [ 12.418817] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.418839] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.418860] ? finish_task_switch.isra.0+0x153/0x700 [ 12.418881] ? __switch_to+0x47/0xf50 [ 12.418906] ? __schedule+0x10cc/0x2b60 [ 12.418927] ? __pfx_read_tsc+0x10/0x10 [ 12.418948] ? ktime_get_ts64+0x86/0x230 [ 12.418967] ? irqentry_exit+0x2a/0x60 [ 12.418990] kunit_try_run_case+0x1a5/0x480 [ 12.419013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.419034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.419056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.419077] ? __kthread_parkme+0x82/0x180 [ 12.419097] ? preempt_count_sub+0x50/0x80 [ 12.419118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.419140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.419160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.419182] kthread+0x337/0x6f0 [ 12.419200] ? trace_preempt_on+0x20/0xc0 [ 12.419234] ? __pfx_kthread+0x10/0x10 [ 12.419256] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.419277] ? calculate_sigpending+0x7b/0xa0 [ 12.419300] ? __pfx_kthread+0x10/0x10 [ 12.419320] ret_from_fork+0x116/0x1d0 [ 12.419336] ? __pfx_kthread+0x10/0x10 [ 12.419357] ret_from_fork_asm+0x1a/0x30 [ 12.419387] </TASK> [ 12.419398] [ 12.431926] Allocated by task 211: [ 12.432107] kasan_save_stack+0x45/0x70 [ 12.432328] kasan_save_track+0x18/0x40 [ 12.433030] kasan_save_alloc_info+0x3b/0x50 [ 12.433293] __kasan_kmalloc+0xb7/0xc0 [ 12.433471] __kmalloc_cache_noprof+0x189/0x420 [ 12.433635] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.433948] kunit_try_run_case+0x1a5/0x480 [ 12.434134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.434497] kthread+0x337/0x6f0 [ 12.434624] ret_from_fork+0x116/0x1d0 [ 12.434755] ret_from_fork_asm+0x1a/0x30 [ 12.434954] [ 12.435052] The buggy address belongs to the object at ffff88810262fd00 [ 12.435052] which belongs to the cache kmalloc-128 of size 128 [ 12.435804] The buggy address is located 5 bytes to the right of [ 12.435804] allocated 115-byte region [ffff88810262fd00, ffff88810262fd73) [ 12.436586] [ 12.436688] The buggy address belongs to the physical page: [ 12.436896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 12.437232] flags: 0x200000000000000(node=0|zone=2) [ 12.437512] page_type: f5(slab) [ 12.437723] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.438069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.438409] page dumped because: kasan: bad access detected [ 12.438596] [ 12.438665] Memory state around the buggy address: [ 12.438893] ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.439204] ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.439563] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.439824] ^ [ 12.440090] ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.440407] ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.440712] ==================================================================