Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.234577] ================================================================== [ 18.234638] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.234689] Read of size 1 at addr fff00000c3ec0673 by task kunit_try_catch/194 [ 18.234738] [ 18.234772] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.234852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.234879] Hardware name: linux,dummy-virt (DT) [ 18.234911] Call trace: [ 18.234933] show_stack+0x20/0x38 (C) [ 18.234986] dump_stack_lvl+0x8c/0xd0 [ 18.235033] print_report+0x118/0x608 [ 18.235079] kasan_report+0xdc/0x128 [ 18.235189] __asan_report_load1_noabort+0x20/0x30 [ 18.235248] ksize_unpoisons_memory+0x628/0x740 [ 18.235306] kunit_try_run_case+0x170/0x3f0 [ 18.235362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.235415] kthread+0x328/0x630 [ 18.235456] ret_from_fork+0x10/0x20 [ 18.235503] [ 18.235521] Allocated by task 194: [ 18.235562] kasan_save_stack+0x3c/0x68 [ 18.235604] kasan_save_track+0x20/0x40 [ 18.235641] kasan_save_alloc_info+0x40/0x58 [ 18.235680] __kasan_kmalloc+0xd4/0xd8 [ 18.235718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.235767] ksize_unpoisons_memory+0xc0/0x740 [ 18.235805] kunit_try_run_case+0x170/0x3f0 [ 18.235842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.236706] kthread+0x328/0x630 [ 18.237267] ret_from_fork+0x10/0x20 [ 18.237527] [ 18.237593] The buggy address belongs to the object at fff00000c3ec0600 [ 18.237593] which belongs to the cache kmalloc-128 of size 128 [ 18.237800] The buggy address is located 0 bytes to the right of [ 18.237800] allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673) [ 18.237986] [ 18.238083] The buggy address belongs to the physical page: [ 18.238137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.238208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.238280] page_type: f5(slab) [ 18.238346] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.238615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.238714] page dumped because: kasan: bad access detected [ 18.238936] [ 18.239060] Memory state around the buggy address: [ 18.239146] fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.239287] fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239411] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.239722] ^ [ 18.239830] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239885] fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239963] ================================================================== [ 18.242578] ================================================================== [ 18.242629] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.242697] Read of size 1 at addr fff00000c3ec0678 by task kunit_try_catch/194 [ 18.243030] [ 18.243077] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.243204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.243272] Hardware name: linux,dummy-virt (DT) [ 18.243350] Call trace: [ 18.243476] show_stack+0x20/0x38 (C) [ 18.243530] dump_stack_lvl+0x8c/0xd0 [ 18.243576] print_report+0x118/0x608 [ 18.243864] kasan_report+0xdc/0x128 [ 18.243950] __asan_report_load1_noabort+0x20/0x30 [ 18.244189] ksize_unpoisons_memory+0x618/0x740 [ 18.244366] kunit_try_run_case+0x170/0x3f0 [ 18.244679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.245080] kthread+0x328/0x630 [ 18.245317] ret_from_fork+0x10/0x20 [ 18.245723] [ 18.245878] Allocated by task 194: [ 18.246029] kasan_save_stack+0x3c/0x68 [ 18.246431] kasan_save_track+0x20/0x40 [ 18.246504] kasan_save_alloc_info+0x40/0x58 [ 18.246763] __kasan_kmalloc+0xd4/0xd8 [ 18.246989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.247262] ksize_unpoisons_memory+0xc0/0x740 [ 18.247344] kunit_try_run_case+0x170/0x3f0 [ 18.247610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.248219] kthread+0x328/0x630 [ 18.248289] ret_from_fork+0x10/0x20 [ 18.248470] [ 18.248663] The buggy address belongs to the object at fff00000c3ec0600 [ 18.248663] which belongs to the cache kmalloc-128 of size 128 [ 18.248759] The buggy address is located 5 bytes to the right of [ 18.248759] allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673) [ 18.248906] [ 18.248925] The buggy address belongs to the physical page: [ 18.248963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.249018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.249455] page_type: f5(slab) [ 18.249517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.249621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.249664] page dumped because: kasan: bad access detected [ 18.250025] [ 18.250072] Memory state around the buggy address: [ 18.250193] fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.250287] fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.250346] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.250531] ^ [ 18.250603] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.250771] fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.250941] ================================================================== [ 18.252492] ================================================================== [ 18.252903] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.252968] Read of size 1 at addr fff00000c3ec067f by task kunit_try_catch/194 [ 18.253179] [ 18.253335] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.253450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.253489] Hardware name: linux,dummy-virt (DT) [ 18.253635] Call trace: [ 18.253682] show_stack+0x20/0x38 (C) [ 18.253876] dump_stack_lvl+0x8c/0xd0 [ 18.253937] print_report+0x118/0x608 [ 18.254093] kasan_report+0xdc/0x128 [ 18.254146] __asan_report_load1_noabort+0x20/0x30 [ 18.254209] ksize_unpoisons_memory+0x690/0x740 [ 18.254409] kunit_try_run_case+0x170/0x3f0 [ 18.254579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.254642] kthread+0x328/0x630 [ 18.254684] ret_from_fork+0x10/0x20 [ 18.254733] [ 18.254751] Allocated by task 194: [ 18.254999] kasan_save_stack+0x3c/0x68 [ 18.255107] kasan_save_track+0x20/0x40 [ 18.255272] kasan_save_alloc_info+0x40/0x58 [ 18.255318] __kasan_kmalloc+0xd4/0xd8 [ 18.255365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.255406] ksize_unpoisons_memory+0xc0/0x740 [ 18.255445] kunit_try_run_case+0x170/0x3f0 [ 18.255491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.255534] kthread+0x328/0x630 [ 18.255567] ret_from_fork+0x10/0x20 [ 18.255613] [ 18.255643] The buggy address belongs to the object at fff00000c3ec0600 [ 18.255643] which belongs to the cache kmalloc-128 of size 128 [ 18.255701] The buggy address is located 12 bytes to the right of [ 18.255701] allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673) [ 18.255768] [ 18.255793] The buggy address belongs to the physical page: [ 18.255823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.255873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.256142] page_type: f5(slab) [ 18.256449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.256530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.256717] page dumped because: kasan: bad access detected [ 18.256874] [ 18.256897] Memory state around the buggy address: [ 18.256942] fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.257340] fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257391] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.257455] ^ [ 18.257660] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257866] fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257911] ==================================================================
[ 14.029878] ================================================================== [ 14.031341] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 14.031653] Read of size 1 at addr ffff8881021dbb73 by task kunit_try_catch/212 [ 14.031941] [ 14.032186] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.032244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.032259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.032284] Call Trace: [ 14.032301] <TASK> [ 14.032324] dump_stack_lvl+0x73/0xb0 [ 14.032364] print_report+0xd1/0x650 [ 14.032393] ? __virt_addr_valid+0x1db/0x2d0 [ 14.032422] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.032448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.032473] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.032500] kasan_report+0x141/0x180 [ 14.032524] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.032555] __asan_report_load1_noabort+0x18/0x20 [ 14.032582] ksize_unpoisons_memory+0x81c/0x9b0 [ 14.032609] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.032634] ? finish_task_switch.isra.0+0x153/0x700 [ 14.032660] ? __switch_to+0x47/0xf50 [ 14.032690] ? __schedule+0x10cc/0x2b60 [ 14.032716] ? __pfx_read_tsc+0x10/0x10 [ 14.032740] ? ktime_get_ts64+0x86/0x230 [ 14.032768] kunit_try_run_case+0x1a5/0x480 [ 14.032810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.032863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.032889] ? __kthread_parkme+0x82/0x180 [ 14.032912] ? preempt_count_sub+0x50/0x80 [ 14.032938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033017] kthread+0x337/0x6f0 [ 14.033040] ? trace_preempt_on+0x20/0xc0 [ 14.033067] ? __pfx_kthread+0x10/0x10 [ 14.033090] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.033114] ? calculate_sigpending+0x7b/0xa0 [ 14.033142] ? __pfx_kthread+0x10/0x10 [ 14.033166] ret_from_fork+0x116/0x1d0 [ 14.033187] ? __pfx_kthread+0x10/0x10 [ 14.033210] ret_from_fork_asm+0x1a/0x30 [ 14.033246] </TASK> [ 14.033260] [ 14.050646] Allocated by task 212: [ 14.051333] kasan_save_stack+0x45/0x70 [ 14.051763] kasan_save_track+0x18/0x40 [ 14.051940] kasan_save_alloc_info+0x3b/0x50 [ 14.052121] __kasan_kmalloc+0xb7/0xc0 [ 14.052530] __kmalloc_cache_noprof+0x189/0x420 [ 14.053120] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.053655] kunit_try_run_case+0x1a5/0x480 [ 14.054125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.054592] kthread+0x337/0x6f0 [ 14.054738] ret_from_fork+0x116/0x1d0 [ 14.054906] ret_from_fork_asm+0x1a/0x30 [ 14.055065] [ 14.055254] The buggy address belongs to the object at ffff8881021dbb00 [ 14.055254] which belongs to the cache kmalloc-128 of size 128 [ 14.056748] The buggy address is located 0 bytes to the right of [ 14.056748] allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73) [ 14.058237] [ 14.058459] The buggy address belongs to the physical page: [ 14.058923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.059536] flags: 0x200000000000000(node=0|zone=2) [ 14.060165] page_type: f5(slab) [ 14.060721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.061029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.061774] page dumped because: kasan: bad access detected [ 14.062452] [ 14.062637] Memory state around the buggy address: [ 14.063117] ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.063549] ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.063818] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.064062] ^ [ 14.065002] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.066037] ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.066836] ================================================================== [ 14.067914] ================================================================== [ 14.068634] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.069506] Read of size 1 at addr ffff8881021dbb78 by task kunit_try_catch/212 [ 14.069767] [ 14.069890] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.069941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.069955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.069979] Call Trace: [ 14.070000] <TASK> [ 14.070022] dump_stack_lvl+0x73/0xb0 [ 14.070061] print_report+0xd1/0x650 [ 14.070087] ? __virt_addr_valid+0x1db/0x2d0 [ 14.070112] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.070138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.070162] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.070188] kasan_report+0x141/0x180 [ 14.070212] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.070243] __asan_report_load1_noabort+0x18/0x20 [ 14.070269] ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.070295] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.070319] ? finish_task_switch.isra.0+0x153/0x700 [ 14.070344] ? __switch_to+0x47/0xf50 [ 14.070372] ? __schedule+0x10cc/0x2b60 [ 14.070397] ? __pfx_read_tsc+0x10/0x10 [ 14.070421] ? ktime_get_ts64+0x86/0x230 [ 14.070447] kunit_try_run_case+0x1a5/0x480 [ 14.070475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.070499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.070525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.070550] ? __kthread_parkme+0x82/0x180 [ 14.070573] ? preempt_count_sub+0x50/0x80 [ 14.070598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.070634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.070659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.070684] kthread+0x337/0x6f0 [ 14.070706] ? trace_preempt_on+0x20/0xc0 [ 14.070732] ? __pfx_kthread+0x10/0x10 [ 14.070755] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.070778] ? calculate_sigpending+0x7b/0xa0 [ 14.070817] ? __pfx_kthread+0x10/0x10 [ 14.070841] ret_from_fork+0x116/0x1d0 [ 14.070862] ? __pfx_kthread+0x10/0x10 [ 14.070884] ret_from_fork_asm+0x1a/0x30 [ 14.070919] </TASK> [ 14.070933] [ 14.080044] Allocated by task 212: [ 14.080541] kasan_save_stack+0x45/0x70 [ 14.080809] kasan_save_track+0x18/0x40 [ 14.080999] kasan_save_alloc_info+0x3b/0x50 [ 14.081327] __kasan_kmalloc+0xb7/0xc0 [ 14.081494] __kmalloc_cache_noprof+0x189/0x420 [ 14.081703] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.081966] kunit_try_run_case+0x1a5/0x480 [ 14.082201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.082506] kthread+0x337/0x6f0 [ 14.082650] ret_from_fork+0x116/0x1d0 [ 14.082881] ret_from_fork_asm+0x1a/0x30 [ 14.083085] [ 14.083167] The buggy address belongs to the object at ffff8881021dbb00 [ 14.083167] which belongs to the cache kmalloc-128 of size 128 [ 14.083567] The buggy address is located 5 bytes to the right of [ 14.083567] allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73) [ 14.084441] [ 14.084579] The buggy address belongs to the physical page: [ 14.084889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.085431] flags: 0x200000000000000(node=0|zone=2) [ 14.085672] page_type: f5(slab) [ 14.085867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.086316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.086663] page dumped because: kasan: bad access detected [ 14.086933] [ 14.087041] Memory state around the buggy address: [ 14.087322] ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.087640] ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.088029] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.088528] ^ [ 14.088862] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089111] ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089472] ================================================================== [ 14.090052] ================================================================== [ 14.090622] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.091001] Read of size 1 at addr ffff8881021dbb7f by task kunit_try_catch/212 [ 14.091540] [ 14.091674] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.091721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.091734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.091758] Call Trace: [ 14.091777] <TASK> [ 14.091810] dump_stack_lvl+0x73/0xb0 [ 14.091844] print_report+0xd1/0x650 [ 14.091870] ? __virt_addr_valid+0x1db/0x2d0 [ 14.091896] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.091921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.091946] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.091973] kasan_report+0x141/0x180 [ 14.091997] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.092028] __asan_report_load1_noabort+0x18/0x20 [ 14.092054] ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.092081] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.092105] ? finish_task_switch.isra.0+0x153/0x700 [ 14.092130] ? __switch_to+0x47/0xf50 [ 14.092157] ? __schedule+0x10cc/0x2b60 [ 14.092182] ? __pfx_read_tsc+0x10/0x10 [ 14.092206] ? ktime_get_ts64+0x86/0x230 [ 14.092232] kunit_try_run_case+0x1a5/0x480 [ 14.092260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.092310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.092335] ? __kthread_parkme+0x82/0x180 [ 14.092358] ? preempt_count_sub+0x50/0x80 [ 14.092383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.092434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.092459] kthread+0x337/0x6f0 [ 14.092480] ? trace_preempt_on+0x20/0xc0 [ 14.092506] ? __pfx_kthread+0x10/0x10 [ 14.092529] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.092552] ? calculate_sigpending+0x7b/0xa0 [ 14.092578] ? __pfx_kthread+0x10/0x10 [ 14.092602] ret_from_fork+0x116/0x1d0 [ 14.092622] ? __pfx_kthread+0x10/0x10 [ 14.092645] ret_from_fork_asm+0x1a/0x30 [ 14.092678] </TASK> [ 14.092691] [ 14.101819] Allocated by task 212: [ 14.101983] kasan_save_stack+0x45/0x70 [ 14.102153] kasan_save_track+0x18/0x40 [ 14.102351] kasan_save_alloc_info+0x3b/0x50 [ 14.102597] __kasan_kmalloc+0xb7/0xc0 [ 14.102956] __kmalloc_cache_noprof+0x189/0x420 [ 14.103216] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.103390] kunit_try_run_case+0x1a5/0x480 [ 14.103555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.103919] kthread+0x337/0x6f0 [ 14.104138] ret_from_fork+0x116/0x1d0 [ 14.104365] ret_from_fork_asm+0x1a/0x30 [ 14.104593] [ 14.104704] The buggy address belongs to the object at ffff8881021dbb00 [ 14.104704] which belongs to the cache kmalloc-128 of size 128 [ 14.105502] The buggy address is located 12 bytes to the right of [ 14.105502] allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73) [ 14.106230] [ 14.106347] The buggy address belongs to the physical page: [ 14.106620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.107016] flags: 0x200000000000000(node=0|zone=2) [ 14.107932] page_type: f5(slab) [ 14.108121] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.108548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.108904] page dumped because: kasan: bad access detected [ 14.109156] [ 14.109239] Memory state around the buggy address: [ 14.109425] ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.109861] ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.110476] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.110811] ^ [ 14.111139] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.111438] ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.111687] ==================================================================