Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.987993] ================================================================== [ 16.988042] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.988091] Read of size 1 at addr fff00000c6f3f97f by task kunit_try_catch/195 [ 16.988371] [ 16.988859] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.989308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.989449] Hardware name: linux,dummy-virt (DT) [ 16.989562] Call trace: [ 16.989585] show_stack+0x20/0x38 (C) [ 16.989940] dump_stack_lvl+0x8c/0xd0 [ 16.989990] print_report+0x118/0x608 [ 16.990284] kasan_report+0xdc/0x128 [ 16.990597] __asan_report_load1_noabort+0x20/0x30 [ 16.990649] ksize_unpoisons_memory+0x690/0x740 [ 16.990695] kunit_try_run_case+0x170/0x3f0 [ 16.991225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.991490] kthread+0x328/0x630 [ 16.991534] ret_from_fork+0x10/0x20 [ 16.991582] [ 16.991600] Allocated by task 195: [ 16.991628] kasan_save_stack+0x3c/0x68 [ 16.992779] kasan_save_track+0x20/0x40 [ 16.992831] kasan_save_alloc_info+0x40/0x58 [ 16.992881] __kasan_kmalloc+0xd4/0xd8 [ 16.992918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.992956] ksize_unpoisons_memory+0xc0/0x740 [ 16.993676] kunit_try_run_case+0x170/0x3f0 [ 16.994207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.994699] kthread+0x328/0x630 [ 16.994860] ret_from_fork+0x10/0x20 [ 16.995167] [ 16.995483] The buggy address belongs to the object at fff00000c6f3f900 [ 16.995483] which belongs to the cache kmalloc-128 of size 128 [ 16.995568] The buggy address is located 12 bytes to the right of [ 16.995568] allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973) [ 16.995633] [ 16.996190] The buggy address belongs to the physical page: [ 16.996439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.996825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.997185] page_type: f5(slab) [ 16.997763] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.998116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.998204] page dumped because: kasan: bad access detected [ 16.998828] [ 16.999216] Memory state around the buggy address: [ 16.999259] fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.999564] fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.000004] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.000560] ^ [ 17.000611] fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.001050] fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.001369] ================================================================== [ 16.978863] ================================================================== [ 16.978986] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.979064] Read of size 1 at addr fff00000c6f3f978 by task kunit_try_catch/195 [ 16.979117] [ 16.979147] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.979229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.979254] Hardware name: linux,dummy-virt (DT) [ 16.979285] Call trace: [ 16.979307] show_stack+0x20/0x38 (C) [ 16.979362] dump_stack_lvl+0x8c/0xd0 [ 16.979409] print_report+0x118/0x608 [ 16.980391] kasan_report+0xdc/0x128 [ 16.980721] __asan_report_load1_noabort+0x20/0x30 [ 16.980912] ksize_unpoisons_memory+0x618/0x740 [ 16.980963] kunit_try_run_case+0x170/0x3f0 [ 16.981018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.981071] kthread+0x328/0x630 [ 16.981112] ret_from_fork+0x10/0x20 [ 16.981630] [ 16.981654] Allocated by task 195: [ 16.981685] kasan_save_stack+0x3c/0x68 [ 16.981907] kasan_save_track+0x20/0x40 [ 16.981996] kasan_save_alloc_info+0x40/0x58 [ 16.982350] __kasan_kmalloc+0xd4/0xd8 [ 16.982393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.982438] ksize_unpoisons_memory+0xc0/0x740 [ 16.982770] kunit_try_run_case+0x170/0x3f0 [ 16.982821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.983000] kthread+0x328/0x630 [ 16.983039] ret_from_fork+0x10/0x20 [ 16.983076] [ 16.983094] The buggy address belongs to the object at fff00000c6f3f900 [ 16.983094] which belongs to the cache kmalloc-128 of size 128 [ 16.983189] The buggy address is located 5 bytes to the right of [ 16.983189] allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973) [ 16.983252] [ 16.983272] The buggy address belongs to the physical page: [ 16.983600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.983771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.983891] page_type: f5(slab) [ 16.984188] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.984461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.984762] page dumped because: kasan: bad access detected [ 16.985090] [ 16.985110] Memory state around the buggy address: [ 16.985142] fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.985186] fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.985657] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.985904] ^ [ 16.985950] fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.985994] fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.986036] ================================================================== [ 16.968850] ================================================================== [ 16.968972] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.969041] Read of size 1 at addr fff00000c6f3f973 by task kunit_try_catch/195 [ 16.969092] [ 16.969130] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.969217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.969244] Hardware name: linux,dummy-virt (DT) [ 16.969692] Call trace: [ 16.970102] show_stack+0x20/0x38 (C) [ 16.970161] dump_stack_lvl+0x8c/0xd0 [ 16.970209] print_report+0x118/0x608 [ 16.970254] kasan_report+0xdc/0x128 [ 16.970299] __asan_report_load1_noabort+0x20/0x30 [ 16.970351] ksize_unpoisons_memory+0x628/0x740 [ 16.970806] kunit_try_run_case+0x170/0x3f0 [ 16.970883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.970989] kthread+0x328/0x630 [ 16.971059] ret_from_fork+0x10/0x20 [ 16.971113] [ 16.971131] Allocated by task 195: [ 16.971160] kasan_save_stack+0x3c/0x68 [ 16.971266] kasan_save_track+0x20/0x40 [ 16.971307] kasan_save_alloc_info+0x40/0x58 [ 16.971426] __kasan_kmalloc+0xd4/0xd8 [ 16.971765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.971808] ksize_unpoisons_memory+0xc0/0x740 [ 16.972149] kunit_try_run_case+0x170/0x3f0 [ 16.972195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.972238] kthread+0x328/0x630 [ 16.972525] ret_from_fork+0x10/0x20 [ 16.972807] [ 16.972835] The buggy address belongs to the object at fff00000c6f3f900 [ 16.972835] which belongs to the cache kmalloc-128 of size 128 [ 16.972909] The buggy address is located 0 bytes to the right of [ 16.972909] allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973) [ 16.973066] [ 16.973097] The buggy address belongs to the physical page: [ 16.973146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.973434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.973725] page_type: f5(slab) [ 16.973767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.974004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.974489] page dumped because: kasan: bad access detected [ 16.974529] [ 16.974547] Memory state around the buggy address: [ 16.974652] fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.974740] fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.975152] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.975194] ^ [ 16.975235] fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.975275] fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.975314] ==================================================================
[ 12.803538] ================================================================== [ 12.803838] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.804327] Read of size 1 at addr ffff8881029f2e7f by task kunit_try_catch/211 [ 12.804542] [ 12.804622] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.804677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.804688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.804707] Call Trace: [ 12.804719] <TASK> [ 12.804732] dump_stack_lvl+0x73/0xb0 [ 12.804760] print_report+0xd1/0x650 [ 12.804783] ? __virt_addr_valid+0x1db/0x2d0 [ 12.804806] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.804828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.804852] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.804876] kasan_report+0x141/0x180 [ 12.804897] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.804935] __asan_report_load1_noabort+0x18/0x20 [ 12.804960] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.804984] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.805007] ? finish_task_switch.isra.0+0x153/0x700 [ 12.805029] ? __switch_to+0x47/0xf50 [ 12.805054] ? __schedule+0x10cc/0x2b60 [ 12.805076] ? __pfx_read_tsc+0x10/0x10 [ 12.805097] ? ktime_get_ts64+0x86/0x230 [ 12.805121] kunit_try_run_case+0x1a5/0x480 [ 12.805145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.805168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.805193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.805217] ? __kthread_parkme+0x82/0x180 [ 12.805236] ? preempt_count_sub+0x50/0x80 [ 12.805260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.805284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.805308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.805332] kthread+0x337/0x6f0 [ 12.805350] ? trace_preempt_on+0x20/0xc0 [ 12.805374] ? __pfx_kthread+0x10/0x10 [ 12.805394] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.805415] ? calculate_sigpending+0x7b/0xa0 [ 12.805439] ? __pfx_kthread+0x10/0x10 [ 12.805460] ret_from_fork+0x116/0x1d0 [ 12.805478] ? __pfx_kthread+0x10/0x10 [ 12.805498] ret_from_fork_asm+0x1a/0x30 [ 12.805531] </TASK> [ 12.805540] [ 12.813181] Allocated by task 211: [ 12.813520] kasan_save_stack+0x45/0x70 [ 12.813671] kasan_save_track+0x18/0x40 [ 12.813902] kasan_save_alloc_info+0x3b/0x50 [ 12.814229] __kasan_kmalloc+0xb7/0xc0 [ 12.814389] __kmalloc_cache_noprof+0x189/0x420 [ 12.814556] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.814711] kunit_try_run_case+0x1a5/0x480 [ 12.814857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.815069] kthread+0x337/0x6f0 [ 12.815237] ret_from_fork+0x116/0x1d0 [ 12.815423] ret_from_fork_asm+0x1a/0x30 [ 12.815661] [ 12.815769] The buggy address belongs to the object at ffff8881029f2e00 [ 12.815769] which belongs to the cache kmalloc-128 of size 128 [ 12.816659] The buggy address is located 12 bytes to the right of [ 12.816659] allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73) [ 12.818690] [ 12.818796] The buggy address belongs to the physical page: [ 12.819428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 12.819679] flags: 0x200000000000000(node=0|zone=2) [ 12.819887] page_type: f5(slab) [ 12.820164] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.820509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.820853] page dumped because: kasan: bad access detected [ 12.821152] [ 12.821238] Memory state around the buggy address: [ 12.821446] ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.821675] ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.822002] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.822310] ^ [ 12.822544] ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.822984] ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.823284] ================================================================== [ 12.751937] ================================================================== [ 12.752959] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.753566] Read of size 1 at addr ffff8881029f2e73 by task kunit_try_catch/211 [ 12.754080] [ 12.754448] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.754508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.754520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.754577] Call Trace: [ 12.754592] <TASK> [ 12.754611] dump_stack_lvl+0x73/0xb0 [ 12.754646] print_report+0xd1/0x650 [ 12.754669] ? __virt_addr_valid+0x1db/0x2d0 [ 12.754694] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.754717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.754740] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.754781] kasan_report+0x141/0x180 [ 12.754803] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.754832] __asan_report_load1_noabort+0x18/0x20 [ 12.754857] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.754880] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.754903] ? finish_task_switch.isra.0+0x153/0x700 [ 12.754939] ? __switch_to+0x47/0xf50 [ 12.754966] ? __schedule+0x10cc/0x2b60 [ 12.754989] ? __pfx_read_tsc+0x10/0x10 [ 12.755020] ? ktime_get_ts64+0x86/0x230 [ 12.755046] kunit_try_run_case+0x1a5/0x480 [ 12.755071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.755094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.755118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.755141] ? __kthread_parkme+0x82/0x180 [ 12.755163] ? preempt_count_sub+0x50/0x80 [ 12.755186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.755210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.755235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.755259] kthread+0x337/0x6f0 [ 12.755278] ? trace_preempt_on+0x20/0xc0 [ 12.755301] ? __pfx_kthread+0x10/0x10 [ 12.755321] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.755343] ? calculate_sigpending+0x7b/0xa0 [ 12.755367] ? __pfx_kthread+0x10/0x10 [ 12.755389] ret_from_fork+0x116/0x1d0 [ 12.755406] ? __pfx_kthread+0x10/0x10 [ 12.755427] ret_from_fork_asm+0x1a/0x30 [ 12.755459] </TASK> [ 12.755471] [ 12.764989] Allocated by task 211: [ 12.765194] kasan_save_stack+0x45/0x70 [ 12.765375] kasan_save_track+0x18/0x40 [ 12.765514] kasan_save_alloc_info+0x3b/0x50 [ 12.765664] __kasan_kmalloc+0xb7/0xc0 [ 12.765798] __kmalloc_cache_noprof+0x189/0x420 [ 12.766029] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.766381] kunit_try_run_case+0x1a5/0x480 [ 12.766544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.766721] kthread+0x337/0x6f0 [ 12.766985] ret_from_fork+0x116/0x1d0 [ 12.767348] ret_from_fork_asm+0x1a/0x30 [ 12.767550] [ 12.767632] The buggy address belongs to the object at ffff8881029f2e00 [ 12.767632] which belongs to the cache kmalloc-128 of size 128 [ 12.768148] The buggy address is located 0 bytes to the right of [ 12.768148] allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73) [ 12.768667] [ 12.768739] The buggy address belongs to the physical page: [ 12.768911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 12.769261] flags: 0x200000000000000(node=0|zone=2) [ 12.769498] page_type: f5(slab) [ 12.769637] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.769867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.770103] page dumped because: kasan: bad access detected [ 12.770274] [ 12.770377] Memory state around the buggy address: [ 12.770627] ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.771022] ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.771238] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.771448] ^ [ 12.771650] ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.771860] ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.772155] ================================================================== [ 12.772649] ================================================================== [ 12.772885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.773778] Read of size 1 at addr ffff8881029f2e78 by task kunit_try_catch/211 [ 12.774122] [ 12.774289] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.774331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.774342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.774360] Call Trace: [ 12.774375] <TASK> [ 12.774389] dump_stack_lvl+0x73/0xb0 [ 12.774417] print_report+0xd1/0x650 [ 12.774438] ? __virt_addr_valid+0x1db/0x2d0 [ 12.774461] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.774484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.774513] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.774536] kasan_report+0x141/0x180 [ 12.774558] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.774586] __asan_report_load1_noabort+0x18/0x20 [ 12.774611] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.774635] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.774658] ? finish_task_switch.isra.0+0x153/0x700 [ 12.774680] ? __switch_to+0x47/0xf50 [ 12.774704] ? __schedule+0x10cc/0x2b60 [ 12.774726] ? __pfx_read_tsc+0x10/0x10 [ 12.774764] ? ktime_get_ts64+0x86/0x230 [ 12.774788] kunit_try_run_case+0x1a5/0x480 [ 12.774811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.776377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.776427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.776453] ? __kthread_parkme+0x82/0x180 [ 12.776474] ? preempt_count_sub+0x50/0x80 [ 12.776498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.776524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.776550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.776576] kthread+0x337/0x6f0 [ 12.776595] ? trace_preempt_on+0x20/0xc0 [ 12.776618] ? __pfx_kthread+0x10/0x10 [ 12.776639] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.776660] ? calculate_sigpending+0x7b/0xa0 [ 12.776684] ? __pfx_kthread+0x10/0x10 [ 12.776705] ret_from_fork+0x116/0x1d0 [ 12.776724] ? __pfx_kthread+0x10/0x10 [ 12.776744] ret_from_fork_asm+0x1a/0x30 [ 12.776967] </TASK> [ 12.776977] [ 12.789524] Allocated by task 211: [ 12.789653] kasan_save_stack+0x45/0x70 [ 12.789850] kasan_save_track+0x18/0x40 [ 12.790651] kasan_save_alloc_info+0x3b/0x50 [ 12.791164] __kasan_kmalloc+0xb7/0xc0 [ 12.791513] __kmalloc_cache_noprof+0x189/0x420 [ 12.791938] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.792503] kunit_try_run_case+0x1a5/0x480 [ 12.792890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.793440] kthread+0x337/0x6f0 [ 12.793650] ret_from_fork+0x116/0x1d0 [ 12.793811] ret_from_fork_asm+0x1a/0x30 [ 12.794239] [ 12.794404] The buggy address belongs to the object at ffff8881029f2e00 [ 12.794404] which belongs to the cache kmalloc-128 of size 128 [ 12.795060] The buggy address is located 5 bytes to the right of [ 12.795060] allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73) [ 12.796166] [ 12.796362] The buggy address belongs to the physical page: [ 12.796611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 12.796998] flags: 0x200000000000000(node=0|zone=2) [ 12.797491] page_type: f5(slab) [ 12.798006] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.798708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.799321] page dumped because: kasan: bad access detected [ 12.799744] [ 12.799815] Memory state around the buggy address: [ 12.799981] ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.800610] ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.801432] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.801991] ^ [ 12.802587] ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.802822] ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.803117] ==================================================================