Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.545070] ================================================================== [ 15.545363] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.545497] Read of size 1 at addr fff00000c6e6507f by task kunit_try_catch/195 [ 15.545559] [ 15.545588] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.545923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.545955] Hardware name: linux,dummy-virt (DT) [ 15.546274] Call trace: [ 15.546475] show_stack+0x20/0x38 (C) [ 15.547623] dump_stack_lvl+0x8c/0xd0 [ 15.547686] print_report+0x118/0x5d0 [ 15.548031] kasan_report+0xdc/0x128 [ 15.548158] __asan_report_load1_noabort+0x20/0x30 [ 15.548209] ksize_unpoisons_memory+0x690/0x740 [ 15.548586] kunit_try_run_case+0x170/0x3f0 [ 15.548771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.548896] kthread+0x328/0x630 [ 15.548939] ret_from_fork+0x10/0x20 [ 15.548989] [ 15.549027] Allocated by task 195: [ 15.549133] kasan_save_stack+0x3c/0x68 [ 15.549174] kasan_save_track+0x20/0x40 [ 15.549212] kasan_save_alloc_info+0x40/0x58 [ 15.549251] __kasan_kmalloc+0xd4/0xd8 [ 15.549289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.549327] ksize_unpoisons_memory+0xc0/0x740 [ 15.549406] kunit_try_run_case+0x170/0x3f0 [ 15.549614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.550132] kthread+0x328/0x630 [ 15.550205] ret_from_fork+0x10/0x20 [ 15.550245] [ 15.550264] The buggy address belongs to the object at fff00000c6e65000 [ 15.550264] which belongs to the cache kmalloc-128 of size 128 [ 15.550322] The buggy address is located 12 bytes to the right of [ 15.550322] allocated 115-byte region [fff00000c6e65000, fff00000c6e65073) [ 15.550703] [ 15.550730] The buggy address belongs to the physical page: [ 15.550763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65 [ 15.550857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.550905] page_type: f5(slab) [ 15.550943] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.550994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.551043] page dumped because: kasan: bad access detected [ 15.551162] [ 15.551180] Memory state around the buggy address: [ 15.551212] fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.551257] fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.551300] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.551668] ^ [ 15.551734] fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553290] fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553337] ================================================================== [ 15.534586] ================================================================== [ 15.534829] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.534884] Read of size 1 at addr fff00000c6e65078 by task kunit_try_catch/195 [ 15.534931] [ 15.534968] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.535048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.535085] Hardware name: linux,dummy-virt (DT) [ 15.535117] Call trace: [ 15.535139] show_stack+0x20/0x38 (C) [ 15.535487] dump_stack_lvl+0x8c/0xd0 [ 15.536032] print_report+0x118/0x5d0 [ 15.536284] kasan_report+0xdc/0x128 [ 15.536344] __asan_report_load1_noabort+0x20/0x30 [ 15.536449] ksize_unpoisons_memory+0x618/0x740 [ 15.536497] kunit_try_run_case+0x170/0x3f0 [ 15.536557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.536609] kthread+0x328/0x630 [ 15.536651] ret_from_fork+0x10/0x20 [ 15.537516] [ 15.537550] Allocated by task 195: [ 15.537580] kasan_save_stack+0x3c/0x68 [ 15.537670] kasan_save_track+0x20/0x40 [ 15.537709] kasan_save_alloc_info+0x40/0x58 [ 15.538171] __kasan_kmalloc+0xd4/0xd8 [ 15.538391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.538441] ksize_unpoisons_memory+0xc0/0x740 [ 15.538518] kunit_try_run_case+0x170/0x3f0 [ 15.538569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.539019] kthread+0x328/0x630 [ 15.539253] ret_from_fork+0x10/0x20 [ 15.539381] [ 15.539420] The buggy address belongs to the object at fff00000c6e65000 [ 15.539420] which belongs to the cache kmalloc-128 of size 128 [ 15.539481] The buggy address is located 5 bytes to the right of [ 15.539481] allocated 115-byte region [fff00000c6e65000, fff00000c6e65073) [ 15.539565] [ 15.539584] The buggy address belongs to the physical page: [ 15.539615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65 [ 15.540071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.540144] page_type: f5(slab) [ 15.540501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.540699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.540743] page dumped because: kasan: bad access detected [ 15.540792] [ 15.540810] Memory state around the buggy address: [ 15.540842] fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.541149] fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.541251] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.541292] ^ [ 15.541334] fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.541377] fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543210] ================================================================== [ 15.524436] ================================================================== [ 15.524497] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.524562] Read of size 1 at addr fff00000c6e65073 by task kunit_try_catch/195 [ 15.524614] [ 15.524648] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.525125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525278] Hardware name: linux,dummy-virt (DT) [ 15.525328] Call trace: [ 15.526401] show_stack+0x20/0x38 (C) [ 15.526790] dump_stack_lvl+0x8c/0xd0 [ 15.527184] print_report+0x118/0x5d0 [ 15.527800] kasan_report+0xdc/0x128 [ 15.527859] __asan_report_load1_noabort+0x20/0x30 [ 15.527941] ksize_unpoisons_memory+0x628/0x740 [ 15.528167] kunit_try_run_case+0x170/0x3f0 [ 15.528325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.528480] kthread+0x328/0x630 [ 15.528522] ret_from_fork+0x10/0x20 [ 15.528611] [ 15.528630] Allocated by task 195: [ 15.528660] kasan_save_stack+0x3c/0x68 [ 15.528701] kasan_save_track+0x20/0x40 [ 15.528767] kasan_save_alloc_info+0x40/0x58 [ 15.529004] __kasan_kmalloc+0xd4/0xd8 [ 15.529082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.529186] ksize_unpoisons_memory+0xc0/0x740 [ 15.529262] kunit_try_run_case+0x170/0x3f0 [ 15.529300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.529378] kthread+0x328/0x630 [ 15.529411] ret_from_fork+0x10/0x20 [ 15.529492] [ 15.530162] The buggy address belongs to the object at fff00000c6e65000 [ 15.530162] which belongs to the cache kmalloc-128 of size 128 [ 15.530240] The buggy address is located 0 bytes to the right of [ 15.530240] allocated 115-byte region [fff00000c6e65000, fff00000c6e65073) [ 15.530309] [ 15.530332] The buggy address belongs to the physical page: [ 15.530363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65 [ 15.530421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.530563] page_type: f5(slab) [ 15.530632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.530681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.530722] page dumped because: kasan: bad access detected [ 15.530753] [ 15.530771] Memory state around the buggy address: [ 15.531123] fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531260] fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531304] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.531380] ^ [ 15.531421] fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531691] fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531751] ==================================================================
[ 12.479634] ================================================================== [ 12.480002] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.480732] Read of size 1 at addr ffff888102f59878 by task kunit_try_catch/212 [ 12.481093] [ 12.481231] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.481275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.481286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.481309] Call Trace: [ 12.481322] <TASK> [ 12.481338] dump_stack_lvl+0x73/0xb0 [ 12.481366] print_report+0xd1/0x610 [ 12.481387] ? __virt_addr_valid+0x1db/0x2d0 [ 12.481410] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.481432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.481454] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.481476] kasan_report+0x141/0x180 [ 12.481507] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.481534] __asan_report_load1_noabort+0x18/0x20 [ 12.481558] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.481581] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.481605] ? __kasan_check_write+0x18/0x20 [ 12.481623] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.481646] ? irqentry_exit+0x2a/0x60 [ 12.481667] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.481691] ? trace_hardirqs_on+0x37/0xe0 [ 12.481714] ? __pfx_read_tsc+0x10/0x10 [ 12.481733] ? ktime_get_ts64+0x86/0x230 [ 12.481757] kunit_try_run_case+0x1a5/0x480 [ 12.481781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.481805] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.481827] ? __kthread_parkme+0x82/0x180 [ 12.481847] ? preempt_count_sub+0x50/0x80 [ 12.481871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.481894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.481917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.481940] kthread+0x337/0x6f0 [ 12.481958] ? trace_preempt_on+0x20/0xc0 [ 12.481979] ? __pfx_kthread+0x10/0x10 [ 12.481999] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.482020] ? calculate_sigpending+0x7b/0xa0 [ 12.482079] ? __pfx_kthread+0x10/0x10 [ 12.482102] ret_from_fork+0x116/0x1d0 [ 12.482121] ? __pfx_kthread+0x10/0x10 [ 12.482140] ret_from_fork_asm+0x1a/0x30 [ 12.482170] </TASK> [ 12.482180] [ 12.490730] Allocated by task 212: [ 12.490922] kasan_save_stack+0x45/0x70 [ 12.491265] kasan_save_track+0x18/0x40 [ 12.491470] kasan_save_alloc_info+0x3b/0x50 [ 12.491672] __kasan_kmalloc+0xb7/0xc0 [ 12.491838] __kmalloc_cache_noprof+0x189/0x420 [ 12.492035] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.492282] kunit_try_run_case+0x1a5/0x480 [ 12.492506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.492712] kthread+0x337/0x6f0 [ 12.492835] ret_from_fork+0x116/0x1d0 [ 12.493021] ret_from_fork_asm+0x1a/0x30 [ 12.493344] [ 12.493441] The buggy address belongs to the object at ffff888102f59800 [ 12.493441] which belongs to the cache kmalloc-128 of size 128 [ 12.493880] The buggy address is located 5 bytes to the right of [ 12.493880] allocated 115-byte region [ffff888102f59800, ffff888102f59873) [ 12.494686] [ 12.494768] The buggy address belongs to the physical page: [ 12.494959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59 [ 12.495640] flags: 0x200000000000000(node=0|zone=2) [ 12.495870] page_type: f5(slab) [ 12.496011] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.496424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.496672] page dumped because: kasan: bad access detected [ 12.496842] [ 12.496910] Memory state around the buggy address: [ 12.497074] ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.497768] ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.498082] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.498357] ^ [ 12.498582] ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.498992] ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.499712] ================================================================== [ 12.500206] ================================================================== [ 12.500526] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.500762] Read of size 1 at addr ffff888102f5987f by task kunit_try_catch/212 [ 12.501405] [ 12.501546] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.501593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.501603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.501624] Call Trace: [ 12.501641] <TASK> [ 12.501658] dump_stack_lvl+0x73/0xb0 [ 12.501689] print_report+0xd1/0x610 [ 12.501710] ? __virt_addr_valid+0x1db/0x2d0 [ 12.501733] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.501755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.501777] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.501800] kasan_report+0x141/0x180 [ 12.501821] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.501849] __asan_report_load1_noabort+0x18/0x20 [ 12.501873] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.501897] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.501921] ? __kasan_check_write+0x18/0x20 [ 12.501939] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.501962] ? irqentry_exit+0x2a/0x60 [ 12.501983] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.502006] ? trace_hardirqs_on+0x37/0xe0 [ 12.502029] ? __pfx_read_tsc+0x10/0x10 [ 12.502104] ? ktime_get_ts64+0x86/0x230 [ 12.502128] kunit_try_run_case+0x1a5/0x480 [ 12.502152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.502175] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.502204] ? __kthread_parkme+0x82/0x180 [ 12.502224] ? preempt_count_sub+0x50/0x80 [ 12.502247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.502270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.502293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.502316] kthread+0x337/0x6f0 [ 12.502334] ? trace_preempt_on+0x20/0xc0 [ 12.502355] ? __pfx_kthread+0x10/0x10 [ 12.502374] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.502394] ? calculate_sigpending+0x7b/0xa0 [ 12.502419] ? __pfx_kthread+0x10/0x10 [ 12.502439] ret_from_fork+0x116/0x1d0 [ 12.502457] ? __pfx_kthread+0x10/0x10 [ 12.502476] ret_from_fork_asm+0x1a/0x30 [ 12.502519] </TASK> [ 12.502528] [ 12.510394] Allocated by task 212: [ 12.510590] kasan_save_stack+0x45/0x70 [ 12.510793] kasan_save_track+0x18/0x40 [ 12.510968] kasan_save_alloc_info+0x3b/0x50 [ 12.511225] __kasan_kmalloc+0xb7/0xc0 [ 12.511404] __kmalloc_cache_noprof+0x189/0x420 [ 12.511621] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.511800] kunit_try_run_case+0x1a5/0x480 [ 12.511947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.512122] kthread+0x337/0x6f0 [ 12.512242] ret_from_fork+0x116/0x1d0 [ 12.512374] ret_from_fork_asm+0x1a/0x30 [ 12.512522] [ 12.512616] The buggy address belongs to the object at ffff888102f59800 [ 12.512616] which belongs to the cache kmalloc-128 of size 128 [ 12.513330] The buggy address is located 12 bytes to the right of [ 12.513330] allocated 115-byte region [ffff888102f59800, ffff888102f59873) [ 12.514586] [ 12.514659] The buggy address belongs to the physical page: [ 12.514830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59 [ 12.515226] flags: 0x200000000000000(node=0|zone=2) [ 12.515475] page_type: f5(slab) [ 12.515656] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.515972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.516368] page dumped because: kasan: bad access detected [ 12.516596] [ 12.516687] Memory state around the buggy address: [ 12.516896] ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.517264] ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.517565] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.517842] ^ [ 12.518147] ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.518532] ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.518814] ================================================================== [ 12.460770] ================================================================== [ 12.461317] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.461649] Read of size 1 at addr ffff888102f59873 by task kunit_try_catch/212 [ 12.461947] [ 12.462040] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.462086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.462097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.462118] Call Trace: [ 12.462130] <TASK> [ 12.462147] dump_stack_lvl+0x73/0xb0 [ 12.462378] print_report+0xd1/0x610 [ 12.462400] ? __virt_addr_valid+0x1db/0x2d0 [ 12.462423] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.462445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.462467] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.462490] kasan_report+0x141/0x180 [ 12.462524] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.462551] __asan_report_load1_noabort+0x18/0x20 [ 12.462575] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.462598] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.462622] ? __kasan_check_write+0x18/0x20 [ 12.462640] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.462664] ? irqentry_exit+0x2a/0x60 [ 12.462685] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.462708] ? trace_hardirqs_on+0x37/0xe0 [ 12.462731] ? __pfx_read_tsc+0x10/0x10 [ 12.462751] ? ktime_get_ts64+0x86/0x230 [ 12.462775] kunit_try_run_case+0x1a5/0x480 [ 12.462800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.462823] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.462846] ? __kthread_parkme+0x82/0x180 [ 12.462866] ? preempt_count_sub+0x50/0x80 [ 12.462889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.462912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.462935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.462958] kthread+0x337/0x6f0 [ 12.462977] ? trace_preempt_on+0x20/0xc0 [ 12.462997] ? __pfx_kthread+0x10/0x10 [ 12.463017] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.463038] ? calculate_sigpending+0x7b/0xa0 [ 12.463206] ? __pfx_kthread+0x10/0x10 [ 12.463227] ret_from_fork+0x116/0x1d0 [ 12.463246] ? __pfx_kthread+0x10/0x10 [ 12.463265] ret_from_fork_asm+0x1a/0x30 [ 12.463295] </TASK> [ 12.463306] [ 12.471131] Allocated by task 212: [ 12.471327] kasan_save_stack+0x45/0x70 [ 12.471540] kasan_save_track+0x18/0x40 [ 12.471712] kasan_save_alloc_info+0x3b/0x50 [ 12.471908] __kasan_kmalloc+0xb7/0xc0 [ 12.472042] __kmalloc_cache_noprof+0x189/0x420 [ 12.472364] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.472564] kunit_try_run_case+0x1a5/0x480 [ 12.472753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.472960] kthread+0x337/0x6f0 [ 12.473127] ret_from_fork+0x116/0x1d0 [ 12.473297] ret_from_fork_asm+0x1a/0x30 [ 12.473438] [ 12.473517] The buggy address belongs to the object at ffff888102f59800 [ 12.473517] which belongs to the cache kmalloc-128 of size 128 [ 12.473965] The buggy address is located 0 bytes to the right of [ 12.473965] allocated 115-byte region [ffff888102f59800, ffff888102f59873) [ 12.474640] [ 12.474723] The buggy address belongs to the physical page: [ 12.474943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59 [ 12.475222] flags: 0x200000000000000(node=0|zone=2) [ 12.475564] page_type: f5(slab) [ 12.475693] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.475994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.476486] page dumped because: kasan: bad access detected [ 12.476725] [ 12.476819] Memory state around the buggy address: [ 12.477007] ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.477710] ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.478002] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.478233] ^ [ 12.478440] ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.478667] ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.478879] ==================================================================