Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.409395] ================================================================== [ 15.409444] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.409506] Read of size 1 at addr fff00000c6417b7f by task kunit_try_catch/194 [ 15.409555] [ 15.409584] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.409672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.409712] Hardware name: linux,dummy-virt (DT) [ 15.410074] Call trace: [ 15.410372] show_stack+0x20/0x38 (C) [ 15.410461] dump_stack_lvl+0x8c/0xd0 [ 15.410514] print_report+0x118/0x5d0 [ 15.410712] kasan_report+0xdc/0x128 [ 15.410981] __asan_report_load1_noabort+0x20/0x30 [ 15.411052] ksize_unpoisons_memory+0x690/0x740 [ 15.411398] kunit_try_run_case+0x170/0x3f0 [ 15.411526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.411641] kthread+0x328/0x630 [ 15.411873] ret_from_fork+0x10/0x20 [ 15.412085] [ 15.412152] Allocated by task 194: [ 15.412504] kasan_save_stack+0x3c/0x68 [ 15.412600] kasan_save_track+0x20/0x40 [ 15.412772] kasan_save_alloc_info+0x40/0x58 [ 15.412906] __kasan_kmalloc+0xd4/0xd8 [ 15.412976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.413039] ksize_unpoisons_memory+0xc0/0x740 [ 15.413368] kunit_try_run_case+0x170/0x3f0 [ 15.413664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.413752] kthread+0x328/0x630 [ 15.413852] ret_from_fork+0x10/0x20 [ 15.413932] [ 15.414153] The buggy address belongs to the object at fff00000c6417b00 [ 15.414153] which belongs to the cache kmalloc-128 of size 128 [ 15.414441] The buggy address is located 12 bytes to the right of [ 15.414441] allocated 115-byte region [fff00000c6417b00, fff00000c6417b73) [ 15.414658] [ 15.414711] The buggy address belongs to the physical page: [ 15.415108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 15.415184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.415341] page_type: f5(slab) [ 15.415390] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.415592] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.415682] page dumped because: kasan: bad access detected [ 15.416111] [ 15.416200] Memory state around the buggy address: [ 15.416355] fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.416462] fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416583] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.416624] ^ [ 15.416701] fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416747] fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416935] ================================================================== [ 15.390360] ================================================================== [ 15.390519] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.390622] Read of size 1 at addr fff00000c6417b73 by task kunit_try_catch/194 [ 15.391071] [ 15.391122] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.391465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.391667] Hardware name: linux,dummy-virt (DT) [ 15.391753] Call trace: [ 15.391777] show_stack+0x20/0x38 (C) [ 15.391832] dump_stack_lvl+0x8c/0xd0 [ 15.392297] print_report+0x118/0x5d0 [ 15.392377] kasan_report+0xdc/0x128 [ 15.392430] __asan_report_load1_noabort+0x20/0x30 [ 15.392681] ksize_unpoisons_memory+0x628/0x740 [ 15.392984] kunit_try_run_case+0x170/0x3f0 [ 15.393113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.393248] kthread+0x328/0x630 [ 15.393591] ret_from_fork+0x10/0x20 [ 15.394091] [ 15.394196] Allocated by task 194: [ 15.394254] kasan_save_stack+0x3c/0x68 [ 15.394573] kasan_save_track+0x20/0x40 [ 15.394868] kasan_save_alloc_info+0x40/0x58 [ 15.394940] __kasan_kmalloc+0xd4/0xd8 [ 15.395149] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.395372] ksize_unpoisons_memory+0xc0/0x740 [ 15.395794] kunit_try_run_case+0x170/0x3f0 [ 15.395974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.396027] kthread+0x328/0x630 [ 15.396061] ret_from_fork+0x10/0x20 [ 15.396123] [ 15.396144] The buggy address belongs to the object at fff00000c6417b00 [ 15.396144] which belongs to the cache kmalloc-128 of size 128 [ 15.396359] The buggy address is located 0 bytes to the right of [ 15.396359] allocated 115-byte region [fff00000c6417b00, fff00000c6417b73) [ 15.396531] [ 15.396554] The buggy address belongs to the physical page: [ 15.396648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 15.396745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.396813] page_type: f5(slab) [ 15.396853] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.396905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.396958] page dumped because: kasan: bad access detected [ 15.396989] [ 15.397019] Memory state around the buggy address: [ 15.397063] fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.397110] fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397155] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.397205] ^ [ 15.397256] fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397297] fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397347] ================================================================== [ 15.403079] ================================================================== [ 15.403154] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.403291] Read of size 1 at addr fff00000c6417b78 by task kunit_try_catch/194 [ 15.403406] [ 15.403440] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.403707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.403909] Hardware name: linux,dummy-virt (DT) [ 15.404266] Call trace: [ 15.404330] show_stack+0x20/0x38 (C) [ 15.404445] dump_stack_lvl+0x8c/0xd0 [ 15.404495] print_report+0x118/0x5d0 [ 15.404543] kasan_report+0xdc/0x128 [ 15.404947] __asan_report_load1_noabort+0x20/0x30 [ 15.405072] ksize_unpoisons_memory+0x618/0x740 [ 15.405346] kunit_try_run_case+0x170/0x3f0 [ 15.405558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.405983] kthread+0x328/0x630 [ 15.406110] ret_from_fork+0x10/0x20 [ 15.406207] [ 15.406306] Allocated by task 194: [ 15.406524] kasan_save_stack+0x3c/0x68 [ 15.406569] kasan_save_track+0x20/0x40 [ 15.406631] kasan_save_alloc_info+0x40/0x58 [ 15.406925] __kasan_kmalloc+0xd4/0xd8 [ 15.407080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.407242] ksize_unpoisons_memory+0xc0/0x740 [ 15.407428] kunit_try_run_case+0x170/0x3f0 [ 15.407483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.407978] kthread+0x328/0x630 [ 15.408042] ret_from_fork+0x10/0x20 [ 15.408079] [ 15.408120] The buggy address belongs to the object at fff00000c6417b00 [ 15.408120] which belongs to the cache kmalloc-128 of size 128 [ 15.408180] The buggy address is located 5 bytes to the right of [ 15.408180] allocated 115-byte region [fff00000c6417b00, fff00000c6417b73) [ 15.408245] [ 15.408266] The buggy address belongs to the physical page: [ 15.408298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 15.408362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.408412] page_type: f5(slab) [ 15.408449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.408502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.408553] page dumped because: kasan: bad access detected [ 15.408585] [ 15.408602] Memory state around the buggy address: [ 15.408651] fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.408715] fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.408760] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.408798] ^ [ 15.408839] fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.408891] fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.408929] ==================================================================
[ 12.475100] ================================================================== [ 12.475554] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.475893] Read of size 1 at addr ffff888102fd127f by task kunit_try_catch/211 [ 12.476202] [ 12.476283] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.476322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.476333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.476425] Call Trace: [ 12.476439] <TASK> [ 12.476452] dump_stack_lvl+0x73/0xb0 [ 12.476480] print_report+0xd1/0x610 [ 12.476500] ? __virt_addr_valid+0x1db/0x2d0 [ 12.476521] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.476542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.476562] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.476584] kasan_report+0x141/0x180 [ 12.476604] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.476631] __asan_report_load1_noabort+0x18/0x20 [ 12.476653] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.476675] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.476710] ? __kasan_check_write+0x18/0x20 [ 12.476727] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.476749] ? irqentry_exit+0x2a/0x60 [ 12.476790] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.476812] ? trace_hardirqs_on+0x37/0xe0 [ 12.476834] ? __pfx_read_tsc+0x10/0x10 [ 12.476864] ? ktime_get_ts64+0x86/0x230 [ 12.476888] kunit_try_run_case+0x1a5/0x480 [ 12.476910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.476933] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.476955] ? __kthread_parkme+0x82/0x180 [ 12.476980] ? preempt_count_sub+0x50/0x80 [ 12.477018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.477041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.477062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.477095] kthread+0x337/0x6f0 [ 12.477113] ? trace_preempt_on+0x20/0xc0 [ 12.477133] ? __pfx_kthread+0x10/0x10 [ 12.477153] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.477172] ? calculate_sigpending+0x7b/0xa0 [ 12.477194] ? __pfx_kthread+0x10/0x10 [ 12.477223] ret_from_fork+0x116/0x1d0 [ 12.477240] ? __pfx_kthread+0x10/0x10 [ 12.477259] ret_from_fork_asm+0x1a/0x30 [ 12.477298] </TASK> [ 12.477307] [ 12.485663] Allocated by task 211: [ 12.485870] kasan_save_stack+0x45/0x70 [ 12.486083] kasan_save_track+0x18/0x40 [ 12.486263] kasan_save_alloc_info+0x3b/0x50 [ 12.486674] __kasan_kmalloc+0xb7/0xc0 [ 12.486857] __kmalloc_cache_noprof+0x189/0x420 [ 12.487097] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.487308] kunit_try_run_case+0x1a5/0x480 [ 12.487648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.487910] kthread+0x337/0x6f0 [ 12.488102] ret_from_fork+0x116/0x1d0 [ 12.488270] ret_from_fork_asm+0x1a/0x30 [ 12.488479] [ 12.488553] The buggy address belongs to the object at ffff888102fd1200 [ 12.488553] which belongs to the cache kmalloc-128 of size 128 [ 12.488989] The buggy address is located 12 bytes to the right of [ 12.488989] allocated 115-byte region [ffff888102fd1200, ffff888102fd1273) [ 12.489658] [ 12.489756] The buggy address belongs to the physical page: [ 12.489956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 12.490310] flags: 0x200000000000000(node=0|zone=2) [ 12.490708] page_type: f5(slab) [ 12.490835] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.491203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.491645] page dumped because: kasan: bad access detected [ 12.491889] [ 12.492013] Memory state around the buggy address: [ 12.492183] ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.492581] ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.492899] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.493216] ^ [ 12.493613] ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.493888] ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.494116] ================================================================== [ 12.436680] ================================================================== [ 12.437178] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.437518] Read of size 1 at addr ffff888102fd1273 by task kunit_try_catch/211 [ 12.438107] [ 12.438223] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.438267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.438277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.438298] Call Trace: [ 12.438309] <TASK> [ 12.438323] dump_stack_lvl+0x73/0xb0 [ 12.438353] print_report+0xd1/0x610 [ 12.438375] ? __virt_addr_valid+0x1db/0x2d0 [ 12.438473] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.438504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.438527] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.438549] kasan_report+0x141/0x180 [ 12.438570] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.438597] __asan_report_load1_noabort+0x18/0x20 [ 12.438620] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.438643] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.438666] ? __kasan_check_write+0x18/0x20 [ 12.438683] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.438706] ? irqentry_exit+0x2a/0x60 [ 12.438727] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.438750] ? trace_hardirqs_on+0x37/0xe0 [ 12.438772] ? __pfx_read_tsc+0x10/0x10 [ 12.438792] ? ktime_get_ts64+0x86/0x230 [ 12.438815] kunit_try_run_case+0x1a5/0x480 [ 12.438838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.438861] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.438882] ? __kthread_parkme+0x82/0x180 [ 12.438902] ? preempt_count_sub+0x50/0x80 [ 12.438924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.438947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.438968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.438990] kthread+0x337/0x6f0 [ 12.439020] ? trace_preempt_on+0x20/0xc0 [ 12.439041] ? __pfx_kthread+0x10/0x10 [ 12.439060] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.439079] ? calculate_sigpending+0x7b/0xa0 [ 12.439102] ? __pfx_kthread+0x10/0x10 [ 12.439122] ret_from_fork+0x116/0x1d0 [ 12.439139] ? __pfx_kthread+0x10/0x10 [ 12.439158] ret_from_fork_asm+0x1a/0x30 [ 12.439187] </TASK> [ 12.439198] [ 12.447127] Allocated by task 211: [ 12.447282] kasan_save_stack+0x45/0x70 [ 12.447495] kasan_save_track+0x18/0x40 [ 12.447689] kasan_save_alloc_info+0x3b/0x50 [ 12.447861] __kasan_kmalloc+0xb7/0xc0 [ 12.448054] __kmalloc_cache_noprof+0x189/0x420 [ 12.448228] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.448468] kunit_try_run_case+0x1a5/0x480 [ 12.448633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.448865] kthread+0x337/0x6f0 [ 12.448990] ret_from_fork+0x116/0x1d0 [ 12.449130] ret_from_fork_asm+0x1a/0x30 [ 12.449294] [ 12.449385] The buggy address belongs to the object at ffff888102fd1200 [ 12.449385] which belongs to the cache kmalloc-128 of size 128 [ 12.449903] The buggy address is located 0 bytes to the right of [ 12.449903] allocated 115-byte region [ffff888102fd1200, ffff888102fd1273) [ 12.450677] [ 12.450759] The buggy address belongs to the physical page: [ 12.450931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 12.451188] flags: 0x200000000000000(node=0|zone=2) [ 12.451353] page_type: f5(slab) [ 12.451474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.451811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.452164] page dumped because: kasan: bad access detected [ 12.452456] [ 12.452553] Memory state around the buggy address: [ 12.452820] ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.453161] ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.453702] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.454035] ^ [ 12.454298] ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.454655] ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.454912] ================================================================== [ 12.455307] ================================================================== [ 12.456064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.456526] Read of size 1 at addr ffff888102fd1278 by task kunit_try_catch/211 [ 12.456833] [ 12.456934] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.456981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.456991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.457022] Call Trace: [ 12.457035] <TASK> [ 12.457049] dump_stack_lvl+0x73/0xb0 [ 12.457075] print_report+0xd1/0x610 [ 12.457096] ? __virt_addr_valid+0x1db/0x2d0 [ 12.457116] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.457138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.457159] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.457181] kasan_report+0x141/0x180 [ 12.457201] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.457227] __asan_report_load1_noabort+0x18/0x20 [ 12.457250] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.457272] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.457295] ? __kasan_check_write+0x18/0x20 [ 12.457313] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.457335] ? irqentry_exit+0x2a/0x60 [ 12.457355] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.457395] ? trace_hardirqs_on+0x37/0xe0 [ 12.457416] ? __pfx_read_tsc+0x10/0x10 [ 12.457437] ? ktime_get_ts64+0x86/0x230 [ 12.457460] kunit_try_run_case+0x1a5/0x480 [ 12.457483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.457506] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.457528] ? __kthread_parkme+0x82/0x180 [ 12.457547] ? preempt_count_sub+0x50/0x80 [ 12.457569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.457592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.457614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.457636] kthread+0x337/0x6f0 [ 12.457654] ? trace_preempt_on+0x20/0xc0 [ 12.457675] ? __pfx_kthread+0x10/0x10 [ 12.457694] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.457714] ? calculate_sigpending+0x7b/0xa0 [ 12.457736] ? __pfx_kthread+0x10/0x10 [ 12.457757] ret_from_fork+0x116/0x1d0 [ 12.457774] ? __pfx_kthread+0x10/0x10 [ 12.457793] ret_from_fork_asm+0x1a/0x30 [ 12.457821] </TASK> [ 12.457831] [ 12.465813] Allocated by task 211: [ 12.465941] kasan_save_stack+0x45/0x70 [ 12.466100] kasan_save_track+0x18/0x40 [ 12.466234] kasan_save_alloc_info+0x3b/0x50 [ 12.466592] __kasan_kmalloc+0xb7/0xc0 [ 12.466819] __kmalloc_cache_noprof+0x189/0x420 [ 12.467102] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.467448] kunit_try_run_case+0x1a5/0x480 [ 12.467697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.467952] kthread+0x337/0x6f0 [ 12.468130] ret_from_fork+0x116/0x1d0 [ 12.468317] ret_from_fork_asm+0x1a/0x30 [ 12.468615] [ 12.468714] The buggy address belongs to the object at ffff888102fd1200 [ 12.468714] which belongs to the cache kmalloc-128 of size 128 [ 12.469287] The buggy address is located 5 bytes to the right of [ 12.469287] allocated 115-byte region [ffff888102fd1200, ffff888102fd1273) [ 12.469923] [ 12.470053] The buggy address belongs to the physical page: [ 12.470234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 12.470648] flags: 0x200000000000000(node=0|zone=2) [ 12.470846] page_type: f5(slab) [ 12.471024] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.471451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.471821] page dumped because: kasan: bad access detected [ 12.472086] [ 12.472183] Memory state around the buggy address: [ 12.472507] ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.472828] ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.473177] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.473552] ^ [ 12.473782] ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.473996] ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.474547] ==================================================================