Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.529707] ================================================================== [ 15.529754] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.529805] Read of size 1 at addr fff00000c3fc2f78 by task kunit_try_catch/194 [ 15.530145] [ 15.530274] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.530687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.530852] Hardware name: linux,dummy-virt (DT) [ 15.530953] Call trace: [ 15.530975] show_stack+0x20/0x38 (C) [ 15.531041] dump_stack_lvl+0x8c/0xd0 [ 15.531088] print_report+0x118/0x5d0 [ 15.531513] kasan_report+0xdc/0x128 [ 15.531623] __asan_report_load1_noabort+0x20/0x30 [ 15.531733] ksize_unpoisons_memory+0x618/0x740 [ 15.531783] kunit_try_run_case+0x170/0x3f0 [ 15.531888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.531999] kthread+0x328/0x630 [ 15.532041] ret_from_fork+0x10/0x20 [ 15.532090] [ 15.532157] Allocated by task 194: [ 15.532189] kasan_save_stack+0x3c/0x68 [ 15.532427] kasan_save_track+0x20/0x40 [ 15.532484] kasan_save_alloc_info+0x40/0x58 [ 15.532523] __kasan_kmalloc+0xd4/0xd8 [ 15.532560] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.532647] ksize_unpoisons_memory+0xc0/0x740 [ 15.532845] kunit_try_run_case+0x170/0x3f0 [ 15.532881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.532926] kthread+0x328/0x630 [ 15.532958] ret_from_fork+0x10/0x20 [ 15.532994] [ 15.533014] The buggy address belongs to the object at fff00000c3fc2f00 [ 15.533014] which belongs to the cache kmalloc-128 of size 128 [ 15.533109] The buggy address is located 5 bytes to the right of [ 15.533109] allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73) [ 15.533173] [ 15.533221] The buggy address belongs to the physical page: [ 15.533303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.533379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.533427] page_type: f5(slab) [ 15.533554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.533961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.534007] page dumped because: kasan: bad access detected [ 15.534355] [ 15.534379] Memory state around the buggy address: [ 15.534520] fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.534680] fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534744] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.534802] ^ [ 15.534932] fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534978] fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.535036] ================================================================== [ 15.535976] ================================================================== [ 15.536026] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.536075] Read of size 1 at addr fff00000c3fc2f7f by task kunit_try_catch/194 [ 15.536124] [ 15.536153] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.536233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536383] Hardware name: linux,dummy-virt (DT) [ 15.536419] Call trace: [ 15.536598] show_stack+0x20/0x38 (C) [ 15.536816] dump_stack_lvl+0x8c/0xd0 [ 15.536865] print_report+0x118/0x5d0 [ 15.536911] kasan_report+0xdc/0x128 [ 15.536956] __asan_report_load1_noabort+0x20/0x30 [ 15.537010] ksize_unpoisons_memory+0x690/0x740 [ 15.537057] kunit_try_run_case+0x170/0x3f0 [ 15.537104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.537156] kthread+0x328/0x630 [ 15.537197] ret_from_fork+0x10/0x20 [ 15.537243] [ 15.537261] Allocated by task 194: [ 15.537290] kasan_save_stack+0x3c/0x68 [ 15.537331] kasan_save_track+0x20/0x40 [ 15.537378] kasan_save_alloc_info+0x40/0x58 [ 15.537419] __kasan_kmalloc+0xd4/0xd8 [ 15.537455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.537549] ksize_unpoisons_memory+0xc0/0x740 [ 15.538055] kunit_try_run_case+0x170/0x3f0 [ 15.538571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.538701] kthread+0x328/0x630 [ 15.538734] ret_from_fork+0x10/0x20 [ 15.538807] [ 15.538828] The buggy address belongs to the object at fff00000c3fc2f00 [ 15.538828] which belongs to the cache kmalloc-128 of size 128 [ 15.538886] The buggy address is located 12 bytes to the right of [ 15.538886] allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73) [ 15.539454] [ 15.539480] The buggy address belongs to the physical page: [ 15.539510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.539564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.539840] page_type: f5(slab) [ 15.539902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.540082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.540151] page dumped because: kasan: bad access detected [ 15.540272] [ 15.540291] Memory state around the buggy address: [ 15.540329] fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.540409] fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.540496] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.540562] ^ [ 15.540605] fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.540647] fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.540695] ================================================================== [ 15.524871] ================================================================== [ 15.524930] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.525037] Read of size 1 at addr fff00000c3fc2f73 by task kunit_try_catch/194 [ 15.525096] [ 15.525165] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.525246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525273] Hardware name: linux,dummy-virt (DT) [ 15.525304] Call trace: [ 15.525326] show_stack+0x20/0x38 (C) [ 15.525480] dump_stack_lvl+0x8c/0xd0 [ 15.525528] print_report+0x118/0x5d0 [ 15.525583] kasan_report+0xdc/0x128 [ 15.525703] __asan_report_load1_noabort+0x20/0x30 [ 15.525819] ksize_unpoisons_memory+0x628/0x740 [ 15.525934] kunit_try_run_case+0x170/0x3f0 [ 15.525989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.526041] kthread+0x328/0x630 [ 15.526123] ret_from_fork+0x10/0x20 [ 15.526222] [ 15.526241] Allocated by task 194: [ 15.526406] kasan_save_stack+0x3c/0x68 [ 15.526451] kasan_save_track+0x20/0x40 [ 15.526489] kasan_save_alloc_info+0x40/0x58 [ 15.526555] __kasan_kmalloc+0xd4/0xd8 [ 15.526650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.526752] ksize_unpoisons_memory+0xc0/0x740 [ 15.526906] kunit_try_run_case+0x170/0x3f0 [ 15.526968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.527095] kthread+0x328/0x630 [ 15.527157] ret_from_fork+0x10/0x20 [ 15.527195] [ 15.527214] The buggy address belongs to the object at fff00000c3fc2f00 [ 15.527214] which belongs to the cache kmalloc-128 of size 128 [ 15.527273] The buggy address is located 0 bytes to the right of [ 15.527273] allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73) [ 15.527338] [ 15.527357] The buggy address belongs to the physical page: [ 15.527631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.527703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.527752] page_type: f5(slab) [ 15.527801] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.527877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.527918] page dumped because: kasan: bad access detected [ 15.527950] [ 15.528033] Memory state around the buggy address: [ 15.528069] fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.528176] fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528253] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.528292] ^ [ 15.528331] fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528386] fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.528480] ==================================================================
[ 12.703738] ================================================================== [ 12.704616] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.705832] Read of size 1 at addr ffff88810272b973 by task kunit_try_catch/211 [ 12.706319] [ 12.706420] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.706465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.706476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.706775] Call Trace: [ 12.706794] <TASK> [ 12.706810] dump_stack_lvl+0x73/0xb0 [ 12.706842] print_report+0xd1/0x610 [ 12.706864] ? __virt_addr_valid+0x1db/0x2d0 [ 12.706887] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.706951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.706973] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.706995] kasan_report+0x141/0x180 [ 12.707016] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.707042] __asan_report_load1_noabort+0x18/0x20 [ 12.707073] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.707095] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.707116] ? finish_task_switch.isra.0+0x153/0x700 [ 12.707138] ? __switch_to+0x47/0xf50 [ 12.707163] ? __schedule+0x10cc/0x2b60 [ 12.707185] ? __pfx_read_tsc+0x10/0x10 [ 12.707204] ? ktime_get_ts64+0x86/0x230 [ 12.707227] kunit_try_run_case+0x1a5/0x480 [ 12.707251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.707271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.707294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.707315] ? __kthread_parkme+0x82/0x180 [ 12.707356] ? preempt_count_sub+0x50/0x80 [ 12.707378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.707400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.707422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.707443] kthread+0x337/0x6f0 [ 12.707462] ? trace_preempt_on+0x20/0xc0 [ 12.707483] ? __pfx_kthread+0x10/0x10 [ 12.707502] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.707522] ? calculate_sigpending+0x7b/0xa0 [ 12.707544] ? __pfx_kthread+0x10/0x10 [ 12.707564] ret_from_fork+0x116/0x1d0 [ 12.707581] ? __pfx_kthread+0x10/0x10 [ 12.707600] ret_from_fork_asm+0x1a/0x30 [ 12.707629] </TASK> [ 12.707639] [ 12.718522] Allocated by task 211: [ 12.718918] kasan_save_stack+0x45/0x70 [ 12.719319] kasan_save_track+0x18/0x40 [ 12.719729] kasan_save_alloc_info+0x3b/0x50 [ 12.720225] __kasan_kmalloc+0xb7/0xc0 [ 12.720607] __kmalloc_cache_noprof+0x189/0x420 [ 12.721175] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.721714] kunit_try_run_case+0x1a5/0x480 [ 12.722123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.722300] kthread+0x337/0x6f0 [ 12.722761] ret_from_fork+0x116/0x1d0 [ 12.723174] ret_from_fork_asm+0x1a/0x30 [ 12.723639] [ 12.723808] The buggy address belongs to the object at ffff88810272b900 [ 12.723808] which belongs to the cache kmalloc-128 of size 128 [ 12.724621] The buggy address is located 0 bytes to the right of [ 12.724621] allocated 115-byte region [ffff88810272b900, ffff88810272b973) [ 12.725995] [ 12.726158] The buggy address belongs to the physical page: [ 12.726775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b [ 12.727030] flags: 0x200000000000000(node=0|zone=2) [ 12.727571] page_type: f5(slab) [ 12.727989] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.728730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.729541] page dumped because: kasan: bad access detected [ 12.730150] [ 12.730312] Memory state around the buggy address: [ 12.730940] ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.731197] ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.731628] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.732487] ^ [ 12.733220] ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.733642] ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.734311] ================================================================== [ 12.735117] ================================================================== [ 12.735359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.735656] Read of size 1 at addr ffff88810272b978 by task kunit_try_catch/211 [ 12.736242] [ 12.736332] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.736373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.736384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.736403] Call Trace: [ 12.736418] <TASK> [ 12.736431] dump_stack_lvl+0x73/0xb0 [ 12.736459] print_report+0xd1/0x610 [ 12.736479] ? __virt_addr_valid+0x1db/0x2d0 [ 12.736501] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.736522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.736543] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.736564] kasan_report+0x141/0x180 [ 12.736585] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.736611] __asan_report_load1_noabort+0x18/0x20 [ 12.736633] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.736656] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.736677] ? finish_task_switch.isra.0+0x153/0x700 [ 12.736697] ? __switch_to+0x47/0xf50 [ 12.736752] ? __schedule+0x10cc/0x2b60 [ 12.736773] ? __pfx_read_tsc+0x10/0x10 [ 12.736792] ? ktime_get_ts64+0x86/0x230 [ 12.736976] kunit_try_run_case+0x1a5/0x480 [ 12.737005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.737028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.737052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.737073] ? __kthread_parkme+0x82/0x180 [ 12.737092] ? preempt_count_sub+0x50/0x80 [ 12.737113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.737136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.737170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.737192] kthread+0x337/0x6f0 [ 12.737210] ? trace_preempt_on+0x20/0xc0 [ 12.737244] ? __pfx_kthread+0x10/0x10 [ 12.737264] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.737283] ? calculate_sigpending+0x7b/0xa0 [ 12.737305] ? __pfx_kthread+0x10/0x10 [ 12.737334] ret_from_fork+0x116/0x1d0 [ 12.737422] ? __pfx_kthread+0x10/0x10 [ 12.737443] ret_from_fork_asm+0x1a/0x30 [ 12.737472] </TASK> [ 12.737482] [ 12.746022] Allocated by task 211: [ 12.746235] kasan_save_stack+0x45/0x70 [ 12.746556] kasan_save_track+0x18/0x40 [ 12.746764] kasan_save_alloc_info+0x3b/0x50 [ 12.747002] __kasan_kmalloc+0xb7/0xc0 [ 12.747153] __kmalloc_cache_noprof+0x189/0x420 [ 12.747310] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.747463] kunit_try_run_case+0x1a5/0x480 [ 12.747762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.748028] kthread+0x337/0x6f0 [ 12.748195] ret_from_fork+0x116/0x1d0 [ 12.748379] ret_from_fork_asm+0x1a/0x30 [ 12.748733] [ 12.748851] The buggy address belongs to the object at ffff88810272b900 [ 12.748851] which belongs to the cache kmalloc-128 of size 128 [ 12.749332] The buggy address is located 5 bytes to the right of [ 12.749332] allocated 115-byte region [ffff88810272b900, ffff88810272b973) [ 12.750064] [ 12.750178] The buggy address belongs to the physical page: [ 12.750473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b [ 12.750761] flags: 0x200000000000000(node=0|zone=2) [ 12.750938] page_type: f5(slab) [ 12.751059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.751320] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.751822] page dumped because: kasan: bad access detected [ 12.752085] [ 12.752177] Memory state around the buggy address: [ 12.752579] ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.753068] ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.753323] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.753864] ^ [ 12.754215] ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.754485] ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.755041] ================================================================== [ 12.755468] ================================================================== [ 12.755937] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.756494] Read of size 1 at addr ffff88810272b97f by task kunit_try_catch/211 [ 12.756833] [ 12.756973] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.757014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.757024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.757043] Call Trace: [ 12.757056] <TASK> [ 12.757069] dump_stack_lvl+0x73/0xb0 [ 12.757095] print_report+0xd1/0x610 [ 12.757116] ? __virt_addr_valid+0x1db/0x2d0 [ 12.757136] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.757169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.757190] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.757212] kasan_report+0x141/0x180 [ 12.757232] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.757270] __asan_report_load1_noabort+0x18/0x20 [ 12.757292] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.757314] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.757335] ? finish_task_switch.isra.0+0x153/0x700 [ 12.757431] ? __switch_to+0x47/0xf50 [ 12.757456] ? __schedule+0x10cc/0x2b60 [ 12.757476] ? __pfx_read_tsc+0x10/0x10 [ 12.757495] ? ktime_get_ts64+0x86/0x230 [ 12.757531] kunit_try_run_case+0x1a5/0x480 [ 12.757553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.757574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.757608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.757630] ? __kthread_parkme+0x82/0x180 [ 12.757648] ? preempt_count_sub+0x50/0x80 [ 12.757669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.757699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.757729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.757751] kthread+0x337/0x6f0 [ 12.757769] ? trace_preempt_on+0x20/0xc0 [ 12.757800] ? __pfx_kthread+0x10/0x10 [ 12.757820] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.757839] ? calculate_sigpending+0x7b/0xa0 [ 12.757861] ? __pfx_kthread+0x10/0x10 [ 12.757880] ret_from_fork+0x116/0x1d0 [ 12.757897] ? __pfx_kthread+0x10/0x10 [ 12.757926] ret_from_fork_asm+0x1a/0x30 [ 12.757954] </TASK> [ 12.757964] [ 12.766329] Allocated by task 211: [ 12.766464] kasan_save_stack+0x45/0x70 [ 12.766635] kasan_save_track+0x18/0x40 [ 12.766823] kasan_save_alloc_info+0x3b/0x50 [ 12.767041] __kasan_kmalloc+0xb7/0xc0 [ 12.767307] __kmalloc_cache_noprof+0x189/0x420 [ 12.767647] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.767883] kunit_try_run_case+0x1a5/0x480 [ 12.768105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.768885] kthread+0x337/0x6f0 [ 12.769092] ret_from_fork+0x116/0x1d0 [ 12.769274] ret_from_fork_asm+0x1a/0x30 [ 12.770280] [ 12.770431] The buggy address belongs to the object at ffff88810272b900 [ 12.770431] which belongs to the cache kmalloc-128 of size 128 [ 12.771325] The buggy address is located 12 bytes to the right of [ 12.771325] allocated 115-byte region [ffff88810272b900, ffff88810272b973) [ 12.772098] [ 12.772196] The buggy address belongs to the physical page: [ 12.773020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b [ 12.773311] flags: 0x200000000000000(node=0|zone=2) [ 12.773987] page_type: f5(slab) [ 12.774328] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.775042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.775277] page dumped because: kasan: bad access detected [ 12.775457] [ 12.775527] Memory state around the buggy address: [ 12.775685] ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.775900] ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.776118] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.776604] ^ [ 12.777577] ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.778431] ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.779117] ==================================================================