Date
June 20, 2025, 12:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.422110] ================================================================== [ 32.422260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 32.422402] Read of size 1 at addr fff00000c44dfb7f by task kunit_try_catch/205 [ 32.422537] [ 32.422646] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.422983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.423170] Hardware name: linux,dummy-virt (DT) [ 32.423391] Call trace: [ 32.423466] show_stack+0x20/0x38 (C) [ 32.423598] dump_stack_lvl+0x8c/0xd0 [ 32.423829] print_report+0x118/0x608 [ 32.424157] kasan_report+0xdc/0x128 [ 32.424406] __asan_report_load1_noabort+0x20/0x30 [ 32.424651] ksize_unpoisons_memory+0x690/0x740 [ 32.424857] kunit_try_run_case+0x170/0x3f0 [ 32.425050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.425195] kthread+0x328/0x630 [ 32.425287] ret_from_fork+0x10/0x20 [ 32.425389] [ 32.425431] Allocated by task 205: [ 32.425960] kasan_save_stack+0x3c/0x68 [ 32.426092] kasan_save_track+0x20/0x40 [ 32.426190] kasan_save_alloc_info+0x40/0x58 [ 32.426292] __kasan_kmalloc+0xd4/0xd8 [ 32.426418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.426641] ksize_unpoisons_memory+0xc0/0x740 [ 32.426823] kunit_try_run_case+0x170/0x3f0 [ 32.426921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.427510] kthread+0x328/0x630 [ 32.427634] ret_from_fork+0x10/0x20 [ 32.427732] [ 32.427780] The buggy address belongs to the object at fff00000c44dfb00 [ 32.427780] which belongs to the cache kmalloc-128 of size 128 [ 32.427939] The buggy address is located 12 bytes to the right of [ 32.427939] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.428329] [ 32.428393] The buggy address belongs to the physical page: [ 32.428741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.429085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.429385] page_type: f5(slab) [ 32.429589] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.429820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.429950] page dumped because: kasan: bad access detected [ 32.430036] [ 32.430075] Memory state around the buggy address: [ 32.430154] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.430758] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430911] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.431106] ^ [ 32.431289] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431437] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431539] ================================================================== [ 32.399845] ================================================================== [ 32.400073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 32.400685] Read of size 1 at addr fff00000c44dfb73 by task kunit_try_catch/205 [ 32.400879] [ 32.401007] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.401210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.401282] Hardware name: linux,dummy-virt (DT) [ 32.401407] Call trace: [ 32.401458] show_stack+0x20/0x38 (C) [ 32.401789] dump_stack_lvl+0x8c/0xd0 [ 32.401907] print_report+0x118/0x608 [ 32.402040] kasan_report+0xdc/0x128 [ 32.402192] __asan_report_load1_noabort+0x20/0x30 [ 32.402415] ksize_unpoisons_memory+0x628/0x740 [ 32.402547] kunit_try_run_case+0x170/0x3f0 [ 32.402689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.402822] kthread+0x328/0x630 [ 32.402938] ret_from_fork+0x10/0x20 [ 32.403063] [ 32.403118] Allocated by task 205: [ 32.403192] kasan_save_stack+0x3c/0x68 [ 32.403377] kasan_save_track+0x20/0x40 [ 32.403647] kasan_save_alloc_info+0x40/0x58 [ 32.403879] __kasan_kmalloc+0xd4/0xd8 [ 32.403967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.404066] ksize_unpoisons_memory+0xc0/0x740 [ 32.404476] kunit_try_run_case+0x170/0x3f0 [ 32.404662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.404827] kthread+0x328/0x630 [ 32.404912] ret_from_fork+0x10/0x20 [ 32.404994] [ 32.405035] The buggy address belongs to the object at fff00000c44dfb00 [ 32.405035] which belongs to the cache kmalloc-128 of size 128 [ 32.405152] The buggy address is located 0 bytes to the right of [ 32.405152] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.405327] [ 32.405585] The buggy address belongs to the physical page: [ 32.405728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.405879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.406019] page_type: f5(slab) [ 32.406127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.406259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.406375] page dumped because: kasan: bad access detected [ 32.406459] [ 32.406504] Memory state around the buggy address: [ 32.406599] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.406919] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407161] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.407279] ^ [ 32.407387] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407778] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407924] ================================================================== [ 32.410776] ================================================================== [ 32.410918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 32.411056] Read of size 1 at addr fff00000c44dfb78 by task kunit_try_catch/205 [ 32.411191] [ 32.411276] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.411516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.411584] Hardware name: linux,dummy-virt (DT) [ 32.411673] Call trace: [ 32.411725] show_stack+0x20/0x38 (C) [ 32.412113] dump_stack_lvl+0x8c/0xd0 [ 32.412511] print_report+0x118/0x608 [ 32.412815] kasan_report+0xdc/0x128 [ 32.412981] __asan_report_load1_noabort+0x20/0x30 [ 32.413153] ksize_unpoisons_memory+0x618/0x740 [ 32.413307] kunit_try_run_case+0x170/0x3f0 [ 32.413462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.413654] kthread+0x328/0x630 [ 32.413837] ret_from_fork+0x10/0x20 [ 32.413953] [ 32.413996] Allocated by task 205: [ 32.414069] kasan_save_stack+0x3c/0x68 [ 32.414420] kasan_save_track+0x20/0x40 [ 32.414510] kasan_save_alloc_info+0x40/0x58 [ 32.414601] __kasan_kmalloc+0xd4/0xd8 [ 32.414711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.414821] ksize_unpoisons_memory+0xc0/0x740 [ 32.414920] kunit_try_run_case+0x170/0x3f0 [ 32.415041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.415191] kthread+0x328/0x630 [ 32.415320] ret_from_fork+0x10/0x20 [ 32.415463] [ 32.415516] The buggy address belongs to the object at fff00000c44dfb00 [ 32.415516] which belongs to the cache kmalloc-128 of size 128 [ 32.415705] The buggy address is located 5 bytes to the right of [ 32.415705] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.415891] [ 32.415943] The buggy address belongs to the physical page: [ 32.416073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.416475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.416816] page_type: f5(slab) [ 32.416903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.417043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.417367] page dumped because: kasan: bad access detected [ 32.417499] [ 32.417560] Memory state around the buggy address: [ 32.417683] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.417827] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.417977] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.418123] ^ [ 32.418272] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.418388] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.418498] ==================================================================
[ 26.034512] ================================================================== [ 26.035650] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 26.036100] Read of size 1 at addr ffff88810232a273 by task kunit_try_catch/223 [ 26.036576] [ 26.036846] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.036946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.036970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.037022] Call Trace: [ 26.037064] <TASK> [ 26.037105] dump_stack_lvl+0x73/0xb0 [ 26.037175] print_report+0xd1/0x650 [ 26.037218] ? __virt_addr_valid+0x1db/0x2d0 [ 26.037266] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.037314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.037367] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.037412] kasan_report+0x141/0x180 [ 26.037471] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.037543] __asan_report_load1_noabort+0x18/0x20 [ 26.037593] ksize_unpoisons_memory+0x81c/0x9b0 [ 26.037646] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.037695] ? finish_task_switch.isra.0+0x153/0x700 [ 26.037743] ? __switch_to+0x47/0xf50 [ 26.037791] ? __schedule+0x10cc/0x2b60 [ 26.037834] ? __pfx_read_tsc+0x10/0x10 [ 26.037878] ? ktime_get_ts64+0x86/0x230 [ 26.037929] kunit_try_run_case+0x1a5/0x480 [ 26.037983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.038037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.038081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.038118] ? __kthread_parkme+0x82/0x180 [ 26.038153] ? preempt_count_sub+0x50/0x80 [ 26.038191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.038246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.038311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.038363] kthread+0x337/0x6f0 [ 26.038404] ? trace_preempt_on+0x20/0xc0 [ 26.038467] ? __pfx_kthread+0x10/0x10 [ 26.038508] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.038546] ? calculate_sigpending+0x7b/0xa0 [ 26.038588] ? __pfx_kthread+0x10/0x10 [ 26.038622] ret_from_fork+0x116/0x1d0 [ 26.038654] ? __pfx_kthread+0x10/0x10 [ 26.038686] ret_from_fork_asm+0x1a/0x30 [ 26.038737] </TASK> [ 26.038758] [ 26.052367] Allocated by task 223: [ 26.052872] kasan_save_stack+0x45/0x70 [ 26.053281] kasan_save_track+0x18/0x40 [ 26.053473] kasan_save_alloc_info+0x3b/0x50 [ 26.053670] __kasan_kmalloc+0xb7/0xc0 [ 26.054218] __kmalloc_cache_noprof+0x189/0x420 [ 26.055072] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.055481] kunit_try_run_case+0x1a5/0x480 [ 26.055945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.056851] kthread+0x337/0x6f0 [ 26.057094] ret_from_fork+0x116/0x1d0 [ 26.057976] ret_from_fork_asm+0x1a/0x30 [ 26.058297] [ 26.058453] The buggy address belongs to the object at ffff88810232a200 [ 26.058453] which belongs to the cache kmalloc-128 of size 128 [ 26.059270] The buggy address is located 0 bytes to the right of [ 26.059270] allocated 115-byte region [ffff88810232a200, ffff88810232a273) [ 26.060883] [ 26.061086] The buggy address belongs to the physical page: [ 26.061505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.062388] flags: 0x200000000000000(node=0|zone=2) [ 26.063006] page_type: f5(slab) [ 26.063254] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.063935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.064868] page dumped because: kasan: bad access detected [ 26.065059] [ 26.065138] Memory state around the buggy address: [ 26.065972] ffff88810232a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.066413] ffff88810232a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.067406] >ffff88810232a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.067968] ^ [ 26.068261] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.069080] ffff88810232a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.069342] ================================================================== [ 26.070943] ================================================================== [ 26.071750] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.072505] Read of size 1 at addr ffff88810232a278 by task kunit_try_catch/223 [ 26.073167] [ 26.073400] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.073578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.073606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.073645] Call Trace: [ 26.073677] <TASK> [ 26.073715] dump_stack_lvl+0x73/0xb0 [ 26.073817] print_report+0xd1/0x650 [ 26.073865] ? __virt_addr_valid+0x1db/0x2d0 [ 26.073934] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.073984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.074049] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.074099] kasan_report+0x141/0x180 [ 26.074134] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.074192] __asan_report_load1_noabort+0x18/0x20 [ 26.074220] ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.074247] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.074286] ? finish_task_switch.isra.0+0x153/0x700 [ 26.074322] ? __switch_to+0x47/0xf50 [ 26.074353] ? __schedule+0x10cc/0x2b60 [ 26.074378] ? __pfx_read_tsc+0x10/0x10 [ 26.074402] ? ktime_get_ts64+0x86/0x230 [ 26.074431] kunit_try_run_case+0x1a5/0x480 [ 26.074479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.074503] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.074529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.074561] ? __kthread_parkme+0x82/0x180 [ 26.074598] ? preempt_count_sub+0x50/0x80 [ 26.074634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.074674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.074704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.074729] kthread+0x337/0x6f0 [ 26.074751] ? trace_preempt_on+0x20/0xc0 [ 26.074776] ? __pfx_kthread+0x10/0x10 [ 26.074798] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.074821] ? calculate_sigpending+0x7b/0xa0 [ 26.074847] ? __pfx_kthread+0x10/0x10 [ 26.074870] ret_from_fork+0x116/0x1d0 [ 26.074890] ? __pfx_kthread+0x10/0x10 [ 26.074912] ret_from_fork_asm+0x1a/0x30 [ 26.074945] </TASK> [ 26.074959] [ 26.087368] Allocated by task 223: [ 26.087971] kasan_save_stack+0x45/0x70 [ 26.088573] kasan_save_track+0x18/0x40 [ 26.089048] kasan_save_alloc_info+0x3b/0x50 [ 26.089421] __kasan_kmalloc+0xb7/0xc0 [ 26.089805] __kmalloc_cache_noprof+0x189/0x420 [ 26.090490] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.090889] kunit_try_run_case+0x1a5/0x480 [ 26.091095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.091528] kthread+0x337/0x6f0 [ 26.091862] ret_from_fork+0x116/0x1d0 [ 26.092451] ret_from_fork_asm+0x1a/0x30 [ 26.092864] [ 26.093033] The buggy address belongs to the object at ffff88810232a200 [ 26.093033] which belongs to the cache kmalloc-128 of size 128 [ 26.094368] The buggy address is located 5 bytes to the right of [ 26.094368] allocated 115-byte region [ffff88810232a200, ffff88810232a273) [ 26.095227] [ 26.095391] The buggy address belongs to the physical page: [ 26.095611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.096216] flags: 0x200000000000000(node=0|zone=2) [ 26.097042] page_type: f5(slab) [ 26.097917] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.098462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.099170] page dumped because: kasan: bad access detected [ 26.099704] [ 26.099829] Memory state around the buggy address: [ 26.100319] ffff88810232a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.100693] ffff88810232a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.101203] >ffff88810232a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.101914] ^ [ 26.102665] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.103140] ffff88810232a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.103674] ================================================================== [ 26.104780] ================================================================== [ 26.105042] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.105223] Read of size 1 at addr ffff88810232a27f by task kunit_try_catch/223 [ 26.105366] [ 26.105472] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.105561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.105586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.105629] Call Trace: [ 26.105710] <TASK> [ 26.105765] dump_stack_lvl+0x73/0xb0 [ 26.105844] print_report+0xd1/0x650 [ 26.105894] ? __virt_addr_valid+0x1db/0x2d0 [ 26.105946] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.105996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.106059] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.106101] kasan_report+0x141/0x180 [ 26.106144] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.106197] __asan_report_load1_noabort+0x18/0x20 [ 26.106245] ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.106290] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.106327] ? finish_task_switch.isra.0+0x153/0x700 [ 26.106365] ? __switch_to+0x47/0xf50 [ 26.106411] ? __schedule+0x10cc/0x2b60 [ 26.106461] ? __pfx_read_tsc+0x10/0x10 [ 26.106501] ? ktime_get_ts64+0x86/0x230 [ 26.106551] kunit_try_run_case+0x1a5/0x480 [ 26.106596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.106638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.106677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.106716] ? __kthread_parkme+0x82/0x180 [ 26.106757] ? preempt_count_sub+0x50/0x80 [ 26.106803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.106849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.106902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.106949] kthread+0x337/0x6f0 [ 26.106993] ? trace_preempt_on+0x20/0xc0 [ 26.107045] ? __pfx_kthread+0x10/0x10 [ 26.107088] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.107130] ? calculate_sigpending+0x7b/0xa0 [ 26.107177] ? __pfx_kthread+0x10/0x10 [ 26.107222] ret_from_fork+0x116/0x1d0 [ 26.107263] ? __pfx_kthread+0x10/0x10 [ 26.107308] ret_from_fork_asm+0x1a/0x30 [ 26.107368] </TASK> [ 26.107391] [ 26.121953] Allocated by task 223: [ 26.122362] kasan_save_stack+0x45/0x70 [ 26.122852] kasan_save_track+0x18/0x40 [ 26.123163] kasan_save_alloc_info+0x3b/0x50 [ 26.123485] __kasan_kmalloc+0xb7/0xc0 [ 26.123849] __kmalloc_cache_noprof+0x189/0x420 [ 26.124134] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.124522] kunit_try_run_case+0x1a5/0x480 [ 26.124952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.125505] kthread+0x337/0x6f0 [ 26.126481] ret_from_fork+0x116/0x1d0 [ 26.126909] ret_from_fork_asm+0x1a/0x30 [ 26.127429] [ 26.127654] The buggy address belongs to the object at ffff88810232a200 [ 26.127654] which belongs to the cache kmalloc-128 of size 128 [ 26.128713] The buggy address is located 12 bytes to the right of [ 26.128713] allocated 115-byte region [ffff88810232a200, ffff88810232a273) [ 26.129611] [ 26.129803] The buggy address belongs to the physical page: [ 26.130310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.130793] flags: 0x200000000000000(node=0|zone=2) [ 26.131318] page_type: f5(slab) [ 26.131717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.132552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.132851] page dumped because: kasan: bad access detected [ 26.133104] [ 26.134127] Memory state around the buggy address: [ 26.134574] ffff88810232a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.135454] ffff88810232a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.135984] >ffff88810232a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.136747] ^ [ 26.137730] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.138414] ffff88810232a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.138965] ==================================================================