Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.359464] ================================================================== [ 31.359878] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.360023] Read of size 1 at addr fff00000c9a9c77f by task kunit_try_catch/225 [ 31.360073] [ 31.360102] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.360229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.360257] Hardware name: linux,dummy-virt (DT) [ 31.360286] Call trace: [ 31.360309] show_stack+0x20/0x38 (C) [ 31.360356] dump_stack_lvl+0x8c/0xd0 [ 31.360412] print_report+0x118/0x5d0 [ 31.360459] kasan_report+0xdc/0x128 [ 31.360506] __asan_report_load1_noabort+0x20/0x30 [ 31.360569] ksize_unpoisons_memory+0x690/0x740 [ 31.360662] kunit_try_run_case+0x170/0x3f0 [ 31.360756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.360862] kthread+0x328/0x630 [ 31.360954] ret_from_fork+0x10/0x20 [ 31.361051] [ 31.361124] Allocated by task 225: [ 31.361229] kasan_save_stack+0x3c/0x68 [ 31.361297] kasan_save_track+0x20/0x40 [ 31.361389] kasan_save_alloc_info+0x40/0x58 [ 31.361458] __kasan_kmalloc+0xd4/0xd8 [ 31.361568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.361629] ksize_unpoisons_memory+0xc0/0x740 [ 31.361669] kunit_try_run_case+0x170/0x3f0 [ 31.361708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.361753] kthread+0x328/0x630 [ 31.361785] ret_from_fork+0x10/0x20 [ 31.361962] [ 31.361982] The buggy address belongs to the object at fff00000c9a9c700 [ 31.361982] which belongs to the cache kmalloc-128 of size 128 [ 31.362041] The buggy address is located 12 bytes to the right of [ 31.362041] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.362159] [ 31.362235] The buggy address belongs to the physical page: [ 31.362277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.362340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.362420] page_type: f5(slab) [ 31.362520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.362590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.362650] page dumped because: kasan: bad access detected [ 31.362679] [ 31.362711] Memory state around the buggy address: [ 31.362760] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.362829] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.362912] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.362983] ^ [ 31.363082] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.363142] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.363180] ================================================================== [ 31.352273] ================================================================== [ 31.352594] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.352817] Read of size 1 at addr fff00000c9a9c773 by task kunit_try_catch/225 [ 31.352893] [ 31.352955] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.353068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.353117] Hardware name: linux,dummy-virt (DT) [ 31.353148] Call trace: [ 31.353172] show_stack+0x20/0x38 (C) [ 31.353352] dump_stack_lvl+0x8c/0xd0 [ 31.353403] print_report+0x118/0x5d0 [ 31.353452] kasan_report+0xdc/0x128 [ 31.353498] __asan_report_load1_noabort+0x20/0x30 [ 31.353545] ksize_unpoisons_memory+0x628/0x740 [ 31.353644] kunit_try_run_case+0x170/0x3f0 [ 31.353774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.353829] kthread+0x328/0x630 [ 31.353871] ret_from_fork+0x10/0x20 [ 31.354063] [ 31.354084] Allocated by task 225: [ 31.354113] kasan_save_stack+0x3c/0x68 [ 31.354173] kasan_save_track+0x20/0x40 [ 31.354313] kasan_save_alloc_info+0x40/0x58 [ 31.354382] __kasan_kmalloc+0xd4/0xd8 [ 31.354461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.354560] ksize_unpoisons_memory+0xc0/0x740 [ 31.354630] kunit_try_run_case+0x170/0x3f0 [ 31.354738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.354807] kthread+0x328/0x630 [ 31.354885] ret_from_fork+0x10/0x20 [ 31.354988] [ 31.355038] The buggy address belongs to the object at fff00000c9a9c700 [ 31.355038] which belongs to the cache kmalloc-128 of size 128 [ 31.355273] The buggy address is located 0 bytes to the right of [ 31.355273] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.355339] [ 31.355360] The buggy address belongs to the physical page: [ 31.355391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.355472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.355552] page_type: f5(slab) [ 31.355675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.355756] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.355814] page dumped because: kasan: bad access detected [ 31.355875] [ 31.355915] Memory state around the buggy address: [ 31.356023] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.356112] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356250] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.356289] ^ [ 31.356373] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356541] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356581] ================================================================== [ 31.357104] ================================================================== [ 31.357160] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.357224] Read of size 1 at addr fff00000c9a9c778 by task kunit_try_catch/225 [ 31.357280] [ 31.357318] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.357439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.357467] Hardware name: linux,dummy-virt (DT) [ 31.357515] Call trace: [ 31.357545] show_stack+0x20/0x38 (C) [ 31.357595] dump_stack_lvl+0x8c/0xd0 [ 31.357654] print_report+0x118/0x5d0 [ 31.357712] kasan_report+0xdc/0x128 [ 31.357760] __asan_report_load1_noabort+0x20/0x30 [ 31.357818] ksize_unpoisons_memory+0x618/0x740 [ 31.357873] kunit_try_run_case+0x170/0x3f0 [ 31.357930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.357984] kthread+0x328/0x630 [ 31.358027] ret_from_fork+0x10/0x20 [ 31.358075] [ 31.358092] Allocated by task 225: [ 31.358118] kasan_save_stack+0x3c/0x68 [ 31.358158] kasan_save_track+0x20/0x40 [ 31.358202] kasan_save_alloc_info+0x40/0x58 [ 31.358251] __kasan_kmalloc+0xd4/0xd8 [ 31.358294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.358336] ksize_unpoisons_memory+0xc0/0x740 [ 31.358375] kunit_try_run_case+0x170/0x3f0 [ 31.358420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.358464] kthread+0x328/0x630 [ 31.358496] ret_from_fork+0x10/0x20 [ 31.358532] [ 31.358563] The buggy address belongs to the object at fff00000c9a9c700 [ 31.358563] which belongs to the cache kmalloc-128 of size 128 [ 31.358625] The buggy address is located 5 bytes to the right of [ 31.358625] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.358706] [ 31.358738] The buggy address belongs to the physical page: [ 31.358769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.358831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.358878] page_type: f5(slab) [ 31.358916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.358966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.359006] page dumped because: kasan: bad access detected [ 31.359043] [ 31.359067] Memory state around the buggy address: [ 31.359096] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.359140] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359187] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.359233] ^ [ 31.359273] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359314] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359352] ==================================================================
[ 23.736019] ================================================================== [ 23.736542] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 23.736871] Read of size 1 at addr ffff8881062af073 by task kunit_try_catch/242 [ 23.737341] [ 23.737474] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 23.737553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.737566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.737682] Call Trace: [ 23.737862] <TASK> [ 23.737885] dump_stack_lvl+0x73/0xb0 [ 23.737919] print_report+0xd1/0x610 [ 23.737943] ? __virt_addr_valid+0x1db/0x2d0 [ 23.737969] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.737993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.738021] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.738046] kasan_report+0x141/0x180 [ 23.738069] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.738097] __asan_report_load1_noabort+0x18/0x20 [ 23.738124] ksize_unpoisons_memory+0x81c/0x9b0 [ 23.738150] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.738174] ? finish_task_switch.isra.0+0x153/0x700 [ 23.738197] ? __switch_to+0x47/0xf50 [ 23.738228] ? __schedule+0x10cc/0x2b60 [ 23.738270] ? __pfx_read_tsc+0x10/0x10 [ 23.738296] ? ktime_get_ts64+0x86/0x230 [ 23.738323] kunit_try_run_case+0x1a5/0x480 [ 23.738347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.738367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.738389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.738418] ? __kthread_parkme+0x82/0x180 [ 23.738440] ? preempt_count_sub+0x50/0x80 [ 23.738464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.738485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.738512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.738539] kthread+0x337/0x6f0 [ 23.738564] ? trace_preempt_on+0x20/0xc0 [ 23.738592] ? __pfx_kthread+0x10/0x10 [ 23.738616] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.738644] ? calculate_sigpending+0x7b/0xa0 [ 23.738672] ? __pfx_kthread+0x10/0x10 [ 23.738697] ret_from_fork+0x116/0x1d0 [ 23.738716] ? __pfx_kthread+0x10/0x10 [ 23.738739] ret_from_fork_asm+0x1a/0x30 [ 23.738948] </TASK> [ 23.738969] [ 23.748924] Allocated by task 242: [ 23.749097] kasan_save_stack+0x45/0x70 [ 23.749471] kasan_save_track+0x18/0x40 [ 23.749728] kasan_save_alloc_info+0x3b/0x50 [ 23.750092] __kasan_kmalloc+0xb7/0xc0 [ 23.750279] __kmalloc_cache_noprof+0x189/0x420 [ 23.750491] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.750682] kunit_try_run_case+0x1a5/0x480 [ 23.751136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.751353] kthread+0x337/0x6f0 [ 23.751522] ret_from_fork+0x116/0x1d0 [ 23.752212] ret_from_fork_asm+0x1a/0x30 [ 23.752408] [ 23.752605] The buggy address belongs to the object at ffff8881062af000 [ 23.752605] which belongs to the cache kmalloc-128 of size 128 [ 23.753649] The buggy address is located 0 bytes to the right of [ 23.753649] allocated 115-byte region [ffff8881062af000, ffff8881062af073) [ 23.754620] [ 23.754719] The buggy address belongs to the physical page: [ 23.755152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 23.755512] flags: 0x200000000000000(node=0|zone=2) [ 23.755723] page_type: f5(slab) [ 23.756098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.756423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.756865] page dumped because: kasan: bad access detected [ 23.757083] [ 23.757565] Memory state around the buggy address: [ 23.757765] ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.758422] ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.758881] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.759166] ^ [ 23.759450] ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.759737] ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.760505] ================================================================== [ 23.791686] ================================================================== [ 23.791947] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.792615] Read of size 1 at addr ffff8881062af07f by task kunit_try_catch/242 [ 23.793030] [ 23.793317] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 23.793373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.793385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.793407] Call Trace: [ 23.793429] <TASK> [ 23.793449] dump_stack_lvl+0x73/0xb0 [ 23.793481] print_report+0xd1/0x610 [ 23.793505] ? __virt_addr_valid+0x1db/0x2d0 [ 23.793530] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.793554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.793582] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.793606] kasan_report+0x141/0x180 [ 23.793628] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.793657] __asan_report_load1_noabort+0x18/0x20 [ 23.793683] ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.793708] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.793731] ? finish_task_switch.isra.0+0x153/0x700 [ 23.793754] ? __switch_to+0x47/0xf50 [ 23.793832] ? __schedule+0x10cc/0x2b60 [ 23.793862] ? __pfx_read_tsc+0x10/0x10 [ 23.793887] ? ktime_get_ts64+0x86/0x230 [ 23.793915] kunit_try_run_case+0x1a5/0x480 [ 23.793938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.793959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.793981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.794025] ? __kthread_parkme+0x82/0x180 [ 23.794046] ? preempt_count_sub+0x50/0x80 [ 23.794070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.794092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.794118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.794144] kthread+0x337/0x6f0 [ 23.794166] ? trace_preempt_on+0x20/0xc0 [ 23.794192] ? __pfx_kthread+0x10/0x10 [ 23.794214] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.794252] ? calculate_sigpending+0x7b/0xa0 [ 23.794280] ? __pfx_kthread+0x10/0x10 [ 23.794304] ret_from_fork+0x116/0x1d0 [ 23.794323] ? __pfx_kthread+0x10/0x10 [ 23.794345] ret_from_fork_asm+0x1a/0x30 [ 23.794380] </TASK> [ 23.794392] [ 23.803869] Allocated by task 242: [ 23.804109] kasan_save_stack+0x45/0x70 [ 23.804280] kasan_save_track+0x18/0x40 [ 23.804532] kasan_save_alloc_info+0x3b/0x50 [ 23.804815] __kasan_kmalloc+0xb7/0xc0 [ 23.804997] __kmalloc_cache_noprof+0x189/0x420 [ 23.805180] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.805338] kunit_try_run_case+0x1a5/0x480 [ 23.805498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.805751] kthread+0x337/0x6f0 [ 23.806012] ret_from_fork+0x116/0x1d0 [ 23.806323] ret_from_fork_asm+0x1a/0x30 [ 23.807417] [ 23.807500] The buggy address belongs to the object at ffff8881062af000 [ 23.807500] which belongs to the cache kmalloc-128 of size 128 [ 23.808333] The buggy address is located 12 bytes to the right of [ 23.808333] allocated 115-byte region [ffff8881062af000, ffff8881062af073) [ 23.808859] [ 23.809308] The buggy address belongs to the physical page: [ 23.809636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 23.810260] flags: 0x200000000000000(node=0|zone=2) [ 23.810547] page_type: f5(slab) [ 23.810739] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.811487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.811983] page dumped because: kasan: bad access detected [ 23.812378] [ 23.812611] Memory state around the buggy address: [ 23.812896] ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.813450] ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.813866] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.814325] ^ [ 23.814647] ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.815361] ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.815791] ================================================================== [ 23.761580] ================================================================== [ 23.762003] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.762421] Read of size 1 at addr ffff8881062af078 by task kunit_try_catch/242 [ 23.762945] [ 23.763134] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 23.763266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.763280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.763303] Call Trace: [ 23.763323] <TASK> [ 23.763343] dump_stack_lvl+0x73/0xb0 [ 23.763377] print_report+0xd1/0x610 [ 23.763400] ? __virt_addr_valid+0x1db/0x2d0 [ 23.763424] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.763448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.763477] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.763501] kasan_report+0x141/0x180 [ 23.763523] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.763552] __asan_report_load1_noabort+0x18/0x20 [ 23.763578] ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.763603] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.763627] ? finish_task_switch.isra.0+0x153/0x700 [ 23.763649] ? __switch_to+0x47/0xf50 [ 23.763678] ? __schedule+0x10cc/0x2b60 [ 23.763708] ? __pfx_read_tsc+0x10/0x10 [ 23.763732] ? ktime_get_ts64+0x86/0x230 [ 23.763772] kunit_try_run_case+0x1a5/0x480 [ 23.763795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.763865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.763893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.763923] ? __kthread_parkme+0x82/0x180 [ 23.763945] ? preempt_count_sub+0x50/0x80 [ 23.763968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.763991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.764018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.764045] kthread+0x337/0x6f0 [ 23.764068] ? trace_preempt_on+0x20/0xc0 [ 23.764094] ? __pfx_kthread+0x10/0x10 [ 23.764118] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.764145] ? calculate_sigpending+0x7b/0xa0 [ 23.764173] ? __pfx_kthread+0x10/0x10 [ 23.764197] ret_from_fork+0x116/0x1d0 [ 23.764218] ? __pfx_kthread+0x10/0x10 [ 23.764251] ret_from_fork_asm+0x1a/0x30 [ 23.764286] </TASK> [ 23.764297] [ 23.775415] Allocated by task 242: [ 23.775562] kasan_save_stack+0x45/0x70 [ 23.775719] kasan_save_track+0x18/0x40 [ 23.775857] kasan_save_alloc_info+0x3b/0x50 [ 23.776004] __kasan_kmalloc+0xb7/0xc0 [ 23.776129] __kmalloc_cache_noprof+0x189/0x420 [ 23.776362] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.776576] kunit_try_run_case+0x1a5/0x480 [ 23.777653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.777842] kthread+0x337/0x6f0 [ 23.778438] ret_from_fork+0x116/0x1d0 [ 23.779101] ret_from_fork_asm+0x1a/0x30 [ 23.780805] [ 23.780949] The buggy address belongs to the object at ffff8881062af000 [ 23.780949] which belongs to the cache kmalloc-128 of size 128 [ 23.781473] The buggy address is located 5 bytes to the right of [ 23.781473] allocated 115-byte region [ffff8881062af000, ffff8881062af073) [ 23.783285] [ 23.783493] The buggy address belongs to the physical page: [ 23.784593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 23.785484] flags: 0x200000000000000(node=0|zone=2) [ 23.786019] page_type: f5(slab) [ 23.786203] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.786596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.787284] page dumped because: kasan: bad access detected [ 23.787634] [ 23.787727] Memory state around the buggy address: [ 23.788183] ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.788593] ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.789132] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.789553] ^ [ 23.789973] ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.790290] ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.790598] ==================================================================