Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.501230] ================================================================== [ 29.501486] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.501556] Read of size 1 at addr fff00000c5998173 by task kunit_try_catch/226 [ 29.501799] [ 29.502003] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.502122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.502150] Hardware name: linux,dummy-virt (DT) [ 29.502464] Call trace: [ 29.502508] show_stack+0x20/0x38 (C) [ 29.502793] dump_stack_lvl+0x8c/0xd0 [ 29.502933] print_report+0x118/0x5d0 [ 29.502987] kasan_report+0xdc/0x128 [ 29.503032] __asan_report_load1_noabort+0x20/0x30 [ 29.503431] ksize_unpoisons_memory+0x628/0x740 [ 29.503622] kunit_try_run_case+0x170/0x3f0 [ 29.503914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.504210] kthread+0x328/0x630 [ 29.504327] ret_from_fork+0x10/0x20 [ 29.504682] [ 29.504972] Allocated by task 226: [ 29.505021] kasan_save_stack+0x3c/0x68 [ 29.505496] kasan_save_track+0x20/0x40 [ 29.505580] kasan_save_alloc_info+0x40/0x58 [ 29.506050] __kasan_kmalloc+0xd4/0xd8 [ 29.506232] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.506622] ksize_unpoisons_memory+0xc0/0x740 [ 29.507133] kunit_try_run_case+0x170/0x3f0 [ 29.507279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.507698] kthread+0x328/0x630 [ 29.507929] ret_from_fork+0x10/0x20 [ 29.507979] [ 29.508000] The buggy address belongs to the object at fff00000c5998100 [ 29.508000] which belongs to the cache kmalloc-128 of size 128 [ 29.508077] The buggy address is located 0 bytes to the right of [ 29.508077] allocated 115-byte region [fff00000c5998100, fff00000c5998173) [ 29.508366] [ 29.508477] The buggy address belongs to the physical page: [ 29.508546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.508717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.508794] page_type: f5(slab) [ 29.509073] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.509264] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.509330] page dumped because: kasan: bad access detected [ 29.509655] [ 29.509730] Memory state around the buggy address: [ 29.509893] fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.510208] fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510261] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.510524] ^ [ 29.510639] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510690] fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510744] ================================================================== [ 29.522889] ================================================================== [ 29.523098] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.523299] Read of size 1 at addr fff00000c599817f by task kunit_try_catch/226 [ 29.523363] [ 29.523397] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.523482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.523509] Hardware name: linux,dummy-virt (DT) [ 29.523540] Call trace: [ 29.523561] show_stack+0x20/0x38 (C) [ 29.523612] dump_stack_lvl+0x8c/0xd0 [ 29.524187] print_report+0x118/0x5d0 [ 29.524240] kasan_report+0xdc/0x128 [ 29.524285] __asan_report_load1_noabort+0x20/0x30 [ 29.524623] ksize_unpoisons_memory+0x690/0x740 [ 29.524808] kunit_try_run_case+0x170/0x3f0 [ 29.524962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.525144] kthread+0x328/0x630 [ 29.525191] ret_from_fork+0x10/0x20 [ 29.525423] [ 29.525598] Allocated by task 226: [ 29.525714] kasan_save_stack+0x3c/0x68 [ 29.525821] kasan_save_track+0x20/0x40 [ 29.525900] kasan_save_alloc_info+0x40/0x58 [ 29.526168] __kasan_kmalloc+0xd4/0xd8 [ 29.526333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.526439] ksize_unpoisons_memory+0xc0/0x740 [ 29.526568] kunit_try_run_case+0x170/0x3f0 [ 29.526722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.526827] kthread+0x328/0x630 [ 29.526937] ret_from_fork+0x10/0x20 [ 29.527026] [ 29.527251] The buggy address belongs to the object at fff00000c5998100 [ 29.527251] which belongs to the cache kmalloc-128 of size 128 [ 29.527426] The buggy address is located 12 bytes to the right of [ 29.527426] allocated 115-byte region [fff00000c5998100, fff00000c5998173) [ 29.527544] [ 29.527586] The buggy address belongs to the physical page: [ 29.527751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.527808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.527856] page_type: f5(slab) [ 29.527904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.527954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.528278] page dumped because: kasan: bad access detected [ 29.528350] [ 29.528433] Memory state around the buggy address: [ 29.528477] fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.528543] fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528587] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.528635] ^ [ 29.528677] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528729] fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528766] ================================================================== [ 29.513990] ================================================================== [ 29.514214] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.514277] Read of size 1 at addr fff00000c5998178 by task kunit_try_catch/226 [ 29.514556] [ 29.514621] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.514846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.514879] Hardware name: linux,dummy-virt (DT) [ 29.514917] Call trace: [ 29.514939] show_stack+0x20/0x38 (C) [ 29.515267] dump_stack_lvl+0x8c/0xd0 [ 29.515437] print_report+0x118/0x5d0 [ 29.515532] kasan_report+0xdc/0x128 [ 29.515642] __asan_report_load1_noabort+0x20/0x30 [ 29.515743] ksize_unpoisons_memory+0x618/0x740 [ 29.515816] kunit_try_run_case+0x170/0x3f0 [ 29.516019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.516273] kthread+0x328/0x630 [ 29.516349] ret_from_fork+0x10/0x20 [ 29.516527] [ 29.516606] Allocated by task 226: [ 29.516737] kasan_save_stack+0x3c/0x68 [ 29.516826] kasan_save_track+0x20/0x40 [ 29.516900] kasan_save_alloc_info+0x40/0x58 [ 29.516938] __kasan_kmalloc+0xd4/0xd8 [ 29.517121] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.517320] ksize_unpoisons_memory+0xc0/0x740 [ 29.517513] kunit_try_run_case+0x170/0x3f0 [ 29.517756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.517829] kthread+0x328/0x630 [ 29.517987] ret_from_fork+0x10/0x20 [ 29.518109] [ 29.518200] The buggy address belongs to the object at fff00000c5998100 [ 29.518200] which belongs to the cache kmalloc-128 of size 128 [ 29.518279] The buggy address is located 5 bytes to the right of [ 29.518279] allocated 115-byte region [fff00000c5998100, fff00000c5998173) [ 29.518495] [ 29.518673] The buggy address belongs to the physical page: [ 29.518849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.518988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.519129] page_type: f5(slab) [ 29.519223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.519518] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.519667] page dumped because: kasan: bad access detected [ 29.519704] [ 29.519722] Memory state around the buggy address: [ 29.519754] fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.519861] fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.519916] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.519955] ^ [ 29.520329] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.520462] fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.520622] ==================================================================
[ 24.518602] ================================================================== [ 24.519199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.519497] Read of size 1 at addr ffff8881058c1878 by task kunit_try_catch/244 [ 24.520002] [ 24.520215] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.520380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.520395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.520418] Call Trace: [ 24.520433] <TASK> [ 24.520454] dump_stack_lvl+0x73/0xb0 [ 24.520488] print_report+0xd1/0x610 [ 24.520510] ? __virt_addr_valid+0x1db/0x2d0 [ 24.520536] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.520558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.520582] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.520605] kasan_report+0x141/0x180 [ 24.520625] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.520652] __asan_report_load1_noabort+0x18/0x20 [ 24.520675] ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.520711] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.520734] ? finish_task_switch.isra.0+0x153/0x700 [ 24.520757] ? __switch_to+0x47/0xf80 [ 24.520795] ? __schedule+0x10cc/0x2b60 [ 24.520819] ? __pfx_read_tsc+0x10/0x10 [ 24.520841] ? ktime_get_ts64+0x86/0x230 [ 24.520868] kunit_try_run_case+0x1a5/0x480 [ 24.520892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.520912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.520936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.520959] ? __kthread_parkme+0x82/0x180 [ 24.520980] ? preempt_count_sub+0x50/0x80 [ 24.521002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.521022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.521047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.521070] kthread+0x337/0x6f0 [ 24.521090] ? trace_preempt_on+0x20/0xc0 [ 24.521113] ? __pfx_kthread+0x10/0x10 [ 24.521133] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.521154] ? calculate_sigpending+0x7b/0xa0 [ 24.521179] ? __pfx_kthread+0x10/0x10 [ 24.521199] ret_from_fork+0x116/0x1d0 [ 24.521218] ? __pfx_kthread+0x10/0x10 [ 24.521238] ret_from_fork_asm+0x1a/0x30 [ 24.521270] </TASK> [ 24.521282] [ 24.530557] Allocated by task 244: [ 24.530741] kasan_save_stack+0x45/0x70 [ 24.531077] kasan_save_track+0x18/0x40 [ 24.531230] kasan_save_alloc_info+0x3b/0x50 [ 24.531435] __kasan_kmalloc+0xb7/0xc0 [ 24.531596] __kmalloc_cache_noprof+0x189/0x420 [ 24.531797] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.532273] kunit_try_run_case+0x1a5/0x480 [ 24.532429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.532782] kthread+0x337/0x6f0 [ 24.532944] ret_from_fork+0x116/0x1d0 [ 24.533266] ret_from_fork_asm+0x1a/0x30 [ 24.533450] [ 24.533657] The buggy address belongs to the object at ffff8881058c1800 [ 24.533657] which belongs to the cache kmalloc-128 of size 128 [ 24.534343] The buggy address is located 5 bytes to the right of [ 24.534343] allocated 115-byte region [ffff8881058c1800, ffff8881058c1873) [ 24.534927] [ 24.535031] The buggy address belongs to the physical page: [ 24.535246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 24.535571] flags: 0x200000000000000(node=0|zone=2) [ 24.535791] page_type: f5(slab) [ 24.536318] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.536623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.537033] page dumped because: kasan: bad access detected [ 24.537219] [ 24.537312] Memory state around the buggy address: [ 24.537690] ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.538075] ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.538453] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.538889] ^ [ 24.539176] ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.539580] ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.540018] ================================================================== [ 24.541020] ================================================================== [ 24.541556] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.541991] Read of size 1 at addr ffff8881058c187f by task kunit_try_catch/244 [ 24.542453] [ 24.542564] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.542617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.542630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.542652] Call Trace: [ 24.542674] <TASK> [ 24.542708] dump_stack_lvl+0x73/0xb0 [ 24.542740] print_report+0xd1/0x610 [ 24.542762] ? __virt_addr_valid+0x1db/0x2d0 [ 24.542953] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.542979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.543004] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.543027] kasan_report+0x141/0x180 [ 24.543048] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.543075] __asan_report_load1_noabort+0x18/0x20 [ 24.543098] ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.543121] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.543142] ? finish_task_switch.isra.0+0x153/0x700 [ 24.543164] ? __switch_to+0x47/0xf80 [ 24.543190] ? __schedule+0x10cc/0x2b60 [ 24.543214] ? __pfx_read_tsc+0x10/0x10 [ 24.543236] ? ktime_get_ts64+0x86/0x230 [ 24.543261] kunit_try_run_case+0x1a5/0x480 [ 24.543283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.543302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.543325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.543349] ? __kthread_parkme+0x82/0x180 [ 24.543369] ? preempt_count_sub+0x50/0x80 [ 24.543391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.543412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.543437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.543461] kthread+0x337/0x6f0 [ 24.543480] ? trace_preempt_on+0x20/0xc0 [ 24.543503] ? __pfx_kthread+0x10/0x10 [ 24.543523] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.543545] ? calculate_sigpending+0x7b/0xa0 [ 24.543568] ? __pfx_kthread+0x10/0x10 [ 24.543589] ret_from_fork+0x116/0x1d0 [ 24.543608] ? __pfx_kthread+0x10/0x10 [ 24.543628] ret_from_fork_asm+0x1a/0x30 [ 24.543658] </TASK> [ 24.543670] [ 24.552742] Allocated by task 244: [ 24.553189] kasan_save_stack+0x45/0x70 [ 24.553383] kasan_save_track+0x18/0x40 [ 24.553522] kasan_save_alloc_info+0x3b/0x50 [ 24.553742] __kasan_kmalloc+0xb7/0xc0 [ 24.554070] __kmalloc_cache_noprof+0x189/0x420 [ 24.554266] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.554452] kunit_try_run_case+0x1a5/0x480 [ 24.554629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.555138] kthread+0x337/0x6f0 [ 24.555301] ret_from_fork+0x116/0x1d0 [ 24.555446] ret_from_fork_asm+0x1a/0x30 [ 24.555642] [ 24.555836] The buggy address belongs to the object at ffff8881058c1800 [ 24.555836] which belongs to the cache kmalloc-128 of size 128 [ 24.556415] The buggy address is located 12 bytes to the right of [ 24.556415] allocated 115-byte region [ffff8881058c1800, ffff8881058c1873) [ 24.557209] [ 24.557366] The buggy address belongs to the physical page: [ 24.557582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 24.558068] flags: 0x200000000000000(node=0|zone=2) [ 24.558358] page_type: f5(slab) [ 24.558486] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.558920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.559189] page dumped because: kasan: bad access detected [ 24.559434] [ 24.559513] Memory state around the buggy address: [ 24.560054] ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.560372] ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560743] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.561012] ^ [ 24.561421] ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.561780] ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.562114] ================================================================== [ 24.496369] ================================================================== [ 24.496833] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 24.497107] Read of size 1 at addr ffff8881058c1873 by task kunit_try_catch/244 [ 24.497529] [ 24.497620] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.497677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.497690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.497723] Call Trace: [ 24.497738] <TASK> [ 24.497759] dump_stack_lvl+0x73/0xb0 [ 24.497808] print_report+0xd1/0x610 [ 24.497832] ? __virt_addr_valid+0x1db/0x2d0 [ 24.497857] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.497879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.497905] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.497928] kasan_report+0x141/0x180 [ 24.497949] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.497976] __asan_report_load1_noabort+0x18/0x20 [ 24.497999] ksize_unpoisons_memory+0x81c/0x9b0 [ 24.498023] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.498044] ? finish_task_switch.isra.0+0x153/0x700 [ 24.498067] ? __switch_to+0x47/0xf80 [ 24.498093] ? __schedule+0x10cc/0x2b60 [ 24.498117] ? __pfx_read_tsc+0x10/0x10 [ 24.498138] ? ktime_get_ts64+0x86/0x230 [ 24.498163] kunit_try_run_case+0x1a5/0x480 [ 24.498187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.498207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.498230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.498254] ? __kthread_parkme+0x82/0x180 [ 24.498274] ? preempt_count_sub+0x50/0x80 [ 24.498297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.498318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.498342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.498367] kthread+0x337/0x6f0 [ 24.498386] ? trace_preempt_on+0x20/0xc0 [ 24.498410] ? __pfx_kthread+0x10/0x10 [ 24.498431] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.498452] ? calculate_sigpending+0x7b/0xa0 [ 24.498476] ? __pfx_kthread+0x10/0x10 [ 24.498497] ret_from_fork+0x116/0x1d0 [ 24.498516] ? __pfx_kthread+0x10/0x10 [ 24.498537] ret_from_fork_asm+0x1a/0x30 [ 24.498567] </TASK> [ 24.498579] [ 24.507661] Allocated by task 244: [ 24.507970] kasan_save_stack+0x45/0x70 [ 24.508292] kasan_save_track+0x18/0x40 [ 24.508449] kasan_save_alloc_info+0x3b/0x50 [ 24.508785] __kasan_kmalloc+0xb7/0xc0 [ 24.508988] __kmalloc_cache_noprof+0x189/0x420 [ 24.509270] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.509480] kunit_try_run_case+0x1a5/0x480 [ 24.509659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.510161] kthread+0x337/0x6f0 [ 24.510331] ret_from_fork+0x116/0x1d0 [ 24.510463] ret_from_fork_asm+0x1a/0x30 [ 24.510890] [ 24.510982] The buggy address belongs to the object at ffff8881058c1800 [ 24.510982] which belongs to the cache kmalloc-128 of size 128 [ 24.511561] The buggy address is located 0 bytes to the right of [ 24.511561] allocated 115-byte region [ffff8881058c1800, ffff8881058c1873) [ 24.512409] [ 24.512509] The buggy address belongs to the physical page: [ 24.512727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 24.513213] flags: 0x200000000000000(node=0|zone=2) [ 24.513510] page_type: f5(slab) [ 24.513718] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.514133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.514439] page dumped because: kasan: bad access detected [ 24.514660] [ 24.514739] Memory state around the buggy address: [ 24.514937] ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.515515] ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.515927] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.516301] ^ [ 24.516571] ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.517128] ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.517499] ==================================================================