Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.766705] ================================================================== [ 29.766900] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.766983] Read of size 1 at addr fff00000c9b1e373 by task kunit_try_catch/225 [ 29.767034] [ 29.767305] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.767414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.767787] Hardware name: linux,dummy-virt (DT) [ 29.767868] Call trace: [ 29.767894] show_stack+0x20/0x38 (C) [ 29.767946] dump_stack_lvl+0x8c/0xd0 [ 29.768281] print_report+0x118/0x5d0 [ 29.768359] kasan_report+0xdc/0x128 [ 29.768539] __asan_report_load1_noabort+0x20/0x30 [ 29.768626] ksize_unpoisons_memory+0x628/0x740 [ 29.768760] kunit_try_run_case+0x170/0x3f0 [ 29.768842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.768898] kthread+0x328/0x630 [ 29.768939] ret_from_fork+0x10/0x20 [ 29.768987] [ 29.769005] Allocated by task 225: [ 29.769033] kasan_save_stack+0x3c/0x68 [ 29.769434] kasan_save_track+0x20/0x40 [ 29.769508] kasan_save_alloc_info+0x40/0x58 [ 29.769546] __kasan_kmalloc+0xd4/0xd8 [ 29.769579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.769627] ksize_unpoisons_memory+0xc0/0x740 [ 29.769686] kunit_try_run_case+0x170/0x3f0 [ 29.769724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769765] kthread+0x328/0x630 [ 29.769796] ret_from_fork+0x10/0x20 [ 29.769832] [ 29.769862] The buggy address belongs to the object at fff00000c9b1e300 [ 29.769862] which belongs to the cache kmalloc-128 of size 128 [ 29.769930] The buggy address is located 0 bytes to the right of [ 29.769930] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.769994] [ 29.770021] The buggy address belongs to the physical page: [ 29.770064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.770134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.770182] page_type: f5(slab) [ 29.770221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.770282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.770323] page dumped because: kasan: bad access detected [ 29.770356] [ 29.770381] Memory state around the buggy address: [ 29.770421] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.770465] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770519] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.770568] ^ [ 29.770617] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770662] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770710] ================================================================== [ 29.773355] ================================================================== [ 29.773418] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.773792] Read of size 1 at addr fff00000c9b1e378 by task kunit_try_catch/225 [ 29.774450] [ 29.774507] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.774607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.774646] Hardware name: linux,dummy-virt (DT) [ 29.774685] Call trace: [ 29.774708] show_stack+0x20/0x38 (C) [ 29.774760] dump_stack_lvl+0x8c/0xd0 [ 29.774937] print_report+0x118/0x5d0 [ 29.774999] kasan_report+0xdc/0x128 [ 29.775197] __asan_report_load1_noabort+0x20/0x30 [ 29.775261] ksize_unpoisons_memory+0x618/0x740 [ 29.775313] kunit_try_run_case+0x170/0x3f0 [ 29.775639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.775736] kthread+0x328/0x630 [ 29.775979] ret_from_fork+0x10/0x20 [ 29.776046] [ 29.776117] Allocated by task 225: [ 29.776303] kasan_save_stack+0x3c/0x68 [ 29.776632] kasan_save_track+0x20/0x40 [ 29.776685] kasan_save_alloc_info+0x40/0x58 [ 29.776790] __kasan_kmalloc+0xd4/0xd8 [ 29.776867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.777008] ksize_unpoisons_memory+0xc0/0x740 [ 29.777115] kunit_try_run_case+0x170/0x3f0 [ 29.777195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.777239] kthread+0x328/0x630 [ 29.777421] ret_from_fork+0x10/0x20 [ 29.777601] [ 29.777629] The buggy address belongs to the object at fff00000c9b1e300 [ 29.777629] which belongs to the cache kmalloc-128 of size 128 [ 29.778082] The buggy address is located 5 bytes to the right of [ 29.778082] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.778226] [ 29.778285] The buggy address belongs to the physical page: [ 29.778350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.778480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.778559] page_type: f5(slab) [ 29.778613] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.778738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.778885] page dumped because: kasan: bad access detected [ 29.778943] [ 29.778989] Memory state around the buggy address: [ 29.779027] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.779228] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.779446] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.779540] ^ [ 29.779613] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780097] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780236] ================================================================== [ 29.781719] ================================================================== [ 29.781843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.781928] Read of size 1 at addr fff00000c9b1e37f by task kunit_try_catch/225 [ 29.781978] [ 29.782139] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.782225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.782251] Hardware name: linux,dummy-virt (DT) [ 29.782575] Call trace: [ 29.782635] show_stack+0x20/0x38 (C) [ 29.782748] dump_stack_lvl+0x8c/0xd0 [ 29.782804] print_report+0x118/0x5d0 [ 29.782850] kasan_report+0xdc/0x128 [ 29.783089] __asan_report_load1_noabort+0x20/0x30 [ 29.783220] ksize_unpoisons_memory+0x690/0x740 [ 29.783280] kunit_try_run_case+0x170/0x3f0 [ 29.783477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.783561] kthread+0x328/0x630 [ 29.783605] ret_from_fork+0x10/0x20 [ 29.783891] [ 29.783922] Allocated by task 225: [ 29.783961] kasan_save_stack+0x3c/0x68 [ 29.784100] kasan_save_track+0x20/0x40 [ 29.784141] kasan_save_alloc_info+0x40/0x58 [ 29.784205] __kasan_kmalloc+0xd4/0xd8 [ 29.784363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.784571] ksize_unpoisons_memory+0xc0/0x740 [ 29.784652] kunit_try_run_case+0x170/0x3f0 [ 29.784715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.784761] kthread+0x328/0x630 [ 29.784795] ret_from_fork+0x10/0x20 [ 29.785274] [ 29.785379] The buggy address belongs to the object at fff00000c9b1e300 [ 29.785379] which belongs to the cache kmalloc-128 of size 128 [ 29.785452] The buggy address is located 12 bytes to the right of [ 29.785452] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.785531] [ 29.785586] The buggy address belongs to the physical page: [ 29.785624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.785680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.785727] page_type: f5(slab) [ 29.785767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.785817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.785859] page dumped because: kasan: bad access detected [ 29.785898] [ 29.785917] Memory state around the buggy address: [ 29.785946] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.785990] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786042] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.786106] ^ [ 29.786148] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786190] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786228] ==================================================================
[ 26.097366] ================================================================== [ 26.097604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.097836] Read of size 1 at addr ffff88810553d87f by task kunit_try_catch/243 [ 26.098058] [ 26.098940] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.098997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.099010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.099031] Call Trace: [ 26.099054] <TASK> [ 26.099068] dump_stack_lvl+0x73/0xb0 [ 26.099108] print_report+0xd1/0x610 [ 26.099130] ? __virt_addr_valid+0x1db/0x2d0 [ 26.099153] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.099176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.099202] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.099225] kasan_report+0x141/0x180 [ 26.099247] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.099306] __asan_report_load1_noabort+0x18/0x20 [ 26.099358] ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.099382] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.099404] ? finish_task_switch.isra.0+0x153/0x700 [ 26.099425] ? __switch_to+0x47/0xf80 [ 26.099450] ? __schedule+0x10c6/0x2b60 [ 26.099473] ? __pfx_read_tsc+0x10/0x10 [ 26.099493] ? ktime_get_ts64+0x86/0x230 [ 26.099517] kunit_try_run_case+0x1a5/0x480 [ 26.099540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.099562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.099584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.099607] ? __kthread_parkme+0x82/0x180 [ 26.099630] ? preempt_count_sub+0x50/0x80 [ 26.099652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.099676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.099698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.099721] kthread+0x337/0x6f0 [ 26.099740] ? trace_preempt_on+0x20/0xc0 [ 26.099763] ? __pfx_kthread+0x10/0x10 [ 26.099783] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.099804] ? calculate_sigpending+0x7b/0xa0 [ 26.099827] ? __pfx_kthread+0x10/0x10 [ 26.099847] ret_from_fork+0x116/0x1d0 [ 26.099866] ? __pfx_kthread+0x10/0x10 [ 26.099885] ret_from_fork_asm+0x1a/0x30 [ 26.099917] </TASK> [ 26.099927] [ 26.112138] Allocated by task 243: [ 26.112285] kasan_save_stack+0x45/0x70 [ 26.113011] kasan_save_track+0x18/0x40 [ 26.113404] kasan_save_alloc_info+0x3b/0x50 [ 26.113787] __kasan_kmalloc+0xb7/0xc0 [ 26.113916] __kmalloc_cache_noprof+0x189/0x420 [ 26.114068] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.114221] kunit_try_run_case+0x1a5/0x480 [ 26.114717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.115201] kthread+0x337/0x6f0 [ 26.115582] ret_from_fork+0x116/0x1d0 [ 26.115923] ret_from_fork_asm+0x1a/0x30 [ 26.116335] [ 26.116488] The buggy address belongs to the object at ffff88810553d800 [ 26.116488] which belongs to the cache kmalloc-128 of size 128 [ 26.117622] The buggy address is located 12 bytes to the right of [ 26.117622] allocated 115-byte region [ffff88810553d800, ffff88810553d873) [ 26.118158] [ 26.118224] The buggy address belongs to the physical page: [ 26.118930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.119720] flags: 0x200000000000000(node=0|zone=2) [ 26.120229] page_type: f5(slab) [ 26.120534] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.121248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.121643] page dumped because: kasan: bad access detected [ 26.121977] [ 26.122039] Memory state around the buggy address: [ 26.122198] ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.122651] ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.122874] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.123499] ^ [ 26.124198] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.124828] ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.125508] ================================================================== [ 26.076361] ================================================================== [ 26.076695] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.076989] Read of size 1 at addr ffff88810553d878 by task kunit_try_catch/243 [ 26.077229] [ 26.077542] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.077591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.077602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.077622] Call Trace: [ 26.077636] <TASK> [ 26.077650] dump_stack_lvl+0x73/0xb0 [ 26.077679] print_report+0xd1/0x610 [ 26.077700] ? __virt_addr_valid+0x1db/0x2d0 [ 26.077723] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.077745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.077771] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.077794] kasan_report+0x141/0x180 [ 26.077815] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.077843] __asan_report_load1_noabort+0x18/0x20 [ 26.077867] ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.077891] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.077913] ? finish_task_switch.isra.0+0x153/0x700 [ 26.077938] ? __switch_to+0x47/0xf80 [ 26.077963] ? __schedule+0x10c6/0x2b60 [ 26.077986] ? __pfx_read_tsc+0x10/0x10 [ 26.078006] ? ktime_get_ts64+0x86/0x230 [ 26.078030] kunit_try_run_case+0x1a5/0x480 [ 26.078053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.078074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.078107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.078131] ? __kthread_parkme+0x82/0x180 [ 26.078154] ? preempt_count_sub+0x50/0x80 [ 26.078176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.078199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.078222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.078480] kthread+0x337/0x6f0 [ 26.078507] ? trace_preempt_on+0x20/0xc0 [ 26.078531] ? __pfx_kthread+0x10/0x10 [ 26.078551] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.078573] ? calculate_sigpending+0x7b/0xa0 [ 26.078596] ? __pfx_kthread+0x10/0x10 [ 26.078617] ret_from_fork+0x116/0x1d0 [ 26.078636] ? __pfx_kthread+0x10/0x10 [ 26.078656] ret_from_fork_asm+0x1a/0x30 [ 26.078687] </TASK> [ 26.078696] [ 26.086335] Allocated by task 243: [ 26.086488] kasan_save_stack+0x45/0x70 [ 26.086677] kasan_save_track+0x18/0x40 [ 26.086853] kasan_save_alloc_info+0x3b/0x50 [ 26.087056] __kasan_kmalloc+0xb7/0xc0 [ 26.087245] __kmalloc_cache_noprof+0x189/0x420 [ 26.088156] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.088602] kunit_try_run_case+0x1a5/0x480 [ 26.088795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.089027] kthread+0x337/0x6f0 [ 26.089206] ret_from_fork+0x116/0x1d0 [ 26.089452] ret_from_fork_asm+0x1a/0x30 [ 26.090139] [ 26.090226] The buggy address belongs to the object at ffff88810553d800 [ 26.090226] which belongs to the cache kmalloc-128 of size 128 [ 26.090731] The buggy address is located 5 bytes to the right of [ 26.090731] allocated 115-byte region [ffff88810553d800, ffff88810553d873) [ 26.091236] [ 26.091792] The buggy address belongs to the physical page: [ 26.092009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.092368] flags: 0x200000000000000(node=0|zone=2) [ 26.092693] page_type: f5(slab) [ 26.092853] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.093160] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.093589] page dumped because: kasan: bad access detected [ 26.093838] [ 26.093911] Memory state around the buggy address: [ 26.094128] ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.094559] ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.094863] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.095156] ^ [ 26.095537] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.095834] ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.096128] ================================================================== [ 26.052681] ================================================================== [ 26.053218] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 26.054460] Read of size 1 at addr ffff88810553d873 by task kunit_try_catch/243 [ 26.055584] [ 26.055740] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.055796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.055809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.055830] Call Trace: [ 26.055842] <TASK> [ 26.055857] dump_stack_lvl+0x73/0xb0 [ 26.055888] print_report+0xd1/0x610 [ 26.055910] ? __virt_addr_valid+0x1db/0x2d0 [ 26.055934] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.056097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.056128] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.056151] kasan_report+0x141/0x180 [ 26.056173] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.056201] __asan_report_load1_noabort+0x18/0x20 [ 26.056224] ksize_unpoisons_memory+0x81c/0x9b0 [ 26.056282] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.056306] ? finish_task_switch.isra.0+0x153/0x700 [ 26.056328] ? __switch_to+0x47/0xf80 [ 26.056354] ? __schedule+0x10c6/0x2b60 [ 26.056377] ? __pfx_read_tsc+0x10/0x10 [ 26.056398] ? ktime_get_ts64+0x86/0x230 [ 26.056422] kunit_try_run_case+0x1a5/0x480 [ 26.056446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.056467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.056490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.056513] ? __kthread_parkme+0x82/0x180 [ 26.056536] ? preempt_count_sub+0x50/0x80 [ 26.056558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.056581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.056604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.056627] kthread+0x337/0x6f0 [ 26.056645] ? trace_preempt_on+0x20/0xc0 [ 26.056670] ? __pfx_kthread+0x10/0x10 [ 26.056691] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.056712] ? calculate_sigpending+0x7b/0xa0 [ 26.056736] ? __pfx_kthread+0x10/0x10 [ 26.056756] ret_from_fork+0x116/0x1d0 [ 26.056775] ? __pfx_kthread+0x10/0x10 [ 26.056794] ret_from_fork_asm+0x1a/0x30 [ 26.056825] </TASK> [ 26.056836] [ 26.067043] Allocated by task 243: [ 26.067182] kasan_save_stack+0x45/0x70 [ 26.067402] kasan_save_track+0x18/0x40 [ 26.067959] kasan_save_alloc_info+0x3b/0x50 [ 26.068132] __kasan_kmalloc+0xb7/0xc0 [ 26.068743] __kmalloc_cache_noprof+0x189/0x420 [ 26.068942] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.069147] kunit_try_run_case+0x1a5/0x480 [ 26.069316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.069641] kthread+0x337/0x6f0 [ 26.069799] ret_from_fork+0x116/0x1d0 [ 26.069932] ret_from_fork_asm+0x1a/0x30 [ 26.070126] [ 26.070214] The buggy address belongs to the object at ffff88810553d800 [ 26.070214] which belongs to the cache kmalloc-128 of size 128 [ 26.070737] The buggy address is located 0 bytes to the right of [ 26.070737] allocated 115-byte region [ffff88810553d800, ffff88810553d873) [ 26.071196] [ 26.071346] The buggy address belongs to the physical page: [ 26.071630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.071937] flags: 0x200000000000000(node=0|zone=2) [ 26.072128] page_type: f5(slab) [ 26.072244] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.072671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.072903] page dumped because: kasan: bad access detected [ 26.073215] [ 26.073349] Memory state around the buggy address: [ 26.073700] ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.073911] ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.074238] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.074830] ^ [ 26.075133] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.075437] ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.075782] ==================================================================