Date
July 18, 2025, 1:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.732425] ================================================================== [ 31.732501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.732553] Read of size 1 at addr fff00000c3efdd7f by task kunit_try_catch/225 [ 31.732622] [ 31.732971] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.733129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.733178] Hardware name: linux,dummy-virt (DT) [ 31.733226] Call trace: [ 31.733253] show_stack+0x20/0x38 (C) [ 31.733544] dump_stack_lvl+0x8c/0xd0 [ 31.733644] print_report+0x118/0x5e8 [ 31.733727] kasan_report+0xdc/0x128 [ 31.733794] __asan_report_load1_noabort+0x20/0x30 [ 31.733845] ksize_unpoisons_memory+0x690/0x740 [ 31.734150] kunit_try_run_case+0x170/0x3f0 [ 31.734236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.734290] kthread+0x328/0x630 [ 31.734365] ret_from_fork+0x10/0x20 [ 31.734417] [ 31.734435] Allocated by task 225: [ 31.734492] kasan_save_stack+0x3c/0x68 [ 31.734537] kasan_save_track+0x20/0x40 [ 31.734572] kasan_save_alloc_info+0x40/0x58 [ 31.734867] __kasan_kmalloc+0xd4/0xd8 [ 31.734943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.735072] ksize_unpoisons_memory+0xc0/0x740 [ 31.735128] kunit_try_run_case+0x170/0x3f0 [ 31.735163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.735210] kthread+0x328/0x630 [ 31.735408] ret_from_fork+0x10/0x20 [ 31.735469] [ 31.735615] The buggy address belongs to the object at fff00000c3efdd00 [ 31.735615] which belongs to the cache kmalloc-128 of size 128 [ 31.735681] The buggy address is located 12 bytes to the right of [ 31.735681] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.736057] [ 31.736156] The buggy address belongs to the physical page: [ 31.736190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.736246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.736304] page_type: f5(slab) [ 31.736342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.736634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.736813] page dumped because: kasan: bad access detected [ 31.737016] [ 31.737074] Memory state around the buggy address: [ 31.737346] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.737509] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.737643] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.737683] ^ [ 31.738005] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.738102] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.738223] ================================================================== [ 31.727015] ================================================================== [ 31.727065] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.727128] Read of size 1 at addr fff00000c3efdd78 by task kunit_try_catch/225 [ 31.727384] [ 31.727426] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.727531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.727567] Hardware name: linux,dummy-virt (DT) [ 31.727598] Call trace: [ 31.727621] show_stack+0x20/0x38 (C) [ 31.727668] dump_stack_lvl+0x8c/0xd0 [ 31.727717] print_report+0x118/0x5e8 [ 31.727760] kasan_report+0xdc/0x128 [ 31.727803] __asan_report_load1_noabort+0x20/0x30 [ 31.727863] ksize_unpoisons_memory+0x618/0x740 [ 31.727911] kunit_try_run_case+0x170/0x3f0 [ 31.727967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728020] kthread+0x328/0x630 [ 31.728066] ret_from_fork+0x10/0x20 [ 31.728125] [ 31.728157] Allocated by task 225: [ 31.728185] kasan_save_stack+0x3c/0x68 [ 31.728231] kasan_save_track+0x20/0x40 [ 31.728275] kasan_save_alloc_info+0x40/0x58 [ 31.728313] __kasan_kmalloc+0xd4/0xd8 [ 31.728353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.728394] ksize_unpoisons_memory+0xc0/0x740 [ 31.728434] kunit_try_run_case+0x170/0x3f0 [ 31.728471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728513] kthread+0x328/0x630 [ 31.728559] ret_from_fork+0x10/0x20 [ 31.728597] [ 31.728624] The buggy address belongs to the object at fff00000c3efdd00 [ 31.728624] which belongs to the cache kmalloc-128 of size 128 [ 31.728689] The buggy address is located 5 bytes to the right of [ 31.728689] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.728751] [ 31.728771] The buggy address belongs to the physical page: [ 31.728800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.728852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.728909] page_type: f5(slab) [ 31.728953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.729003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.729048] page dumped because: kasan: bad access detected [ 31.729089] [ 31.729435] Memory state around the buggy address: [ 31.729524] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.729834] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.730070] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.730338] ^ [ 31.730594] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.730647] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.731195] ================================================================== [ 31.720413] ================================================================== [ 31.720500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.720641] Read of size 1 at addr fff00000c3efdd73 by task kunit_try_catch/225 [ 31.720697] [ 31.720728] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.720818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.720845] Hardware name: linux,dummy-virt (DT) [ 31.721177] Call trace: [ 31.721214] show_stack+0x20/0x38 (C) [ 31.721356] dump_stack_lvl+0x8c/0xd0 [ 31.721410] print_report+0x118/0x5e8 [ 31.721480] kasan_report+0xdc/0x128 [ 31.721602] __asan_report_load1_noabort+0x20/0x30 [ 31.721654] ksize_unpoisons_memory+0x628/0x740 [ 31.721945] kunit_try_run_case+0x170/0x3f0 [ 31.722026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.722309] kthread+0x328/0x630 [ 31.722385] ret_from_fork+0x10/0x20 [ 31.722452] [ 31.722543] Allocated by task 225: [ 31.722574] kasan_save_stack+0x3c/0x68 [ 31.722614] kasan_save_track+0x20/0x40 [ 31.722649] kasan_save_alloc_info+0x40/0x58 [ 31.722702] __kasan_kmalloc+0xd4/0xd8 [ 31.723002] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.723094] ksize_unpoisons_memory+0xc0/0x740 [ 31.723143] kunit_try_run_case+0x170/0x3f0 [ 31.723192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.723292] kthread+0x328/0x630 [ 31.723327] ret_from_fork+0x10/0x20 [ 31.723384] [ 31.723425] The buggy address belongs to the object at fff00000c3efdd00 [ 31.723425] which belongs to the cache kmalloc-128 of size 128 [ 31.723485] The buggy address is located 0 bytes to the right of [ 31.723485] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.723698] [ 31.723814] The buggy address belongs to the physical page: [ 31.723991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.724143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.724244] page_type: f5(slab) [ 31.724302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.724425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.724470] page dumped because: kasan: bad access detected [ 31.724512] [ 31.724535] Memory state around the buggy address: [ 31.724575] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.724936] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.724992] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.725759] ^ [ 31.725836] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.725905] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.726010] ==================================================================
[ 25.282906] ================================================================== [ 25.283138] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.283728] Read of size 1 at addr ffff888102b0647f by task kunit_try_catch/242 [ 25.284015] [ 25.284250] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 25.284297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.284309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.284329] Call Trace: [ 25.284345] <TASK> [ 25.284361] dump_stack_lvl+0x73/0xb0 [ 25.284422] print_report+0xd1/0x640 [ 25.284444] ? __virt_addr_valid+0x1db/0x2d0 [ 25.284466] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.284494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.284519] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.284540] kasan_report+0x141/0x180 [ 25.284561] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.284587] __asan_report_load1_noabort+0x18/0x20 [ 25.284610] ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.284633] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.284654] ? finish_task_switch.isra.0+0x153/0x700 [ 25.284675] ? __switch_to+0x47/0xf80 [ 25.284699] ? __schedule+0x10da/0x2b60 [ 25.284722] ? __pfx_read_tsc+0x10/0x10 [ 25.284742] ? ktime_get_ts64+0x86/0x230 [ 25.284766] kunit_try_run_case+0x1a5/0x480 [ 25.284788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.284809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.284842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.284874] ? __kthread_parkme+0x82/0x180 [ 25.284893] ? preempt_count_sub+0x50/0x80 [ 25.284914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.284936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.284958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.285021] kthread+0x337/0x6f0 [ 25.285042] ? trace_preempt_on+0x20/0xc0 [ 25.285066] ? __pfx_kthread+0x10/0x10 [ 25.285085] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.285126] ? calculate_sigpending+0x7b/0xa0 [ 25.285149] ? __pfx_kthread+0x10/0x10 [ 25.285169] ret_from_fork+0x116/0x1d0 [ 25.285188] ? __pfx_kthread+0x10/0x10 [ 25.285207] ret_from_fork_asm+0x1a/0x30 [ 25.285244] </TASK> [ 25.285255] [ 25.299124] Allocated by task 242: [ 25.299568] kasan_save_stack+0x45/0x70 [ 25.300019] kasan_save_track+0x18/0x40 [ 25.300375] kasan_save_alloc_info+0x3b/0x50 [ 25.300517] __kasan_kmalloc+0xb7/0xc0 [ 25.300638] __kmalloc_cache_noprof+0x189/0x420 [ 25.300804] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.301256] kunit_try_run_case+0x1a5/0x480 [ 25.301805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.302448] kthread+0x337/0x6f0 [ 25.302857] ret_from_fork+0x116/0x1d0 [ 25.303266] ret_from_fork_asm+0x1a/0x30 [ 25.303649] [ 25.303862] The buggy address belongs to the object at ffff888102b06400 [ 25.303862] which belongs to the cache kmalloc-128 of size 128 [ 25.304309] The buggy address is located 12 bytes to the right of [ 25.304309] allocated 115-byte region [ffff888102b06400, ffff888102b06473) [ 25.304673] [ 25.304739] The buggy address belongs to the physical page: [ 25.304910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06 [ 25.305145] flags: 0x200000000000000(node=0|zone=2) [ 25.305312] page_type: f5(slab) [ 25.305426] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.305649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.305867] page dumped because: kasan: bad access detected [ 25.306030] [ 25.306091] Memory state around the buggy address: [ 25.306295] ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.306882] ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.307479] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.308128] ^ [ 25.308815] ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309522] ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.310183] ================================================================== [ 25.257475] ================================================================== [ 25.257728] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.258698] Read of size 1 at addr ffff888102b06478 by task kunit_try_catch/242 [ 25.259367] [ 25.259465] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 25.259689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.259703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.259724] Call Trace: [ 25.259736] <TASK> [ 25.259750] dump_stack_lvl+0x73/0xb0 [ 25.259782] print_report+0xd1/0x640 [ 25.259882] ? __virt_addr_valid+0x1db/0x2d0 [ 25.259906] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.259928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.259953] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.259975] kasan_report+0x141/0x180 [ 25.259996] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.260022] __asan_report_load1_noabort+0x18/0x20 [ 25.260045] ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.260067] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.260088] ? finish_task_switch.isra.0+0x153/0x700 [ 25.260109] ? __switch_to+0x47/0xf80 [ 25.260133] ? __schedule+0x10da/0x2b60 [ 25.260155] ? __pfx_read_tsc+0x10/0x10 [ 25.260176] ? ktime_get_ts64+0x86/0x230 [ 25.260199] kunit_try_run_case+0x1a5/0x480 [ 25.260235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.260256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.260289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.260321] ? __kthread_parkme+0x82/0x180 [ 25.260340] ? preempt_count_sub+0x50/0x80 [ 25.260361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.260384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.260405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.260427] kthread+0x337/0x6f0 [ 25.260446] ? trace_preempt_on+0x20/0xc0 [ 25.260468] ? __pfx_kthread+0x10/0x10 [ 25.260487] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.260517] ? calculate_sigpending+0x7b/0xa0 [ 25.260540] ? __pfx_kthread+0x10/0x10 [ 25.260560] ret_from_fork+0x116/0x1d0 [ 25.260578] ? __pfx_kthread+0x10/0x10 [ 25.260597] ret_from_fork_asm+0x1a/0x30 [ 25.260627] </TASK> [ 25.260637] [ 25.271345] Allocated by task 242: [ 25.271668] kasan_save_stack+0x45/0x70 [ 25.271844] kasan_save_track+0x18/0x40 [ 25.272158] kasan_save_alloc_info+0x3b/0x50 [ 25.272380] __kasan_kmalloc+0xb7/0xc0 [ 25.272551] __kmalloc_cache_noprof+0x189/0x420 [ 25.272753] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.272950] kunit_try_run_case+0x1a5/0x480 [ 25.273145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.273887] kthread+0x337/0x6f0 [ 25.274298] ret_from_fork+0x116/0x1d0 [ 25.274464] ret_from_fork_asm+0x1a/0x30 [ 25.274798] [ 25.275071] The buggy address belongs to the object at ffff888102b06400 [ 25.275071] which belongs to the cache kmalloc-128 of size 128 [ 25.275573] The buggy address is located 5 bytes to the right of [ 25.275573] allocated 115-byte region [ffff888102b06400, ffff888102b06473) [ 25.276335] [ 25.276528] The buggy address belongs to the physical page: [ 25.276768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06 [ 25.277289] flags: 0x200000000000000(node=0|zone=2) [ 25.277517] page_type: f5(slab) [ 25.277650] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.278205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.278540] page dumped because: kasan: bad access detected [ 25.278772] [ 25.278947] Memory state around the buggy address: [ 25.279151] ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.279467] ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.279762] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.280715] ^ [ 25.281368] ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.281677] ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.282452] ================================================================== [ 25.231648] ================================================================== [ 25.232231] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 25.233043] Read of size 1 at addr ffff888102b06473 by task kunit_try_catch/242 [ 25.233560] [ 25.234066] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 25.234123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.234135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.234158] Call Trace: [ 25.234170] <TASK> [ 25.234187] dump_stack_lvl+0x73/0xb0 [ 25.234240] print_report+0xd1/0x640 [ 25.234263] ? __virt_addr_valid+0x1db/0x2d0 [ 25.234288] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.234310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.234334] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.234357] kasan_report+0x141/0x180 [ 25.234377] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.234404] __asan_report_load1_noabort+0x18/0x20 [ 25.234426] ksize_unpoisons_memory+0x81c/0x9b0 [ 25.234449] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.234470] ? finish_task_switch.isra.0+0x153/0x700 [ 25.234492] ? __switch_to+0x47/0xf80 [ 25.234518] ? __schedule+0x10da/0x2b60 [ 25.234541] ? __pfx_read_tsc+0x10/0x10 [ 25.234562] ? ktime_get_ts64+0x86/0x230 [ 25.234587] kunit_try_run_case+0x1a5/0x480 [ 25.234612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.234637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.234670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.234702] ? __kthread_parkme+0x82/0x180 [ 25.234721] ? preempt_count_sub+0x50/0x80 [ 25.234742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.234765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.234786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.234810] kthread+0x337/0x6f0 [ 25.234828] ? trace_preempt_on+0x20/0xc0 [ 25.234852] ? __pfx_kthread+0x10/0x10 [ 25.234871] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.234900] ? calculate_sigpending+0x7b/0xa0 [ 25.234923] ? __pfx_kthread+0x10/0x10 [ 25.234943] ret_from_fork+0x116/0x1d0 [ 25.234962] ? __pfx_kthread+0x10/0x10 [ 25.234982] ret_from_fork_asm+0x1a/0x30 [ 25.235014] </TASK> [ 25.235025] [ 25.245679] Allocated by task 242: [ 25.246208] kasan_save_stack+0x45/0x70 [ 25.246425] kasan_save_track+0x18/0x40 [ 25.246604] kasan_save_alloc_info+0x3b/0x50 [ 25.246811] __kasan_kmalloc+0xb7/0xc0 [ 25.247421] __kmalloc_cache_noprof+0x189/0x420 [ 25.247587] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.248015] kunit_try_run_case+0x1a5/0x480 [ 25.248379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.248712] kthread+0x337/0x6f0 [ 25.248849] ret_from_fork+0x116/0x1d0 [ 25.249196] ret_from_fork_asm+0x1a/0x30 [ 25.249395] [ 25.249471] The buggy address belongs to the object at ffff888102b06400 [ 25.249471] which belongs to the cache kmalloc-128 of size 128 [ 25.249970] The buggy address is located 0 bytes to the right of [ 25.249970] allocated 115-byte region [ffff888102b06400, ffff888102b06473) [ 25.250473] [ 25.250546] The buggy address belongs to the physical page: [ 25.250799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06 [ 25.251125] flags: 0x200000000000000(node=0|zone=2) [ 25.252017] page_type: f5(slab) [ 25.252304] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.252680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.253313] page dumped because: kasan: bad access detected [ 25.253564] [ 25.253638] Memory state around the buggy address: [ 25.254054] ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.254481] ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.254896] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.255332] ^ [ 25.255736] ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.256420] ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.256719] ==================================================================