Date
July 22, 2025, 5:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.564510] ================================================================== [ 30.564558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.564610] Read of size 1 at addr fff00000c3f71f7f by task kunit_try_catch/225 [ 30.564848] [ 30.565280] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.565418] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.565450] Hardware name: linux,dummy-virt (DT) [ 30.565495] Call trace: [ 30.565671] show_stack+0x20/0x38 (C) [ 30.565924] dump_stack_lvl+0x8c/0xd0 [ 30.566053] print_report+0x118/0x5e8 [ 30.566188] kasan_report+0xdc/0x128 [ 30.566326] __asan_report_load1_noabort+0x20/0x30 [ 30.566485] ksize_unpoisons_memory+0x690/0x740 [ 30.566558] kunit_try_run_case+0x170/0x3f0 [ 30.566837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.567023] kthread+0x328/0x630 [ 30.567179] ret_from_fork+0x10/0x20 [ 30.567390] [ 30.567501] Allocated by task 225: [ 30.567546] kasan_save_stack+0x3c/0x68 [ 30.567788] kasan_save_track+0x20/0x40 [ 30.567925] kasan_save_alloc_info+0x40/0x58 [ 30.568096] __kasan_kmalloc+0xd4/0xd8 [ 30.568204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.568314] ksize_unpoisons_memory+0xc0/0x740 [ 30.568391] kunit_try_run_case+0x170/0x3f0 [ 30.568745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568987] kthread+0x328/0x630 [ 30.569093] ret_from_fork+0x10/0x20 [ 30.569216] [ 30.569297] The buggy address belongs to the object at fff00000c3f71f00 [ 30.569297] which belongs to the cache kmalloc-128 of size 128 [ 30.569544] The buggy address is located 12 bytes to the right of [ 30.569544] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.569620] [ 30.569639] The buggy address belongs to the physical page: [ 30.569675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.569841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.570615] page_type: f5(slab) [ 30.570679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.570749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.570853] page dumped because: kasan: bad access detected [ 30.571007] [ 30.571071] Memory state around the buggy address: [ 30.571146] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.571838] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572097] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.572181] ^ [ 30.572378] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572494] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.572561] ================================================================== [ 30.551438] ================================================================== [ 30.551885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.551964] Read of size 1 at addr fff00000c3f71f73 by task kunit_try_catch/225 [ 30.552015] [ 30.552093] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.552197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.552226] Hardware name: linux,dummy-virt (DT) [ 30.552259] Call trace: [ 30.552290] show_stack+0x20/0x38 (C) [ 30.552358] dump_stack_lvl+0x8c/0xd0 [ 30.552404] print_report+0x118/0x5e8 [ 30.552449] kasan_report+0xdc/0x128 [ 30.552492] __asan_report_load1_noabort+0x20/0x30 [ 30.552539] ksize_unpoisons_memory+0x628/0x740 [ 30.552589] kunit_try_run_case+0x170/0x3f0 [ 30.552648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.552700] kthread+0x328/0x630 [ 30.552741] ret_from_fork+0x10/0x20 [ 30.552849] [ 30.553386] Allocated by task 225: [ 30.553446] kasan_save_stack+0x3c/0x68 [ 30.553501] kasan_save_track+0x20/0x40 [ 30.553905] kasan_save_alloc_info+0x40/0x58 [ 30.553976] __kasan_kmalloc+0xd4/0xd8 [ 30.554063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.554162] ksize_unpoisons_memory+0xc0/0x740 [ 30.554253] kunit_try_run_case+0x170/0x3f0 [ 30.554397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.554474] kthread+0x328/0x630 [ 30.554688] ret_from_fork+0x10/0x20 [ 30.554913] [ 30.554972] The buggy address belongs to the object at fff00000c3f71f00 [ 30.554972] which belongs to the cache kmalloc-128 of size 128 [ 30.555085] The buggy address is located 0 bytes to the right of [ 30.555085] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.555205] [ 30.555322] The buggy address belongs to the physical page: [ 30.555380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.555461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.555861] page_type: f5(slab) [ 30.556161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.556370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.556439] page dumped because: kasan: bad access detected [ 30.556542] [ 30.556613] Memory state around the buggy address: [ 30.556755] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.556845] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.557026] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.557444] ^ [ 30.557554] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.557684] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.557773] ================================================================== [ 30.558969] ================================================================== [ 30.559027] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.559081] Read of size 1 at addr fff00000c3f71f78 by task kunit_try_catch/225 [ 30.559283] [ 30.559439] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.559539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.559762] Hardware name: linux,dummy-virt (DT) [ 30.559837] Call trace: [ 30.559863] show_stack+0x20/0x38 (C) [ 30.559991] dump_stack_lvl+0x8c/0xd0 [ 30.560339] print_report+0x118/0x5e8 [ 30.560433] kasan_report+0xdc/0x128 [ 30.560541] __asan_report_load1_noabort+0x20/0x30 [ 30.560629] ksize_unpoisons_memory+0x618/0x740 [ 30.560874] kunit_try_run_case+0x170/0x3f0 [ 30.561090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.561162] kthread+0x328/0x630 [ 30.561390] ret_from_fork+0x10/0x20 [ 30.561593] [ 30.561661] Allocated by task 225: [ 30.561849] kasan_save_stack+0x3c/0x68 [ 30.561988] kasan_save_track+0x20/0x40 [ 30.562080] kasan_save_alloc_info+0x40/0x58 [ 30.562165] __kasan_kmalloc+0xd4/0xd8 [ 30.562200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.562412] ksize_unpoisons_memory+0xc0/0x740 [ 30.562581] kunit_try_run_case+0x170/0x3f0 [ 30.562645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.562691] kthread+0x328/0x630 [ 30.562723] ret_from_fork+0x10/0x20 [ 30.562806] [ 30.562838] The buggy address belongs to the object at fff00000c3f71f00 [ 30.562838] which belongs to the cache kmalloc-128 of size 128 [ 30.562898] The buggy address is located 5 bytes to the right of [ 30.562898] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.562964] [ 30.563005] The buggy address belongs to the physical page: [ 30.563040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.563093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.563140] page_type: f5(slab) [ 30.563178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.563248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.563288] page dumped because: kasan: bad access detected [ 30.563334] [ 30.563353] Memory state around the buggy address: [ 30.563393] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.563438] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563480] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.563519] ^ [ 30.563559] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563600] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.563636] ==================================================================
[ 25.531354] ================================================================== [ 25.531862] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.532321] Read of size 1 at addr ffff8881058a9578 by task kunit_try_catch/242 [ 25.532964] [ 25.533109] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.533156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.533177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.533198] Call Trace: [ 25.533213] <TASK> [ 25.533228] dump_stack_lvl+0x73/0xb0 [ 25.533256] print_report+0xd1/0x640 [ 25.533279] ? __virt_addr_valid+0x1db/0x2d0 [ 25.533302] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.533324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.533351] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.533374] kasan_report+0x141/0x180 [ 25.533396] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.533424] __asan_report_load1_noabort+0x18/0x20 [ 25.533449] ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.533790] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.533821] ? __kasan_check_write+0x18/0x20 [ 25.533859] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.533887] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 25.533939] ? __pfx_read_tsc+0x10/0x10 [ 25.533962] ? ktime_get_ts64+0x86/0x230 [ 25.533987] kunit_try_run_case+0x1a5/0x480 [ 25.534012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.534035] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 25.534060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.534086] ? __kthread_parkme+0x82/0x180 [ 25.534106] ? preempt_count_sub+0x50/0x80 [ 25.534129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.534154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.534178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.534202] kthread+0x337/0x6f0 [ 25.534222] ? trace_preempt_on+0x20/0xc0 [ 25.534245] ? __pfx_kthread+0x10/0x10 [ 25.534266] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.534290] ? calculate_sigpending+0x7b/0xa0 [ 25.534314] ? __pfx_kthread+0x10/0x10 [ 25.534336] ret_from_fork+0x116/0x1d0 [ 25.534355] ? __pfx_kthread+0x10/0x10 [ 25.534397] ret_from_fork_asm+0x1a/0x30 [ 25.534428] </TASK> [ 25.534439] [ 25.543102] Allocated by task 242: [ 25.543385] kasan_save_stack+0x45/0x70 [ 25.543706] kasan_save_track+0x18/0x40 [ 25.543933] kasan_save_alloc_info+0x3b/0x50 [ 25.544101] __kasan_kmalloc+0xb7/0xc0 [ 25.544406] __kmalloc_cache_noprof+0x189/0x420 [ 25.544574] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.544825] kunit_try_run_case+0x1a5/0x480 [ 25.545343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.545634] kthread+0x337/0x6f0 [ 25.545757] ret_from_fork+0x116/0x1d0 [ 25.546047] ret_from_fork_asm+0x1a/0x30 [ 25.546508] [ 25.546591] The buggy address belongs to the object at ffff8881058a9500 [ 25.546591] which belongs to the cache kmalloc-128 of size 128 [ 25.547101] The buggy address is located 5 bytes to the right of [ 25.547101] allocated 115-byte region [ffff8881058a9500, ffff8881058a9573) [ 25.547478] [ 25.547674] The buggy address belongs to the physical page: [ 25.547940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.548553] flags: 0x200000000000000(node=0|zone=2) [ 25.548746] page_type: f5(slab) [ 25.548901] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.549321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.549768] page dumped because: kasan: bad access detected [ 25.550003] [ 25.550072] Memory state around the buggy address: [ 25.550369] ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.550691] ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.551180] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.551453] ^ [ 25.551813] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.552047] ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.552331] ================================================================== [ 25.511424] ================================================================== [ 25.512075] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 25.512413] Read of size 1 at addr ffff8881058a9573 by task kunit_try_catch/242 [ 25.512814] [ 25.512945] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.512996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.513008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.513030] Call Trace: [ 25.513045] <TASK> [ 25.513061] dump_stack_lvl+0x73/0xb0 [ 25.513093] print_report+0xd1/0x640 [ 25.513117] ? __virt_addr_valid+0x1db/0x2d0 [ 25.513142] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.513165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.513192] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.513215] kasan_report+0x141/0x180 [ 25.513262] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.513290] __asan_report_load1_noabort+0x18/0x20 [ 25.513314] ksize_unpoisons_memory+0x81c/0x9b0 [ 25.513339] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.513363] ? __kasan_check_write+0x18/0x20 [ 25.513387] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.513414] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 25.513441] ? __pfx_read_tsc+0x10/0x10 [ 25.513463] ? ktime_get_ts64+0x86/0x230 [ 25.513629] kunit_try_run_case+0x1a5/0x480 [ 25.513661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.513685] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 25.513709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.513735] ? __kthread_parkme+0x82/0x180 [ 25.513756] ? preempt_count_sub+0x50/0x80 [ 25.513780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.513804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.513842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.513869] kthread+0x337/0x6f0 [ 25.513889] ? trace_preempt_on+0x20/0xc0 [ 25.513915] ? __pfx_kthread+0x10/0x10 [ 25.513936] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.513959] ? calculate_sigpending+0x7b/0xa0 [ 25.513984] ? __pfx_kthread+0x10/0x10 [ 25.514005] ret_from_fork+0x116/0x1d0 [ 25.514025] ? __pfx_kthread+0x10/0x10 [ 25.514045] ret_from_fork_asm+0x1a/0x30 [ 25.514077] </TASK> [ 25.514088] [ 25.521963] Allocated by task 242: [ 25.522146] kasan_save_stack+0x45/0x70 [ 25.522371] kasan_save_track+0x18/0x40 [ 25.522633] kasan_save_alloc_info+0x3b/0x50 [ 25.522807] __kasan_kmalloc+0xb7/0xc0 [ 25.523036] __kmalloc_cache_noprof+0x189/0x420 [ 25.523281] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.523569] kunit_try_run_case+0x1a5/0x480 [ 25.523764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.524016] kthread+0x337/0x6f0 [ 25.524197] ret_from_fork+0x116/0x1d0 [ 25.524333] ret_from_fork_asm+0x1a/0x30 [ 25.524514] [ 25.524605] The buggy address belongs to the object at ffff8881058a9500 [ 25.524605] which belongs to the cache kmalloc-128 of size 128 [ 25.525057] The buggy address is located 0 bytes to the right of [ 25.525057] allocated 115-byte region [ffff8881058a9500, ffff8881058a9573) [ 25.525442] [ 25.525776] The buggy address belongs to the physical page: [ 25.526071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.526721] flags: 0x200000000000000(node=0|zone=2) [ 25.526904] page_type: f5(slab) [ 25.527028] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.527328] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.527690] page dumped because: kasan: bad access detected [ 25.527964] [ 25.528059] Memory state around the buggy address: [ 25.528515] ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.528880] ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.529114] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.529440] ^ [ 25.529899] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.530511] ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.530856] ================================================================== [ 25.552806] ================================================================== [ 25.553557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.553883] Read of size 1 at addr ffff8881058a957f by task kunit_try_catch/242 [ 25.554328] [ 25.554461] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.554507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.554519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.554538] Call Trace: [ 25.554552] <TASK> [ 25.554565] dump_stack_lvl+0x73/0xb0 [ 25.554592] print_report+0xd1/0x640 [ 25.554614] ? __virt_addr_valid+0x1db/0x2d0 [ 25.554638] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.554661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.554687] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.554762] kasan_report+0x141/0x180 [ 25.554785] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.554813] __asan_report_load1_noabort+0x18/0x20 [ 25.554856] ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.554881] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.554905] ? __kasan_check_write+0x18/0x20 [ 25.554929] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.554956] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 25.554983] ? __pfx_read_tsc+0x10/0x10 [ 25.555005] ? ktime_get_ts64+0x86/0x230 [ 25.555029] kunit_try_run_case+0x1a5/0x480 [ 25.555054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.555077] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 25.555101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.555126] ? __kthread_parkme+0x82/0x180 [ 25.555148] ? preempt_count_sub+0x50/0x80 [ 25.555550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.555584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.555611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.555636] kthread+0x337/0x6f0 [ 25.555656] ? trace_preempt_on+0x20/0xc0 [ 25.555679] ? __pfx_kthread+0x10/0x10 [ 25.555700] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.555724] ? calculate_sigpending+0x7b/0xa0 [ 25.555747] ? __pfx_kthread+0x10/0x10 [ 25.555769] ret_from_fork+0x116/0x1d0 [ 25.555788] ? __pfx_kthread+0x10/0x10 [ 25.555809] ret_from_fork_asm+0x1a/0x30 [ 25.555852] </TASK> [ 25.555863] [ 25.564167] Allocated by task 242: [ 25.564349] kasan_save_stack+0x45/0x70 [ 25.564909] kasan_save_track+0x18/0x40 [ 25.565152] kasan_save_alloc_info+0x3b/0x50 [ 25.565398] __kasan_kmalloc+0xb7/0xc0 [ 25.565640] __kmalloc_cache_noprof+0x189/0x420 [ 25.565801] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.566039] kunit_try_run_case+0x1a5/0x480 [ 25.566341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.566591] kthread+0x337/0x6f0 [ 25.566822] ret_from_fork+0x116/0x1d0 [ 25.566991] ret_from_fork_asm+0x1a/0x30 [ 25.567132] [ 25.567200] The buggy address belongs to the object at ffff8881058a9500 [ 25.567200] which belongs to the cache kmalloc-128 of size 128 [ 25.567557] The buggy address is located 12 bytes to the right of [ 25.567557] allocated 115-byte region [ffff8881058a9500, ffff8881058a9573) [ 25.568161] [ 25.568260] The buggy address belongs to the physical page: [ 25.568655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.568904] flags: 0x200000000000000(node=0|zone=2) [ 25.569061] page_type: f5(slab) [ 25.569411] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.569968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.570403] page dumped because: kasan: bad access detected [ 25.570748] [ 25.570822] Memory state around the buggy address: [ 25.570988] ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.571283] ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.571598] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.571953] ^ [ 25.572224] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.572441] ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.572760] ==================================================================