Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.257589] ================================================================== [ 31.257924] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.258068] Read of size 1 at addr fff00000c99bce78 by task kunit_try_catch/227 [ 31.258123] [ 31.258157] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.258543] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.258587] Hardware name: linux,dummy-virt (DT) [ 31.258689] Call trace: [ 31.258716] show_stack+0x20/0x38 (C) [ 31.258888] dump_stack_lvl+0x8c/0xd0 [ 31.258983] print_report+0x118/0x5e8 [ 31.259208] kasan_report+0xdc/0x128 [ 31.259271] __asan_report_load1_noabort+0x20/0x30 [ 31.259479] ksize_unpoisons_memory+0x618/0x740 [ 31.259641] kunit_try_run_case+0x170/0x3f0 [ 31.259696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.259749] kthread+0x328/0x630 [ 31.259798] ret_from_fork+0x10/0x20 [ 31.259847] [ 31.259865] Allocated by task 227: [ 31.259893] kasan_save_stack+0x3c/0x68 [ 31.259942] kasan_save_track+0x20/0x40 [ 31.259979] kasan_save_alloc_info+0x40/0x58 [ 31.260017] __kasan_kmalloc+0xd4/0xd8 [ 31.260051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.260089] ksize_unpoisons_memory+0xc0/0x740 [ 31.260128] kunit_try_run_case+0x170/0x3f0 [ 31.260163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.260204] kthread+0x328/0x630 [ 31.260282] ret_from_fork+0x10/0x20 [ 31.260321] [ 31.260339] The buggy address belongs to the object at fff00000c99bce00 [ 31.260339] which belongs to the cache kmalloc-128 of size 128 [ 31.260397] The buggy address is located 5 bytes to the right of [ 31.260397] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.260471] [ 31.260491] The buggy address belongs to the physical page: [ 31.261176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.261436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.261523] page_type: f5(slab) [ 31.261660] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.261739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.262098] page dumped because: kasan: bad access detected [ 31.262153] [ 31.262214] Memory state around the buggy address: [ 31.262316] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.262488] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.262598] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.262673] ^ [ 31.263039] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263092] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263183] ================================================================== [ 31.264094] ================================================================== [ 31.264146] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.264199] Read of size 1 at addr fff00000c99bce7f by task kunit_try_catch/227 [ 31.265071] [ 31.265122] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.265476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.265618] Hardware name: linux,dummy-virt (DT) [ 31.265673] Call trace: [ 31.265715] show_stack+0x20/0x38 (C) [ 31.266343] dump_stack_lvl+0x8c/0xd0 [ 31.266551] print_report+0x118/0x5e8 [ 31.266641] kasan_report+0xdc/0x128 [ 31.266751] __asan_report_load1_noabort+0x20/0x30 [ 31.266879] ksize_unpoisons_memory+0x690/0x740 [ 31.266974] kunit_try_run_case+0x170/0x3f0 [ 31.267367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.267578] kthread+0x328/0x630 [ 31.267770] ret_from_fork+0x10/0x20 [ 31.267888] [ 31.268003] Allocated by task 227: [ 31.268061] kasan_save_stack+0x3c/0x68 [ 31.268169] kasan_save_track+0x20/0x40 [ 31.268236] kasan_save_alloc_info+0x40/0x58 [ 31.268385] __kasan_kmalloc+0xd4/0xd8 [ 31.268462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.268602] ksize_unpoisons_memory+0xc0/0x740 [ 31.268653] kunit_try_run_case+0x170/0x3f0 [ 31.268691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.268741] kthread+0x328/0x630 [ 31.268773] ret_from_fork+0x10/0x20 [ 31.269150] [ 31.269227] The buggy address belongs to the object at fff00000c99bce00 [ 31.269227] which belongs to the cache kmalloc-128 of size 128 [ 31.269290] The buggy address is located 12 bytes to the right of [ 31.269290] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.269363] [ 31.269398] The buggy address belongs to the physical page: [ 31.269434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.269509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.269556] page_type: f5(slab) [ 31.269591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.269649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.269700] page dumped because: kasan: bad access detected [ 31.269740] [ 31.269766] Memory state around the buggy address: [ 31.269807] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.269851] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270129] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.270730] ^ [ 31.270875] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271230] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271297] ================================================================== [ 31.249693] ================================================================== [ 31.249796] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.250019] Read of size 1 at addr fff00000c99bce73 by task kunit_try_catch/227 [ 31.250074] [ 31.250110] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.250201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.250401] Hardware name: linux,dummy-virt (DT) [ 31.250480] Call trace: [ 31.250506] show_stack+0x20/0x38 (C) [ 31.250858] dump_stack_lvl+0x8c/0xd0 [ 31.251019] print_report+0x118/0x5e8 [ 31.251085] kasan_report+0xdc/0x128 [ 31.251131] __asan_report_load1_noabort+0x20/0x30 [ 31.251207] ksize_unpoisons_memory+0x628/0x740 [ 31.251305] kunit_try_run_case+0x170/0x3f0 [ 31.251354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.251429] kthread+0x328/0x630 [ 31.251627] ret_from_fork+0x10/0x20 [ 31.251697] [ 31.251996] Allocated by task 227: [ 31.252048] kasan_save_stack+0x3c/0x68 [ 31.252094] kasan_save_track+0x20/0x40 [ 31.252130] kasan_save_alloc_info+0x40/0x58 [ 31.252304] __kasan_kmalloc+0xd4/0xd8 [ 31.252351] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.252420] ksize_unpoisons_memory+0xc0/0x740 [ 31.252836] kunit_try_run_case+0x170/0x3f0 [ 31.252950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.253088] kthread+0x328/0x630 [ 31.253137] ret_from_fork+0x10/0x20 [ 31.253186] [ 31.253212] The buggy address belongs to the object at fff00000c99bce00 [ 31.253212] which belongs to the cache kmalloc-128 of size 128 [ 31.253343] The buggy address is located 0 bytes to the right of [ 31.253343] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.253548] [ 31.253765] The buggy address belongs to the physical page: [ 31.253853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.254007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.254096] page_type: f5(slab) [ 31.254223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.254462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.254627] page dumped because: kasan: bad access detected [ 31.254928] [ 31.255064] Memory state around the buggy address: [ 31.255143] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.255281] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255348] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.255397] ^ [ 31.255472] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255515] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255590] ==================================================================
[ 25.631472] ================================================================== [ 25.631811] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.632832] Read of size 1 at addr ffff888104964678 by task kunit_try_catch/243 [ 25.633218] [ 25.633350] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.633399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.633413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.633435] Call Trace: [ 25.633449] <TASK> [ 25.633468] dump_stack_lvl+0x73/0xb0 [ 25.633497] print_report+0xd1/0x640 [ 25.633519] ? __virt_addr_valid+0x1db/0x2d0 [ 25.633564] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.633586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.633627] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.633650] kasan_report+0x141/0x180 [ 25.633672] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.633699] __asan_report_load1_noabort+0x18/0x20 [ 25.633723] ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.633746] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.633768] ? finish_task_switch.isra.0+0x153/0x700 [ 25.634385] ? __switch_to+0x47/0xf80 [ 25.634425] ? __schedule+0x10da/0x2b60 [ 25.634451] ? __pfx_read_tsc+0x10/0x10 [ 25.634472] ? ktime_get_ts64+0x86/0x230 [ 25.634754] kunit_try_run_case+0x1a5/0x480 [ 25.634787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.634810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.634836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.634881] ? __kthread_parkme+0x82/0x180 [ 25.634915] ? preempt_count_sub+0x50/0x80 [ 25.634947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.635248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.635276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.635300] kthread+0x337/0x6f0 [ 25.635320] ? trace_preempt_on+0x20/0xc0 [ 25.635345] ? __pfx_kthread+0x10/0x10 [ 25.635365] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.635408] ? calculate_sigpending+0x7b/0xa0 [ 25.635432] ? __pfx_kthread+0x10/0x10 [ 25.635453] ret_from_fork+0x116/0x1d0 [ 25.635473] ? __pfx_kthread+0x10/0x10 [ 25.635493] ret_from_fork_asm+0x1a/0x30 [ 25.635525] </TASK> [ 25.635537] [ 25.646546] Allocated by task 243: [ 25.646684] kasan_save_stack+0x45/0x70 [ 25.646827] kasan_save_track+0x18/0x40 [ 25.646957] kasan_save_alloc_info+0x3b/0x50 [ 25.647102] __kasan_kmalloc+0xb7/0xc0 [ 25.647253] __kmalloc_cache_noprof+0x189/0x420 [ 25.647472] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.647720] kunit_try_run_case+0x1a5/0x480 [ 25.648396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.648627] kthread+0x337/0x6f0 [ 25.648979] ret_from_fork+0x116/0x1d0 [ 25.649660] ret_from_fork_asm+0x1a/0x30 [ 25.649887] [ 25.650077] The buggy address belongs to the object at ffff888104964600 [ 25.650077] which belongs to the cache kmalloc-128 of size 128 [ 25.650837] The buggy address is located 5 bytes to the right of [ 25.650837] allocated 115-byte region [ffff888104964600, ffff888104964673) [ 25.651589] [ 25.651733] The buggy address belongs to the physical page: [ 25.651908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 25.652178] flags: 0x200000000000000(node=0|zone=2) [ 25.652407] page_type: f5(slab) [ 25.652544] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.653353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.653845] page dumped because: kasan: bad access detected [ 25.654025] [ 25.654089] Memory state around the buggy address: [ 25.654249] ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.654527] ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.655277] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.655686] ^ [ 25.656222] ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.656760] ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.657098] ================================================================== [ 25.607913] ================================================================== [ 25.608492] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 25.609167] Read of size 1 at addr ffff888104964673 by task kunit_try_catch/243 [ 25.609626] [ 25.609768] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.609823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.610081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.610107] Call Trace: [ 25.610122] <TASK> [ 25.610252] dump_stack_lvl+0x73/0xb0 [ 25.610302] print_report+0xd1/0x640 [ 25.610327] ? __virt_addr_valid+0x1db/0x2d0 [ 25.610353] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.610376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.610405] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.610428] kasan_report+0x141/0x180 [ 25.610450] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.610480] __asan_report_load1_noabort+0x18/0x20 [ 25.610504] ksize_unpoisons_memory+0x81c/0x9b0 [ 25.610527] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.610549] ? finish_task_switch.isra.0+0x153/0x700 [ 25.610575] ? __switch_to+0x47/0xf80 [ 25.610602] ? __schedule+0x10da/0x2b60 [ 25.610628] ? __pfx_read_tsc+0x10/0x10 [ 25.610649] ? ktime_get_ts64+0x86/0x230 [ 25.610676] kunit_try_run_case+0x1a5/0x480 [ 25.610702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.610725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.610750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.610774] ? __kthread_parkme+0x82/0x180 [ 25.610795] ? preempt_count_sub+0x50/0x80 [ 25.610817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.610841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.610864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.610886] kthread+0x337/0x6f0 [ 25.610906] ? trace_preempt_on+0x20/0xc0 [ 25.610932] ? __pfx_kthread+0x10/0x10 [ 25.610954] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.610978] ? calculate_sigpending+0x7b/0xa0 [ 25.611002] ? __pfx_kthread+0x10/0x10 [ 25.611023] ret_from_fork+0x116/0x1d0 [ 25.611042] ? __pfx_kthread+0x10/0x10 [ 25.611062] ret_from_fork_asm+0x1a/0x30 [ 25.611119] </TASK> [ 25.611131] [ 25.621014] Allocated by task 243: [ 25.621165] kasan_save_stack+0x45/0x70 [ 25.621310] kasan_save_track+0x18/0x40 [ 25.621435] kasan_save_alloc_info+0x3b/0x50 [ 25.621573] __kasan_kmalloc+0xb7/0xc0 [ 25.621695] __kmalloc_cache_noprof+0x189/0x420 [ 25.622157] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.623098] kunit_try_run_case+0x1a5/0x480 [ 25.623312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.623525] kthread+0x337/0x6f0 [ 25.624034] ret_from_fork+0x116/0x1d0 [ 25.624343] ret_from_fork_asm+0x1a/0x30 [ 25.624525] [ 25.624618] The buggy address belongs to the object at ffff888104964600 [ 25.624618] which belongs to the cache kmalloc-128 of size 128 [ 25.625250] The buggy address is located 0 bytes to the right of [ 25.625250] allocated 115-byte region [ffff888104964600, ffff888104964673) [ 25.625957] [ 25.626228] The buggy address belongs to the physical page: [ 25.626679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 25.627236] flags: 0x200000000000000(node=0|zone=2) [ 25.627654] page_type: f5(slab) [ 25.627847] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.628395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.628840] page dumped because: kasan: bad access detected [ 25.629115] [ 25.629431] Memory state around the buggy address: [ 25.629588] ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.629790] ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.629995] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.630209] ^ [ 25.630410] ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.630613] ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.630810] ================================================================== [ 25.657974] ================================================================== [ 25.658277] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.658511] Read of size 1 at addr ffff88810496467f by task kunit_try_catch/243 [ 25.658793] [ 25.658974] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.659333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.659348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.659381] Call Trace: [ 25.659400] <TASK> [ 25.659419] dump_stack_lvl+0x73/0xb0 [ 25.659450] print_report+0xd1/0x640 [ 25.659472] ? __virt_addr_valid+0x1db/0x2d0 [ 25.659496] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.659539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.659565] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.659601] kasan_report+0x141/0x180 [ 25.659628] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.659784] __asan_report_load1_noabort+0x18/0x20 [ 25.659809] ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.659833] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.659855] ? finish_task_switch.isra.0+0x153/0x700 [ 25.659877] ? __switch_to+0x47/0xf80 [ 25.659903] ? __schedule+0x10da/0x2b60 [ 25.659928] ? __pfx_read_tsc+0x10/0x10 [ 25.659957] ? ktime_get_ts64+0x86/0x230 [ 25.659982] kunit_try_run_case+0x1a5/0x480 [ 25.660005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.660027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.660051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.660076] ? __kthread_parkme+0x82/0x180 [ 25.660096] ? preempt_count_sub+0x50/0x80 [ 25.660118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.660141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.660175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.660197] kthread+0x337/0x6f0 [ 25.660217] ? trace_preempt_on+0x20/0xc0 [ 25.660241] ? __pfx_kthread+0x10/0x10 [ 25.660261] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.660284] ? calculate_sigpending+0x7b/0xa0 [ 25.660307] ? __pfx_kthread+0x10/0x10 [ 25.660328] ret_from_fork+0x116/0x1d0 [ 25.660347] ? __pfx_kthread+0x10/0x10 [ 25.660376] ret_from_fork_asm+0x1a/0x30 [ 25.660408] </TASK> [ 25.660419] [ 25.671942] Allocated by task 243: [ 25.672729] kasan_save_stack+0x45/0x70 [ 25.672911] kasan_save_track+0x18/0x40 [ 25.673369] kasan_save_alloc_info+0x3b/0x50 [ 25.673708] __kasan_kmalloc+0xb7/0xc0 [ 25.674058] __kmalloc_cache_noprof+0x189/0x420 [ 25.674454] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.674646] kunit_try_run_case+0x1a5/0x480 [ 25.674855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.675390] kthread+0x337/0x6f0 [ 25.675645] ret_from_fork+0x116/0x1d0 [ 25.675825] ret_from_fork_asm+0x1a/0x30 [ 25.676204] [ 25.676298] The buggy address belongs to the object at ffff888104964600 [ 25.676298] which belongs to the cache kmalloc-128 of size 128 [ 25.677047] The buggy address is located 12 bytes to the right of [ 25.677047] allocated 115-byte region [ffff888104964600, ffff888104964673) [ 25.677881] [ 25.678128] The buggy address belongs to the physical page: [ 25.678346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 25.678990] flags: 0x200000000000000(node=0|zone=2) [ 25.679183] page_type: f5(slab) [ 25.679439] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.679778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.680330] page dumped because: kasan: bad access detected [ 25.680630] [ 25.680957] Memory state around the buggy address: [ 25.681169] ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.681579] ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.681863] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.682416] ^ [ 25.682798] ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.683272] ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.683706] ==================================================================