Date
July 5, 2025, 5:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.473608] ================================================================== [ 18.473711] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.473889] Read of size 1 at addr fff00000c5cbbf78 by task kunit_try_catch/194 [ 18.473938] [ 18.473967] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.474045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.474071] Hardware name: linux,dummy-virt (DT) [ 18.474739] Call trace: [ 18.474955] show_stack+0x20/0x38 (C) [ 18.475439] dump_stack_lvl+0x8c/0xd0 [ 18.475566] print_report+0x118/0x608 [ 18.475681] kasan_report+0xdc/0x128 [ 18.475728] __asan_report_load1_noabort+0x20/0x30 [ 18.475806] ksize_unpoisons_memory+0x618/0x740 [ 18.476042] kunit_try_run_case+0x170/0x3f0 [ 18.476101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.476187] kthread+0x328/0x630 [ 18.476230] ret_from_fork+0x10/0x20 [ 18.476277] [ 18.476295] Allocated by task 194: [ 18.476328] kasan_save_stack+0x3c/0x68 [ 18.476399] kasan_save_track+0x20/0x40 [ 18.476436] kasan_save_alloc_info+0x40/0x58 [ 18.476475] __kasan_kmalloc+0xd4/0xd8 [ 18.476822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.476874] ksize_unpoisons_memory+0xc0/0x740 [ 18.476913] kunit_try_run_case+0x170/0x3f0 [ 18.477052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.477195] kthread+0x328/0x630 [ 18.477227] ret_from_fork+0x10/0x20 [ 18.477370] [ 18.477411] The buggy address belongs to the object at fff00000c5cbbf00 [ 18.477411] which belongs to the cache kmalloc-128 of size 128 [ 18.477513] The buggy address is located 5 bytes to the right of [ 18.477513] allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73) [ 18.477735] [ 18.477762] The buggy address belongs to the physical page: [ 18.477840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb [ 18.477906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.477952] page_type: f5(slab) [ 18.478313] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.478399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.478452] page dumped because: kasan: bad access detected [ 18.478485] [ 18.478504] Memory state around the buggy address: [ 18.478639] fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.478787] fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.478833] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.478889] ^ [ 18.478929] fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.478993] fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.479033] ================================================================== [ 18.480013] ================================================================== [ 18.480202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.480372] Read of size 1 at addr fff00000c5cbbf7f by task kunit_try_catch/194 [ 18.480471] [ 18.480499] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.480940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.480970] Hardware name: linux,dummy-virt (DT) [ 18.480999] Call trace: [ 18.481021] show_stack+0x20/0x38 (C) [ 18.481155] dump_stack_lvl+0x8c/0xd0 [ 18.481200] print_report+0x118/0x608 [ 18.481529] kasan_report+0xdc/0x128 [ 18.481588] __asan_report_load1_noabort+0x20/0x30 [ 18.481640] ksize_unpoisons_memory+0x690/0x740 [ 18.481686] kunit_try_run_case+0x170/0x3f0 [ 18.481733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.481785] kthread+0x328/0x630 [ 18.481826] ret_from_fork+0x10/0x20 [ 18.481884] [ 18.481901] Allocated by task 194: [ 18.481929] kasan_save_stack+0x3c/0x68 [ 18.481978] kasan_save_track+0x20/0x40 [ 18.482017] kasan_save_alloc_info+0x40/0x58 [ 18.482055] __kasan_kmalloc+0xd4/0xd8 [ 18.482199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.482321] ksize_unpoisons_memory+0xc0/0x740 [ 18.482418] kunit_try_run_case+0x170/0x3f0 [ 18.482541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.482584] kthread+0x328/0x630 [ 18.482615] ret_from_fork+0x10/0x20 [ 18.482649] [ 18.482668] The buggy address belongs to the object at fff00000c5cbbf00 [ 18.482668] which belongs to the cache kmalloc-128 of size 128 [ 18.483157] The buggy address is located 12 bytes to the right of [ 18.483157] allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73) [ 18.483231] [ 18.483260] The buggy address belongs to the physical page: [ 18.483301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb [ 18.483379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.483429] page_type: f5(slab) [ 18.483466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.483516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.483726] page dumped because: kasan: bad access detected [ 18.483760] [ 18.483928] Memory state around the buggy address: [ 18.483968] fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.484139] fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.484182] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.484246] ^ [ 18.484288] fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.484329] fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.484368] ================================================================== [ 18.465780] ================================================================== [ 18.466095] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.466220] Read of size 1 at addr fff00000c5cbbf73 by task kunit_try_catch/194 [ 18.466308] [ 18.466430] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.466540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.466568] Hardware name: linux,dummy-virt (DT) [ 18.466600] Call trace: [ 18.466621] show_stack+0x20/0x38 (C) [ 18.467000] dump_stack_lvl+0x8c/0xd0 [ 18.467051] print_report+0x118/0x608 [ 18.467097] kasan_report+0xdc/0x128 [ 18.467459] __asan_report_load1_noabort+0x20/0x30 [ 18.467540] ksize_unpoisons_memory+0x628/0x740 [ 18.467619] kunit_try_run_case+0x170/0x3f0 [ 18.467672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.467725] kthread+0x328/0x630 [ 18.467775] ret_from_fork+0x10/0x20 [ 18.467853] [ 18.467884] Allocated by task 194: [ 18.467914] kasan_save_stack+0x3c/0x68 [ 18.468000] kasan_save_track+0x20/0x40 [ 18.468059] kasan_save_alloc_info+0x40/0x58 [ 18.468209] __kasan_kmalloc+0xd4/0xd8 [ 18.468252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.468290] ksize_unpoisons_memory+0xc0/0x740 [ 18.468368] kunit_try_run_case+0x170/0x3f0 [ 18.468543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.468595] kthread+0x328/0x630 [ 18.468761] ret_from_fork+0x10/0x20 [ 18.468798] [ 18.468817] The buggy address belongs to the object at fff00000c5cbbf00 [ 18.468817] which belongs to the cache kmalloc-128 of size 128 [ 18.468882] The buggy address is located 0 bytes to the right of [ 18.468882] allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73) [ 18.468944] [ 18.468963] The buggy address belongs to the physical page: [ 18.468992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb [ 18.469044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.469432] page_type: f5(slab) [ 18.469740] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.469935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.470216] page dumped because: kasan: bad access detected [ 18.470477] [ 18.470576] Memory state around the buggy address: [ 18.470651] fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.470774] fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.470919] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.471056] ^ [ 18.471096] fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471318] fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.471607] ==================================================================
[ 12.014081] ================================================================== [ 12.014492] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.014876] Read of size 1 at addr ffff8881031d4878 by task kunit_try_catch/212 [ 12.015106] [ 12.015263] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.015310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.015323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.015346] Call Trace: [ 12.015360] <TASK> [ 12.015376] dump_stack_lvl+0x73/0xb0 [ 12.015406] print_report+0xd1/0x650 [ 12.015430] ? __virt_addr_valid+0x1db/0x2d0 [ 12.015471] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.015496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.015519] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.015543] kasan_report+0x141/0x180 [ 12.015566] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.015595] __asan_report_load1_noabort+0x18/0x20 [ 12.015619] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.015644] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.015667] ? finish_task_switch.isra.0+0x153/0x700 [ 12.015690] ? __switch_to+0x47/0xf50 [ 12.015716] ? __schedule+0x10cc/0x2b60 [ 12.015739] ? __pfx_read_tsc+0x10/0x10 [ 12.015760] ? ktime_get_ts64+0x86/0x230 [ 12.015785] kunit_try_run_case+0x1a5/0x480 [ 12.015810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.015832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.015857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.015880] ? __kthread_parkme+0x82/0x180 [ 12.015903] ? preempt_count_sub+0x50/0x80 [ 12.015927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.015951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.015974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.015998] kthread+0x337/0x6f0 [ 12.016019] ? trace_preempt_on+0x20/0xc0 [ 12.016042] ? __pfx_kthread+0x10/0x10 [ 12.016063] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.016084] ? calculate_sigpending+0x7b/0xa0 [ 12.016118] ? __pfx_kthread+0x10/0x10 [ 12.016140] ret_from_fork+0x116/0x1d0 [ 12.016160] ? __pfx_kthread+0x10/0x10 [ 12.016181] ret_from_fork_asm+0x1a/0x30 [ 12.016213] </TASK> [ 12.016224] [ 12.023933] Allocated by task 212: [ 12.024084] kasan_save_stack+0x45/0x70 [ 12.024509] kasan_save_track+0x18/0x40 [ 12.024741] kasan_save_alloc_info+0x3b/0x50 [ 12.024927] __kasan_kmalloc+0xb7/0xc0 [ 12.025093] __kmalloc_cache_noprof+0x189/0x420 [ 12.025253] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.025419] kunit_try_run_case+0x1a5/0x480 [ 12.025590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.025850] kthread+0x337/0x6f0 [ 12.026021] ret_from_fork+0x116/0x1d0 [ 12.026255] ret_from_fork_asm+0x1a/0x30 [ 12.026591] [ 12.026698] The buggy address belongs to the object at ffff8881031d4800 [ 12.026698] which belongs to the cache kmalloc-128 of size 128 [ 12.027100] The buggy address is located 5 bytes to the right of [ 12.027100] allocated 115-byte region [ffff8881031d4800, ffff8881031d4873) [ 12.027917] [ 12.028019] The buggy address belongs to the physical page: [ 12.028298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 12.028633] flags: 0x200000000000000(node=0|zone=2) [ 12.028878] page_type: f5(slab) [ 12.029004] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.029240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.029671] page dumped because: kasan: bad access detected [ 12.029921] [ 12.030018] Memory state around the buggy address: [ 12.030395] ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.030715] ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.030936] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.031204] ^ [ 12.031528] ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.031840] ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.032395] ================================================================== [ 12.032812] ================================================================== [ 12.033388] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.033820] Read of size 1 at addr ffff8881031d487f by task kunit_try_catch/212 [ 12.034048] [ 12.034137] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.034181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.034194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.034215] Call Trace: [ 12.034230] <TASK> [ 12.034247] dump_stack_lvl+0x73/0xb0 [ 12.034278] print_report+0xd1/0x650 [ 12.034301] ? __virt_addr_valid+0x1db/0x2d0 [ 12.034323] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.034347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.034370] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.034394] kasan_report+0x141/0x180 [ 12.034417] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.034446] __asan_report_load1_noabort+0x18/0x20 [ 12.034484] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.034509] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.034533] ? finish_task_switch.isra.0+0x153/0x700 [ 12.034555] ? __switch_to+0x47/0xf50 [ 12.034580] ? __schedule+0x10cc/0x2b60 [ 12.034603] ? __pfx_read_tsc+0x10/0x10 [ 12.034624] ? ktime_get_ts64+0x86/0x230 [ 12.034690] kunit_try_run_case+0x1a5/0x480 [ 12.034717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.034740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.034764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.034788] ? __kthread_parkme+0x82/0x180 [ 12.034809] ? preempt_count_sub+0x50/0x80 [ 12.034833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.034857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.034881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.034905] kthread+0x337/0x6f0 [ 12.034925] ? trace_preempt_on+0x20/0xc0 [ 12.034949] ? __pfx_kthread+0x10/0x10 [ 12.034971] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.034992] ? calculate_sigpending+0x7b/0xa0 [ 12.035017] ? __pfx_kthread+0x10/0x10 [ 12.035039] ret_from_fork+0x116/0x1d0 [ 12.035058] ? __pfx_kthread+0x10/0x10 [ 12.035079] ret_from_fork_asm+0x1a/0x30 [ 12.035111] </TASK> [ 12.035122] [ 12.043162] Allocated by task 212: [ 12.043344] kasan_save_stack+0x45/0x70 [ 12.043739] kasan_save_track+0x18/0x40 [ 12.043945] kasan_save_alloc_info+0x3b/0x50 [ 12.044139] __kasan_kmalloc+0xb7/0xc0 [ 12.044314] __kmalloc_cache_noprof+0x189/0x420 [ 12.044556] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.044711] kunit_try_run_case+0x1a5/0x480 [ 12.044860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.045159] kthread+0x337/0x6f0 [ 12.045559] ret_from_fork+0x116/0x1d0 [ 12.045786] ret_from_fork_asm+0x1a/0x30 [ 12.045959] [ 12.046035] The buggy address belongs to the object at ffff8881031d4800 [ 12.046035] which belongs to the cache kmalloc-128 of size 128 [ 12.046721] The buggy address is located 12 bytes to the right of [ 12.046721] allocated 115-byte region [ffff8881031d4800, ffff8881031d4873) [ 12.047089] [ 12.047210] The buggy address belongs to the physical page: [ 12.047524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 12.048158] flags: 0x200000000000000(node=0|zone=2) [ 12.048403] page_type: f5(slab) [ 12.048574] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.048809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.049189] page dumped because: kasan: bad access detected [ 12.049540] [ 12.049624] Memory state around the buggy address: [ 12.049873] ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.050164] ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.050497] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.050827] ^ [ 12.051097] ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.051347] ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.051977] ================================================================== [ 11.991718] ================================================================== [ 11.992201] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.992572] Read of size 1 at addr ffff8881031d4873 by task kunit_try_catch/212 [ 11.992929] [ 11.993044] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.993089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.993102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.993124] Call Trace: [ 11.993136] <TASK> [ 11.993153] dump_stack_lvl+0x73/0xb0 [ 11.993182] print_report+0xd1/0x650 [ 11.993205] ? __virt_addr_valid+0x1db/0x2d0 [ 11.993227] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.993251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.993274] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.993298] kasan_report+0x141/0x180 [ 11.993321] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.993350] __asan_report_load1_noabort+0x18/0x20 [ 11.993375] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.993405] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.993428] ? finish_task_switch.isra.0+0x153/0x700 [ 11.993450] ? __switch_to+0x47/0xf50 [ 11.993489] ? __schedule+0x10cc/0x2b60 [ 11.993511] ? __pfx_read_tsc+0x10/0x10 [ 11.993532] ? ktime_get_ts64+0x86/0x230 [ 11.993556] kunit_try_run_case+0x1a5/0x480 [ 11.993581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.993604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.993628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.993652] ? __kthread_parkme+0x82/0x180 [ 11.993672] ? preempt_count_sub+0x50/0x80 [ 11.993696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.993721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.993744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.993769] kthread+0x337/0x6f0 [ 11.993789] ? trace_preempt_on+0x20/0xc0 [ 11.993813] ? __pfx_kthread+0x10/0x10 [ 11.993862] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.993884] ? calculate_sigpending+0x7b/0xa0 [ 11.993909] ? __pfx_kthread+0x10/0x10 [ 11.993932] ret_from_fork+0x116/0x1d0 [ 11.993952] ? __pfx_kthread+0x10/0x10 [ 11.993974] ret_from_fork_asm+0x1a/0x30 [ 11.994005] </TASK> [ 11.994016] [ 12.001706] Allocated by task 212: [ 12.001842] kasan_save_stack+0x45/0x70 [ 12.002051] kasan_save_track+0x18/0x40 [ 12.002252] kasan_save_alloc_info+0x3b/0x50 [ 12.002549] __kasan_kmalloc+0xb7/0xc0 [ 12.002758] __kmalloc_cache_noprof+0x189/0x420 [ 12.002978] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.003135] kunit_try_run_case+0x1a5/0x480 [ 12.003342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.003613] kthread+0x337/0x6f0 [ 12.003897] ret_from_fork+0x116/0x1d0 [ 12.004060] ret_from_fork_asm+0x1a/0x30 [ 12.004327] [ 12.004432] The buggy address belongs to the object at ffff8881031d4800 [ 12.004432] which belongs to the cache kmalloc-128 of size 128 [ 12.004948] The buggy address is located 0 bytes to the right of [ 12.004948] allocated 115-byte region [ffff8881031d4800, ffff8881031d4873) [ 12.005515] [ 12.005614] The buggy address belongs to the physical page: [ 12.005827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4 [ 12.006072] flags: 0x200000000000000(node=0|zone=2) [ 12.006239] page_type: f5(slab) [ 12.006362] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.006608] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.006849] page dumped because: kasan: bad access detected [ 12.007101] [ 12.009007] Memory state around the buggy address: [ 12.009392] ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.009751] ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.009972] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.010186] ^ [ 12.010662] ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.010919] ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.011230] ==================================================================