Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.267553] ================================================================== [ 18.267607] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.267660] Read of size 1 at addr fff00000c68f1878 by task kunit_try_catch/194 [ 18.267985] [ 18.268034] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.268122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.268148] Hardware name: linux,dummy-virt (DT) [ 18.268300] Call trace: [ 18.268509] show_stack+0x20/0x38 (C) [ 18.268635] dump_stack_lvl+0x8c/0xd0 [ 18.268770] print_report+0x118/0x608 [ 18.268867] kasan_report+0xdc/0x128 [ 18.268962] __asan_report_load1_noabort+0x20/0x30 [ 18.269225] ksize_unpoisons_memory+0x618/0x740 [ 18.269303] kunit_try_run_case+0x170/0x3f0 [ 18.269387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.269457] kthread+0x328/0x630 [ 18.269690] ret_from_fork+0x10/0x20 [ 18.270026] [ 18.270064] Allocated by task 194: [ 18.270177] kasan_save_stack+0x3c/0x68 [ 18.270511] kasan_save_track+0x20/0x40 [ 18.270608] kasan_save_alloc_info+0x40/0x58 [ 18.270825] __kasan_kmalloc+0xd4/0xd8 [ 18.271019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.271274] ksize_unpoisons_memory+0xc0/0x740 [ 18.271507] kunit_try_run_case+0x170/0x3f0 [ 18.271651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.271826] kthread+0x328/0x630 [ 18.271948] ret_from_fork+0x10/0x20 [ 18.272115] [ 18.272145] The buggy address belongs to the object at fff00000c68f1800 [ 18.272145] which belongs to the cache kmalloc-128 of size 128 [ 18.272557] The buggy address is located 5 bytes to the right of [ 18.272557] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.272740] [ 18.272790] The buggy address belongs to the physical page: [ 18.272829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.272882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.272932] page_type: f5(slab) [ 18.272984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.273035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.273084] page dumped because: kasan: bad access detected [ 18.273115] [ 18.273141] Memory state around the buggy address: [ 18.273184] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.273235] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273278] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.273326] ^ [ 18.273378] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273421] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.273464] ================================================================== [ 18.252728] ================================================================== [ 18.252784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.252836] Read of size 1 at addr fff00000c68f1873 by task kunit_try_catch/194 [ 18.252886] [ 18.252944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.253038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.253066] Hardware name: linux,dummy-virt (DT) [ 18.253102] Call trace: [ 18.253124] show_stack+0x20/0x38 (C) [ 18.253187] dump_stack_lvl+0x8c/0xd0 [ 18.253232] print_report+0x118/0x608 [ 18.253690] kasan_report+0xdc/0x128 [ 18.253865] __asan_report_load1_noabort+0x20/0x30 [ 18.254449] ksize_unpoisons_memory+0x628/0x740 [ 18.254510] kunit_try_run_case+0x170/0x3f0 [ 18.255540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.255763] kthread+0x328/0x630 [ 18.255827] ret_from_fork+0x10/0x20 [ 18.256128] [ 18.256346] Allocated by task 194: [ 18.256450] kasan_save_stack+0x3c/0x68 [ 18.256621] kasan_save_track+0x20/0x40 [ 18.256907] kasan_save_alloc_info+0x40/0x58 [ 18.257051] __kasan_kmalloc+0xd4/0xd8 [ 18.257280] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.257701] ksize_unpoisons_memory+0xc0/0x740 [ 18.257934] kunit_try_run_case+0x170/0x3f0 [ 18.257976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.258046] kthread+0x328/0x630 [ 18.258356] ret_from_fork+0x10/0x20 [ 18.258506] [ 18.258549] The buggy address belongs to the object at fff00000c68f1800 [ 18.258549] which belongs to the cache kmalloc-128 of size 128 [ 18.258887] The buggy address is located 0 bytes to the right of [ 18.258887] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.259025] [ 18.259048] The buggy address belongs to the physical page: [ 18.259244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.259472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.259527] page_type: f5(slab) [ 18.259567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.259934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.260074] page dumped because: kasan: bad access detected [ 18.260166] [ 18.260184] Memory state around the buggy address: [ 18.260246] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.260310] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.260494] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.260760] ^ [ 18.261110] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.261224] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.261322] ================================================================== [ 18.275711] ================================================================== [ 18.275765] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.275840] Read of size 1 at addr fff00000c68f187f by task kunit_try_catch/194 [ 18.275892] [ 18.275928] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 18.276197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.276426] Hardware name: linux,dummy-virt (DT) [ 18.276471] Call trace: [ 18.276579] show_stack+0x20/0x38 (C) [ 18.276651] dump_stack_lvl+0x8c/0xd0 [ 18.276727] print_report+0x118/0x608 [ 18.276849] kasan_report+0xdc/0x128 [ 18.277054] __asan_report_load1_noabort+0x20/0x30 [ 18.277253] ksize_unpoisons_memory+0x690/0x740 [ 18.277366] kunit_try_run_case+0x170/0x3f0 [ 18.277418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.277472] kthread+0x328/0x630 [ 18.277584] ret_from_fork+0x10/0x20 [ 18.277635] [ 18.277653] Allocated by task 194: [ 18.277768] kasan_save_stack+0x3c/0x68 [ 18.277814] kasan_save_track+0x20/0x40 [ 18.278468] kasan_save_alloc_info+0x40/0x58 [ 18.278568] __kasan_kmalloc+0xd4/0xd8 [ 18.278731] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.279121] ksize_unpoisons_memory+0xc0/0x740 [ 18.279322] kunit_try_run_case+0x170/0x3f0 [ 18.279448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.279666] kthread+0x328/0x630 [ 18.279986] ret_from_fork+0x10/0x20 [ 18.280254] [ 18.280387] The buggy address belongs to the object at fff00000c68f1800 [ 18.280387] which belongs to the cache kmalloc-128 of size 128 [ 18.280519] The buggy address is located 12 bytes to the right of [ 18.280519] allocated 115-byte region [fff00000c68f1800, fff00000c68f1873) [ 18.280693] [ 18.280735] The buggy address belongs to the physical page: [ 18.281132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1 [ 18.281327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.281534] page_type: f5(slab) [ 18.281600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.281680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.282030] page dumped because: kasan: bad access detected [ 18.282103] [ 18.282541] Memory state around the buggy address: [ 18.282592] fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.282638] fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283066] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.283149] ^ [ 18.283202] fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283346] fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.283387] ==================================================================
[ 14.540253] ================================================================== [ 14.540927] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.541209] Read of size 1 at addr ffff888102b48f78 by task kunit_try_catch/212 [ 14.541884] [ 14.542100] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.542199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.542231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.542270] Call Trace: [ 14.542298] <TASK> [ 14.542339] dump_stack_lvl+0x73/0xb0 [ 14.542401] print_report+0xd1/0x650 [ 14.542449] ? __virt_addr_valid+0x1db/0x2d0 [ 14.542660] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.542746] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542799] kasan_report+0x141/0x180 [ 14.542842] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542905] __asan_report_load1_noabort+0x18/0x20 [ 14.542938] ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.542978] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.543016] ? finish_task_switch.isra.0+0x153/0x700 [ 14.543056] ? __switch_to+0x47/0xf50 [ 14.543104] ? __schedule+0x10cc/0x2b60 [ 14.543150] ? __pfx_read_tsc+0x10/0x10 [ 14.543189] ? ktime_get_ts64+0x86/0x230 [ 14.543246] kunit_try_run_case+0x1a5/0x480 [ 14.543290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.543342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.543363] ? __kthread_parkme+0x82/0x180 [ 14.543385] ? preempt_count_sub+0x50/0x80 [ 14.543407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.543469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.543541] kthread+0x337/0x6f0 [ 14.543576] ? trace_preempt_on+0x20/0xc0 [ 14.543627] ? __pfx_kthread+0x10/0x10 [ 14.543650] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.543671] ? calculate_sigpending+0x7b/0xa0 [ 14.543695] ? __pfx_kthread+0x10/0x10 [ 14.543716] ret_from_fork+0x116/0x1d0 [ 14.543734] ? __pfx_kthread+0x10/0x10 [ 14.543754] ret_from_fork_asm+0x1a/0x30 [ 14.543785] </TASK> [ 14.543797] [ 14.556847] Allocated by task 212: [ 14.557169] kasan_save_stack+0x45/0x70 [ 14.557515] kasan_save_track+0x18/0x40 [ 14.557806] kasan_save_alloc_info+0x3b/0x50 [ 14.558024] __kasan_kmalloc+0xb7/0xc0 [ 14.558356] __kmalloc_cache_noprof+0x189/0x420 [ 14.558589] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.559035] kunit_try_run_case+0x1a5/0x480 [ 14.559349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559722] kthread+0x337/0x6f0 [ 14.559924] ret_from_fork+0x116/0x1d0 [ 14.560090] ret_from_fork_asm+0x1a/0x30 [ 14.561134] [ 14.561320] The buggy address belongs to the object at ffff888102b48f00 [ 14.561320] which belongs to the cache kmalloc-128 of size 128 [ 14.562022] The buggy address is located 5 bytes to the right of [ 14.562022] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.562721] [ 14.562976] The buggy address belongs to the physical page: [ 14.563897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.564215] flags: 0x200000000000000(node=0|zone=2) [ 14.565076] page_type: f5(slab) [ 14.565270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.565499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.565859] page dumped because: kasan: bad access detected [ 14.566785] [ 14.567105] Memory state around the buggy address: [ 14.567302] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.567658] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.568083] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.568375] ^ [ 14.568839] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569241] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.569592] ================================================================== [ 14.512077] ================================================================== [ 14.512564] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 14.513157] Read of size 1 at addr ffff888102b48f73 by task kunit_try_catch/212 [ 14.513761] [ 14.513880] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.513937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.513949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.513972] Call Trace: [ 14.513987] <TASK> [ 14.514008] dump_stack_lvl+0x73/0xb0 [ 14.514042] print_report+0xd1/0x650 [ 14.514067] ? __virt_addr_valid+0x1db/0x2d0 [ 14.514090] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.514135] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514158] kasan_report+0x141/0x180 [ 14.514179] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514207] __asan_report_load1_noabort+0x18/0x20 [ 14.514246] ksize_unpoisons_memory+0x81c/0x9b0 [ 14.514272] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.514294] ? finish_task_switch.isra.0+0x153/0x700 [ 14.514319] ? __switch_to+0x47/0xf50 [ 14.514362] ? __schedule+0x10cc/0x2b60 [ 14.514387] ? __pfx_read_tsc+0x10/0x10 [ 14.514410] ? ktime_get_ts64+0x86/0x230 [ 14.514436] kunit_try_run_case+0x1a5/0x480 [ 14.514474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.514508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.514547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.514584] ? __kthread_parkme+0x82/0x180 [ 14.514622] ? preempt_count_sub+0x50/0x80 [ 14.514670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.514716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.514760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.514948] kthread+0x337/0x6f0 [ 14.515001] ? trace_preempt_on+0x20/0xc0 [ 14.515053] ? __pfx_kthread+0x10/0x10 [ 14.515097] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.515136] ? calculate_sigpending+0x7b/0xa0 [ 14.515176] ? __pfx_kthread+0x10/0x10 [ 14.515213] ret_from_fork+0x116/0x1d0 [ 14.515262] ? __pfx_kthread+0x10/0x10 [ 14.515300] ret_from_fork_asm+0x1a/0x30 [ 14.515364] </TASK> [ 14.515389] [ 14.526426] Allocated by task 212: [ 14.526909] kasan_save_stack+0x45/0x70 [ 14.527162] kasan_save_track+0x18/0x40 [ 14.527667] kasan_save_alloc_info+0x3b/0x50 [ 14.527957] __kasan_kmalloc+0xb7/0xc0 [ 14.528156] __kmalloc_cache_noprof+0x189/0x420 [ 14.528737] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.529089] kunit_try_run_case+0x1a5/0x480 [ 14.529449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.529915] kthread+0x337/0x6f0 [ 14.530164] ret_from_fork+0x116/0x1d0 [ 14.530629] ret_from_fork_asm+0x1a/0x30 [ 14.530873] [ 14.531038] The buggy address belongs to the object at ffff888102b48f00 [ 14.531038] which belongs to the cache kmalloc-128 of size 128 [ 14.531743] The buggy address is located 0 bytes to the right of [ 14.531743] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.532367] [ 14.532694] The buggy address belongs to the physical page: [ 14.532992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.533423] flags: 0x200000000000000(node=0|zone=2) [ 14.533979] page_type: f5(slab) [ 14.534277] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.534882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.535319] page dumped because: kasan: bad access detected [ 14.535797] [ 14.535903] Memory state around the buggy address: [ 14.536125] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.536366] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536860] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.537139] ^ [ 14.537775] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538158] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.538831] ================================================================== [ 14.572160] ================================================================== [ 14.572855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.573365] Read of size 1 at addr ffff888102b48f7f by task kunit_try_catch/212 [ 14.573670] [ 14.573921] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 14.574045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.574071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.574114] Call Trace: [ 14.574142] <TASK> [ 14.574177] dump_stack_lvl+0x73/0xb0 [ 14.574247] print_report+0xd1/0x650 [ 14.574293] ? __virt_addr_valid+0x1db/0x2d0 [ 14.574410] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.574499] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574546] kasan_report+0x141/0x180 [ 14.574587] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574644] __asan_report_load1_noabort+0x18/0x20 [ 14.574683] ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.574712] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.574734] ? finish_task_switch.isra.0+0x153/0x700 [ 14.574759] ? __switch_to+0x47/0xf50 [ 14.574786] ? __schedule+0x10cc/0x2b60 [ 14.574809] ? __pfx_read_tsc+0x10/0x10 [ 14.574831] ? ktime_get_ts64+0x86/0x230 [ 14.574855] kunit_try_run_case+0x1a5/0x480 [ 14.574882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.574903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.574925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.574947] ? __kthread_parkme+0x82/0x180 [ 14.574970] ? preempt_count_sub+0x50/0x80 [ 14.574993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.575015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.575037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.575058] kthread+0x337/0x6f0 [ 14.575077] ? trace_preempt_on+0x20/0xc0 [ 14.575101] ? __pfx_kthread+0x10/0x10 [ 14.575122] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.575142] ? calculate_sigpending+0x7b/0xa0 [ 14.575166] ? __pfx_kthread+0x10/0x10 [ 14.575187] ret_from_fork+0x116/0x1d0 [ 14.575204] ? __pfx_kthread+0x10/0x10 [ 14.575245] ret_from_fork_asm+0x1a/0x30 [ 14.575280] </TASK> [ 14.575292] [ 14.583581] Allocated by task 212: [ 14.583934] kasan_save_stack+0x45/0x70 [ 14.584300] kasan_save_track+0x18/0x40 [ 14.584574] kasan_save_alloc_info+0x3b/0x50 [ 14.584894] __kasan_kmalloc+0xb7/0xc0 [ 14.585186] __kmalloc_cache_noprof+0x189/0x420 [ 14.585583] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.585943] kunit_try_run_case+0x1a5/0x480 [ 14.586232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.586571] kthread+0x337/0x6f0 [ 14.586734] ret_from_fork+0x116/0x1d0 [ 14.586907] ret_from_fork_asm+0x1a/0x30 [ 14.587083] [ 14.587190] The buggy address belongs to the object at ffff888102b48f00 [ 14.587190] which belongs to the cache kmalloc-128 of size 128 [ 14.587577] The buggy address is located 12 bytes to the right of [ 14.587577] allocated 115-byte region [ffff888102b48f00, ffff888102b48f73) [ 14.588447] [ 14.588645] The buggy address belongs to the physical page: [ 14.589024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 14.589637] flags: 0x200000000000000(node=0|zone=2) [ 14.590045] page_type: f5(slab) [ 14.590331] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.590876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.591446] page dumped because: kasan: bad access detected [ 14.591822] [ 14.591966] Memory state around the buggy address: [ 14.592275] ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.592688] ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.592972] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.593201] ^ [ 14.593727] ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.594247] ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.594630] ==================================================================