Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.523428] ================================================================== [ 34.524321] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 34.525668] Read of size 1 at addr fff00000c635797f by task kunit_try_catch/183 [ 34.526393] [ 34.526726] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 34.528252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.529164] Hardware name: linux,dummy-virt (DT) [ 34.530374] Call trace: [ 34.531253] show_stack+0x20/0x38 (C) [ 34.532162] dump_stack_lvl+0x8c/0xd0 [ 34.533259] print_report+0x118/0x5e0 [ 34.534046] kasan_report+0xc8/0x118 [ 34.535095] __asan_report_load1_noabort+0x20/0x30 [ 34.535901] ksize_unpoisons_memory+0x6a0/0x750 [ 34.536783] kunit_try_run_case+0x14c/0x3d0 [ 34.537934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.539101] kthread+0x24c/0x2d0 [ 34.539781] ret_from_fork+0x10/0x20 [ 34.540980] [ 34.541526] Allocated by task 183: [ 34.542298] kasan_save_stack+0x3c/0x68 [ 34.542698] kasan_save_track+0x20/0x40 [ 34.542983] kasan_save_alloc_info+0x40/0x58 [ 34.543285] __kasan_kmalloc+0xd4/0xd8 [ 34.543663] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.544736] ksize_unpoisons_memory+0xc0/0x750 [ 34.545844] kunit_try_run_case+0x14c/0x3d0 [ 34.547008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548084] kthread+0x24c/0x2d0 [ 34.548869] ret_from_fork+0x10/0x20 [ 34.549847] [ 34.550230] The buggy address belongs to the object at fff00000c6357900 [ 34.550230] which belongs to the cache kmalloc-128 of size 128 [ 34.551636] The buggy address is located 12 bytes to the right of [ 34.551636] allocated 115-byte region [fff00000c6357900, fff00000c6357973) [ 34.553136] [ 34.553431] The buggy address belongs to the physical page: [ 34.553963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357 [ 34.557273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.560415] page_type: f5(slab) [ 34.561151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.562263] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 34.563381] page dumped because: kasan: bad access detected [ 34.564465] [ 34.564974] Memory state around the buggy address: [ 34.565791] fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.566471] fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.567337] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.568126] ^ [ 34.569752] fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.570896] fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.571745] ================================================================== [ 34.471874] ================================================================== [ 34.473005] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 34.474491] Read of size 1 at addr fff00000c6357978 by task kunit_try_catch/183 [ 34.475512] [ 34.475835] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 34.478219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.479796] Hardware name: linux,dummy-virt (DT) [ 34.480515] Call trace: [ 34.481159] show_stack+0x20/0x38 (C) [ 34.481912] dump_stack_lvl+0x8c/0xd0 [ 34.483730] print_report+0x118/0x5e0 [ 34.484346] kasan_report+0xc8/0x118 [ 34.485369] __asan_report_load1_noabort+0x20/0x30 [ 34.486422] ksize_unpoisons_memory+0x628/0x750 [ 34.487238] kunit_try_run_case+0x14c/0x3d0 [ 34.488011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.489232] kthread+0x24c/0x2d0 [ 34.490211] ret_from_fork+0x10/0x20 [ 34.491199] [ 34.491690] Allocated by task 183: [ 34.492500] kasan_save_stack+0x3c/0x68 [ 34.493366] kasan_save_track+0x20/0x40 [ 34.493831] kasan_save_alloc_info+0x40/0x58 [ 34.494567] __kasan_kmalloc+0xd4/0xd8 [ 34.495212] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.496283] ksize_unpoisons_memory+0xc0/0x750 [ 34.497674] kunit_try_run_case+0x14c/0x3d0 [ 34.498622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.499495] kthread+0x24c/0x2d0 [ 34.499988] ret_from_fork+0x10/0x20 [ 34.500570] [ 34.501718] The buggy address belongs to the object at fff00000c6357900 [ 34.501718] which belongs to the cache kmalloc-128 of size 128 [ 34.503132] The buggy address is located 5 bytes to the right of [ 34.503132] allocated 115-byte region [fff00000c6357900, fff00000c6357973) [ 34.504677] [ 34.505012] The buggy address belongs to the physical page: [ 34.506476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357 [ 34.507057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.507518] page_type: f5(slab) [ 34.508307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.509993] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 34.511037] page dumped because: kasan: bad access detected [ 34.511939] [ 34.512250] Memory state around the buggy address: [ 34.512899] fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.513774] fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.515653] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.516415] ^ [ 34.518020] fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.519152] fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.520029] ================================================================== [ 34.414681] ================================================================== [ 34.416340] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 34.417992] Read of size 1 at addr fff00000c6357973 by task kunit_try_catch/183 [ 34.419701] [ 34.420071] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 34.422193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.422759] Hardware name: linux,dummy-virt (DT) [ 34.423589] Call trace: [ 34.424024] show_stack+0x20/0x38 (C) [ 34.424619] dump_stack_lvl+0x8c/0xd0 [ 34.425808] print_report+0x118/0x5e0 [ 34.426677] kasan_report+0xc8/0x118 [ 34.427620] __asan_report_load1_noabort+0x20/0x30 [ 34.428698] ksize_unpoisons_memory+0x638/0x750 [ 34.429057] kunit_try_run_case+0x14c/0x3d0 [ 34.431490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432173] kthread+0x24c/0x2d0 [ 34.432625] ret_from_fork+0x10/0x20 [ 34.433049] [ 34.433590] Allocated by task 183: [ 34.434143] kasan_save_stack+0x3c/0x68 [ 34.436612] kasan_save_track+0x20/0x40 [ 34.437660] kasan_save_alloc_info+0x40/0x58 [ 34.438179] __kasan_kmalloc+0xd4/0xd8 [ 34.440633] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.442758] ksize_unpoisons_memory+0xc0/0x750 [ 34.443312] kunit_try_run_case+0x14c/0x3d0 [ 34.445908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.447161] kthread+0x24c/0x2d0 [ 34.447967] ret_from_fork+0x10/0x20 [ 34.449067] [ 34.449415] The buggy address belongs to the object at fff00000c6357900 [ 34.449415] which belongs to the cache kmalloc-128 of size 128 [ 34.451634] The buggy address is located 0 bytes to the right of [ 34.451634] allocated 115-byte region [fff00000c6357900, fff00000c6357973) [ 34.454385] [ 34.454776] The buggy address belongs to the physical page: [ 34.455504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357 [ 34.456398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.458204] page_type: f5(slab) [ 34.458926] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.459655] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 34.460090] page dumped because: kasan: bad access detected [ 34.460422] [ 34.461918] Memory state around the buggy address: [ 34.462839] fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.463586] fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.464851] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.465652] ^ [ 34.466587] fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.467532] fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.468426] ==================================================================
[ 25.837990] ================================================================== [ 25.839035] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 25.839953] Read of size 1 at addr ffff888102a0b47f by task kunit_try_catch/202 [ 25.840748] [ 25.841015] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 25.842129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.842540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.843108] Call Trace: [ 25.843406] <TASK> [ 25.843694] dump_stack_lvl+0x73/0xb0 [ 25.844104] print_report+0xd1/0x640 [ 25.844534] ? __virt_addr_valid+0x1db/0x2d0 [ 25.845011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.845537] kasan_report+0x102/0x140 [ 25.845951] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 25.846411] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 25.846920] __asan_report_load1_noabort+0x18/0x20 [ 25.847364] ksize_unpoisons_memory+0x7b8/0x9b0 [ 25.847671] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.848184] ? finish_task_switch.isra.0+0x153/0x700 [ 25.848732] ? __switch_to+0x5d9/0xf60 [ 25.849166] ? __schedule+0xc3e/0x2790 [ 25.849634] ? __pfx_read_tsc+0x10/0x10 [ 25.850048] ? ktime_get_ts64+0x84/0x230 [ 25.850447] kunit_try_run_case+0x1b3/0x490 [ 25.850897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.851448] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.851771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.852369] ? __kthread_parkme+0x82/0x160 [ 25.852795] ? preempt_count_sub+0x50/0x80 [ 25.853107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.853454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.854078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.854669] kthread+0x257/0x310 [ 25.855077] ? __pfx_kthread+0x10/0x10 [ 25.855575] ret_from_fork+0x41/0x80 [ 25.856031] ? __pfx_kthread+0x10/0x10 [ 25.856446] ret_from_fork_asm+0x1a/0x30 [ 25.856933] </TASK> [ 25.857287] [ 25.857510] Allocated by task 202: [ 25.857750] kasan_save_stack+0x3d/0x60 [ 25.858235] kasan_save_track+0x18/0x40 [ 25.858716] kasan_save_alloc_info+0x3b/0x50 [ 25.859211] __kasan_kmalloc+0xb7/0xc0 [ 25.859522] __kmalloc_cache_noprof+0x184/0x410 [ 25.859810] ksize_unpoisons_memory+0xc8/0x9b0 [ 25.860330] kunit_try_run_case+0x1b3/0x490 [ 25.860817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.861399] kthread+0x257/0x310 [ 25.861675] ret_from_fork+0x41/0x80 [ 25.861963] ret_from_fork_asm+0x1a/0x30 [ 25.862227] [ 25.862423] The buggy address belongs to the object at ffff888102a0b400 [ 25.862423] which belongs to the cache kmalloc-128 of size 128 [ 25.863234] The buggy address is located 12 bytes to the right of [ 25.863234] allocated 115-byte region [ffff888102a0b400, ffff888102a0b473) [ 25.864307] [ 25.864474] The buggy address belongs to the physical page: [ 25.864767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 25.865191] flags: 0x200000000000000(node=0|zone=2) [ 25.865539] page_type: f5(slab) [ 25.866355] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.867070] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.868589] page dumped because: kasan: bad access detected [ 25.869071] [ 25.869291] Memory state around the buggy address: [ 25.869741] ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.870384] ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.871045] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.871709] ^ [ 25.872402] ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.872891] ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.873399] ================================================================== [ 25.799242] ================================================================== [ 25.799933] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 25.800639] Read of size 1 at addr ffff888102a0b478 by task kunit_try_catch/202 [ 25.801289] [ 25.801526] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 25.802417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.803864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.804850] Call Trace: [ 25.805137] <TASK> [ 25.805596] dump_stack_lvl+0x73/0xb0 [ 25.806286] print_report+0xd1/0x640 [ 25.806784] ? __virt_addr_valid+0x1db/0x2d0 [ 25.807184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.807646] kasan_report+0x102/0x140 [ 25.808119] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 25.808631] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 25.808985] __asan_report_load1_noabort+0x18/0x20 [ 25.809528] ksize_unpoisons_memory+0x7eb/0x9b0 [ 25.809965] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.810382] ? finish_task_switch.isra.0+0x153/0x700 [ 25.810901] ? __switch_to+0x5d9/0xf60 [ 25.811381] ? __schedule+0xc3e/0x2790 [ 25.811706] ? __pfx_read_tsc+0x10/0x10 [ 25.812128] ? ktime_get_ts64+0x84/0x230 [ 25.812525] kunit_try_run_case+0x1b3/0x490 [ 25.812914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.813394] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.813773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.814189] ? __kthread_parkme+0x82/0x160 [ 25.814662] ? preempt_count_sub+0x50/0x80 [ 25.815093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.815585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.816041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.816618] kthread+0x257/0x310 [ 25.816964] ? __pfx_kthread+0x10/0x10 [ 25.817304] ret_from_fork+0x41/0x80 [ 25.817712] ? __pfx_kthread+0x10/0x10 [ 25.818155] ret_from_fork_asm+0x1a/0x30 [ 25.818598] </TASK> [ 25.818876] [ 25.819028] Allocated by task 202: [ 25.819406] kasan_save_stack+0x3d/0x60 [ 25.819780] kasan_save_track+0x18/0x40 [ 25.820082] kasan_save_alloc_info+0x3b/0x50 [ 25.820564] __kasan_kmalloc+0xb7/0xc0 [ 25.820919] __kmalloc_cache_noprof+0x184/0x410 [ 25.821360] ksize_unpoisons_memory+0xc8/0x9b0 [ 25.821789] kunit_try_run_case+0x1b3/0x490 [ 25.822287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.822667] kthread+0x257/0x310 [ 25.823041] ret_from_fork+0x41/0x80 [ 25.823397] ret_from_fork_asm+0x1a/0x30 [ 25.823672] [ 25.823819] The buggy address belongs to the object at ffff888102a0b400 [ 25.823819] which belongs to the cache kmalloc-128 of size 128 [ 25.824449] The buggy address is located 5 bytes to the right of [ 25.824449] allocated 115-byte region [ffff888102a0b400, ffff888102a0b473) [ 25.825213] [ 25.825479] The buggy address belongs to the physical page: [ 25.826012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 25.826754] flags: 0x200000000000000(node=0|zone=2) [ 25.827285] page_type: f5(slab) [ 25.827647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.828368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.828746] page dumped because: kasan: bad access detected [ 25.829066] [ 25.829205] Memory state around the buggy address: [ 25.829523] ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.830173] ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.830817] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.831487] ^ [ 25.832109] ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.832770] ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.833236] ================================================================== [ 25.743737] ================================================================== [ 25.744975] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 25.746339] Read of size 1 at addr ffff888102a0b473 by task kunit_try_catch/202 [ 25.746907] [ 25.747108] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 25.748263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.748751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.750173] Call Trace: [ 25.750423] <TASK> [ 25.751760] dump_stack_lvl+0x73/0xb0 [ 25.752206] print_report+0xd1/0x640 [ 25.752888] ? __virt_addr_valid+0x1db/0x2d0 [ 25.753814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.754293] kasan_report+0x102/0x140 [ 25.754649] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 25.755132] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 25.756636] __asan_report_load1_noabort+0x18/0x20 [ 25.757290] ksize_unpoisons_memory+0x81e/0x9b0 [ 25.757702] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.758226] ? finish_task_switch.isra.0+0x153/0x700 [ 25.759323] ? __switch_to+0x5d9/0xf60 [ 25.759692] ? __schedule+0xc3e/0x2790 [ 25.760107] ? __pfx_read_tsc+0x10/0x10 [ 25.761609] ? ktime_get_ts64+0x84/0x230 [ 25.762172] kunit_try_run_case+0x1b3/0x490 [ 25.762979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.763688] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.764156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.764687] ? __kthread_parkme+0x82/0x160 [ 25.765793] ? preempt_count_sub+0x50/0x80 [ 25.766572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.767417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.768530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.769219] kthread+0x257/0x310 [ 25.770109] ? __pfx_kthread+0x10/0x10 [ 25.770688] ret_from_fork+0x41/0x80 [ 25.771124] ? __pfx_kthread+0x10/0x10 [ 25.771684] ret_from_fork_asm+0x1a/0x30 [ 25.772181] </TASK> [ 25.772791] [ 25.773674] Allocated by task 202: [ 25.774298] kasan_save_stack+0x3d/0x60 [ 25.775058] kasan_save_track+0x18/0x40 [ 25.775430] kasan_save_alloc_info+0x3b/0x50 [ 25.776470] __kasan_kmalloc+0xb7/0xc0 [ 25.777427] __kmalloc_cache_noprof+0x184/0x410 [ 25.777696] ksize_unpoisons_memory+0xc8/0x9b0 [ 25.778937] kunit_try_run_case+0x1b3/0x490 [ 25.779327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.779999] kthread+0x257/0x310 [ 25.780925] ret_from_fork+0x41/0x80 [ 25.781330] ret_from_fork_asm+0x1a/0x30 [ 25.781553] [ 25.781687] The buggy address belongs to the object at ffff888102a0b400 [ 25.781687] which belongs to the cache kmalloc-128 of size 128 [ 25.782702] The buggy address is located 0 bytes to the right of [ 25.782702] allocated 115-byte region [ffff888102a0b400, ffff888102a0b473) [ 25.784705] [ 25.785277] The buggy address belongs to the physical page: [ 25.785717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 25.787380] flags: 0x200000000000000(node=0|zone=2) [ 25.787785] page_type: f5(slab) [ 25.788648] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.790136] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.790569] page dumped because: kasan: bad access detected [ 25.791529] [ 25.792021] Memory state around the buggy address: [ 25.792726] ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.793496] ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.794520] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.795637] ^ [ 25.796093] ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.796738] ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.797557] ==================================================================