Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.523428] ==================================================================
[   34.524321] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   34.525668] Read of size 1 at addr fff00000c635797f by task kunit_try_catch/183
[   34.526393] 
[   34.526726] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.528252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.529164] Hardware name: linux,dummy-virt (DT)
[   34.530374] Call trace:
[   34.531253]  show_stack+0x20/0x38 (C)
[   34.532162]  dump_stack_lvl+0x8c/0xd0
[   34.533259]  print_report+0x118/0x5e0
[   34.534046]  kasan_report+0xc8/0x118
[   34.535095]  __asan_report_load1_noabort+0x20/0x30
[   34.535901]  ksize_unpoisons_memory+0x6a0/0x750
[   34.536783]  kunit_try_run_case+0x14c/0x3d0
[   34.537934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.539101]  kthread+0x24c/0x2d0
[   34.539781]  ret_from_fork+0x10/0x20
[   34.540980] 
[   34.541526] Allocated by task 183:
[   34.542298]  kasan_save_stack+0x3c/0x68
[   34.542698]  kasan_save_track+0x20/0x40
[   34.542983]  kasan_save_alloc_info+0x40/0x58
[   34.543285]  __kasan_kmalloc+0xd4/0xd8
[   34.543663]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.544736]  ksize_unpoisons_memory+0xc0/0x750
[   34.545844]  kunit_try_run_case+0x14c/0x3d0
[   34.547008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548084]  kthread+0x24c/0x2d0
[   34.548869]  ret_from_fork+0x10/0x20
[   34.549847] 
[   34.550230] The buggy address belongs to the object at fff00000c6357900
[   34.550230]  which belongs to the cache kmalloc-128 of size 128
[   34.551636] The buggy address is located 12 bytes to the right of
[   34.551636]  allocated 115-byte region [fff00000c6357900, fff00000c6357973)
[   34.553136] 
[   34.553431] The buggy address belongs to the physical page:
[   34.553963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.557273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.560415] page_type: f5(slab)
[   34.561151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.562263] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.563381] page dumped because: kasan: bad access detected
[   34.564465] 
[   34.564974] Memory state around the buggy address:
[   34.565791]  fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.566471]  fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.567337] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.568126]                                                                 ^
[   34.569752]  fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.570896]  fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.571745] ==================================================================
[   34.471874] ==================================================================
[   34.473005] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   34.474491] Read of size 1 at addr fff00000c6357978 by task kunit_try_catch/183
[   34.475512] 
[   34.475835] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.478219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.479796] Hardware name: linux,dummy-virt (DT)
[   34.480515] Call trace:
[   34.481159]  show_stack+0x20/0x38 (C)
[   34.481912]  dump_stack_lvl+0x8c/0xd0
[   34.483730]  print_report+0x118/0x5e0
[   34.484346]  kasan_report+0xc8/0x118
[   34.485369]  __asan_report_load1_noabort+0x20/0x30
[   34.486422]  ksize_unpoisons_memory+0x628/0x750
[   34.487238]  kunit_try_run_case+0x14c/0x3d0
[   34.488011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.489232]  kthread+0x24c/0x2d0
[   34.490211]  ret_from_fork+0x10/0x20
[   34.491199] 
[   34.491690] Allocated by task 183:
[   34.492500]  kasan_save_stack+0x3c/0x68
[   34.493366]  kasan_save_track+0x20/0x40
[   34.493831]  kasan_save_alloc_info+0x40/0x58
[   34.494567]  __kasan_kmalloc+0xd4/0xd8
[   34.495212]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.496283]  ksize_unpoisons_memory+0xc0/0x750
[   34.497674]  kunit_try_run_case+0x14c/0x3d0
[   34.498622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.499495]  kthread+0x24c/0x2d0
[   34.499988]  ret_from_fork+0x10/0x20
[   34.500570] 
[   34.501718] The buggy address belongs to the object at fff00000c6357900
[   34.501718]  which belongs to the cache kmalloc-128 of size 128
[   34.503132] The buggy address is located 5 bytes to the right of
[   34.503132]  allocated 115-byte region [fff00000c6357900, fff00000c6357973)
[   34.504677] 
[   34.505012] The buggy address belongs to the physical page:
[   34.506476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.507057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.507518] page_type: f5(slab)
[   34.508307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.509993] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.511037] page dumped because: kasan: bad access detected
[   34.511939] 
[   34.512250] Memory state around the buggy address:
[   34.512899]  fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.513774]  fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.515653] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.516415]                                                                 ^
[   34.518020]  fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.519152]  fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.520029] ==================================================================
[   34.414681] ==================================================================
[   34.416340] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   34.417992] Read of size 1 at addr fff00000c6357973 by task kunit_try_catch/183
[   34.419701] 
[   34.420071] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.422193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.422759] Hardware name: linux,dummy-virt (DT)
[   34.423589] Call trace:
[   34.424024]  show_stack+0x20/0x38 (C)
[   34.424619]  dump_stack_lvl+0x8c/0xd0
[   34.425808]  print_report+0x118/0x5e0
[   34.426677]  kasan_report+0xc8/0x118
[   34.427620]  __asan_report_load1_noabort+0x20/0x30
[   34.428698]  ksize_unpoisons_memory+0x638/0x750
[   34.429057]  kunit_try_run_case+0x14c/0x3d0
[   34.431490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.432173]  kthread+0x24c/0x2d0
[   34.432625]  ret_from_fork+0x10/0x20
[   34.433049] 
[   34.433590] Allocated by task 183:
[   34.434143]  kasan_save_stack+0x3c/0x68
[   34.436612]  kasan_save_track+0x20/0x40
[   34.437660]  kasan_save_alloc_info+0x40/0x58
[   34.438179]  __kasan_kmalloc+0xd4/0xd8
[   34.440633]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.442758]  ksize_unpoisons_memory+0xc0/0x750
[   34.443312]  kunit_try_run_case+0x14c/0x3d0
[   34.445908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.447161]  kthread+0x24c/0x2d0
[   34.447967]  ret_from_fork+0x10/0x20
[   34.449067] 
[   34.449415] The buggy address belongs to the object at fff00000c6357900
[   34.449415]  which belongs to the cache kmalloc-128 of size 128
[   34.451634] The buggy address is located 0 bytes to the right of
[   34.451634]  allocated 115-byte region [fff00000c6357900, fff00000c6357973)
[   34.454385] 
[   34.454776] The buggy address belongs to the physical page:
[   34.455504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.456398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.458204] page_type: f5(slab)
[   34.458926] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.459655] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.460090] page dumped because: kasan: bad access detected
[   34.460422] 
[   34.461918] Memory state around the buggy address:
[   34.462839]  fff00000c6357800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.463586]  fff00000c6357880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.464851] >fff00000c6357900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.465652]                                                              ^
[   34.466587]  fff00000c6357980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.467532]  fff00000c6357a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.468426] ==================================================================

[   25.837990] ==================================================================
[   25.839035] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   25.839953] Read of size 1 at addr ffff888102a0b47f by task kunit_try_catch/202
[   25.840748] 
[   25.841015] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.842129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.842540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.843108] Call Trace:
[   25.843406]  <TASK>
[   25.843694]  dump_stack_lvl+0x73/0xb0
[   25.844104]  print_report+0xd1/0x640
[   25.844534]  ? __virt_addr_valid+0x1db/0x2d0
[   25.845011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.845537]  kasan_report+0x102/0x140
[   25.845951]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   25.846411]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   25.846920]  __asan_report_load1_noabort+0x18/0x20
[   25.847364]  ksize_unpoisons_memory+0x7b8/0x9b0
[   25.847671]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.848184]  ? finish_task_switch.isra.0+0x153/0x700
[   25.848732]  ? __switch_to+0x5d9/0xf60
[   25.849166]  ? __schedule+0xc3e/0x2790
[   25.849634]  ? __pfx_read_tsc+0x10/0x10
[   25.850048]  ? ktime_get_ts64+0x84/0x230
[   25.850447]  kunit_try_run_case+0x1b3/0x490
[   25.850897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.851448]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.851771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.852369]  ? __kthread_parkme+0x82/0x160
[   25.852795]  ? preempt_count_sub+0x50/0x80
[   25.853107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.853454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.854078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.854669]  kthread+0x257/0x310
[   25.855077]  ? __pfx_kthread+0x10/0x10
[   25.855575]  ret_from_fork+0x41/0x80
[   25.856031]  ? __pfx_kthread+0x10/0x10
[   25.856446]  ret_from_fork_asm+0x1a/0x30
[   25.856933]  </TASK>
[   25.857287] 
[   25.857510] Allocated by task 202:
[   25.857750]  kasan_save_stack+0x3d/0x60
[   25.858235]  kasan_save_track+0x18/0x40
[   25.858716]  kasan_save_alloc_info+0x3b/0x50
[   25.859211]  __kasan_kmalloc+0xb7/0xc0
[   25.859522]  __kmalloc_cache_noprof+0x184/0x410
[   25.859810]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.860330]  kunit_try_run_case+0x1b3/0x490
[   25.860817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.861399]  kthread+0x257/0x310
[   25.861675]  ret_from_fork+0x41/0x80
[   25.861963]  ret_from_fork_asm+0x1a/0x30
[   25.862227] 
[   25.862423] The buggy address belongs to the object at ffff888102a0b400
[   25.862423]  which belongs to the cache kmalloc-128 of size 128
[   25.863234] The buggy address is located 12 bytes to the right of
[   25.863234]  allocated 115-byte region [ffff888102a0b400, ffff888102a0b473)
[   25.864307] 
[   25.864474] The buggy address belongs to the physical page:
[   25.864767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   25.865191] flags: 0x200000000000000(node=0|zone=2)
[   25.865539] page_type: f5(slab)
[   25.866355] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.867070] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.868589] page dumped because: kasan: bad access detected
[   25.869071] 
[   25.869291] Memory state around the buggy address:
[   25.869741]  ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.870384]  ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.871045] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.871709]                                                                 ^
[   25.872402]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.872891]  ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.873399] ==================================================================
[   25.799242] ==================================================================
[   25.799933] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   25.800639] Read of size 1 at addr ffff888102a0b478 by task kunit_try_catch/202
[   25.801289] 
[   25.801526] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.802417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.803864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.804850] Call Trace:
[   25.805137]  <TASK>
[   25.805596]  dump_stack_lvl+0x73/0xb0
[   25.806286]  print_report+0xd1/0x640
[   25.806784]  ? __virt_addr_valid+0x1db/0x2d0
[   25.807184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.807646]  kasan_report+0x102/0x140
[   25.808119]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   25.808631]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   25.808985]  __asan_report_load1_noabort+0x18/0x20
[   25.809528]  ksize_unpoisons_memory+0x7eb/0x9b0
[   25.809965]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.810382]  ? finish_task_switch.isra.0+0x153/0x700
[   25.810901]  ? __switch_to+0x5d9/0xf60
[   25.811381]  ? __schedule+0xc3e/0x2790
[   25.811706]  ? __pfx_read_tsc+0x10/0x10
[   25.812128]  ? ktime_get_ts64+0x84/0x230
[   25.812525]  kunit_try_run_case+0x1b3/0x490
[   25.812914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.813394]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.813773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.814189]  ? __kthread_parkme+0x82/0x160
[   25.814662]  ? preempt_count_sub+0x50/0x80
[   25.815093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.815585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.816041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.816618]  kthread+0x257/0x310
[   25.816964]  ? __pfx_kthread+0x10/0x10
[   25.817304]  ret_from_fork+0x41/0x80
[   25.817712]  ? __pfx_kthread+0x10/0x10
[   25.818155]  ret_from_fork_asm+0x1a/0x30
[   25.818598]  </TASK>
[   25.818876] 
[   25.819028] Allocated by task 202:
[   25.819406]  kasan_save_stack+0x3d/0x60
[   25.819780]  kasan_save_track+0x18/0x40
[   25.820082]  kasan_save_alloc_info+0x3b/0x50
[   25.820564]  __kasan_kmalloc+0xb7/0xc0
[   25.820919]  __kmalloc_cache_noprof+0x184/0x410
[   25.821360]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.821789]  kunit_try_run_case+0x1b3/0x490
[   25.822287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.822667]  kthread+0x257/0x310
[   25.823041]  ret_from_fork+0x41/0x80
[   25.823397]  ret_from_fork_asm+0x1a/0x30
[   25.823672] 
[   25.823819] The buggy address belongs to the object at ffff888102a0b400
[   25.823819]  which belongs to the cache kmalloc-128 of size 128
[   25.824449] The buggy address is located 5 bytes to the right of
[   25.824449]  allocated 115-byte region [ffff888102a0b400, ffff888102a0b473)
[   25.825213] 
[   25.825479] The buggy address belongs to the physical page:
[   25.826012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   25.826754] flags: 0x200000000000000(node=0|zone=2)
[   25.827285] page_type: f5(slab)
[   25.827647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.828368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.828746] page dumped because: kasan: bad access detected
[   25.829066] 
[   25.829205] Memory state around the buggy address:
[   25.829523]  ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.830173]  ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.830817] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.831487]                                                                 ^
[   25.832109]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832770]  ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.833236] ==================================================================
[   25.743737] ==================================================================
[   25.744975] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   25.746339] Read of size 1 at addr ffff888102a0b473 by task kunit_try_catch/202
[   25.746907] 
[   25.747108] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.748263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.748751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.750173] Call Trace:
[   25.750423]  <TASK>
[   25.751760]  dump_stack_lvl+0x73/0xb0
[   25.752206]  print_report+0xd1/0x640
[   25.752888]  ? __virt_addr_valid+0x1db/0x2d0
[   25.753814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.754293]  kasan_report+0x102/0x140
[   25.754649]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   25.755132]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   25.756636]  __asan_report_load1_noabort+0x18/0x20
[   25.757290]  ksize_unpoisons_memory+0x81e/0x9b0
[   25.757702]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.758226]  ? finish_task_switch.isra.0+0x153/0x700
[   25.759323]  ? __switch_to+0x5d9/0xf60
[   25.759692]  ? __schedule+0xc3e/0x2790
[   25.760107]  ? __pfx_read_tsc+0x10/0x10
[   25.761609]  ? ktime_get_ts64+0x84/0x230
[   25.762172]  kunit_try_run_case+0x1b3/0x490
[   25.762979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.763688]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.764156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.764687]  ? __kthread_parkme+0x82/0x160
[   25.765793]  ? preempt_count_sub+0x50/0x80
[   25.766572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.767417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.768530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.769219]  kthread+0x257/0x310
[   25.770109]  ? __pfx_kthread+0x10/0x10
[   25.770688]  ret_from_fork+0x41/0x80
[   25.771124]  ? __pfx_kthread+0x10/0x10
[   25.771684]  ret_from_fork_asm+0x1a/0x30
[   25.772181]  </TASK>
[   25.772791] 
[   25.773674] Allocated by task 202:
[   25.774298]  kasan_save_stack+0x3d/0x60
[   25.775058]  kasan_save_track+0x18/0x40
[   25.775430]  kasan_save_alloc_info+0x3b/0x50
[   25.776470]  __kasan_kmalloc+0xb7/0xc0
[   25.777427]  __kmalloc_cache_noprof+0x184/0x410
[   25.777696]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.778937]  kunit_try_run_case+0x1b3/0x490
[   25.779327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.779999]  kthread+0x257/0x310
[   25.780925]  ret_from_fork+0x41/0x80
[   25.781330]  ret_from_fork_asm+0x1a/0x30
[   25.781553] 
[   25.781687] The buggy address belongs to the object at ffff888102a0b400
[   25.781687]  which belongs to the cache kmalloc-128 of size 128
[   25.782702] The buggy address is located 0 bytes to the right of
[   25.782702]  allocated 115-byte region [ffff888102a0b400, ffff888102a0b473)
[   25.784705] 
[   25.785277] The buggy address belongs to the physical page:
[   25.785717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   25.787380] flags: 0x200000000000000(node=0|zone=2)
[   25.787785] page_type: f5(slab)
[   25.788648] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.790136] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.790569] page dumped because: kasan: bad access detected
[   25.791529] 
[   25.792021] Memory state around the buggy address:
[   25.792726]  ffff888102a0b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.793496]  ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.794520] >ffff888102a0b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.795637]                                                              ^
[   25.796093]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.796738]  ffff888102a0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.797557] ==================================================================