Hay
Date
Nov. 27, 2024, 3:37 a.m.

Environment
qemu-arm64
qemu-x86_64

[   48.568142] ==================================================================
[   48.569161] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   48.570280] Read of size 1 at addr fff00000c619d67f by task kunit_try_catch/183
[   48.571683] 
[   48.572049] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.573489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.574099] Hardware name: linux,dummy-virt (DT)
[   48.574783] Call trace:
[   48.575186]  show_stack+0x20/0x38 (C)
[   48.575835]  dump_stack_lvl+0x8c/0xd0
[   48.576547]  print_report+0x118/0x5e0
[   48.577226]  kasan_report+0xc8/0x118
[   48.577949]  __asan_report_load1_noabort+0x20/0x30
[   48.578768]  ksize_unpoisons_memory+0x6a0/0x750
[   48.579605]  kunit_try_run_case+0x14c/0x3d0
[   48.580286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.581239]  kthread+0x24c/0x2d0
[   48.581860]  ret_from_fork+0x10/0x20
[   48.582653] 
[   48.582958] Allocated by task 183:
[   48.583671]  kasan_save_stack+0x3c/0x68
[   48.584213]  kasan_save_track+0x20/0x40
[   48.584938]  kasan_save_alloc_info+0x40/0x58
[   48.585769]  __kasan_kmalloc+0xd4/0xd8
[   48.586409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.587076]  ksize_unpoisons_memory+0xc0/0x750
[   48.587780]  kunit_try_run_case+0x14c/0x3d0
[   48.588670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.589388]  kthread+0x24c/0x2d0
[   48.590054]  ret_from_fork+0x10/0x20
[   48.590812] 
[   48.591246] The buggy address belongs to the object at fff00000c619d600
[   48.591246]  which belongs to the cache kmalloc-128 of size 128
[   48.592663] The buggy address is located 12 bytes to the right of
[   48.592663]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.594411] 
[   48.594917] The buggy address belongs to the physical page:
[   48.595637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.596746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.598175] page_type: f5(slab)
[   48.598952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.599947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.600974] page dumped because: kasan: bad access detected
[   48.602092] 
[   48.602502] Memory state around the buggy address:
[   48.603379]  fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.604406]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.605709] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.606906]                                                                 ^
[   48.607562]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.608574]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.609211] ==================================================================
[   48.483605] ==================================================================
[   48.484813] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   48.485805] Read of size 1 at addr fff00000c619d673 by task kunit_try_catch/183
[   48.487125] 
[   48.487434] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.488943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.489654] Hardware name: linux,dummy-virt (DT)
[   48.490402] Call trace:
[   48.491169]  show_stack+0x20/0x38 (C)
[   48.491916]  dump_stack_lvl+0x8c/0xd0
[   48.492575]  print_report+0x118/0x5e0
[   48.493315]  kasan_report+0xc8/0x118
[   48.494064]  __asan_report_load1_noabort+0x20/0x30
[   48.494985]  ksize_unpoisons_memory+0x638/0x750
[   48.495692]  kunit_try_run_case+0x14c/0x3d0
[   48.496402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.497548]  kthread+0x24c/0x2d0
[   48.498110]  ret_from_fork+0x10/0x20
[   48.498913] 
[   48.499233] Allocated by task 183:
[   48.499820]  kasan_save_stack+0x3c/0x68
[   48.500350]  kasan_save_track+0x20/0x40
[   48.500999]  kasan_save_alloc_info+0x40/0x58
[   48.501663]  __kasan_kmalloc+0xd4/0xd8
[   48.502362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.503215]  ksize_unpoisons_memory+0xc0/0x750
[   48.503738]  kunit_try_run_case+0x14c/0x3d0
[   48.504827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.505952]  kthread+0x24c/0x2d0
[   48.506587]  ret_from_fork+0x10/0x20
[   48.507106] 
[   48.507463] The buggy address belongs to the object at fff00000c619d600
[   48.507463]  which belongs to the cache kmalloc-128 of size 128
[   48.508913] The buggy address is located 0 bytes to the right of
[   48.508913]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.510545] 
[   48.510821] The buggy address belongs to the physical page:
[   48.511502] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.512649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.513694] page_type: f5(slab)
[   48.514174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.515086] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.515945] page dumped because: kasan: bad access detected
[   48.516748] 
[   48.517013] Memory state around the buggy address:
[   48.517950]  fff00000c619d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.518774]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.519713] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.520487]                                                              ^
[   48.521722]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.522650]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.523545] ==================================================================
[   48.526202] ==================================================================
[   48.527125] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   48.527896] Read of size 1 at addr fff00000c619d678 by task kunit_try_catch/183
[   48.528762] 
[   48.529112] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.530369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.531004] Hardware name: linux,dummy-virt (DT)
[   48.531745] Call trace:
[   48.532120]  show_stack+0x20/0x38 (C)
[   48.532651]  dump_stack_lvl+0x8c/0xd0
[   48.533452]  print_report+0x118/0x5e0
[   48.535485]  kasan_report+0xc8/0x118
[   48.535883]  __asan_report_load1_noabort+0x20/0x30
[   48.536414]  ksize_unpoisons_memory+0x628/0x750
[   48.537802]  kunit_try_run_case+0x14c/0x3d0
[   48.538921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.539836]  kthread+0x24c/0x2d0
[   48.540427]  ret_from_fork+0x10/0x20
[   48.541229] 
[   48.541629] Allocated by task 183:
[   48.542247]  kasan_save_stack+0x3c/0x68
[   48.542936]  kasan_save_track+0x20/0x40
[   48.543523]  kasan_save_alloc_info+0x40/0x58
[   48.544090]  __kasan_kmalloc+0xd4/0xd8
[   48.544533]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.545288]  ksize_unpoisons_memory+0xc0/0x750
[   48.546272]  kunit_try_run_case+0x14c/0x3d0
[   48.547804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.549125]  kthread+0x24c/0x2d0
[   48.550075]  ret_from_fork+0x10/0x20
[   48.550602] 
[   48.550781] The buggy address belongs to the object at fff00000c619d600
[   48.550781]  which belongs to the cache kmalloc-128 of size 128
[   48.551500] The buggy address is located 5 bytes to the right of
[   48.551500]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.552833] 
[   48.553339] The buggy address belongs to the physical page:
[   48.554108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.555113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.556045] page_type: f5(slab)
[   48.556611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.557728] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.558621] page dumped because: kasan: bad access detected
[   48.559439] 
[   48.559778] Memory state around the buggy address:
[   48.560423]  fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.561244]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.562108] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.562960]                                                                 ^
[   48.564248]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.565307]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.566679] ==================================================================

[   25.766134] ==================================================================
[   25.767184] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   25.767830] Read of size 1 at addr ffff888102a4ae78 by task kunit_try_catch/202
[   25.768617] 
[   25.768788] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   25.769939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.770383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.771367] Call Trace:
[   25.771592]  <TASK>
[   25.771811]  dump_stack_lvl+0x73/0xb0
[   25.773010]  print_report+0xd1/0x640
[   25.774186]  ? __virt_addr_valid+0x1db/0x2d0
[   25.775286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.775887]  kasan_report+0x102/0x140
[   25.776549]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   25.777332]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   25.778160]  __asan_report_load1_noabort+0x18/0x20
[   25.778806]  ksize_unpoisons_memory+0x7eb/0x9b0
[   25.779853]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.780571]  ? finish_task_switch.isra.0+0x153/0x700
[   25.781522]  ? __switch_to+0x5d9/0xf60
[   25.782429]  ? __schedule+0xc3e/0x2790
[   25.783176]  ? __pfx_read_tsc+0x10/0x10
[   25.783865]  ? ktime_get_ts64+0x84/0x230
[   25.784659]  kunit_try_run_case+0x1b3/0x490
[   25.785466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.785757]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.786068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.786382]  ? __kthread_parkme+0x82/0x160
[   25.786654]  ? preempt_count_sub+0x50/0x80
[   25.786939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.787370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.788071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.788724]  kthread+0x257/0x310
[   25.790145]  ? __pfx_kthread+0x10/0x10
[   25.790701]  ret_from_fork+0x41/0x80
[   25.791135]  ? __pfx_kthread+0x10/0x10
[   25.791905]  ret_from_fork_asm+0x1a/0x30
[   25.792644]  </TASK>
[   25.793016] 
[   25.793779] Allocated by task 202:
[   25.794350]  kasan_save_stack+0x3d/0x60
[   25.794663]  kasan_save_track+0x18/0x40
[   25.795537]  kasan_save_alloc_info+0x3b/0x50
[   25.796239]  __kasan_kmalloc+0xb7/0xc0
[   25.796627]  __kmalloc_cache_noprof+0x184/0x410
[   25.797667]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.798096]  kunit_try_run_case+0x1b3/0x490
[   25.798804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.799594]  kthread+0x257/0x310
[   25.800404]  ret_from_fork+0x41/0x80
[   25.800839]  ret_from_fork_asm+0x1a/0x30
[   25.801406] 
[   25.801660] The buggy address belongs to the object at ffff888102a4ae00
[   25.801660]  which belongs to the cache kmalloc-128 of size 128
[   25.802415] The buggy address is located 5 bytes to the right of
[   25.802415]  allocated 115-byte region [ffff888102a4ae00, ffff888102a4ae73)
[   25.804589] 
[   25.805009] The buggy address belongs to the physical page:
[   25.805522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a
[   25.806187] flags: 0x200000000000000(node=0|zone=2)
[   25.806580] page_type: f5(slab)
[   25.806961] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.808139] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.808629] page dumped because: kasan: bad access detected
[   25.809352] 
[   25.809600] Memory state around the buggy address:
[   25.810348]  ffff888102a4ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   25.810866]  ffff888102a4ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.812091] >ffff888102a4ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.812696]                                                                 ^
[   25.813612]  ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.814473]  ffff888102a4af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.815165] ==================================================================
[   25.818169] ==================================================================
[   25.818777] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   25.820654] Read of size 1 at addr ffff888102a4ae7f by task kunit_try_catch/202
[   25.821891] 
[   25.822268] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   25.824043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.824415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.825310] Call Trace:
[   25.825621]  <TASK>
[   25.826054]  dump_stack_lvl+0x73/0xb0
[   25.826562]  print_report+0xd1/0x640
[   25.826910]  ? __virt_addr_valid+0x1db/0x2d0
[   25.827739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.828558]  kasan_report+0x102/0x140
[   25.829192]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   25.829745]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   25.830355]  __asan_report_load1_noabort+0x18/0x20
[   25.831314]  ksize_unpoisons_memory+0x7b8/0x9b0
[   25.831959]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.832755]  ? finish_task_switch.isra.0+0x153/0x700
[   25.833594]  ? __switch_to+0x5d9/0xf60
[   25.834347]  ? __schedule+0xc3e/0x2790
[   25.834705]  ? __pfx_read_tsc+0x10/0x10
[   25.835371]  ? ktime_get_ts64+0x84/0x230
[   25.835874]  kunit_try_run_case+0x1b3/0x490
[   25.836754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.837699]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.838478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.839056]  ? __kthread_parkme+0x82/0x160
[   25.839692]  ? preempt_count_sub+0x50/0x80
[   25.840524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.841499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.842337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.842796]  kthread+0x257/0x310
[   25.843221]  ? __pfx_kthread+0x10/0x10
[   25.843683]  ret_from_fork+0x41/0x80
[   25.844488]  ? __pfx_kthread+0x10/0x10
[   25.845110]  ret_from_fork_asm+0x1a/0x30
[   25.845525]  </TASK>
[   25.845848] 
[   25.846270] Allocated by task 202:
[   25.846694]  kasan_save_stack+0x3d/0x60
[   25.847134]  kasan_save_track+0x18/0x40
[   25.847763]  kasan_save_alloc_info+0x3b/0x50
[   25.848335]  __kasan_kmalloc+0xb7/0xc0
[   25.848800]  __kmalloc_cache_noprof+0x184/0x410
[   25.849779]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.850348]  kunit_try_run_case+0x1b3/0x490
[   25.850920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.851657]  kthread+0x257/0x310
[   25.851938]  ret_from_fork+0x41/0x80
[   25.852502]  ret_from_fork_asm+0x1a/0x30
[   25.852925] 
[   25.853188] The buggy address belongs to the object at ffff888102a4ae00
[   25.853188]  which belongs to the cache kmalloc-128 of size 128
[   25.854719] The buggy address is located 12 bytes to the right of
[   25.854719]  allocated 115-byte region [ffff888102a4ae00, ffff888102a4ae73)
[   25.856053] 
[   25.856272] The buggy address belongs to the physical page:
[   25.856978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a
[   25.858058] flags: 0x200000000000000(node=0|zone=2)
[   25.858830] page_type: f5(slab)
[   25.859341] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.860043] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.861322] page dumped because: kasan: bad access detected
[   25.861891] 
[   25.862186] Memory state around the buggy address:
[   25.862783]  ffff888102a4ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.863618]  ffff888102a4ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.864423] >ffff888102a4ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.865241]                                                                 ^
[   25.865905]  ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.866643]  ffff888102a4af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.867494] ==================================================================
[   25.717628] ==================================================================
[   25.719355] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   25.719965] Read of size 1 at addr ffff888102a4ae73 by task kunit_try_catch/202
[   25.721293] 
[   25.721466] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   25.722770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.723491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.724800] Call Trace:
[   25.725052]  <TASK>
[   25.725472]  dump_stack_lvl+0x73/0xb0
[   25.725882]  print_report+0xd1/0x640
[   25.726812]  ? __virt_addr_valid+0x1db/0x2d0
[   25.727279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.728242]  kasan_report+0x102/0x140
[   25.728428]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   25.728641]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   25.728859]  __asan_report_load1_noabort+0x18/0x20
[   25.729206]  ksize_unpoisons_memory+0x81e/0x9b0
[   25.729732]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.731303]  ? finish_task_switch.isra.0+0x153/0x700
[   25.731737]  ? __switch_to+0x5d9/0xf60
[   25.732384]  ? __schedule+0xc3e/0x2790
[   25.732812]  ? __pfx_read_tsc+0x10/0x10
[   25.733556]  ? ktime_get_ts64+0x84/0x230
[   25.734078]  kunit_try_run_case+0x1b3/0x490
[   25.734557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.735000]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.735915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.736550]  ? __kthread_parkme+0x82/0x160
[   25.737282]  ? preempt_count_sub+0x50/0x80
[   25.737759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.738586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.739158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.739819]  kthread+0x257/0x310
[   25.740900]  ? __pfx_kthread+0x10/0x10
[   25.741406]  ret_from_fork+0x41/0x80
[   25.741813]  ? __pfx_kthread+0x10/0x10
[   25.742228]  ret_from_fork_asm+0x1a/0x30
[   25.743058]  </TASK>
[   25.743236] 
[   25.743424] Allocated by task 202:
[   25.743855]  kasan_save_stack+0x3d/0x60
[   25.744269]  kasan_save_track+0x18/0x40
[   25.744662]  kasan_save_alloc_info+0x3b/0x50
[   25.745395]  __kasan_kmalloc+0xb7/0xc0
[   25.746183]  __kmalloc_cache_noprof+0x184/0x410
[   25.746862]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.748270]  kunit_try_run_case+0x1b3/0x490
[   25.748709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.749647]  kthread+0x257/0x310
[   25.749884]  ret_from_fork+0x41/0x80
[   25.750547]  ret_from_fork_asm+0x1a/0x30
[   25.751126] 
[   25.751377] The buggy address belongs to the object at ffff888102a4ae00
[   25.751377]  which belongs to the cache kmalloc-128 of size 128
[   25.752569] The buggy address is located 0 bytes to the right of
[   25.752569]  allocated 115-byte region [ffff888102a4ae00, ffff888102a4ae73)
[   25.753607] 
[   25.753899] The buggy address belongs to the physical page:
[   25.754504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a
[   25.755339] flags: 0x200000000000000(node=0|zone=2)
[   25.755896] page_type: f5(slab)
[   25.756373] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.757142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.758153] page dumped because: kasan: bad access detected
[   25.759045] 
[   25.759263] Memory state around the buggy address:
[   25.759798]  ffff888102a4ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   25.760524]  ffff888102a4ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.761105] >ffff888102a4ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.761950]                                                              ^
[   25.762847]  ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.763570]  ffff888102a4af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.764313] ==================================================================