Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.201411] ==================================================================
[   31.202007] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   31.202876] Read of size 1 at addr fff00000c403f378 by task kunit_try_catch/182
[   31.203742] 
[   31.204143] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.205222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.205826] Hardware name: linux,dummy-virt (DT)
[   31.206529] Call trace:
[   31.207038]  show_stack+0x20/0x38 (C)
[   31.207674]  dump_stack_lvl+0x8c/0xd0
[   31.208341]  print_report+0x118/0x5e0
[   31.208970]  kasan_report+0xc8/0x118
[   31.209619]  __asan_report_load1_noabort+0x20/0x30
[   31.210316]  ksize_unpoisons_memory+0x628/0x750
[   31.211023]  kunit_try_run_case+0x14c/0x3d0
[   31.211668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.212466]  kthread+0x24c/0x2d0
[   31.213316]  ret_from_fork+0x10/0x20
[   31.213801] 
[   31.214194] Allocated by task 182:
[   31.214709]  kasan_save_stack+0x3c/0x68
[   31.215289]  kasan_save_track+0x20/0x40
[   31.215868]  kasan_save_alloc_info+0x40/0x58
[   31.216510]  __kasan_kmalloc+0xd4/0xd8
[   31.217389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.218175]  ksize_unpoisons_memory+0xc0/0x750
[   31.218737]  kunit_try_run_case+0x14c/0x3d0
[   31.219303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.219949]  kthread+0x24c/0x2d0
[   31.220503]  ret_from_fork+0x10/0x20
[   31.221081] 
[   31.221844] The buggy address belongs to the object at fff00000c403f300
[   31.221844]  which belongs to the cache kmalloc-128 of size 128
[   31.222750] The buggy address is located 5 bytes to the right of
[   31.222750]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.224103] 
[   31.224477] The buggy address belongs to the physical page:
[   31.225108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.226194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.226970] page_type: f5(slab)
[   31.227456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.228366] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.229371] page dumped because: kasan: bad access detected
[   31.230074] 
[   31.230445] Memory state around the buggy address:
[   31.231144]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.232033]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.232818] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.233935]                                                                 ^
[   31.234722]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235757]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.236744] ==================================================================
[   31.238597] ==================================================================
[   31.239686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   31.240470] Read of size 1 at addr fff00000c403f37f by task kunit_try_catch/182
[   31.241822] 
[   31.242158] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.244719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.245994] Hardware name: linux,dummy-virt (DT)
[   31.246916] Call trace:
[   31.247311]  show_stack+0x20/0x38 (C)
[   31.247834]  dump_stack_lvl+0x8c/0xd0
[   31.248704]  print_report+0x118/0x5e0
[   31.249950]  kasan_report+0xc8/0x118
[   31.252135]  __asan_report_load1_noabort+0x20/0x30
[   31.253504]  ksize_unpoisons_memory+0x6a0/0x750
[   31.254018]  kunit_try_run_case+0x14c/0x3d0
[   31.255653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.256735]  kthread+0x24c/0x2d0
[   31.258178]  ret_from_fork+0x10/0x20
[   31.258583] 
[   31.258814] Allocated by task 182:
[   31.259166]  kasan_save_stack+0x3c/0x68
[   31.259605]  kasan_save_track+0x20/0x40
[   31.261068]  kasan_save_alloc_info+0x40/0x58
[   31.261789]  __kasan_kmalloc+0xd4/0xd8
[   31.263130]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.264184]  ksize_unpoisons_memory+0xc0/0x750
[   31.264743]  kunit_try_run_case+0x14c/0x3d0
[   31.265537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.266190]  kthread+0x24c/0x2d0
[   31.266724]  ret_from_fork+0x10/0x20
[   31.267367] 
[   31.267736] The buggy address belongs to the object at fff00000c403f300
[   31.267736]  which belongs to the cache kmalloc-128 of size 128
[   31.268895] The buggy address is located 12 bytes to the right of
[   31.268895]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.270424] 
[   31.270715] The buggy address belongs to the physical page:
[   31.271405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.272295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.273259] page_type: f5(slab)
[   31.273791] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.274595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.275507] page dumped because: kasan: bad access detected
[   31.276099] 
[   31.276465] Memory state around the buggy address:
[   31.277358]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.278132]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.278984] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.279667]                                                                 ^
[   31.280501]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.281327]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.282042] ==================================================================
[   31.160436] ==================================================================
[   31.161793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   31.162607] Read of size 1 at addr fff00000c403f373 by task kunit_try_catch/182
[   31.163372] 
[   31.163795] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.165285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.165872] Hardware name: linux,dummy-virt (DT)
[   31.166426] Call trace:
[   31.166887]  show_stack+0x20/0x38 (C)
[   31.167514]  dump_stack_lvl+0x8c/0xd0
[   31.168167]  print_report+0x118/0x5e0
[   31.168747]  kasan_report+0xc8/0x118
[   31.169560]  __asan_report_load1_noabort+0x20/0x30
[   31.170259]  ksize_unpoisons_memory+0x638/0x750
[   31.170906]  kunit_try_run_case+0x14c/0x3d0
[   31.171555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.172332]  kthread+0x24c/0x2d0
[   31.172874]  ret_from_fork+0x10/0x20
[   31.173685] 
[   31.174067] Allocated by task 182:
[   31.174563]  kasan_save_stack+0x3c/0x68
[   31.174973]  kasan_save_track+0x20/0x40
[   31.175696]  kasan_save_alloc_info+0x40/0x58
[   31.176378]  __kasan_kmalloc+0xd4/0xd8
[   31.176904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.177792]  ksize_unpoisons_memory+0xc0/0x750
[   31.178412]  kunit_try_run_case+0x14c/0x3d0
[   31.179005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.179753]  kthread+0x24c/0x2d0
[   31.180287]  ret_from_fork+0x10/0x20
[   31.180803] 
[   31.182277] The buggy address belongs to the object at fff00000c403f300
[   31.182277]  which belongs to the cache kmalloc-128 of size 128
[   31.183483] The buggy address is located 0 bytes to the right of
[   31.183483]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.184751] 
[   31.185175] The buggy address belongs to the physical page:
[   31.185735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.186898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.187765] page_type: f5(slab)
[   31.188545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.189598] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.190498] page dumped because: kasan: bad access detected
[   31.191165] 
[   31.191535] Memory state around the buggy address:
[   31.192144]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.192933]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194097] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.195039]                                                              ^
[   31.195804]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.196833]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.197919] ==================================================================

[   22.183627] ==================================================================
[   22.184122] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   22.185010] Read of size 1 at addr ffff888102a1dc7f by task kunit_try_catch/202
[   22.185548] 
[   22.185721] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   22.187445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.187764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.188647] Call Trace:
[   22.189005]  <TASK>
[   22.189413]  dump_stack_lvl+0x73/0xb0
[   22.190076]  print_report+0xd1/0x640
[   22.190914]  ? __virt_addr_valid+0x1db/0x2d0
[   22.192297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.192873]  kasan_report+0x102/0x140
[   22.193414]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   22.193819]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   22.194715]  __asan_report_load1_noabort+0x18/0x20
[   22.195524]  ksize_unpoisons_memory+0x7b8/0x9b0
[   22.195975]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.197019]  ? finish_task_switch.isra.0+0x153/0x700
[   22.197719]  ? __switch_to+0x5d9/0xf60
[   22.198393]  ? __schedule+0xc3e/0x2790
[   22.198671]  ? __pfx_read_tsc+0x10/0x10
[   22.199690]  ? ktime_get_ts64+0x84/0x230
[   22.200312]  kunit_try_run_case+0x1b3/0x490
[   22.200756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.201101]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.201727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.202810]  ? __kthread_parkme+0x82/0x160
[   22.203640]  ? preempt_count_sub+0x50/0x80
[   22.204513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.204872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.205254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.206507]  kthread+0x257/0x310
[   22.206775]  ? __pfx_kthread+0x10/0x10
[   22.207715]  ret_from_fork+0x41/0x80
[   22.207972]  ? __pfx_kthread+0x10/0x10
[   22.208808]  ret_from_fork_asm+0x1a/0x30
[   22.209638]  </TASK>
[   22.209903] 
[   22.210109] Allocated by task 202:
[   22.210701]  kasan_save_stack+0x3d/0x60
[   22.210974]  kasan_save_track+0x18/0x40
[   22.211727]  kasan_save_alloc_info+0x3b/0x50
[   22.212001]  __kasan_kmalloc+0xb7/0xc0
[   22.212629]  __kmalloc_cache_noprof+0x184/0x410
[   22.213002]  ksize_unpoisons_memory+0xc8/0x9b0
[   22.213680]  kunit_try_run_case+0x1b3/0x490
[   22.214365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.214980]  kthread+0x257/0x310
[   22.215375]  ret_from_fork+0x41/0x80
[   22.216044]  ret_from_fork_asm+0x1a/0x30
[   22.217032] 
[   22.217271] The buggy address belongs to the object at ffff888102a1dc00
[   22.217271]  which belongs to the cache kmalloc-128 of size 128
[   22.218663] The buggy address is located 12 bytes to the right of
[   22.218663]  allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73)
[   22.220033] 
[   22.220218] The buggy address belongs to the physical page:
[   22.220703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   22.221595] flags: 0x200000000000000(node=0|zone=2)
[   22.222108] page_type: f5(slab)
[   22.222575] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.223756] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.225127] page dumped because: kasan: bad access detected
[   22.226052] 
[   22.226689] Memory state around the buggy address:
[   22.227111]  ffff888102a1db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.227994]  ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.228928] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.229997]                                                                 ^
[   22.230816]  ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.231586]  ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232182] ==================================================================
[   22.136062] ==================================================================
[   22.137588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   22.138795] Read of size 1 at addr ffff888102a1dc78 by task kunit_try_catch/202
[   22.139762] 
[   22.140279] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   22.141670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.142098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.143734] Call Trace:
[   22.144013]  <TASK>
[   22.144264]  dump_stack_lvl+0x73/0xb0
[   22.144707]  print_report+0xd1/0x640
[   22.145055]  ? __virt_addr_valid+0x1db/0x2d0
[   22.145689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.146147]  kasan_report+0x102/0x140
[   22.146692]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   22.147292]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   22.147856]  __asan_report_load1_noabort+0x18/0x20
[   22.148228]  ksize_unpoisons_memory+0x7eb/0x9b0
[   22.148779]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.149289]  ? finish_task_switch.isra.0+0x153/0x700
[   22.150829]  ? __switch_to+0x5d9/0xf60
[   22.151536]  ? __schedule+0xc3e/0x2790
[   22.151961]  ? __pfx_read_tsc+0x10/0x10
[   22.152492]  ? ktime_get_ts64+0x84/0x230
[   22.152784]  kunit_try_run_case+0x1b3/0x490
[   22.153269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.153728]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.154145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.154830]  ? __kthread_parkme+0x82/0x160
[   22.155847]  ? preempt_count_sub+0x50/0x80
[   22.156527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.156870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.157789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.158628]  kthread+0x257/0x310
[   22.159043]  ? __pfx_kthread+0x10/0x10
[   22.159603]  ret_from_fork+0x41/0x80
[   22.160056]  ? __pfx_kthread+0x10/0x10
[   22.161015]  ret_from_fork_asm+0x1a/0x30
[   22.161730]  </TASK>
[   22.162031] 
[   22.162396] Allocated by task 202:
[   22.162786]  kasan_save_stack+0x3d/0x60
[   22.163445]  kasan_save_track+0x18/0x40
[   22.163880]  kasan_save_alloc_info+0x3b/0x50
[   22.164576]  __kasan_kmalloc+0xb7/0xc0
[   22.164944]  __kmalloc_cache_noprof+0x184/0x410
[   22.165968]  ksize_unpoisons_memory+0xc8/0x9b0
[   22.166418]  kunit_try_run_case+0x1b3/0x490
[   22.166883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.167327]  kthread+0x257/0x310
[   22.167871]  ret_from_fork+0x41/0x80
[   22.168543]  ret_from_fork_asm+0x1a/0x30
[   22.168912] 
[   22.169379] The buggy address belongs to the object at ffff888102a1dc00
[   22.169379]  which belongs to the cache kmalloc-128 of size 128
[   22.170634] The buggy address is located 5 bytes to the right of
[   22.170634]  allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73)
[   22.171663] 
[   22.172322] The buggy address belongs to the physical page:
[   22.173009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   22.173867] flags: 0x200000000000000(node=0|zone=2)
[   22.174523] page_type: f5(slab)
[   22.174685] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.174966] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.175393] page dumped because: kasan: bad access detected
[   22.176527] 
[   22.176720] Memory state around the buggy address:
[   22.177163]  ffff888102a1db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.177919]  ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.178830] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.179689]                                                                 ^
[   22.180154]  ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.181063]  ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.181904] ==================================================================
[   22.088882] ==================================================================
[   22.090546] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   22.091070] Read of size 1 at addr ffff888102a1dc73 by task kunit_try_catch/202
[   22.091869] 
[   22.092132] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   22.092975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.093698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.094709] Call Trace:
[   22.095064]  <TASK>
[   22.095435]  dump_stack_lvl+0x73/0xb0
[   22.096062]  print_report+0xd1/0x640
[   22.097038]  ? __virt_addr_valid+0x1db/0x2d0
[   22.097832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.098404]  kasan_report+0x102/0x140
[   22.098785]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   22.099255]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   22.100464]  __asan_report_load1_noabort+0x18/0x20
[   22.101061]  ksize_unpoisons_memory+0x81e/0x9b0
[   22.101853]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.102269]  ? finish_task_switch.isra.0+0x153/0x700
[   22.102789]  ? __switch_to+0x5d9/0xf60
[   22.103095]  ? __schedule+0xc3e/0x2790
[   22.103775]  ? __pfx_read_tsc+0x10/0x10
[   22.104427]  ? ktime_get_ts64+0x84/0x230
[   22.104932]  kunit_try_run_case+0x1b3/0x490
[   22.105641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.106146]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.106775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.107577]  ? __kthread_parkme+0x82/0x160
[   22.108000]  ? preempt_count_sub+0x50/0x80
[   22.108703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.109326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.110003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.110714]  kthread+0x257/0x310
[   22.111278]  ? __pfx_kthread+0x10/0x10
[   22.111800]  ret_from_fork+0x41/0x80
[   22.112125]  ? __pfx_kthread+0x10/0x10
[   22.112789]  ret_from_fork_asm+0x1a/0x30
[   22.113499]  </TASK>
[   22.113803] 
[   22.114033] Allocated by task 202:
[   22.114640]  kasan_save_stack+0x3d/0x60
[   22.114990]  kasan_save_track+0x18/0x40
[   22.115631]  kasan_save_alloc_info+0x3b/0x50
[   22.116134]  __kasan_kmalloc+0xb7/0xc0
[   22.116734]  __kmalloc_cache_noprof+0x184/0x410
[   22.117398]  ksize_unpoisons_memory+0xc8/0x9b0
[   22.117863]  kunit_try_run_case+0x1b3/0x490
[   22.118256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.118784]  kthread+0x257/0x310
[   22.119064]  ret_from_fork+0x41/0x80
[   22.119790]  ret_from_fork_asm+0x1a/0x30
[   22.120300] 
[   22.120603] The buggy address belongs to the object at ffff888102a1dc00
[   22.120603]  which belongs to the cache kmalloc-128 of size 128
[   22.121870] The buggy address is located 0 bytes to the right of
[   22.121870]  allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73)
[   22.123372] 
[   22.123522] The buggy address belongs to the physical page:
[   22.124043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   22.125031] flags: 0x200000000000000(node=0|zone=2)
[   22.125715] page_type: f5(slab)
[   22.126138] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.126987] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.127795] page dumped because: kasan: bad access detected
[   22.128471] 
[   22.128716] Memory state around the buggy address:
[   22.129509]  ffff888102a1db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.130121]  ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130920] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.131715]                                                              ^
[   22.132634]  ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.133618]  ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.134693] ==================================================================