Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.201411] ================================================================== [ 31.202007] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.202876] Read of size 1 at addr fff00000c403f378 by task kunit_try_catch/182 [ 31.203742] [ 31.204143] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.205222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.205826] Hardware name: linux,dummy-virt (DT) [ 31.206529] Call trace: [ 31.207038] show_stack+0x20/0x38 (C) [ 31.207674] dump_stack_lvl+0x8c/0xd0 [ 31.208341] print_report+0x118/0x5e0 [ 31.208970] kasan_report+0xc8/0x118 [ 31.209619] __asan_report_load1_noabort+0x20/0x30 [ 31.210316] ksize_unpoisons_memory+0x628/0x750 [ 31.211023] kunit_try_run_case+0x14c/0x3d0 [ 31.211668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.212466] kthread+0x24c/0x2d0 [ 31.213316] ret_from_fork+0x10/0x20 [ 31.213801] [ 31.214194] Allocated by task 182: [ 31.214709] kasan_save_stack+0x3c/0x68 [ 31.215289] kasan_save_track+0x20/0x40 [ 31.215868] kasan_save_alloc_info+0x40/0x58 [ 31.216510] __kasan_kmalloc+0xd4/0xd8 [ 31.217389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.218175] ksize_unpoisons_memory+0xc0/0x750 [ 31.218737] kunit_try_run_case+0x14c/0x3d0 [ 31.219303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.219949] kthread+0x24c/0x2d0 [ 31.220503] ret_from_fork+0x10/0x20 [ 31.221081] [ 31.221844] The buggy address belongs to the object at fff00000c403f300 [ 31.221844] which belongs to the cache kmalloc-128 of size 128 [ 31.222750] The buggy address is located 5 bytes to the right of [ 31.222750] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.224103] [ 31.224477] The buggy address belongs to the physical page: [ 31.225108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.226194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.226970] page_type: f5(slab) [ 31.227456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.228366] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.229371] page dumped because: kasan: bad access detected [ 31.230074] [ 31.230445] Memory state around the buggy address: [ 31.231144] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.232033] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.232818] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.233935] ^ [ 31.234722] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235757] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.236744] ================================================================== [ 31.238597] ================================================================== [ 31.239686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.240470] Read of size 1 at addr fff00000c403f37f by task kunit_try_catch/182 [ 31.241822] [ 31.242158] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.244719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.245994] Hardware name: linux,dummy-virt (DT) [ 31.246916] Call trace: [ 31.247311] show_stack+0x20/0x38 (C) [ 31.247834] dump_stack_lvl+0x8c/0xd0 [ 31.248704] print_report+0x118/0x5e0 [ 31.249950] kasan_report+0xc8/0x118 [ 31.252135] __asan_report_load1_noabort+0x20/0x30 [ 31.253504] ksize_unpoisons_memory+0x6a0/0x750 [ 31.254018] kunit_try_run_case+0x14c/0x3d0 [ 31.255653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.256735] kthread+0x24c/0x2d0 [ 31.258178] ret_from_fork+0x10/0x20 [ 31.258583] [ 31.258814] Allocated by task 182: [ 31.259166] kasan_save_stack+0x3c/0x68 [ 31.259605] kasan_save_track+0x20/0x40 [ 31.261068] kasan_save_alloc_info+0x40/0x58 [ 31.261789] __kasan_kmalloc+0xd4/0xd8 [ 31.263130] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.264184] ksize_unpoisons_memory+0xc0/0x750 [ 31.264743] kunit_try_run_case+0x14c/0x3d0 [ 31.265537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.266190] kthread+0x24c/0x2d0 [ 31.266724] ret_from_fork+0x10/0x20 [ 31.267367] [ 31.267736] The buggy address belongs to the object at fff00000c403f300 [ 31.267736] which belongs to the cache kmalloc-128 of size 128 [ 31.268895] The buggy address is located 12 bytes to the right of [ 31.268895] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.270424] [ 31.270715] The buggy address belongs to the physical page: [ 31.271405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.272295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.273259] page_type: f5(slab) [ 31.273791] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.274595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.275507] page dumped because: kasan: bad access detected [ 31.276099] [ 31.276465] Memory state around the buggy address: [ 31.277358] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.278132] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.278984] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.279667] ^ [ 31.280501] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.281327] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.282042] ================================================================== [ 31.160436] ================================================================== [ 31.161793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.162607] Read of size 1 at addr fff00000c403f373 by task kunit_try_catch/182 [ 31.163372] [ 31.163795] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.165285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.165872] Hardware name: linux,dummy-virt (DT) [ 31.166426] Call trace: [ 31.166887] show_stack+0x20/0x38 (C) [ 31.167514] dump_stack_lvl+0x8c/0xd0 [ 31.168167] print_report+0x118/0x5e0 [ 31.168747] kasan_report+0xc8/0x118 [ 31.169560] __asan_report_load1_noabort+0x20/0x30 [ 31.170259] ksize_unpoisons_memory+0x638/0x750 [ 31.170906] kunit_try_run_case+0x14c/0x3d0 [ 31.171555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.172332] kthread+0x24c/0x2d0 [ 31.172874] ret_from_fork+0x10/0x20 [ 31.173685] [ 31.174067] Allocated by task 182: [ 31.174563] kasan_save_stack+0x3c/0x68 [ 31.174973] kasan_save_track+0x20/0x40 [ 31.175696] kasan_save_alloc_info+0x40/0x58 [ 31.176378] __kasan_kmalloc+0xd4/0xd8 [ 31.176904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.177792] ksize_unpoisons_memory+0xc0/0x750 [ 31.178412] kunit_try_run_case+0x14c/0x3d0 [ 31.179005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.179753] kthread+0x24c/0x2d0 [ 31.180287] ret_from_fork+0x10/0x20 [ 31.180803] [ 31.182277] The buggy address belongs to the object at fff00000c403f300 [ 31.182277] which belongs to the cache kmalloc-128 of size 128 [ 31.183483] The buggy address is located 0 bytes to the right of [ 31.183483] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.184751] [ 31.185175] The buggy address belongs to the physical page: [ 31.185735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.186898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.187765] page_type: f5(slab) [ 31.188545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.189598] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.190498] page dumped because: kasan: bad access detected [ 31.191165] [ 31.191535] Memory state around the buggy address: [ 31.192144] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.192933] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194097] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.195039] ^ [ 31.195804] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.196833] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.197919] ==================================================================
[ 22.183627] ================================================================== [ 22.184122] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 22.185010] Read of size 1 at addr ffff888102a1dc7f by task kunit_try_catch/202 [ 22.185548] [ 22.185721] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 22.187445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.187764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.188647] Call Trace: [ 22.189005] <TASK> [ 22.189413] dump_stack_lvl+0x73/0xb0 [ 22.190076] print_report+0xd1/0x640 [ 22.190914] ? __virt_addr_valid+0x1db/0x2d0 [ 22.192297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.192873] kasan_report+0x102/0x140 [ 22.193414] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 22.193819] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 22.194715] __asan_report_load1_noabort+0x18/0x20 [ 22.195524] ksize_unpoisons_memory+0x7b8/0x9b0 [ 22.195975] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.197019] ? finish_task_switch.isra.0+0x153/0x700 [ 22.197719] ? __switch_to+0x5d9/0xf60 [ 22.198393] ? __schedule+0xc3e/0x2790 [ 22.198671] ? __pfx_read_tsc+0x10/0x10 [ 22.199690] ? ktime_get_ts64+0x84/0x230 [ 22.200312] kunit_try_run_case+0x1b3/0x490 [ 22.200756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.201101] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.201727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.202810] ? __kthread_parkme+0x82/0x160 [ 22.203640] ? preempt_count_sub+0x50/0x80 [ 22.204513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.204872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.205254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.206507] kthread+0x257/0x310 [ 22.206775] ? __pfx_kthread+0x10/0x10 [ 22.207715] ret_from_fork+0x41/0x80 [ 22.207972] ? __pfx_kthread+0x10/0x10 [ 22.208808] ret_from_fork_asm+0x1a/0x30 [ 22.209638] </TASK> [ 22.209903] [ 22.210109] Allocated by task 202: [ 22.210701] kasan_save_stack+0x3d/0x60 [ 22.210974] kasan_save_track+0x18/0x40 [ 22.211727] kasan_save_alloc_info+0x3b/0x50 [ 22.212001] __kasan_kmalloc+0xb7/0xc0 [ 22.212629] __kmalloc_cache_noprof+0x184/0x410 [ 22.213002] ksize_unpoisons_memory+0xc8/0x9b0 [ 22.213680] kunit_try_run_case+0x1b3/0x490 [ 22.214365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.214980] kthread+0x257/0x310 [ 22.215375] ret_from_fork+0x41/0x80 [ 22.216044] ret_from_fork_asm+0x1a/0x30 [ 22.217032] [ 22.217271] The buggy address belongs to the object at ffff888102a1dc00 [ 22.217271] which belongs to the cache kmalloc-128 of size 128 [ 22.218663] The buggy address is located 12 bytes to the right of [ 22.218663] allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73) [ 22.220033] [ 22.220218] The buggy address belongs to the physical page: [ 22.220703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d [ 22.221595] flags: 0x200000000000000(node=0|zone=2) [ 22.222108] page_type: f5(slab) [ 22.222575] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.223756] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.225127] page dumped because: kasan: bad access detected [ 22.226052] [ 22.226689] Memory state around the buggy address: [ 22.227111] ffff888102a1db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.227994] ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.228928] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.229997] ^ [ 22.230816] ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.231586] ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232182] ================================================================== [ 22.136062] ================================================================== [ 22.137588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 22.138795] Read of size 1 at addr ffff888102a1dc78 by task kunit_try_catch/202 [ 22.139762] [ 22.140279] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 22.141670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.142098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.143734] Call Trace: [ 22.144013] <TASK> [ 22.144264] dump_stack_lvl+0x73/0xb0 [ 22.144707] print_report+0xd1/0x640 [ 22.145055] ? __virt_addr_valid+0x1db/0x2d0 [ 22.145689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.146147] kasan_report+0x102/0x140 [ 22.146692] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 22.147292] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 22.147856] __asan_report_load1_noabort+0x18/0x20 [ 22.148228] ksize_unpoisons_memory+0x7eb/0x9b0 [ 22.148779] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.149289] ? finish_task_switch.isra.0+0x153/0x700 [ 22.150829] ? __switch_to+0x5d9/0xf60 [ 22.151536] ? __schedule+0xc3e/0x2790 [ 22.151961] ? __pfx_read_tsc+0x10/0x10 [ 22.152492] ? ktime_get_ts64+0x84/0x230 [ 22.152784] kunit_try_run_case+0x1b3/0x490 [ 22.153269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.153728] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.154145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.154830] ? __kthread_parkme+0x82/0x160 [ 22.155847] ? preempt_count_sub+0x50/0x80 [ 22.156527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.156870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.157789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.158628] kthread+0x257/0x310 [ 22.159043] ? __pfx_kthread+0x10/0x10 [ 22.159603] ret_from_fork+0x41/0x80 [ 22.160056] ? __pfx_kthread+0x10/0x10 [ 22.161015] ret_from_fork_asm+0x1a/0x30 [ 22.161730] </TASK> [ 22.162031] [ 22.162396] Allocated by task 202: [ 22.162786] kasan_save_stack+0x3d/0x60 [ 22.163445] kasan_save_track+0x18/0x40 [ 22.163880] kasan_save_alloc_info+0x3b/0x50 [ 22.164576] __kasan_kmalloc+0xb7/0xc0 [ 22.164944] __kmalloc_cache_noprof+0x184/0x410 [ 22.165968] ksize_unpoisons_memory+0xc8/0x9b0 [ 22.166418] kunit_try_run_case+0x1b3/0x490 [ 22.166883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.167327] kthread+0x257/0x310 [ 22.167871] ret_from_fork+0x41/0x80 [ 22.168543] ret_from_fork_asm+0x1a/0x30 [ 22.168912] [ 22.169379] The buggy address belongs to the object at ffff888102a1dc00 [ 22.169379] which belongs to the cache kmalloc-128 of size 128 [ 22.170634] The buggy address is located 5 bytes to the right of [ 22.170634] allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73) [ 22.171663] [ 22.172322] The buggy address belongs to the physical page: [ 22.173009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d [ 22.173867] flags: 0x200000000000000(node=0|zone=2) [ 22.174523] page_type: f5(slab) [ 22.174685] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.174966] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.175393] page dumped because: kasan: bad access detected [ 22.176527] [ 22.176720] Memory state around the buggy address: [ 22.177163] ffff888102a1db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.177919] ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.178830] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.179689] ^ [ 22.180154] ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.181063] ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.181904] ================================================================== [ 22.088882] ================================================================== [ 22.090546] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 22.091070] Read of size 1 at addr ffff888102a1dc73 by task kunit_try_catch/202 [ 22.091869] [ 22.092132] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 22.092975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.093698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.094709] Call Trace: [ 22.095064] <TASK> [ 22.095435] dump_stack_lvl+0x73/0xb0 [ 22.096062] print_report+0xd1/0x640 [ 22.097038] ? __virt_addr_valid+0x1db/0x2d0 [ 22.097832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.098404] kasan_report+0x102/0x140 [ 22.098785] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 22.099255] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 22.100464] __asan_report_load1_noabort+0x18/0x20 [ 22.101061] ksize_unpoisons_memory+0x81e/0x9b0 [ 22.101853] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.102269] ? finish_task_switch.isra.0+0x153/0x700 [ 22.102789] ? __switch_to+0x5d9/0xf60 [ 22.103095] ? __schedule+0xc3e/0x2790 [ 22.103775] ? __pfx_read_tsc+0x10/0x10 [ 22.104427] ? ktime_get_ts64+0x84/0x230 [ 22.104932] kunit_try_run_case+0x1b3/0x490 [ 22.105641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.106146] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.106775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.107577] ? __kthread_parkme+0x82/0x160 [ 22.108000] ? preempt_count_sub+0x50/0x80 [ 22.108703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.109326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.110003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.110714] kthread+0x257/0x310 [ 22.111278] ? __pfx_kthread+0x10/0x10 [ 22.111800] ret_from_fork+0x41/0x80 [ 22.112125] ? __pfx_kthread+0x10/0x10 [ 22.112789] ret_from_fork_asm+0x1a/0x30 [ 22.113499] </TASK> [ 22.113803] [ 22.114033] Allocated by task 202: [ 22.114640] kasan_save_stack+0x3d/0x60 [ 22.114990] kasan_save_track+0x18/0x40 [ 22.115631] kasan_save_alloc_info+0x3b/0x50 [ 22.116134] __kasan_kmalloc+0xb7/0xc0 [ 22.116734] __kmalloc_cache_noprof+0x184/0x410 [ 22.117398] ksize_unpoisons_memory+0xc8/0x9b0 [ 22.117863] kunit_try_run_case+0x1b3/0x490 [ 22.118256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.118784] kthread+0x257/0x310 [ 22.119064] ret_from_fork+0x41/0x80 [ 22.119790] ret_from_fork_asm+0x1a/0x30 [ 22.120300] [ 22.120603] The buggy address belongs to the object at ffff888102a1dc00 [ 22.120603] which belongs to the cache kmalloc-128 of size 128 [ 22.121870] The buggy address is located 0 bytes to the right of [ 22.121870] allocated 115-byte region [ffff888102a1dc00, ffff888102a1dc73) [ 22.123372] [ 22.123522] The buggy address belongs to the physical page: [ 22.124043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d [ 22.125031] flags: 0x200000000000000(node=0|zone=2) [ 22.125715] page_type: f5(slab) [ 22.126138] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.126987] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.127795] page dumped because: kasan: bad access detected [ 22.128471] [ 22.128716] Memory state around the buggy address: [ 22.129509] ffff888102a1db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.130121] ffff888102a1db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130920] >ffff888102a1dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.131715] ^ [ 22.132634] ffff888102a1dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.133618] ffff888102a1dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.134693] ==================================================================