Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.187825] ================================================================== [ 31.188664] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.189682] Read of size 1 at addr fff00000c58f437f by task kunit_try_catch/183 [ 31.190558] [ 31.190863] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.192374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.192911] Hardware name: linux,dummy-virt (DT) [ 31.193643] Call trace: [ 31.194043] show_stack+0x20/0x38 (C) [ 31.194692] dump_stack_lvl+0x8c/0xd0 [ 31.195476] print_report+0x118/0x5e0 [ 31.196184] kasan_report+0xc8/0x118 [ 31.196769] __asan_report_load1_noabort+0x20/0x30 [ 31.197438] ksize_unpoisons_memory+0x6a0/0x750 [ 31.198224] kunit_try_run_case+0x14c/0x3d0 [ 31.198859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.199873] kthread+0x24c/0x2d0 [ 31.200396] ret_from_fork+0x10/0x20 [ 31.201008] [ 31.201321] Allocated by task 183: [ 31.202048] kasan_save_stack+0x3c/0x68 [ 31.202662] kasan_save_track+0x20/0x40 [ 31.203548] kasan_save_alloc_info+0x40/0x58 [ 31.204135] __kasan_kmalloc+0xd4/0xd8 [ 31.204819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.205551] ksize_unpoisons_memory+0xc0/0x750 [ 31.206274] kunit_try_run_case+0x14c/0x3d0 [ 31.207594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.208256] kthread+0x24c/0x2d0 [ 31.208771] ret_from_fork+0x10/0x20 [ 31.209367] [ 31.209763] The buggy address belongs to the object at fff00000c58f4300 [ 31.209763] which belongs to the cache kmalloc-128 of size 128 [ 31.211459] The buggy address is located 12 bytes to the right of [ 31.211459] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.212426] [ 31.212650] The buggy address belongs to the physical page: [ 31.213397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.214808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.216003] page_type: f5(slab) [ 31.216455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.217458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.218342] page dumped because: kasan: bad access detected [ 31.218978] [ 31.219479] Memory state around the buggy address: [ 31.220475] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.221430] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.222305] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.223605] ^ [ 31.224468] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.225306] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.226668] ================================================================== [ 31.144874] ================================================================== [ 31.146043] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.146875] Read of size 1 at addr fff00000c58f4378 by task kunit_try_catch/183 [ 31.147747] [ 31.148248] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.150044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.150587] Hardware name: linux,dummy-virt (DT) [ 31.151490] Call trace: [ 31.151859] show_stack+0x20/0x38 (C) [ 31.152483] dump_stack_lvl+0x8c/0xd0 [ 31.153102] print_report+0x118/0x5e0 [ 31.153629] kasan_report+0xc8/0x118 [ 31.154245] __asan_report_load1_noabort+0x20/0x30 [ 31.154892] ksize_unpoisons_memory+0x628/0x750 [ 31.155913] kunit_try_run_case+0x14c/0x3d0 [ 31.156497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.157220] kthread+0x24c/0x2d0 [ 31.157854] ret_from_fork+0x10/0x20 [ 31.158515] [ 31.158817] Allocated by task 183: [ 31.159657] kasan_save_stack+0x3c/0x68 [ 31.160423] kasan_save_track+0x20/0x40 [ 31.160977] kasan_save_alloc_info+0x40/0x58 [ 31.161562] __kasan_kmalloc+0xd4/0xd8 [ 31.162158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.162738] ksize_unpoisons_memory+0xc0/0x750 [ 31.163990] kunit_try_run_case+0x14c/0x3d0 [ 31.164549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.165253] kthread+0x24c/0x2d0 [ 31.166429] ret_from_fork+0x10/0x20 [ 31.166952] [ 31.167754] The buggy address belongs to the object at fff00000c58f4300 [ 31.167754] which belongs to the cache kmalloc-128 of size 128 [ 31.169097] The buggy address is located 5 bytes to the right of [ 31.169097] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.170578] [ 31.171259] The buggy address belongs to the physical page: [ 31.171969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.172862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.173741] page_type: f5(slab) [ 31.174208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.175295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.176228] page dumped because: kasan: bad access detected [ 31.176935] [ 31.177240] Memory state around the buggy address: [ 31.178109] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.179251] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180194] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.180894] ^ [ 31.181807] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.182725] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.184132] ================================================================== [ 31.100020] ================================================================== [ 31.101199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.102177] Read of size 1 at addr fff00000c58f4373 by task kunit_try_catch/183 [ 31.103160] [ 31.103670] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.105321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.106009] Hardware name: linux,dummy-virt (DT) [ 31.106782] Call trace: [ 31.107603] show_stack+0x20/0x38 (C) [ 31.108244] dump_stack_lvl+0x8c/0xd0 [ 31.109026] print_report+0x118/0x5e0 [ 31.109719] kasan_report+0xc8/0x118 [ 31.110418] __asan_report_load1_noabort+0x20/0x30 [ 31.111546] ksize_unpoisons_memory+0x638/0x750 [ 31.112343] kunit_try_run_case+0x14c/0x3d0 [ 31.113073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.113941] kthread+0x24c/0x2d0 [ 31.114609] ret_from_fork+0x10/0x20 [ 31.115539] [ 31.115841] Allocated by task 183: [ 31.116108] kasan_save_stack+0x3c/0x68 [ 31.116482] kasan_save_track+0x20/0x40 [ 31.117382] kasan_save_alloc_info+0x40/0x58 [ 31.118371] __kasan_kmalloc+0xd4/0xd8 [ 31.119415] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.119985] ksize_unpoisons_memory+0xc0/0x750 [ 31.120610] kunit_try_run_case+0x14c/0x3d0 [ 31.121305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.122088] kthread+0x24c/0x2d0 [ 31.122399] ret_from_fork+0x10/0x20 [ 31.123691] [ 31.123982] The buggy address belongs to the object at fff00000c58f4300 [ 31.123982] which belongs to the cache kmalloc-128 of size 128 [ 31.125674] The buggy address is located 0 bytes to the right of [ 31.125674] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.127569] [ 31.128229] The buggy address belongs to the physical page: [ 31.129052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.130156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.131206] page_type: f5(slab) [ 31.131652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.132799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.133716] page dumped because: kasan: bad access detected [ 31.134462] [ 31.134890] Memory state around the buggy address: [ 31.135918] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.136915] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.137883] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.138810] ^ [ 31.139872] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.140758] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.142295] ==================================================================
[ 26.625117] ================================================================== [ 26.626361] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 26.626984] Read of size 1 at addr ffff888102a15373 by task kunit_try_catch/203 [ 26.627488] [ 26.627678] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 26.628222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.628596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.630074] Call Trace: [ 26.630357] <TASK> [ 26.631290] dump_stack_lvl+0x73/0xb0 [ 26.631642] print_report+0xd1/0x640 [ 26.632047] ? __virt_addr_valid+0x1db/0x2d0 [ 26.632952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.633947] kasan_report+0x102/0x140 [ 26.634649] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 26.635762] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 26.636189] __asan_report_load1_noabort+0x18/0x20 [ 26.636996] ksize_unpoisons_memory+0x81e/0x9b0 [ 26.637436] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.638236] ? finish_task_switch.isra.0+0x153/0x700 [ 26.638687] ? __switch_to+0x5d9/0xf60 [ 26.639354] ? __schedule+0xc3e/0x2790 [ 26.640309] ? __pfx_read_tsc+0x10/0x10 [ 26.640846] ? ktime_get_ts64+0x86/0x230 [ 26.641256] kunit_try_run_case+0x1b3/0x490 [ 26.642116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.642688] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.643133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.644284] ? __kthread_parkme+0x82/0x160 [ 26.645090] ? preempt_count_sub+0x50/0x80 [ 26.645436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.646282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.647043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.648145] kthread+0x257/0x310 [ 26.648958] ? __pfx_kthread+0x10/0x10 [ 26.649167] ret_from_fork+0x41/0x80 [ 26.649387] ? __pfx_kthread+0x10/0x10 [ 26.650111] ret_from_fork_asm+0x1a/0x30 [ 26.650681] </TASK> [ 26.651191] [ 26.651351] Allocated by task 203: [ 26.651561] kasan_save_stack+0x3d/0x60 [ 26.651953] kasan_save_track+0x18/0x40 [ 26.652326] kasan_save_alloc_info+0x3b/0x50 [ 26.652873] __kasan_kmalloc+0xb7/0xc0 [ 26.653278] __kmalloc_cache_noprof+0x184/0x410 [ 26.653833] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.654771] kunit_try_run_case+0x1b3/0x490 [ 26.655289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.656016] kthread+0x257/0x310 [ 26.656226] ret_from_fork+0x41/0x80 [ 26.656500] ret_from_fork_asm+0x1a/0x30 [ 26.657165] [ 26.657396] The buggy address belongs to the object at ffff888102a15300 [ 26.657396] which belongs to the cache kmalloc-128 of size 128 [ 26.658544] The buggy address is located 0 bytes to the right of [ 26.658544] allocated 115-byte region [ffff888102a15300, ffff888102a15373) [ 26.659587] [ 26.660075] The buggy address belongs to the physical page: [ 26.660567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 26.661842] flags: 0x200000000000000(node=0|zone=2) [ 26.662331] page_type: f5(slab) [ 26.662698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.663338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.664352] page dumped because: kasan: bad access detected [ 26.664705] [ 26.664915] Memory state around the buggy address: [ 26.665389] ffff888102a15200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 26.665797] ffff888102a15280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.666796] >ffff888102a15300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.667242] ^ [ 26.668538] ffff888102a15380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.669136] ffff888102a15400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.669886] ================================================================== [ 26.707862] ================================================================== [ 26.708561] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.710096] Read of size 1 at addr ffff888102a1537f by task kunit_try_catch/203 [ 26.711029] [ 26.711294] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 26.711930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.712240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.712837] Call Trace: [ 26.713153] <TASK> [ 26.713413] dump_stack_lvl+0x73/0xb0 [ 26.713881] print_report+0xd1/0x640 [ 26.714290] ? __virt_addr_valid+0x1db/0x2d0 [ 26.714880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.715417] kasan_report+0x102/0x140 [ 26.715885] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.716396] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.716950] __asan_report_load1_noabort+0x18/0x20 [ 26.717501] ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.717964] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.718498] ? finish_task_switch.isra.0+0x153/0x700 [ 26.718963] ? __switch_to+0x5d9/0xf60 [ 26.719377] ? __schedule+0xc3e/0x2790 [ 26.719732] ? __pfx_read_tsc+0x10/0x10 [ 26.720150] ? ktime_get_ts64+0x86/0x230 [ 26.720642] kunit_try_run_case+0x1b3/0x490 [ 26.721012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.721554] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.721975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.722533] ? __kthread_parkme+0x82/0x160 [ 26.722975] ? preempt_count_sub+0x50/0x80 [ 26.723278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.723825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.724248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.724790] kthread+0x257/0x310 [ 26.725130] ? __pfx_kthread+0x10/0x10 [ 26.725580] ret_from_fork+0x41/0x80 [ 26.725969] ? __pfx_kthread+0x10/0x10 [ 26.726376] ret_from_fork_asm+0x1a/0x30 [ 26.726845] </TASK> [ 26.727123] [ 26.727320] Allocated by task 203: [ 26.727732] kasan_save_stack+0x3d/0x60 [ 26.728146] kasan_save_track+0x18/0x40 [ 26.728584] kasan_save_alloc_info+0x3b/0x50 [ 26.729048] __kasan_kmalloc+0xb7/0xc0 [ 26.729321] __kmalloc_cache_noprof+0x184/0x410 [ 26.729807] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.730282] kunit_try_run_case+0x1b3/0x490 [ 26.730715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.731043] kthread+0x257/0x310 [ 26.731431] ret_from_fork+0x41/0x80 [ 26.731882] ret_from_fork_asm+0x1a/0x30 [ 26.732313] [ 26.732545] The buggy address belongs to the object at ffff888102a15300 [ 26.732545] which belongs to the cache kmalloc-128 of size 128 [ 26.733307] The buggy address is located 12 bytes to the right of [ 26.733307] allocated 115-byte region [ffff888102a15300, ffff888102a15373) [ 26.734230] [ 26.734510] The buggy address belongs to the physical page: [ 26.735083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 26.735685] flags: 0x200000000000000(node=0|zone=2) [ 26.736136] page_type: f5(slab) [ 26.736357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.737075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.737633] page dumped because: kasan: bad access detected [ 26.737988] [ 26.738234] Memory state around the buggy address: [ 26.738718] ffff888102a15200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.739342] ffff888102a15280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.739971] >ffff888102a15300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.740653] ^ [ 26.741143] ffff888102a15380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.741699] ffff888102a15400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.742048] ================================================================== [ 26.672320] ================================================================== [ 26.672835] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.673566] Read of size 1 at addr ffff888102a15378 by task kunit_try_catch/203 [ 26.674161] [ 26.674396] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 26.675170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.675517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.675959] Call Trace: [ 26.676254] <TASK> [ 26.676541] dump_stack_lvl+0x73/0xb0 [ 26.676958] print_report+0xd1/0x640 [ 26.677397] ? __virt_addr_valid+0x1db/0x2d0 [ 26.677876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.678342] kasan_report+0x102/0x140 [ 26.678653] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.679016] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.679607] __asan_report_load1_noabort+0x18/0x20 [ 26.680092] ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.680628] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.681142] ? finish_task_switch.isra.0+0x153/0x700 [ 26.681639] ? __switch_to+0x5d9/0xf60 [ 26.682103] ? __schedule+0xc3e/0x2790 [ 26.682479] ? __pfx_read_tsc+0x10/0x10 [ 26.682751] ? ktime_get_ts64+0x86/0x230 [ 26.683109] kunit_try_run_case+0x1b3/0x490 [ 26.683644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.684145] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.684740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.685262] ? __kthread_parkme+0x82/0x160 [ 26.685758] ? preempt_count_sub+0x50/0x80 [ 26.686145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.686665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.687110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.687470] kthread+0x257/0x310 [ 26.687866] ? __pfx_kthread+0x10/0x10 [ 26.688344] ret_from_fork+0x41/0x80 [ 26.688812] ? __pfx_kthread+0x10/0x10 [ 26.689248] ret_from_fork_asm+0x1a/0x30 [ 26.689724] </TASK> [ 26.689990] [ 26.690244] Allocated by task 203: [ 26.690619] kasan_save_stack+0x3d/0x60 [ 26.691017] kasan_save_track+0x18/0x40 [ 26.691388] kasan_save_alloc_info+0x3b/0x50 [ 26.691771] __kasan_kmalloc+0xb7/0xc0 [ 26.692175] __kmalloc_cache_noprof+0x184/0x410 [ 26.692626] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.693049] kunit_try_run_case+0x1b3/0x490 [ 26.693473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.693822] kthread+0x257/0x310 [ 26.694143] ret_from_fork+0x41/0x80 [ 26.694577] ret_from_fork_asm+0x1a/0x30 [ 26.695049] [ 26.695275] The buggy address belongs to the object at ffff888102a15300 [ 26.695275] which belongs to the cache kmalloc-128 of size 128 [ 26.696255] The buggy address is located 5 bytes to the right of [ 26.696255] allocated 115-byte region [ffff888102a15300, ffff888102a15373) [ 26.696874] [ 26.697023] The buggy address belongs to the physical page: [ 26.697565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 26.698254] flags: 0x200000000000000(node=0|zone=2) [ 26.698763] page_type: f5(slab) [ 26.699151] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.699857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.700556] page dumped because: kasan: bad access detected [ 26.701037] [ 26.701240] Memory state around the buggy address: [ 26.701670] ffff888102a15200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.702026] ffff888102a15280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.702752] >ffff888102a15300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.703378] ^ [ 26.704071] ffff888102a15380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.704738] ffff888102a15400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.705209] ==================================================================