Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.777868] ================================================================== [ 31.779035] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.780469] Read of size 1 at addr fff00000c66fc373 by task kunit_try_catch/183 [ 31.781266] [ 31.782244] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.783444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.784075] Hardware name: linux,dummy-virt (DT) [ 31.784830] Call trace: [ 31.785418] show_stack+0x20/0x38 (C) [ 31.786013] dump_stack_lvl+0x8c/0xd0 [ 31.787003] print_report+0x118/0x5e0 [ 31.787549] kasan_report+0xc8/0x118 [ 31.788136] __asan_report_load1_noabort+0x20/0x30 [ 31.788810] ksize_unpoisons_memory+0x638/0x750 [ 31.789540] kunit_try_run_case+0x14c/0x3d0 [ 31.790100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.791201] kthread+0x24c/0x2d0 [ 31.791695] ret_from_fork+0x10/0x20 [ 31.792334] [ 31.792724] Allocated by task 183: [ 31.793205] kasan_save_stack+0x3c/0x68 [ 31.793861] kasan_save_track+0x20/0x40 [ 31.794760] kasan_save_alloc_info+0x40/0x58 [ 31.795367] __kasan_kmalloc+0xd4/0xd8 [ 31.796033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.796707] ksize_unpoisons_memory+0xc0/0x750 [ 31.797363] kunit_try_run_case+0x14c/0x3d0 [ 31.797983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.798704] kthread+0x24c/0x2d0 [ 31.799297] ret_from_fork+0x10/0x20 [ 31.799842] [ 31.800212] The buggy address belongs to the object at fff00000c66fc300 [ 31.800212] which belongs to the cache kmalloc-128 of size 128 [ 31.802677] The buggy address is located 0 bytes to the right of [ 31.802677] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.803975] [ 31.804353] The buggy address belongs to the physical page: [ 31.804989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.805937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.807086] page_type: f5(slab) [ 31.807675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.808471] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.809358] page dumped because: kasan: bad access detected [ 31.810104] [ 31.810774] Memory state around the buggy address: [ 31.811423] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.812303] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.813183] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.814078] ^ [ 31.815262] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.816105] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.816914] ================================================================== [ 31.820120] ================================================================== [ 31.820885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.821649] Read of size 1 at addr fff00000c66fc378 by task kunit_try_catch/183 [ 31.823003] [ 31.823622] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.824797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.825412] Hardware name: linux,dummy-virt (DT) [ 31.826078] Call trace: [ 31.826440] show_stack+0x20/0x38 (C) [ 31.827324] dump_stack_lvl+0x8c/0xd0 [ 31.827899] print_report+0x118/0x5e0 [ 31.828559] kasan_report+0xc8/0x118 [ 31.829202] __asan_report_load1_noabort+0x20/0x30 [ 31.829900] ksize_unpoisons_memory+0x628/0x750 [ 31.830671] kunit_try_run_case+0x14c/0x3d0 [ 31.831287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.832043] kthread+0x24c/0x2d0 [ 31.832667] ret_from_fork+0x10/0x20 [ 31.833294] [ 31.833622] Allocated by task 183: [ 31.834183] kasan_save_stack+0x3c/0x68 [ 31.834763] kasan_save_track+0x20/0x40 [ 31.835694] kasan_save_alloc_info+0x40/0x58 [ 31.836335] __kasan_kmalloc+0xd4/0xd8 [ 31.836932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.837654] ksize_unpoisons_memory+0xc0/0x750 [ 31.838703] kunit_try_run_case+0x14c/0x3d0 [ 31.839281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.840051] kthread+0x24c/0x2d0 [ 31.840603] ret_from_fork+0x10/0x20 [ 31.841207] [ 31.841590] The buggy address belongs to the object at fff00000c66fc300 [ 31.841590] which belongs to the cache kmalloc-128 of size 128 [ 31.843043] The buggy address is located 5 bytes to the right of [ 31.843043] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.844691] [ 31.845038] The buggy address belongs to the physical page: [ 31.845588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.846940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.847863] page_type: f5(slab) [ 31.848329] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.849084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.850233] page dumped because: kasan: bad access detected [ 31.851091] [ 31.851430] Memory state around the buggy address: [ 31.852059] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.852840] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.853805] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.854964] ^ [ 31.855978] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.857011] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.858003] ================================================================== [ 31.860067] ================================================================== [ 31.860780] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.861689] Read of size 1 at addr fff00000c66fc37f by task kunit_try_catch/183 [ 31.863375] [ 31.863802] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.864915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.865546] Hardware name: linux,dummy-virt (DT) [ 31.866258] Call trace: [ 31.866724] show_stack+0x20/0x38 (C) [ 31.867307] dump_stack_lvl+0x8c/0xd0 [ 31.868226] print_report+0x118/0x5e0 [ 31.868882] kasan_report+0xc8/0x118 [ 31.869531] __asan_report_load1_noabort+0x20/0x30 [ 31.870143] ksize_unpoisons_memory+0x6a0/0x750 [ 31.871120] kunit_try_run_case+0x14c/0x3d0 [ 31.871838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.872481] kthread+0x24c/0x2d0 [ 31.873097] ret_from_fork+0x10/0x20 [ 31.873706] [ 31.874048] Allocated by task 183: [ 31.874558] kasan_save_stack+0x3c/0x68 [ 31.875094] kasan_save_track+0x20/0x40 [ 31.876004] kasan_save_alloc_info+0x40/0x58 [ 31.876642] __kasan_kmalloc+0xd4/0xd8 [ 31.877183] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.877898] ksize_unpoisons_memory+0xc0/0x750 [ 31.878899] kunit_try_run_case+0x14c/0x3d0 [ 31.879409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.880210] kthread+0x24c/0x2d0 [ 31.880892] ret_from_fork+0x10/0x20 [ 31.881503] [ 31.881890] The buggy address belongs to the object at fff00000c66fc300 [ 31.881890] which belongs to the cache kmalloc-128 of size 128 [ 31.883426] The buggy address is located 12 bytes to the right of [ 31.883426] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.884677] [ 31.885050] The buggy address belongs to the physical page: [ 31.885882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.886931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.887807] page_type: f5(slab) [ 31.888320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.889734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.891098] page dumped because: kasan: bad access detected [ 31.891824] [ 31.892457] Memory state around the buggy address: [ 31.893248] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.894410] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.895283] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.896058] ^ [ 31.897195] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.898219] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.899286] ==================================================================
[ 24.423135] ================================================================== [ 24.425482] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 24.427379] Read of size 1 at addr ffff88810291de73 by task kunit_try_catch/202 [ 24.428163] [ 24.428464] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 24.429843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.431076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.432493] Call Trace: [ 24.433023] <TASK> [ 24.434139] dump_stack_lvl+0x73/0xb0 [ 24.434613] print_report+0xd1/0x640 [ 24.435537] ? __virt_addr_valid+0x1db/0x2d0 [ 24.436342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.437365] kasan_report+0x102/0x140 [ 24.438133] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 24.438489] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 24.439416] __asan_report_load1_noabort+0x18/0x20 [ 24.440682] ksize_unpoisons_memory+0x81e/0x9b0 [ 24.442205] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.443593] ? finish_task_switch.isra.0+0x153/0x700 [ 24.444285] ? __switch_to+0x5d9/0xf60 [ 24.445482] ? __schedule+0xc70/0x27e0 [ 24.446510] ? __pfx_read_tsc+0x10/0x10 [ 24.446811] ? ktime_get_ts64+0x86/0x230 [ 24.447116] kunit_try_run_case+0x1b3/0x490 [ 24.447862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.449206] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.450565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.452094] ? __kthread_parkme+0x82/0x160 [ 24.453236] ? preempt_count_sub+0x50/0x80 [ 24.453759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.454097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.455475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.456565] kthread+0x257/0x310 [ 24.457508] ? __pfx_kthread+0x10/0x10 [ 24.458141] ret_from_fork+0x41/0x80 [ 24.458526] ? __pfx_kthread+0x10/0x10 [ 24.459496] ret_from_fork_asm+0x1a/0x30 [ 24.460843] </TASK> [ 24.461150] [ 24.461355] Allocated by task 202: [ 24.462136] kasan_save_stack+0x3d/0x60 [ 24.462706] kasan_save_track+0x18/0x40 [ 24.463980] kasan_save_alloc_info+0x3b/0x50 [ 24.464333] __kasan_kmalloc+0xb7/0xc0 [ 24.465806] __kmalloc_cache_noprof+0x184/0x410 [ 24.466141] ksize_unpoisons_memory+0xc8/0x9b0 [ 24.467075] kunit_try_run_case+0x1b3/0x490 [ 24.467550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.469304] kthread+0x257/0x310 [ 24.469572] ret_from_fork+0x41/0x80 [ 24.470333] ret_from_fork_asm+0x1a/0x30 [ 24.470973] [ 24.471226] The buggy address belongs to the object at ffff88810291de00 [ 24.471226] which belongs to the cache kmalloc-128 of size 128 [ 24.472892] The buggy address is located 0 bytes to the right of [ 24.472892] allocated 115-byte region [ffff88810291de00, ffff88810291de73) [ 24.474666] [ 24.475263] The buggy address belongs to the physical page: [ 24.476577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291d [ 24.477450] flags: 0x200000000000000(node=0|zone=2) [ 24.478476] page_type: f5(slab) [ 24.478916] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.481012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.482893] page dumped because: kasan: bad access detected [ 24.483325] [ 24.483544] Memory state around the buggy address: [ 24.483824] ffff88810291dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.484210] ffff88810291dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.486065] >ffff88810291de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.487348] ^ [ 24.488315] ffff88810291de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.488722] ffff88810291df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.489716] ================================================================== [ 24.492100] ================================================================== [ 24.494140] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.494980] Read of size 1 at addr ffff88810291de78 by task kunit_try_catch/202 [ 24.496017] [ 24.496471] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 24.499177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.500359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.501325] Call Trace: [ 24.502182] <TASK> [ 24.502838] dump_stack_lvl+0x73/0xb0 [ 24.504111] print_report+0xd1/0x640 [ 24.504645] ? __virt_addr_valid+0x1db/0x2d0 [ 24.505016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.505701] kasan_report+0x102/0x140 [ 24.506806] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.507706] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.508131] __asan_report_load1_noabort+0x18/0x20 [ 24.508714] ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.510244] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.511483] ? finish_task_switch.isra.0+0x153/0x700 [ 24.512009] ? __switch_to+0x5d9/0xf60 [ 24.512637] ? __schedule+0xc70/0x27e0 [ 24.514481] ? __pfx_read_tsc+0x10/0x10 [ 24.514911] ? ktime_get_ts64+0x86/0x230 [ 24.515368] kunit_try_run_case+0x1b3/0x490 [ 24.515823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.517750] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.519144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.520445] ? __kthread_parkme+0x82/0x160 [ 24.521153] ? preempt_count_sub+0x50/0x80 [ 24.522926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.523313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.523958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.525834] kthread+0x257/0x310 [ 24.526176] ? __pfx_kthread+0x10/0x10 [ 24.526371] ret_from_fork+0x41/0x80 [ 24.527452] ? __pfx_kthread+0x10/0x10 [ 24.527883] ret_from_fork_asm+0x1a/0x30 [ 24.529062] </TASK> [ 24.529565] [ 24.529824] Allocated by task 202: [ 24.530380] kasan_save_stack+0x3d/0x60 [ 24.531281] kasan_save_track+0x18/0x40 [ 24.532472] kasan_save_alloc_info+0x3b/0x50 [ 24.532868] __kasan_kmalloc+0xb7/0xc0 [ 24.533329] __kmalloc_cache_noprof+0x184/0x410 [ 24.533826] ksize_unpoisons_memory+0xc8/0x9b0 [ 24.535415] kunit_try_run_case+0x1b3/0x490 [ 24.536276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.536974] kthread+0x257/0x310 [ 24.537426] ret_from_fork+0x41/0x80 [ 24.538811] ret_from_fork_asm+0x1a/0x30 [ 24.539148] [ 24.539374] The buggy address belongs to the object at ffff88810291de00 [ 24.539374] which belongs to the cache kmalloc-128 of size 128 [ 24.540390] The buggy address is located 5 bytes to the right of [ 24.540390] allocated 115-byte region [ffff88810291de00, ffff88810291de73) [ 24.542639] [ 24.542893] The buggy address belongs to the physical page: [ 24.544225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291d [ 24.544891] flags: 0x200000000000000(node=0|zone=2) [ 24.545304] page_type: f5(slab) [ 24.546774] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.548028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.548459] page dumped because: kasan: bad access detected [ 24.549734] [ 24.549915] Memory state around the buggy address: [ 24.550220] ffff88810291dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.552483] ffff88810291dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553749] >ffff88810291de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.555959] ^ [ 24.556629] ffff88810291de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.558390] ffff88810291df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560183] ================================================================== [ 24.561800] ================================================================== [ 24.563398] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.566502] Read of size 1 at addr ffff88810291de7f by task kunit_try_catch/202 [ 24.567430] [ 24.567646] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 24.568252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.570450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.571599] Call Trace: [ 24.572676] <TASK> [ 24.573153] dump_stack_lvl+0x73/0xb0 [ 24.573852] print_report+0xd1/0x640 [ 24.574481] ? __virt_addr_valid+0x1db/0x2d0 [ 24.575222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.576085] kasan_report+0x102/0x140 [ 24.577091] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.577989] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.578848] __asan_report_load1_noabort+0x18/0x20 [ 24.580187] ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.581441] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.582080] ? finish_task_switch.isra.0+0x153/0x700 [ 24.583275] ? __switch_to+0x5d9/0xf60 [ 24.584702] ? __schedule+0xc70/0x27e0 [ 24.585190] ? __pfx_read_tsc+0x10/0x10 [ 24.585572] ? ktime_get_ts64+0x86/0x230 [ 24.585979] kunit_try_run_case+0x1b3/0x490 [ 24.587284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.588427] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.589647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.590702] ? __kthread_parkme+0x82/0x160 [ 24.591225] ? preempt_count_sub+0x50/0x80 [ 24.592292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.592886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.594312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.595599] kthread+0x257/0x310 [ 24.596065] ? __pfx_kthread+0x10/0x10 [ 24.596487] ret_from_fork+0x41/0x80 [ 24.598138] ? __pfx_kthread+0x10/0x10 [ 24.598503] ret_from_fork_asm+0x1a/0x30 [ 24.598774] </TASK> [ 24.598965] [ 24.599389] Allocated by task 202: [ 24.599814] kasan_save_stack+0x3d/0x60 [ 24.601149] kasan_save_track+0x18/0x40 [ 24.601626] kasan_save_alloc_info+0x3b/0x50 [ 24.601905] __kasan_kmalloc+0xb7/0xc0 [ 24.603346] __kmalloc_cache_noprof+0x184/0x410 [ 24.603661] ksize_unpoisons_memory+0xc8/0x9b0 [ 24.605032] kunit_try_run_case+0x1b3/0x490 [ 24.606112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.606556] kthread+0x257/0x310 [ 24.607335] ret_from_fork+0x41/0x80 [ 24.607978] ret_from_fork_asm+0x1a/0x30 [ 24.609147] [ 24.609350] The buggy address belongs to the object at ffff88810291de00 [ 24.609350] which belongs to the cache kmalloc-128 of size 128 [ 24.610897] The buggy address is located 12 bytes to the right of [ 24.610897] allocated 115-byte region [ffff88810291de00, ffff88810291de73) [ 24.611489] [ 24.611593] The buggy address belongs to the physical page: [ 24.611814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291d [ 24.612729] flags: 0x200000000000000(node=0|zone=2) [ 24.613399] page_type: f5(slab) [ 24.614195] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.614957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.616994] page dumped because: kasan: bad access detected [ 24.617460] [ 24.617592] Memory state around the buggy address: [ 24.617881] ffff88810291dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.618273] ffff88810291dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.619895] >ffff88810291de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.621039] ^ [ 24.621858] ffff88810291de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.623864] ffff88810291df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.624279] ==================================================================