Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.872837] ==================================================================
[   24.873522] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   24.874329] Read of size 1 at addr fff00000c63a3278 by task kunit_try_catch/182
[   24.876189] 
[   24.876514] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.877550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.878252] Hardware name: linux,dummy-virt (DT)
[   24.879054] Call trace:
[   24.879399]  show_stack+0x20/0x38 (C)
[   24.880023]  dump_stack_lvl+0x8c/0xd0
[   24.880562]  print_report+0x118/0x5e0
[   24.881130]  kasan_report+0xc8/0x118
[   24.881642]  __asan_report_load1_noabort+0x20/0x30
[   24.882274]  ksize_unpoisons_memory+0x628/0x750
[   24.883156]  kunit_try_run_case+0x14c/0x3d0
[   24.883938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.884729]  kthread+0x24c/0x2d0
[   24.885241]  ret_from_fork+0x10/0x20
[   24.885885] 
[   24.886232] Allocated by task 182:
[   24.886725]  kasan_save_stack+0x3c/0x68
[   24.887558]  kasan_save_track+0x20/0x40
[   24.888169]  kasan_save_alloc_info+0x40/0x58
[   24.888844]  __kasan_kmalloc+0xd4/0xd8
[   24.889358]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.889892]  ksize_unpoisons_memory+0xc0/0x750
[   24.890448]  kunit_try_run_case+0x14c/0x3d0
[   24.891345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.892025]  kthread+0x24c/0x2d0
[   24.892512]  ret_from_fork+0x10/0x20
[   24.893042] 
[   24.893371] The buggy address belongs to the object at fff00000c63a3200
[   24.893371]  which belongs to the cache kmalloc-128 of size 128
[   24.894610] The buggy address is located 5 bytes to the right of
[   24.894610]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.896306] 
[   24.896849] The buggy address belongs to the physical page:
[   24.897571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.898459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.899306] page_type: f5(slab)
[   24.899770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.900632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.901524] page dumped because: kasan: bad access detected
[   24.902197] 
[   24.902487] Memory state around the buggy address:
[   24.903282]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.904060]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.904860] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.905639]                                                                 ^
[   24.906459]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.907501]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.908260] ==================================================================
[   24.836191] ==================================================================
[   24.837333] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   24.838289] Read of size 1 at addr fff00000c63a3273 by task kunit_try_catch/182
[   24.839186] 
[   24.839921] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.841094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.841497] Hardware name: linux,dummy-virt (DT)
[   24.841939] Call trace:
[   24.842219]  show_stack+0x20/0x38 (C)
[   24.842612]  dump_stack_lvl+0x8c/0xd0
[   24.843219]  print_report+0x118/0x5e0
[   24.843892]  kasan_report+0xc8/0x118
[   24.844645]  __asan_report_load1_noabort+0x20/0x30
[   24.845186]  ksize_unpoisons_memory+0x638/0x750
[   24.845980]  kunit_try_run_case+0x14c/0x3d0
[   24.846753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.847991]  kthread+0x24c/0x2d0
[   24.848551]  ret_from_fork+0x10/0x20
[   24.849148] 
[   24.849503] Allocated by task 182:
[   24.850132]  kasan_save_stack+0x3c/0x68
[   24.850855]  kasan_save_track+0x20/0x40
[   24.851689]  kasan_save_alloc_info+0x40/0x58
[   24.852351]  __kasan_kmalloc+0xd4/0xd8
[   24.853027]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.853667]  ksize_unpoisons_memory+0xc0/0x750
[   24.854310]  kunit_try_run_case+0x14c/0x3d0
[   24.855181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.855858]  kthread+0x24c/0x2d0
[   24.856352]  ret_from_fork+0x10/0x20
[   24.856886] 
[   24.857230] The buggy address belongs to the object at fff00000c63a3200
[   24.857230]  which belongs to the cache kmalloc-128 of size 128
[   24.858429] The buggy address is located 0 bytes to the right of
[   24.858429]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.860488] 
[   24.860767] The buggy address belongs to the physical page:
[   24.861097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.861460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.861901] page_type: f5(slab)
[   24.862369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.863085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.864202] page dumped because: kasan: bad access detected
[   24.865006] 
[   24.865324] Memory state around the buggy address:
[   24.866101]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.867106]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.867876] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.868544]                                                              ^
[   24.869404]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.870285]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.871383] ==================================================================
[   24.909393] ==================================================================
[   24.910158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   24.912040] Read of size 1 at addr fff00000c63a327f by task kunit_try_catch/182
[   24.912824] 
[   24.913112] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.914375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.915080] Hardware name: linux,dummy-virt (DT)
[   24.915755] Call trace:
[   24.916157]  show_stack+0x20/0x38 (C)
[   24.916789]  dump_stack_lvl+0x8c/0xd0
[   24.917358]  print_report+0x118/0x5e0
[   24.917936]  kasan_report+0xc8/0x118
[   24.918527]  __asan_report_load1_noabort+0x20/0x30
[   24.919403]  ksize_unpoisons_memory+0x6a0/0x750
[   24.920048]  kunit_try_run_case+0x14c/0x3d0
[   24.920633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.921445]  kthread+0x24c/0x2d0
[   24.922118]  ret_from_fork+0x10/0x20
[   24.922653] 
[   24.923270] Allocated by task 182:
[   24.923761]  kasan_save_stack+0x3c/0x68
[   24.924308]  kasan_save_track+0x20/0x40
[   24.924888]  kasan_save_alloc_info+0x40/0x58
[   24.925539]  __kasan_kmalloc+0xd4/0xd8
[   24.926033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.926752]  ksize_unpoisons_memory+0xc0/0x750
[   24.927577]  kunit_try_run_case+0x14c/0x3d0
[   24.928173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.928863]  kthread+0x24c/0x2d0
[   24.929350]  ret_from_fork+0x10/0x20
[   24.929842] 
[   24.930191] The buggy address belongs to the object at fff00000c63a3200
[   24.930191]  which belongs to the cache kmalloc-128 of size 128
[   24.931405] The buggy address is located 12 bytes to the right of
[   24.931405]  allocated 115-byte region [fff00000c63a3200, fff00000c63a3273)
[   24.933278] 
[   24.933619] The buggy address belongs to the physical page:
[   24.934231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3
[   24.935052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.935905] page_type: f5(slab)
[   24.936363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.937510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.938262] page dumped because: kasan: bad access detected
[   24.939057] 
[   24.939407] Memory state around the buggy address:
[   24.939969]  fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.940712]  fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.941451] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.942292]                                                                 ^
[   24.943174]  fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.944156]  fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.944871] ==================================================================

[   24.872692] ==================================================================
[   24.874356] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   24.876070] Read of size 1 at addr ffff888102957e73 by task kunit_try_catch/201
[   24.876932] 
[   24.877776] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.878945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.879626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.880754] Call Trace:
[   24.881221]  <TASK>
[   24.881863]  dump_stack_lvl+0x73/0xb0
[   24.883239]  print_report+0xd1/0x640
[   24.884029]  ? __virt_addr_valid+0x1db/0x2d0
[   24.884941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.886050]  kasan_report+0x102/0x140
[   24.886946]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   24.887970]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   24.888587]  __asan_report_load1_noabort+0x18/0x20
[   24.889587]  ksize_unpoisons_memory+0x81e/0x9b0
[   24.890539]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   24.891270]  ? finish_task_switch.isra.0+0x153/0x700
[   24.891798]  ? __switch_to+0x5d9/0xf60
[   24.892606]  ? __schedule+0xc70/0x27e0
[   24.892917]  ? __pfx_read_tsc+0x10/0x10
[   24.893565]  ? ktime_get_ts64+0x86/0x230
[   24.894193]  kunit_try_run_case+0x1b3/0x490
[   24.894729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.895169]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.896188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.897108]  ? __kthread_parkme+0x82/0x160
[   24.897672]  ? preempt_count_sub+0x50/0x80
[   24.898138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.898700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.899253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.900227]  kthread+0x257/0x310
[   24.900684]  ? __pfx_kthread+0x10/0x10
[   24.901498]  ret_from_fork+0x41/0x80
[   24.902076]  ? __pfx_kthread+0x10/0x10
[   24.902661]  ret_from_fork_asm+0x1a/0x30
[   24.903259]  </TASK>
[   24.903598] 
[   24.903759] Allocated by task 201:
[   24.904798]  kasan_save_stack+0x3d/0x60
[   24.905210]  kasan_save_track+0x18/0x40
[   24.905858]  kasan_save_alloc_info+0x3b/0x50
[   24.906356]  __kasan_kmalloc+0xb7/0xc0
[   24.906918]  __kmalloc_cache_noprof+0x184/0x410
[   24.907678]  ksize_unpoisons_memory+0xc8/0x9b0
[   24.908381]  kunit_try_run_case+0x1b3/0x490
[   24.909404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.910051]  kthread+0x257/0x310
[   24.910540]  ret_from_fork+0x41/0x80
[   24.910924]  ret_from_fork_asm+0x1a/0x30
[   24.911378] 
[   24.911583] The buggy address belongs to the object at ffff888102957e00
[   24.911583]  which belongs to the cache kmalloc-128 of size 128
[   24.912920] The buggy address is located 0 bytes to the right of
[   24.912920]  allocated 115-byte region [ffff888102957e00, ffff888102957e73)
[   24.914393] 
[   24.914642] The buggy address belongs to the physical page:
[   24.915139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957
[   24.916007] flags: 0x200000000000000(node=0|zone=2)
[   24.916556] page_type: f5(slab)
[   24.916821] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.918649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.919498] page dumped because: kasan: bad access detected
[   24.919721] 
[   24.919849] Memory state around the buggy address:
[   24.920613]  ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.921969]  ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.923366] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.924207]                                                              ^
[   24.925154]  ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.925900]  ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.927075] ==================================================================
[   24.928517] ==================================================================
[   24.929078] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   24.929924] Read of size 1 at addr ffff888102957e78 by task kunit_try_catch/201
[   24.931654] 
[   24.932462] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.933133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.933988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.935244] Call Trace:
[   24.935539]  <TASK>
[   24.935838]  dump_stack_lvl+0x73/0xb0
[   24.937104]  print_report+0xd1/0x640
[   24.938064]  ? __virt_addr_valid+0x1db/0x2d0
[   24.938819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.939383]  kasan_report+0x102/0x140
[   24.939791]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   24.941407]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   24.941806]  __asan_report_load1_noabort+0x18/0x20
[   24.943075]  ksize_unpoisons_memory+0x7eb/0x9b0
[   24.944338]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   24.945021]  ? finish_task_switch.isra.0+0x153/0x700
[   24.945632]  ? __switch_to+0x5d9/0xf60
[   24.946402]  ? __schedule+0xc70/0x27e0
[   24.946916]  ? __pfx_read_tsc+0x10/0x10
[   24.947441]  ? ktime_get_ts64+0x86/0x230
[   24.948187]  kunit_try_run_case+0x1b3/0x490
[   24.948700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.950184]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.950765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.951469]  ? __kthread_parkme+0x82/0x160
[   24.952278]  ? preempt_count_sub+0x50/0x80
[   24.953026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.953556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.954593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.955643]  kthread+0x257/0x310
[   24.956321]  ? __pfx_kthread+0x10/0x10
[   24.956727]  ret_from_fork+0x41/0x80
[   24.957860]  ? __pfx_kthread+0x10/0x10
[   24.958244]  ret_from_fork_asm+0x1a/0x30
[   24.959454]  </TASK>
[   24.959925] 
[   24.960565] Allocated by task 201:
[   24.961309]  kasan_save_stack+0x3d/0x60
[   24.961708]  kasan_save_track+0x18/0x40
[   24.962860]  kasan_save_alloc_info+0x3b/0x50
[   24.963411]  __kasan_kmalloc+0xb7/0xc0
[   24.964045]  __kmalloc_cache_noprof+0x184/0x410
[   24.964787]  ksize_unpoisons_memory+0xc8/0x9b0
[   24.965604]  kunit_try_run_case+0x1b3/0x490
[   24.966171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.967454]  kthread+0x257/0x310
[   24.968108]  ret_from_fork+0x41/0x80
[   24.968711]  ret_from_fork_asm+0x1a/0x30
[   24.969533] 
[   24.969808] The buggy address belongs to the object at ffff888102957e00
[   24.969808]  which belongs to the cache kmalloc-128 of size 128
[   24.972119] The buggy address is located 5 bytes to the right of
[   24.972119]  allocated 115-byte region [ffff888102957e00, ffff888102957e73)
[   24.973730] 
[   24.973982] The buggy address belongs to the physical page:
[   24.975021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957
[   24.976167] flags: 0x200000000000000(node=0|zone=2)
[   24.976851] page_type: f5(slab)
[   24.977712] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.978940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.979680] page dumped because: kasan: bad access detected
[   24.980664] 
[   24.980859] Memory state around the buggy address:
[   24.981151]  ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.982484]  ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.982989] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.984329]                                                                 ^
[   24.985060]  ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.986089]  ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.986972] ==================================================================
[   24.989193] ==================================================================
[   24.990503] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   24.991238] Read of size 1 at addr ffff888102957e7f by task kunit_try_catch/201
[   24.992701] 
[   24.992883] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.993777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.994169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.995537] Call Trace:
[   24.995722]  <TASK>
[   24.995934]  dump_stack_lvl+0x73/0xb0
[   24.996387]  print_report+0xd1/0x640
[   24.996837]  ? __virt_addr_valid+0x1db/0x2d0
[   24.997183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.997509]  kasan_report+0x102/0x140
[   24.997794]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   24.998966]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   24.999879]  __asan_report_load1_noabort+0x18/0x20
[   25.000754]  ksize_unpoisons_memory+0x7b8/0x9b0
[   25.001558]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.002073]  ? finish_task_switch.isra.0+0x153/0x700
[   25.002614]  ? __switch_to+0x5d9/0xf60
[   25.003026]  ? __schedule+0xc70/0x27e0
[   25.004271]  ? __pfx_read_tsc+0x10/0x10
[   25.004928]  ? ktime_get_ts64+0x86/0x230
[   25.006081]  kunit_try_run_case+0x1b3/0x490
[   25.007089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.007678]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.008144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.009143]  ? __kthread_parkme+0x82/0x160
[   25.009724]  ? preempt_count_sub+0x50/0x80
[   25.010163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.010898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.011592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.012149]  kthread+0x257/0x310
[   25.012989]  ? __pfx_kthread+0x10/0x10
[   25.013613]  ret_from_fork+0x41/0x80
[   25.014075]  ? __pfx_kthread+0x10/0x10
[   25.014712]  ret_from_fork_asm+0x1a/0x30
[   25.015104]  </TASK>
[   25.015574] 
[   25.015791] Allocated by task 201:
[   25.016144]  kasan_save_stack+0x3d/0x60
[   25.016996]  kasan_save_track+0x18/0x40
[   25.017500]  kasan_save_alloc_info+0x3b/0x50
[   25.017962]  __kasan_kmalloc+0xb7/0xc0
[   25.018272]  __kmalloc_cache_noprof+0x184/0x410
[   25.018830]  ksize_unpoisons_memory+0xc8/0x9b0
[   25.019588]  kunit_try_run_case+0x1b3/0x490
[   25.020105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.021109]  kthread+0x257/0x310
[   25.021679]  ret_from_fork+0x41/0x80
[   25.022350]  ret_from_fork_asm+0x1a/0x30
[   25.022691] 
[   25.022995] The buggy address belongs to the object at ffff888102957e00
[   25.022995]  which belongs to the cache kmalloc-128 of size 128
[   25.024044] The buggy address is located 12 bytes to the right of
[   25.024044]  allocated 115-byte region [ffff888102957e00, ffff888102957e73)
[   25.025983] 
[   25.026276] The buggy address belongs to the physical page:
[   25.026783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957
[   25.027859] flags: 0x200000000000000(node=0|zone=2)
[   25.028867] page_type: f5(slab)
[   25.029285] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.029814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.030782] page dumped because: kasan: bad access detected
[   25.031794] 
[   25.032005] Memory state around the buggy address:
[   25.032492]  ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   25.033084]  ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.033723] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.034982]                                                                 ^
[   25.035777]  ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.036428]  ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.037130] ==================================================================