Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.872837] ================================================================== [ 24.873522] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 24.874329] Read of size 1 at addr fff00000c63a3278 by task kunit_try_catch/182 [ 24.876189] [ 24.876514] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.877550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.878252] Hardware name: linux,dummy-virt (DT) [ 24.879054] Call trace: [ 24.879399] show_stack+0x20/0x38 (C) [ 24.880023] dump_stack_lvl+0x8c/0xd0 [ 24.880562] print_report+0x118/0x5e0 [ 24.881130] kasan_report+0xc8/0x118 [ 24.881642] __asan_report_load1_noabort+0x20/0x30 [ 24.882274] ksize_unpoisons_memory+0x628/0x750 [ 24.883156] kunit_try_run_case+0x14c/0x3d0 [ 24.883938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.884729] kthread+0x24c/0x2d0 [ 24.885241] ret_from_fork+0x10/0x20 [ 24.885885] [ 24.886232] Allocated by task 182: [ 24.886725] kasan_save_stack+0x3c/0x68 [ 24.887558] kasan_save_track+0x20/0x40 [ 24.888169] kasan_save_alloc_info+0x40/0x58 [ 24.888844] __kasan_kmalloc+0xd4/0xd8 [ 24.889358] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.889892] ksize_unpoisons_memory+0xc0/0x750 [ 24.890448] kunit_try_run_case+0x14c/0x3d0 [ 24.891345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.892025] kthread+0x24c/0x2d0 [ 24.892512] ret_from_fork+0x10/0x20 [ 24.893042] [ 24.893371] The buggy address belongs to the object at fff00000c63a3200 [ 24.893371] which belongs to the cache kmalloc-128 of size 128 [ 24.894610] The buggy address is located 5 bytes to the right of [ 24.894610] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.896306] [ 24.896849] The buggy address belongs to the physical page: [ 24.897571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.898459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.899306] page_type: f5(slab) [ 24.899770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.900632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.901524] page dumped because: kasan: bad access detected [ 24.902197] [ 24.902487] Memory state around the buggy address: [ 24.903282] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.904060] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.904860] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.905639] ^ [ 24.906459] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.907501] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.908260] ================================================================== [ 24.836191] ================================================================== [ 24.837333] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 24.838289] Read of size 1 at addr fff00000c63a3273 by task kunit_try_catch/182 [ 24.839186] [ 24.839921] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.841094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.841497] Hardware name: linux,dummy-virt (DT) [ 24.841939] Call trace: [ 24.842219] show_stack+0x20/0x38 (C) [ 24.842612] dump_stack_lvl+0x8c/0xd0 [ 24.843219] print_report+0x118/0x5e0 [ 24.843892] kasan_report+0xc8/0x118 [ 24.844645] __asan_report_load1_noabort+0x20/0x30 [ 24.845186] ksize_unpoisons_memory+0x638/0x750 [ 24.845980] kunit_try_run_case+0x14c/0x3d0 [ 24.846753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.847991] kthread+0x24c/0x2d0 [ 24.848551] ret_from_fork+0x10/0x20 [ 24.849148] [ 24.849503] Allocated by task 182: [ 24.850132] kasan_save_stack+0x3c/0x68 [ 24.850855] kasan_save_track+0x20/0x40 [ 24.851689] kasan_save_alloc_info+0x40/0x58 [ 24.852351] __kasan_kmalloc+0xd4/0xd8 [ 24.853027] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.853667] ksize_unpoisons_memory+0xc0/0x750 [ 24.854310] kunit_try_run_case+0x14c/0x3d0 [ 24.855181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.855858] kthread+0x24c/0x2d0 [ 24.856352] ret_from_fork+0x10/0x20 [ 24.856886] [ 24.857230] The buggy address belongs to the object at fff00000c63a3200 [ 24.857230] which belongs to the cache kmalloc-128 of size 128 [ 24.858429] The buggy address is located 0 bytes to the right of [ 24.858429] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.860488] [ 24.860767] The buggy address belongs to the physical page: [ 24.861097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.861460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.861901] page_type: f5(slab) [ 24.862369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.863085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.864202] page dumped because: kasan: bad access detected [ 24.865006] [ 24.865324] Memory state around the buggy address: [ 24.866101] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.867106] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867876] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.868544] ^ [ 24.869404] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.870285] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.871383] ================================================================== [ 24.909393] ================================================================== [ 24.910158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 24.912040] Read of size 1 at addr fff00000c63a327f by task kunit_try_catch/182 [ 24.912824] [ 24.913112] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.914375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.915080] Hardware name: linux,dummy-virt (DT) [ 24.915755] Call trace: [ 24.916157] show_stack+0x20/0x38 (C) [ 24.916789] dump_stack_lvl+0x8c/0xd0 [ 24.917358] print_report+0x118/0x5e0 [ 24.917936] kasan_report+0xc8/0x118 [ 24.918527] __asan_report_load1_noabort+0x20/0x30 [ 24.919403] ksize_unpoisons_memory+0x6a0/0x750 [ 24.920048] kunit_try_run_case+0x14c/0x3d0 [ 24.920633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.921445] kthread+0x24c/0x2d0 [ 24.922118] ret_from_fork+0x10/0x20 [ 24.922653] [ 24.923270] Allocated by task 182: [ 24.923761] kasan_save_stack+0x3c/0x68 [ 24.924308] kasan_save_track+0x20/0x40 [ 24.924888] kasan_save_alloc_info+0x40/0x58 [ 24.925539] __kasan_kmalloc+0xd4/0xd8 [ 24.926033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.926752] ksize_unpoisons_memory+0xc0/0x750 [ 24.927577] kunit_try_run_case+0x14c/0x3d0 [ 24.928173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.928863] kthread+0x24c/0x2d0 [ 24.929350] ret_from_fork+0x10/0x20 [ 24.929842] [ 24.930191] The buggy address belongs to the object at fff00000c63a3200 [ 24.930191] which belongs to the cache kmalloc-128 of size 128 [ 24.931405] The buggy address is located 12 bytes to the right of [ 24.931405] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.933278] [ 24.933619] The buggy address belongs to the physical page: [ 24.934231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.935052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.935905] page_type: f5(slab) [ 24.936363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.937510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.938262] page dumped because: kasan: bad access detected [ 24.939057] [ 24.939407] Memory state around the buggy address: [ 24.939969] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.940712] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.941451] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.942292] ^ [ 24.943174] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944156] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944871] ==================================================================
[ 24.872692] ================================================================== [ 24.874356] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 24.876070] Read of size 1 at addr ffff888102957e73 by task kunit_try_catch/201 [ 24.876932] [ 24.877776] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.878945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.879626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.880754] Call Trace: [ 24.881221] <TASK> [ 24.881863] dump_stack_lvl+0x73/0xb0 [ 24.883239] print_report+0xd1/0x640 [ 24.884029] ? __virt_addr_valid+0x1db/0x2d0 [ 24.884941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.886050] kasan_report+0x102/0x140 [ 24.886946] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 24.887970] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 24.888587] __asan_report_load1_noabort+0x18/0x20 [ 24.889587] ksize_unpoisons_memory+0x81e/0x9b0 [ 24.890539] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.891270] ? finish_task_switch.isra.0+0x153/0x700 [ 24.891798] ? __switch_to+0x5d9/0xf60 [ 24.892606] ? __schedule+0xc70/0x27e0 [ 24.892917] ? __pfx_read_tsc+0x10/0x10 [ 24.893565] ? ktime_get_ts64+0x86/0x230 [ 24.894193] kunit_try_run_case+0x1b3/0x490 [ 24.894729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.895169] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.896188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.897108] ? __kthread_parkme+0x82/0x160 [ 24.897672] ? preempt_count_sub+0x50/0x80 [ 24.898138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.898700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.899253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.900227] kthread+0x257/0x310 [ 24.900684] ? __pfx_kthread+0x10/0x10 [ 24.901498] ret_from_fork+0x41/0x80 [ 24.902076] ? __pfx_kthread+0x10/0x10 [ 24.902661] ret_from_fork_asm+0x1a/0x30 [ 24.903259] </TASK> [ 24.903598] [ 24.903759] Allocated by task 201: [ 24.904798] kasan_save_stack+0x3d/0x60 [ 24.905210] kasan_save_track+0x18/0x40 [ 24.905858] kasan_save_alloc_info+0x3b/0x50 [ 24.906356] __kasan_kmalloc+0xb7/0xc0 [ 24.906918] __kmalloc_cache_noprof+0x184/0x410 [ 24.907678] ksize_unpoisons_memory+0xc8/0x9b0 [ 24.908381] kunit_try_run_case+0x1b3/0x490 [ 24.909404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.910051] kthread+0x257/0x310 [ 24.910540] ret_from_fork+0x41/0x80 [ 24.910924] ret_from_fork_asm+0x1a/0x30 [ 24.911378] [ 24.911583] The buggy address belongs to the object at ffff888102957e00 [ 24.911583] which belongs to the cache kmalloc-128 of size 128 [ 24.912920] The buggy address is located 0 bytes to the right of [ 24.912920] allocated 115-byte region [ffff888102957e00, ffff888102957e73) [ 24.914393] [ 24.914642] The buggy address belongs to the physical page: [ 24.915139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957 [ 24.916007] flags: 0x200000000000000(node=0|zone=2) [ 24.916556] page_type: f5(slab) [ 24.916821] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.918649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.919498] page dumped because: kasan: bad access detected [ 24.919721] [ 24.919849] Memory state around the buggy address: [ 24.920613] ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.921969] ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.923366] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.924207] ^ [ 24.925154] ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.925900] ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.927075] ================================================================== [ 24.928517] ================================================================== [ 24.929078] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.929924] Read of size 1 at addr ffff888102957e78 by task kunit_try_catch/201 [ 24.931654] [ 24.932462] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.933133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.933988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.935244] Call Trace: [ 24.935539] <TASK> [ 24.935838] dump_stack_lvl+0x73/0xb0 [ 24.937104] print_report+0xd1/0x640 [ 24.938064] ? __virt_addr_valid+0x1db/0x2d0 [ 24.938819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.939383] kasan_report+0x102/0x140 [ 24.939791] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.941407] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.941806] __asan_report_load1_noabort+0x18/0x20 [ 24.943075] ksize_unpoisons_memory+0x7eb/0x9b0 [ 24.944338] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.945021] ? finish_task_switch.isra.0+0x153/0x700 [ 24.945632] ? __switch_to+0x5d9/0xf60 [ 24.946402] ? __schedule+0xc70/0x27e0 [ 24.946916] ? __pfx_read_tsc+0x10/0x10 [ 24.947441] ? ktime_get_ts64+0x86/0x230 [ 24.948187] kunit_try_run_case+0x1b3/0x490 [ 24.948700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.950184] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.950765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.951469] ? __kthread_parkme+0x82/0x160 [ 24.952278] ? preempt_count_sub+0x50/0x80 [ 24.953026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.953556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.954593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.955643] kthread+0x257/0x310 [ 24.956321] ? __pfx_kthread+0x10/0x10 [ 24.956727] ret_from_fork+0x41/0x80 [ 24.957860] ? __pfx_kthread+0x10/0x10 [ 24.958244] ret_from_fork_asm+0x1a/0x30 [ 24.959454] </TASK> [ 24.959925] [ 24.960565] Allocated by task 201: [ 24.961309] kasan_save_stack+0x3d/0x60 [ 24.961708] kasan_save_track+0x18/0x40 [ 24.962860] kasan_save_alloc_info+0x3b/0x50 [ 24.963411] __kasan_kmalloc+0xb7/0xc0 [ 24.964045] __kmalloc_cache_noprof+0x184/0x410 [ 24.964787] ksize_unpoisons_memory+0xc8/0x9b0 [ 24.965604] kunit_try_run_case+0x1b3/0x490 [ 24.966171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.967454] kthread+0x257/0x310 [ 24.968108] ret_from_fork+0x41/0x80 [ 24.968711] ret_from_fork_asm+0x1a/0x30 [ 24.969533] [ 24.969808] The buggy address belongs to the object at ffff888102957e00 [ 24.969808] which belongs to the cache kmalloc-128 of size 128 [ 24.972119] The buggy address is located 5 bytes to the right of [ 24.972119] allocated 115-byte region [ffff888102957e00, ffff888102957e73) [ 24.973730] [ 24.973982] The buggy address belongs to the physical page: [ 24.975021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957 [ 24.976167] flags: 0x200000000000000(node=0|zone=2) [ 24.976851] page_type: f5(slab) [ 24.977712] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.978940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.979680] page dumped because: kasan: bad access detected [ 24.980664] [ 24.980859] Memory state around the buggy address: [ 24.981151] ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.982484] ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.982989] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.984329] ^ [ 24.985060] ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.986089] ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.986972] ================================================================== [ 24.989193] ================================================================== [ 24.990503] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.991238] Read of size 1 at addr ffff888102957e7f by task kunit_try_catch/201 [ 24.992701] [ 24.992883] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.993777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.994169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.995537] Call Trace: [ 24.995722] <TASK> [ 24.995934] dump_stack_lvl+0x73/0xb0 [ 24.996387] print_report+0xd1/0x640 [ 24.996837] ? __virt_addr_valid+0x1db/0x2d0 [ 24.997183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.997509] kasan_report+0x102/0x140 [ 24.997794] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.998966] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 24.999879] __asan_report_load1_noabort+0x18/0x20 [ 25.000754] ksize_unpoisons_memory+0x7b8/0x9b0 [ 25.001558] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.002073] ? finish_task_switch.isra.0+0x153/0x700 [ 25.002614] ? __switch_to+0x5d9/0xf60 [ 25.003026] ? __schedule+0xc70/0x27e0 [ 25.004271] ? __pfx_read_tsc+0x10/0x10 [ 25.004928] ? ktime_get_ts64+0x86/0x230 [ 25.006081] kunit_try_run_case+0x1b3/0x490 [ 25.007089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.007678] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.008144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.009143] ? __kthread_parkme+0x82/0x160 [ 25.009724] ? preempt_count_sub+0x50/0x80 [ 25.010163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.010898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.011592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.012149] kthread+0x257/0x310 [ 25.012989] ? __pfx_kthread+0x10/0x10 [ 25.013613] ret_from_fork+0x41/0x80 [ 25.014075] ? __pfx_kthread+0x10/0x10 [ 25.014712] ret_from_fork_asm+0x1a/0x30 [ 25.015104] </TASK> [ 25.015574] [ 25.015791] Allocated by task 201: [ 25.016144] kasan_save_stack+0x3d/0x60 [ 25.016996] kasan_save_track+0x18/0x40 [ 25.017500] kasan_save_alloc_info+0x3b/0x50 [ 25.017962] __kasan_kmalloc+0xb7/0xc0 [ 25.018272] __kmalloc_cache_noprof+0x184/0x410 [ 25.018830] ksize_unpoisons_memory+0xc8/0x9b0 [ 25.019588] kunit_try_run_case+0x1b3/0x490 [ 25.020105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.021109] kthread+0x257/0x310 [ 25.021679] ret_from_fork+0x41/0x80 [ 25.022350] ret_from_fork_asm+0x1a/0x30 [ 25.022691] [ 25.022995] The buggy address belongs to the object at ffff888102957e00 [ 25.022995] which belongs to the cache kmalloc-128 of size 128 [ 25.024044] The buggy address is located 12 bytes to the right of [ 25.024044] allocated 115-byte region [ffff888102957e00, ffff888102957e73) [ 25.025983] [ 25.026276] The buggy address belongs to the physical page: [ 25.026783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957 [ 25.027859] flags: 0x200000000000000(node=0|zone=2) [ 25.028867] page_type: f5(slab) [ 25.029285] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.029814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.030782] page dumped because: kasan: bad access detected [ 25.031794] [ 25.032005] Memory state around the buggy address: [ 25.032492] ffff888102957d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 25.033084] ffff888102957d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.033723] >ffff888102957e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.034982] ^ [ 25.035777] ffff888102957e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.036428] ffff888102957f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.037130] ==================================================================