Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.044887] ==================================================================
[   28.045078] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   28.045247] Read of size 1 at addr fff00000c5a34f78 by task kunit_try_catch/196
[   28.045399] 
[   28.045507] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.045797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.045989] Hardware name: linux,dummy-virt (DT)
[   28.046102] Call trace:
[   28.046192]  show_stack+0x20/0x38 (C)
[   28.046396]  dump_stack_lvl+0x8c/0xd0
[   28.046554]  print_report+0x118/0x608
[   28.046699]  kasan_report+0xdc/0x128
[   28.046837]  __asan_report_load1_noabort+0x20/0x30
[   28.047036]  ksize_unpoisons_memory+0x618/0x740
[   28.047211]  kunit_try_run_case+0x170/0x3f0
[   28.047357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.047545]  kthread+0x328/0x630
[   28.047685]  ret_from_fork+0x10/0x20
[   28.047824] 
[   28.047882] Allocated by task 196:
[   28.048112]  kasan_save_stack+0x3c/0x68
[   28.048335]  kasan_save_track+0x20/0x40
[   28.048509]  kasan_save_alloc_info+0x40/0x58
[   28.048624]  __kasan_kmalloc+0xd4/0xd8
[   28.048734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.048859]  ksize_unpoisons_memory+0xc0/0x740
[   28.048977]  kunit_try_run_case+0x170/0x3f0
[   28.049089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.049223]  kthread+0x328/0x630
[   28.049377]  ret_from_fork+0x10/0x20
[   28.049500] 
[   28.049545] The buggy address belongs to the object at fff00000c5a34f00
[   28.049545]  which belongs to the cache kmalloc-128 of size 128
[   28.049678] The buggy address is located 5 bytes to the right of
[   28.049678]  allocated 115-byte region [fff00000c5a34f00, fff00000c5a34f73)
[   28.049868] 
[   28.049921] The buggy address belongs to the physical page:
[   28.050006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   28.050145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.050320] page_type: f5(slab)
[   28.050427] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.050652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.050783] page dumped because: kasan: bad access detected
[   28.050915] 
[   28.050962] Memory state around the buggy address:
[   28.051100]  fff00000c5a34e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.051260]  fff00000c5a34e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.051489] >fff00000c5a34f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.051610]                                                                 ^
[   28.051784]  fff00000c5a34f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.051957]  fff00000c5a35000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.052114] ==================================================================
[   28.053785] ==================================================================
[   28.053990] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   28.054199] Read of size 1 at addr fff00000c5a34f7f by task kunit_try_catch/196
[   28.054405] 
[   28.054545] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.054777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.054861] Hardware name: linux,dummy-virt (DT)
[   28.054957] Call trace:
[   28.055021]  show_stack+0x20/0x38 (C)
[   28.055168]  dump_stack_lvl+0x8c/0xd0
[   28.055310]  print_report+0x118/0x608
[   28.055472]  kasan_report+0xdc/0x128
[   28.055604]  __asan_report_load1_noabort+0x20/0x30
[   28.055759]  ksize_unpoisons_memory+0x690/0x740
[   28.055897]  kunit_try_run_case+0x170/0x3f0
[   28.056138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.056358]  kthread+0x328/0x630
[   28.056546]  ret_from_fork+0x10/0x20
[   28.056695] 
[   28.056742] Allocated by task 196:
[   28.056812]  kasan_save_stack+0x3c/0x68
[   28.056961]  kasan_save_track+0x20/0x40
[   28.057086]  kasan_save_alloc_info+0x40/0x58
[   28.057198]  __kasan_kmalloc+0xd4/0xd8
[   28.057284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.057416]  ksize_unpoisons_memory+0xc0/0x740
[   28.057538]  kunit_try_run_case+0x170/0x3f0
[   28.057649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.057789]  kthread+0x328/0x630
[   28.057892]  ret_from_fork+0x10/0x20
[   28.058002] 
[   28.058066] The buggy address belongs to the object at fff00000c5a34f00
[   28.058066]  which belongs to the cache kmalloc-128 of size 128
[   28.058248] The buggy address is located 12 bytes to the right of
[   28.058248]  allocated 115-byte region [fff00000c5a34f00, fff00000c5a34f73)
[   28.058524] 
[   28.058592] The buggy address belongs to the physical page:
[   28.059390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   28.060732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.061097] page_type: f5(slab)
[   28.061354] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.061608] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.062270] page dumped because: kasan: bad access detected
[   28.062545] 
[   28.062672] Memory state around the buggy address:
[   28.062901]  fff00000c5a34e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.063070]  fff00000c5a34e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.063791] >fff00000c5a34f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.064112]                                                                 ^
[   28.064382]  fff00000c5a34f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.064512]  fff00000c5a35000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.064609] ==================================================================
[   28.016131] ==================================================================
[   28.016379] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   28.016568] Read of size 1 at addr fff00000c5a34f73 by task kunit_try_catch/196
[   28.016940] 
[   28.017060] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.017323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.017408] Hardware name: linux,dummy-virt (DT)
[   28.017576] Call trace:
[   28.017651]  show_stack+0x20/0x38 (C)
[   28.017905]  dump_stack_lvl+0x8c/0xd0
[   28.018059]  print_report+0x118/0x608
[   28.018562]  kasan_report+0xdc/0x128
[   28.018961]  __asan_report_load1_noabort+0x20/0x30
[   28.019474]  ksize_unpoisons_memory+0x628/0x740
[   28.019745]  kunit_try_run_case+0x170/0x3f0
[   28.019942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.020188]  kthread+0x328/0x630
[   28.020329]  ret_from_fork+0x10/0x20
[   28.020491] 
[   28.020540] Allocated by task 196:
[   28.020619]  kasan_save_stack+0x3c/0x68
[   28.020730]  kasan_save_track+0x20/0x40
[   28.020844]  kasan_save_alloc_info+0x40/0x58
[   28.020961]  __kasan_kmalloc+0xd4/0xd8
[   28.021068]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.021190]  ksize_unpoisons_memory+0xc0/0x740
[   28.021312]  kunit_try_run_case+0x170/0x3f0
[   28.021414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.021538]  kthread+0x328/0x630
[   28.021626]  ret_from_fork+0x10/0x20
[   28.021731] 
[   28.023288] The buggy address belongs to the object at fff00000c5a34f00
[   28.023288]  which belongs to the cache kmalloc-128 of size 128
[   28.023756] The buggy address is located 0 bytes to the right of
[   28.023756]  allocated 115-byte region [fff00000c5a34f00, fff00000c5a34f73)
[   28.024482] 
[   28.024674] The buggy address belongs to the physical page:
[   28.025255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   28.026005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.026253] page_type: f5(slab)
[   28.026640] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.027005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.027385] page dumped because: kasan: bad access detected
[   28.027594] 
[   28.027682] Memory state around the buggy address:
[   28.027907]  fff00000c5a34e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.028239]  fff00000c5a34e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.028508] >fff00000c5a34f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.028711]                                                              ^
[   28.028936]  fff00000c5a34f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.030096]  fff00000c5a35000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.030423] ==================================================================

[   13.013178] ==================================================================
[   13.013714] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.014443] Read of size 1 at addr ffff8881026f5373 by task kunit_try_catch/213
[   13.015367] 
[   13.015708] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.015759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.015772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.015792] Call Trace:
[   13.015806]  <TASK>
[   13.015822]  dump_stack_lvl+0x73/0xb0
[   13.015852]  print_report+0xd1/0x650
[   13.015874]  ? __virt_addr_valid+0x1db/0x2d0
[   13.015999]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.016023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.016045]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.016069]  kasan_report+0x141/0x180
[   13.016091]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.016120]  __asan_report_load1_noabort+0x18/0x20
[   13.016140]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.016164]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.016185]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.016216]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.016243]  kunit_try_run_case+0x1a5/0x480
[   13.016267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.016288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.016321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.016343]  ? __kthread_parkme+0x82/0x180
[   13.016364]  ? preempt_count_sub+0x50/0x80
[   13.016389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.016411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.016432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.016454]  kthread+0x337/0x6f0
[   13.016470]  ? trace_preempt_on+0x20/0xc0
[   13.016493]  ? __pfx_kthread+0x10/0x10
[   13.016510]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.016531]  ? calculate_sigpending+0x7b/0xa0
[   13.016552]  ? __pfx_kthread+0x10/0x10
[   13.016569]  ret_from_fork+0x41/0x80
[   13.016590]  ? __pfx_kthread+0x10/0x10
[   13.016607]  ret_from_fork_asm+0x1a/0x30
[   13.016637]  </TASK>
[   13.016649] 
[   13.029781] Allocated by task 213:
[   13.030101]  kasan_save_stack+0x45/0x70
[   13.030536]  kasan_save_track+0x18/0x40
[   13.031094]  kasan_save_alloc_info+0x3b/0x50
[   13.031386]  __kasan_kmalloc+0xb7/0xc0
[   13.031844]  __kmalloc_cache_noprof+0x189/0x420
[   13.032246]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.032698]  kunit_try_run_case+0x1a5/0x480
[   13.033143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.033338]  kthread+0x337/0x6f0
[   13.033476]  ret_from_fork+0x41/0x80
[   13.034025]  ret_from_fork_asm+0x1a/0x30
[   13.034499] 
[   13.034762] The buggy address belongs to the object at ffff8881026f5300
[   13.034762]  which belongs to the cache kmalloc-128 of size 128
[   13.036115] The buggy address is located 0 bytes to the right of
[   13.036115]  allocated 115-byte region [ffff8881026f5300, ffff8881026f5373)
[   13.037072] 
[   13.037265] The buggy address belongs to the physical page:
[   13.037950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f5
[   13.038308] flags: 0x200000000000000(node=0|zone=2)
[   13.038496] page_type: f5(slab)
[   13.038623] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.038862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.039125] page dumped because: kasan: bad access detected
[   13.039665] 
[   13.039834] Memory state around the buggy address:
[   13.040353]  ffff8881026f5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.040873]  ffff8881026f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.041374] >ffff8881026f5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.042040]                                                              ^
[   13.042282]  ffff8881026f5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.042805]  ffff8881026f5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.043528] ==================================================================
[   13.073214] ==================================================================
[   13.073866] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.074139] Read of size 1 at addr ffff8881026f537f by task kunit_try_catch/213
[   13.074372] 
[   13.074467] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.074512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.074524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.074543] Call Trace:
[   13.074560]  <TASK>
[   13.074575]  dump_stack_lvl+0x73/0xb0
[   13.074602]  print_report+0xd1/0x650
[   13.074624]  ? __virt_addr_valid+0x1db/0x2d0
[   13.074645]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.074672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.074694]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.074717]  kasan_report+0x141/0x180
[   13.074739]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.074766]  __asan_report_load1_noabort+0x18/0x20
[   13.074786]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.074810]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.074832]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.074860]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.074888]  kunit_try_run_case+0x1a5/0x480
[   13.074911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.074932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.074954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.074976]  ? __kthread_parkme+0x82/0x180
[   13.074998]  ? preempt_count_sub+0x50/0x80
[   13.075022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.075044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.075065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.075087]  kthread+0x337/0x6f0
[   13.075103]  ? trace_preempt_on+0x20/0xc0
[   13.075125]  ? __pfx_kthread+0x10/0x10
[   13.075143]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.075163]  ? calculate_sigpending+0x7b/0xa0
[   13.075184]  ? __pfx_kthread+0x10/0x10
[   13.075202]  ret_from_fork+0x41/0x80
[   13.075222]  ? __pfx_kthread+0x10/0x10
[   13.075240]  ret_from_fork_asm+0x1a/0x30
[   13.075270]  </TASK>
[   13.075282] 
[   13.087107] Allocated by task 213:
[   13.087441]  kasan_save_stack+0x45/0x70
[   13.087796]  kasan_save_track+0x18/0x40
[   13.088148]  kasan_save_alloc_info+0x3b/0x50
[   13.088630]  __kasan_kmalloc+0xb7/0xc0
[   13.089035]  __kmalloc_cache_noprof+0x189/0x420
[   13.089215]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.089378]  kunit_try_run_case+0x1a5/0x480
[   13.089703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.090222]  kthread+0x337/0x6f0
[   13.090583]  ret_from_fork+0x41/0x80
[   13.090958]  ret_from_fork_asm+0x1a/0x30
[   13.091344] 
[   13.091505] The buggy address belongs to the object at ffff8881026f5300
[   13.091505]  which belongs to the cache kmalloc-128 of size 128
[   13.092633] The buggy address is located 12 bytes to the right of
[   13.092633]  allocated 115-byte region [ffff8881026f5300, ffff8881026f5373)
[   13.093289] 
[   13.093375] The buggy address belongs to the physical page:
[   13.093749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f5
[   13.094568] flags: 0x200000000000000(node=0|zone=2)
[   13.095092] page_type: f5(slab)
[   13.095301] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.095551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.095777] page dumped because: kasan: bad access detected
[   13.095967] 
[   13.096037] Memory state around the buggy address:
[   13.096536]  ffff8881026f5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.097316]  ffff8881026f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.097746] >ffff8881026f5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.098435]                                                                 ^
[   13.099099]  ffff8881026f5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.099733]  ffff8881026f5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.100052] ==================================================================
[   13.044731] ==================================================================
[   13.045103] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.045366] Read of size 1 at addr ffff8881026f5378 by task kunit_try_catch/213
[   13.045785] 
[   13.046002] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.046050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.046062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.046083] Call Trace:
[   13.046095]  <TASK>
[   13.046112]  dump_stack_lvl+0x73/0xb0
[   13.046140]  print_report+0xd1/0x650
[   13.046162]  ? __virt_addr_valid+0x1db/0x2d0
[   13.046185]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.046207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.046229]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.046252]  kasan_report+0x141/0x180
[   13.046274]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.046313]  __asan_report_load1_noabort+0x18/0x20
[   13.046333]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.046357]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.046379]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.046409]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.046447]  kunit_try_run_case+0x1a5/0x480
[   13.046471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.046492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.046516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.046537]  ? __kthread_parkme+0x82/0x180
[   13.046559]  ? preempt_count_sub+0x50/0x80
[   13.046585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.046609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.046630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.046652]  kthread+0x337/0x6f0
[   13.046675]  ? trace_preempt_on+0x20/0xc0
[   13.046698]  ? __pfx_kthread+0x10/0x10
[   13.046716]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.046736]  ? calculate_sigpending+0x7b/0xa0
[   13.046758]  ? __pfx_kthread+0x10/0x10
[   13.046775]  ret_from_fork+0x41/0x80
[   13.046797]  ? __pfx_kthread+0x10/0x10
[   13.046814]  ret_from_fork_asm+0x1a/0x30
[   13.046845]  </TASK>
[   13.046856] 
[   13.060405] Allocated by task 213:
[   13.060544]  kasan_save_stack+0x45/0x70
[   13.060925]  kasan_save_track+0x18/0x40
[   13.061338]  kasan_save_alloc_info+0x3b/0x50
[   13.061720]  __kasan_kmalloc+0xb7/0xc0
[   13.062000]  __kmalloc_cache_noprof+0x189/0x420
[   13.062369]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.062851]  kunit_try_run_case+0x1a5/0x480
[   13.063224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.063526]  kthread+0x337/0x6f0
[   13.063784]  ret_from_fork+0x41/0x80
[   13.064176]  ret_from_fork_asm+0x1a/0x30
[   13.064605] 
[   13.064771] The buggy address belongs to the object at ffff8881026f5300
[   13.064771]  which belongs to the cache kmalloc-128 of size 128
[   13.065336] The buggy address is located 5 bytes to the right of
[   13.065336]  allocated 115-byte region [ffff8881026f5300, ffff8881026f5373)
[   13.066235] 
[   13.066438] The buggy address belongs to the physical page:
[   13.067028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f5
[   13.067757] flags: 0x200000000000000(node=0|zone=2)
[   13.068235] page_type: f5(slab)
[   13.068440] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.068677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.068914] page dumped because: kasan: bad access detected
[   13.069371] 
[   13.069559] Memory state around the buggy address:
[   13.069856]  ffff8881026f5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.070072]  ffff8881026f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.070374] >ffff8881026f5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.070824]                                                                 ^
[   13.071277]  ffff8881026f5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.071883]  ffff8881026f5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.072284] ==================================================================