Hay
Date
July 4, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.302598] ==================================================================
[   18.302647] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.302699] Read of size 1 at addr fff00000c7742078 by task kunit_try_catch/194
[   18.302747] 
[   18.302779] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.302873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.302900] Hardware name: linux,dummy-virt (DT)
[   18.302945] Call trace:
[   18.302968]  show_stack+0x20/0x38 (C)
[   18.303017]  dump_stack_lvl+0x8c/0xd0
[   18.303062]  print_report+0x118/0x608
[   18.303108]  kasan_report+0xdc/0x128
[   18.303152]  __asan_report_load1_noabort+0x20/0x30
[   18.303260]  ksize_unpoisons_memory+0x618/0x740
[   18.303836]  kunit_try_run_case+0x170/0x3f0
[   18.303988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304164]  kthread+0x328/0x630
[   18.304256]  ret_from_fork+0x10/0x20
[   18.304353] 
[   18.304393] Allocated by task 194:
[   18.304463]  kasan_save_stack+0x3c/0x68
[   18.304546]  kasan_save_track+0x20/0x40
[   18.304625]  kasan_save_alloc_info+0x40/0x58
[   18.304682]  __kasan_kmalloc+0xd4/0xd8
[   18.304771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.304831]  ksize_unpoisons_memory+0xc0/0x740
[   18.304870]  kunit_try_run_case+0x170/0x3f0
[   18.304907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304950]  kthread+0x328/0x630
[   18.304983]  ret_from_fork+0x10/0x20
[   18.305018] 
[   18.305038] The buggy address belongs to the object at fff00000c7742000
[   18.305038]  which belongs to the cache kmalloc-128 of size 128
[   18.305378] The buggy address is located 5 bytes to the right of
[   18.305378]  allocated 115-byte region [fff00000c7742000, fff00000c7742073)
[   18.305477] 
[   18.305529] The buggy address belongs to the physical page:
[   18.305597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742
[   18.305688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.305747] page_type: f5(slab)
[   18.305786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.306116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.306243] page dumped because: kasan: bad access detected
[   18.306329] 
[   18.306381] Memory state around the buggy address:
[   18.306450]  fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.306495]  fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.306538] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.306694]                                                                 ^
[   18.306882]  fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.306976]  fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.307021] ==================================================================
[   18.297186] ==================================================================
[   18.297258] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.297314] Read of size 1 at addr fff00000c7742073 by task kunit_try_catch/194
[   18.297369] 
[   18.297404] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.297487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.297564] Hardware name: linux,dummy-virt (DT)
[   18.297602] Call trace:
[   18.297625]  show_stack+0x20/0x38 (C)
[   18.297672]  dump_stack_lvl+0x8c/0xd0
[   18.297726]  print_report+0x118/0x608
[   18.297772]  kasan_report+0xdc/0x128
[   18.298377]  __asan_report_load1_noabort+0x20/0x30
[   18.298462]  ksize_unpoisons_memory+0x628/0x740
[   18.298511]  kunit_try_run_case+0x170/0x3f0
[   18.298563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.298616]  kthread+0x328/0x630
[   18.298658]  ret_from_fork+0x10/0x20
[   18.298706] 
[   18.298724] Allocated by task 194:
[   18.298752]  kasan_save_stack+0x3c/0x68
[   18.298792]  kasan_save_track+0x20/0x40
[   18.298842]  kasan_save_alloc_info+0x40/0x58
[   18.298880]  __kasan_kmalloc+0xd4/0xd8
[   18.298915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.299633]  ksize_unpoisons_memory+0xc0/0x740
[   18.299675]  kunit_try_run_case+0x170/0x3f0
[   18.299713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.299756]  kthread+0x328/0x630
[   18.299787]  ret_from_fork+0x10/0x20
[   18.299836] 
[   18.299857] The buggy address belongs to the object at fff00000c7742000
[   18.299857]  which belongs to the cache kmalloc-128 of size 128
[   18.299919] The buggy address is located 0 bytes to the right of
[   18.299919]  allocated 115-byte region [fff00000c7742000, fff00000c7742073)
[   18.299990] 
[   18.300012] The buggy address belongs to the physical page:
[   18.300043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742
[   18.300096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.300146] page_type: f5(slab)
[   18.300189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.300239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.300283] page dumped because: kasan: bad access detected
[   18.300315] 
[   18.300335] Memory state around the buggy address:
[   18.300367]  fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.300412]  fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.300457] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.300494]                                                              ^
[   18.300534]  fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300577]  fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300614] ==================================================================
[   18.307566] ==================================================================
[   18.307631] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.307698] Read of size 1 at addr fff00000c774207f by task kunit_try_catch/194
[   18.307753] 
[   18.307789] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.307895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.307940] Hardware name: linux,dummy-virt (DT)
[   18.307976] Call trace:
[   18.308004]  show_stack+0x20/0x38 (C)
[   18.308067]  dump_stack_lvl+0x8c/0xd0
[   18.308124]  print_report+0x118/0x608
[   18.308179]  kasan_report+0xdc/0x128
[   18.308233]  __asan_report_load1_noabort+0x20/0x30
[   18.308283]  ksize_unpoisons_memory+0x690/0x740
[   18.308348]  kunit_try_run_case+0x170/0x3f0
[   18.308403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.308454]  kthread+0x328/0x630
[   18.308495]  ret_from_fork+0x10/0x20
[   18.308654] 
[   18.308674] Allocated by task 194:
[   18.308832]  kasan_save_stack+0x3c/0x68
[   18.308883]  kasan_save_track+0x20/0x40
[   18.308919]  kasan_save_alloc_info+0x40/0x58
[   18.308989]  __kasan_kmalloc+0xd4/0xd8
[   18.309035]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.309080]  ksize_unpoisons_memory+0xc0/0x740
[   18.309131]  kunit_try_run_case+0x170/0x3f0
[   18.309182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.309224]  kthread+0x328/0x630
[   18.309259]  ret_from_fork+0x10/0x20
[   18.309295] 
[   18.309314] The buggy address belongs to the object at fff00000c7742000
[   18.309314]  which belongs to the cache kmalloc-128 of size 128
[   18.309480] The buggy address is located 12 bytes to the right of
[   18.309480]  allocated 115-byte region [fff00000c7742000, fff00000c7742073)
[   18.309636] 
[   18.309664] The buggy address belongs to the physical page:
[   18.309759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742
[   18.309828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.309894] page_type: f5(slab)
[   18.309941] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.309993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.310033] page dumped because: kasan: bad access detected
[   18.310064] 
[   18.310090] Memory state around the buggy address:
[   18.310122]  fff00000c7741f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.310178]  fff00000c7741f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.310225] >fff00000c7742000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.310271]                                                                 ^
[   18.310312]  fff00000c7742080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310358]  fff00000c7742100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310404] ==================================================================

[   12.380740] ==================================================================
[   12.381182] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.382250] Read of size 1 at addr ffff88810262fd73 by task kunit_try_catch/211
[   12.383330] 
[   12.383671] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.383727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.383739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.383882] Call Trace:
[   12.383902]  <TASK>
[   12.383925]  dump_stack_lvl+0x73/0xb0
[   12.383967]  print_report+0xd1/0x650
[   12.383990]  ? __virt_addr_valid+0x1db/0x2d0
[   12.384014]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.384036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.384056]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.384078]  kasan_report+0x141/0x180
[   12.384099]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.384125]  __asan_report_load1_noabort+0x18/0x20
[   12.384147]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.384170]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.384191]  ? finish_task_switch.isra.0+0x153/0x700
[   12.384213]  ? __switch_to+0x47/0xf50
[   12.384252]  ? __schedule+0x10cc/0x2b60
[   12.384273]  ? __pfx_read_tsc+0x10/0x10
[   12.384294]  ? ktime_get_ts64+0x86/0x230
[   12.384314]  ? irqentry_exit+0x2a/0x60
[   12.384337]  kunit_try_run_case+0x1a5/0x480
[   12.384362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.384383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.384406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.384427]  ? __kthread_parkme+0x82/0x180
[   12.384447]  ? preempt_count_sub+0x50/0x80
[   12.384468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.384492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.384513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.384534]  kthread+0x337/0x6f0
[   12.384552]  ? trace_preempt_on+0x20/0xc0
[   12.384574]  ? __pfx_kthread+0x10/0x10
[   12.384594]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.384614]  ? calculate_sigpending+0x7b/0xa0
[   12.384638]  ? __pfx_kthread+0x10/0x10
[   12.384658]  ret_from_fork+0x116/0x1d0
[   12.384674]  ? __pfx_kthread+0x10/0x10
[   12.384693]  ret_from_fork_asm+0x1a/0x30
[   12.384723]  </TASK>
[   12.384734] 
[   12.400849] Allocated by task 211:
[   12.401022]  kasan_save_stack+0x45/0x70
[   12.401186]  kasan_save_track+0x18/0x40
[   12.401338]  kasan_save_alloc_info+0x3b/0x50
[   12.401486]  __kasan_kmalloc+0xb7/0xc0
[   12.402032]  __kmalloc_cache_noprof+0x189/0x420
[   12.402205]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.402729]  kunit_try_run_case+0x1a5/0x480
[   12.403114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.403676]  kthread+0x337/0x6f0
[   12.403966]  ret_from_fork+0x116/0x1d0
[   12.404099]  ret_from_fork_asm+0x1a/0x30
[   12.404611] 
[   12.404776] The buggy address belongs to the object at ffff88810262fd00
[   12.404776]  which belongs to the cache kmalloc-128 of size 128
[   12.406150] The buggy address is located 0 bytes to the right of
[   12.406150]  allocated 115-byte region [ffff88810262fd00, ffff88810262fd73)
[   12.406998] 
[   12.407078] The buggy address belongs to the physical page:
[   12.407352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   12.408064] flags: 0x200000000000000(node=0|zone=2)
[   12.408581] page_type: f5(slab)
[   12.408970] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.409855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.410698] page dumped because: kasan: bad access detected
[   12.410881] 
[   12.410951] Memory state around the buggy address:
[   12.411112]  ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.411720]  ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.412483] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.413388]                                                              ^
[   12.413996]  ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.414950]  ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.415178] ==================================================================
[   12.441419] ==================================================================
[   12.441761] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.442077] Read of size 1 at addr ffff88810262fd7f by task kunit_try_catch/211
[   12.442785] 
[   12.442910] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.442957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.442969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.442990] Call Trace:
[   12.443005]  <TASK>
[   12.443023]  dump_stack_lvl+0x73/0xb0
[   12.443056]  print_report+0xd1/0x650
[   12.443078]  ? __virt_addr_valid+0x1db/0x2d0
[   12.443100]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.443121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.443142]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.443163]  kasan_report+0x141/0x180
[   12.443184]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.443282]  __asan_report_load1_noabort+0x18/0x20
[   12.443309]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.443332]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.443353]  ? finish_task_switch.isra.0+0x153/0x700
[   12.443376]  ? __switch_to+0x47/0xf50
[   12.443400]  ? __schedule+0x10cc/0x2b60
[   12.443421]  ? __pfx_read_tsc+0x10/0x10
[   12.443441]  ? ktime_get_ts64+0x86/0x230
[   12.443461]  ? irqentry_exit+0x2a/0x60
[   12.443483]  kunit_try_run_case+0x1a5/0x480
[   12.443507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.443528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.443550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.443571]  ? __kthread_parkme+0x82/0x180
[   12.443591]  ? preempt_count_sub+0x50/0x80
[   12.443612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.443633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.443654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.443675]  kthread+0x337/0x6f0
[   12.443693]  ? trace_preempt_on+0x20/0xc0
[   12.443715]  ? __pfx_kthread+0x10/0x10
[   12.443734]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.443754]  ? calculate_sigpending+0x7b/0xa0
[   12.443777]  ? __pfx_kthread+0x10/0x10
[   12.443797]  ret_from_fork+0x116/0x1d0
[   12.443814]  ? __pfx_kthread+0x10/0x10
[   12.443833]  ret_from_fork_asm+0x1a/0x30
[   12.443863]  </TASK>
[   12.443874] 
[   12.452469] Allocated by task 211:
[   12.452631]  kasan_save_stack+0x45/0x70
[   12.452854]  kasan_save_track+0x18/0x40
[   12.453050]  kasan_save_alloc_info+0x3b/0x50
[   12.453326]  __kasan_kmalloc+0xb7/0xc0
[   12.453496]  __kmalloc_cache_noprof+0x189/0x420
[   12.453714]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.453865]  kunit_try_run_case+0x1a5/0x480
[   12.454061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.454322]  kthread+0x337/0x6f0
[   12.454470]  ret_from_fork+0x116/0x1d0
[   12.454611]  ret_from_fork_asm+0x1a/0x30
[   12.454814] 
[   12.454912] The buggy address belongs to the object at ffff88810262fd00
[   12.454912]  which belongs to the cache kmalloc-128 of size 128
[   12.455401] The buggy address is located 12 bytes to the right of
[   12.455401]  allocated 115-byte region [ffff88810262fd00, ffff88810262fd73)
[   12.455830] 
[   12.455903] The buggy address belongs to the physical page:
[   12.456077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   12.456411] flags: 0x200000000000000(node=0|zone=2)
[   12.456646] page_type: f5(slab)
[   12.456821] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.457165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.457685] page dumped because: kasan: bad access detected
[   12.457855] 
[   12.457925] Memory state around the buggy address:
[   12.458083]  ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.458873]  ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.459301] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.459632]                                                                 ^
[   12.459946]  ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.460387]  ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.460701] ==================================================================
[   12.416450] ==================================================================
[   12.417323] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.418110] Read of size 1 at addr ffff88810262fd78 by task kunit_try_catch/211
[   12.418357] 
[   12.418491] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.418540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.418552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.418573] Call Trace:
[   12.418586]  <TASK>
[   12.418605]  dump_stack_lvl+0x73/0xb0
[   12.418638]  print_report+0xd1/0x650
[   12.418661]  ? __virt_addr_valid+0x1db/0x2d0
[   12.418683]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.418705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.418726]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.418748]  kasan_report+0x141/0x180
[   12.418768]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.418795]  __asan_report_load1_noabort+0x18/0x20
[   12.418817]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.418839]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.418860]  ? finish_task_switch.isra.0+0x153/0x700
[   12.418881]  ? __switch_to+0x47/0xf50
[   12.418906]  ? __schedule+0x10cc/0x2b60
[   12.418927]  ? __pfx_read_tsc+0x10/0x10
[   12.418948]  ? ktime_get_ts64+0x86/0x230
[   12.418967]  ? irqentry_exit+0x2a/0x60
[   12.418990]  kunit_try_run_case+0x1a5/0x480
[   12.419013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.419034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.419056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.419077]  ? __kthread_parkme+0x82/0x180
[   12.419097]  ? preempt_count_sub+0x50/0x80
[   12.419118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.419140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.419160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.419182]  kthread+0x337/0x6f0
[   12.419200]  ? trace_preempt_on+0x20/0xc0
[   12.419234]  ? __pfx_kthread+0x10/0x10
[   12.419256]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.419277]  ? calculate_sigpending+0x7b/0xa0
[   12.419300]  ? __pfx_kthread+0x10/0x10
[   12.419320]  ret_from_fork+0x116/0x1d0
[   12.419336]  ? __pfx_kthread+0x10/0x10
[   12.419357]  ret_from_fork_asm+0x1a/0x30
[   12.419387]  </TASK>
[   12.419398] 
[   12.431926] Allocated by task 211:
[   12.432107]  kasan_save_stack+0x45/0x70
[   12.432328]  kasan_save_track+0x18/0x40
[   12.433030]  kasan_save_alloc_info+0x3b/0x50
[   12.433293]  __kasan_kmalloc+0xb7/0xc0
[   12.433471]  __kmalloc_cache_noprof+0x189/0x420
[   12.433635]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.433948]  kunit_try_run_case+0x1a5/0x480
[   12.434134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.434497]  kthread+0x337/0x6f0
[   12.434624]  ret_from_fork+0x116/0x1d0
[   12.434755]  ret_from_fork_asm+0x1a/0x30
[   12.434954] 
[   12.435052] The buggy address belongs to the object at ffff88810262fd00
[   12.435052]  which belongs to the cache kmalloc-128 of size 128
[   12.435804] The buggy address is located 5 bytes to the right of
[   12.435804]  allocated 115-byte region [ffff88810262fd00, ffff88810262fd73)
[   12.436586] 
[   12.436688] The buggy address belongs to the physical page:
[   12.436896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   12.437232] flags: 0x200000000000000(node=0|zone=2)
[   12.437512] page_type: f5(slab)
[   12.437723] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.438069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.438409] page dumped because: kasan: bad access detected
[   12.438596] 
[   12.438665] Memory state around the buggy address:
[   12.438893]  ffff88810262fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.439204]  ffff88810262fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.439563] >ffff88810262fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.439824]                                                                 ^
[   12.440090]  ffff88810262fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.440407]  ffff88810262fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.440712] ==================================================================