Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.293970] ==================================================================
[   19.294153] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.294303] Read of size 1 at addr fff00000c56f1d78 by task kunit_try_catch/195
[   19.294426] 
[   19.294499] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.294728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.294793] Hardware name: linux,dummy-virt (DT)
[   19.294858] Call trace:
[   19.294902]  show_stack+0x20/0x38 (C)
[   19.295007]  dump_stack_lvl+0x8c/0xd0
[   19.295120]  print_report+0x118/0x608
[   19.295220]  kasan_report+0xdc/0x128
[   19.295314]  __asan_report_load1_noabort+0x20/0x30
[   19.295478]  ksize_unpoisons_memory+0x618/0x740
[   19.295641]  kunit_try_run_case+0x170/0x3f0
[   19.295755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295876]  kthread+0x328/0x630
[   19.296012]  ret_from_fork+0x10/0x20
[   19.296161] 
[   19.296208] Allocated by task 195:
[   19.296268]  kasan_save_stack+0x3c/0x68
[   19.296370]  kasan_save_track+0x20/0x40
[   19.296456]  kasan_save_alloc_info+0x40/0x58
[   19.296546]  __kasan_kmalloc+0xd4/0xd8
[   19.296670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.296758]  ksize_unpoisons_memory+0xc0/0x740
[   19.296846]  kunit_try_run_case+0x170/0x3f0
[   19.296931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.297029]  kthread+0x328/0x630
[   19.297122]  ret_from_fork+0x10/0x20
[   19.297208] 
[   19.297260] The buggy address belongs to the object at fff00000c56f1d00
[   19.297260]  which belongs to the cache kmalloc-128 of size 128
[   19.297921] The buggy address is located 5 bytes to the right of
[   19.297921]  allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73)
[   19.298389] 
[   19.298469] The buggy address belongs to the physical page:
[   19.298533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.298635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.298735] page_type: f5(slab)
[   19.299439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.299515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.299558] page dumped because: kasan: bad access detected
[   19.299595] 
[   19.299631] Memory state around the buggy address:
[   19.299685]  fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.299728]  fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299770] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.299807]                                                                 ^
[   19.299848]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299890]  fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299927] ==================================================================
[   19.300831] ==================================================================
[   19.301239] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.301398] Read of size 1 at addr fff00000c56f1d7f by task kunit_try_catch/195
[   19.301513] 
[   19.301579] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.301756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.301814] Hardware name: linux,dummy-virt (DT)
[   19.301889] Call trace:
[   19.301937]  show_stack+0x20/0x38 (C)
[   19.302046]  dump_stack_lvl+0x8c/0xd0
[   19.302155]  print_report+0x118/0x608
[   19.302261]  kasan_report+0xdc/0x128
[   19.303441]  __asan_report_load1_noabort+0x20/0x30
[   19.303705]  ksize_unpoisons_memory+0x690/0x740
[   19.303854]  kunit_try_run_case+0x170/0x3f0
[   19.303979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.304111]  kthread+0x328/0x630
[   19.304218]  ret_from_fork+0x10/0x20
[   19.304387] 
[   19.304450] Allocated by task 195:
[   19.304525]  kasan_save_stack+0x3c/0x68
[   19.304616]  kasan_save_track+0x20/0x40
[   19.304693]  kasan_save_alloc_info+0x40/0x58
[   19.304782]  __kasan_kmalloc+0xd4/0xd8
[   19.304875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.305001]  ksize_unpoisons_memory+0xc0/0x740
[   19.305095]  kunit_try_run_case+0x170/0x3f0
[   19.305172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.305257]  kthread+0x328/0x630
[   19.305327]  ret_from_fork+0x10/0x20
[   19.305639] 
[   19.305711] The buggy address belongs to the object at fff00000c56f1d00
[   19.305711]  which belongs to the cache kmalloc-128 of size 128
[   19.305835] The buggy address is located 12 bytes to the right of
[   19.305835]  allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73)
[   19.306057] 
[   19.306100] The buggy address belongs to the physical page:
[   19.306165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.306552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.306694] page_type: f5(slab)
[   19.306783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.306900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.307003] page dumped because: kasan: bad access detected
[   19.307104] 
[   19.307144] Memory state around the buggy address:
[   19.307222]  fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.307318]  fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307412] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.307509]                                                                 ^
[   19.307597]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307899]  fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307991] ==================================================================
[   19.287408] ==================================================================
[   19.287556] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.287672] Read of size 1 at addr fff00000c56f1d73 by task kunit_try_catch/195
[   19.287806] 
[   19.287877] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.288041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.288099] Hardware name: linux,dummy-virt (DT)
[   19.288166] Call trace:
[   19.288221]  show_stack+0x20/0x38 (C)
[   19.288390]  dump_stack_lvl+0x8c/0xd0
[   19.288528]  print_report+0x118/0x608
[   19.288645]  kasan_report+0xdc/0x128
[   19.288783]  __asan_report_load1_noabort+0x20/0x30
[   19.288915]  ksize_unpoisons_memory+0x628/0x740
[   19.289043]  kunit_try_run_case+0x170/0x3f0
[   19.289195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.289323]  kthread+0x328/0x630
[   19.289456]  ret_from_fork+0x10/0x20
[   19.289607] 
[   19.289648] Allocated by task 195:
[   19.289720]  kasan_save_stack+0x3c/0x68
[   19.289846]  kasan_save_track+0x20/0x40
[   19.289967]  kasan_save_alloc_info+0x40/0x58
[   19.290101]  __kasan_kmalloc+0xd4/0xd8
[   19.290181]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.290272]  ksize_unpoisons_memory+0xc0/0x740
[   19.290415]  kunit_try_run_case+0x170/0x3f0
[   19.290566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.290710]  kthread+0x328/0x630
[   19.290789]  ret_from_fork+0x10/0x20
[   19.290857] 
[   19.290892] The buggy address belongs to the object at fff00000c56f1d00
[   19.290892]  which belongs to the cache kmalloc-128 of size 128
[   19.291036] The buggy address is located 0 bytes to the right of
[   19.291036]  allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73)
[   19.291196] 
[   19.291243] The buggy address belongs to the physical page:
[   19.291315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.291461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.291577] page_type: f5(slab)
[   19.291658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.291762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.291906] page dumped because: kasan: bad access detected
[   19.292025] 
[   19.292070] Memory state around the buggy address:
[   19.292141]  fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.292237]  fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292346] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.292492]                                                              ^
[   19.292626]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292800]  fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292897] ==================================================================

[   14.097985] ==================================================================
[   14.098367] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   14.099222] Read of size 1 at addr ffff888103332278 by task kunit_try_catch/211
[   14.099618] 
[   14.099760] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.099815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.099829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.100166] Call Trace:
[   14.100186]  <TASK>
[   14.100208]  dump_stack_lvl+0x73/0xb0
[   14.100244]  print_report+0xd1/0x650
[   14.100271]  ? __virt_addr_valid+0x1db/0x2d0
[   14.100297]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.100324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.100349]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.100376]  kasan_report+0x141/0x180
[   14.100401]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.100433]  __asan_report_load1_noabort+0x18/0x20
[   14.100461]  ksize_unpoisons_memory+0x7e9/0x9b0
[   14.100488]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.100513]  ? finish_task_switch.isra.0+0x153/0x700
[   14.100537]  ? __switch_to+0x47/0xf50
[   14.100567]  ? __schedule+0x10cc/0x2b60
[   14.100592]  ? __pfx_read_tsc+0x10/0x10
[   14.100616]  ? ktime_get_ts64+0x86/0x230
[   14.100643]  kunit_try_run_case+0x1a5/0x480
[   14.100690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.100715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.100742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.100767]  ? __kthread_parkme+0x82/0x180
[   14.100846]  ? preempt_count_sub+0x50/0x80
[   14.100875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.100902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.100928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.100954]  kthread+0x337/0x6f0
[   14.100977]  ? trace_preempt_on+0x20/0xc0
[   14.101004]  ? __pfx_kthread+0x10/0x10
[   14.101027]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.101051]  ? calculate_sigpending+0x7b/0xa0
[   14.101078]  ? __pfx_kthread+0x10/0x10
[   14.101102]  ret_from_fork+0x116/0x1d0
[   14.101123]  ? __pfx_kthread+0x10/0x10
[   14.101147]  ret_from_fork_asm+0x1a/0x30
[   14.101182]  </TASK>
[   14.101195] 
[   14.112319] Allocated by task 211:
[   14.112541]  kasan_save_stack+0x45/0x70
[   14.113109]  kasan_save_track+0x18/0x40
[   14.113433]  kasan_save_alloc_info+0x3b/0x50
[   14.113957]  __kasan_kmalloc+0xb7/0xc0
[   14.114167]  __kmalloc_cache_noprof+0x189/0x420
[   14.114416]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.114681]  kunit_try_run_case+0x1a5/0x480
[   14.115429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.115959]  kthread+0x337/0x6f0
[   14.116680]  ret_from_fork+0x116/0x1d0
[   14.117296]  ret_from_fork_asm+0x1a/0x30
[   14.117548] 
[   14.117675] The buggy address belongs to the object at ffff888103332200
[   14.117675]  which belongs to the cache kmalloc-128 of size 128
[   14.119116] The buggy address is located 5 bytes to the right of
[   14.119116]  allocated 115-byte region [ffff888103332200, ffff888103332273)
[   14.120273] 
[   14.120548] The buggy address belongs to the physical page:
[   14.121207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.122057] flags: 0x200000000000000(node=0|zone=2)
[   14.122290] page_type: f5(slab)
[   14.122497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.122871] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.123424] page dumped because: kasan: bad access detected
[   14.123681] 
[   14.123850] Memory state around the buggy address:
[   14.124101]  ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.124444]  ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124807] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.125210]                                                                 ^
[   14.125563]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.125861]  ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.126308] ==================================================================
[   14.068551] ==================================================================
[   14.069482] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   14.069930] Read of size 1 at addr ffff888103332273 by task kunit_try_catch/211
[   14.070282] 
[   14.070434] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.070492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.070506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.070532] Call Trace:
[   14.070548]  <TASK>
[   14.070571]  dump_stack_lvl+0x73/0xb0
[   14.070607]  print_report+0xd1/0x650
[   14.070633]  ? __virt_addr_valid+0x1db/0x2d0
[   14.070804]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.070835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.070876]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.070904]  kasan_report+0x141/0x180
[   14.070931]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.070963]  __asan_report_load1_noabort+0x18/0x20
[   14.070991]  ksize_unpoisons_memory+0x81c/0x9b0
[   14.071018]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.071043]  ? finish_task_switch.isra.0+0x153/0x700
[   14.071071]  ? __switch_to+0x47/0xf50
[   14.071197]  ? __schedule+0x10cc/0x2b60
[   14.071231]  ? __pfx_read_tsc+0x10/0x10
[   14.071256]  ? ktime_get_ts64+0x86/0x230
[   14.071305]  kunit_try_run_case+0x1a5/0x480
[   14.071336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.071388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.071414]  ? __kthread_parkme+0x82/0x180
[   14.071437]  ? preempt_count_sub+0x50/0x80
[   14.071463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.071515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.071541]  kthread+0x337/0x6f0
[   14.071565]  ? trace_preempt_on+0x20/0xc0
[   14.071592]  ? __pfx_kthread+0x10/0x10
[   14.071615]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.071639]  ? calculate_sigpending+0x7b/0xa0
[   14.071681]  ? __pfx_kthread+0x10/0x10
[   14.071705]  ret_from_fork+0x116/0x1d0
[   14.071727]  ? __pfx_kthread+0x10/0x10
[   14.071751]  ret_from_fork_asm+0x1a/0x30
[   14.071845]  </TASK>
[   14.071862] 
[   14.083690] Allocated by task 211:
[   14.083979]  kasan_save_stack+0x45/0x70
[   14.084171]  kasan_save_track+0x18/0x40
[   14.084690]  kasan_save_alloc_info+0x3b/0x50
[   14.084962]  __kasan_kmalloc+0xb7/0xc0
[   14.085191]  __kmalloc_cache_noprof+0x189/0x420
[   14.085934]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.086208]  kunit_try_run_case+0x1a5/0x480
[   14.086489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.086841]  kthread+0x337/0x6f0
[   14.087304]  ret_from_fork+0x116/0x1d0
[   14.087603]  ret_from_fork_asm+0x1a/0x30
[   14.087979] 
[   14.088095] The buggy address belongs to the object at ffff888103332200
[   14.088095]  which belongs to the cache kmalloc-128 of size 128
[   14.089101] The buggy address is located 0 bytes to the right of
[   14.089101]  allocated 115-byte region [ffff888103332200, ffff888103332273)
[   14.089770] 
[   14.089992] The buggy address belongs to the physical page:
[   14.090269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.090692] flags: 0x200000000000000(node=0|zone=2)
[   14.091067] page_type: f5(slab)
[   14.091308] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.091692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.092169] page dumped because: kasan: bad access detected
[   14.092873] 
[   14.093098] Memory state around the buggy address:
[   14.093538]  ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.094074]  ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.094505] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.095155]                                                              ^
[   14.095514]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.096167]  ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.096518] ==================================================================
[   14.126994] ==================================================================
[   14.127412] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   14.127775] Read of size 1 at addr ffff88810333227f by task kunit_try_catch/211
[   14.128213] 
[   14.128329] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.128382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.128396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.128421] Call Trace:
[   14.128442]  <TASK>
[   14.128465]  dump_stack_lvl+0x73/0xb0
[   14.128499]  print_report+0xd1/0x650
[   14.128524]  ? __virt_addr_valid+0x1db/0x2d0
[   14.128550]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.128576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.128601]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.128627]  kasan_report+0x141/0x180
[   14.128665]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.128697]  __asan_report_load1_noabort+0x18/0x20
[   14.128725]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.128752]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.128777]  ? finish_task_switch.isra.0+0x153/0x700
[   14.128802]  ? __switch_to+0x47/0xf50
[   14.128832]  ? __schedule+0x10cc/0x2b60
[   14.128858]  ? __pfx_read_tsc+0x10/0x10
[   14.128882]  ? ktime_get_ts64+0x86/0x230
[   14.128909]  kunit_try_run_case+0x1a5/0x480
[   14.128936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.128961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.128988]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.129014]  ? __kthread_parkme+0x82/0x180
[   14.129037]  ? preempt_count_sub+0x50/0x80
[   14.129063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.129142]  kthread+0x337/0x6f0
[   14.129164]  ? trace_preempt_on+0x20/0xc0
[   14.129191]  ? __pfx_kthread+0x10/0x10
[   14.129215]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.129239]  ? calculate_sigpending+0x7b/0xa0
[   14.129267]  ? __pfx_kthread+0x10/0x10
[   14.129291]  ret_from_fork+0x116/0x1d0
[   14.129311]  ? __pfx_kthread+0x10/0x10
[   14.129335]  ret_from_fork_asm+0x1a/0x30
[   14.129370]  </TASK>
[   14.129382] 
[   14.139329] Allocated by task 211:
[   14.139523]  kasan_save_stack+0x45/0x70
[   14.139723]  kasan_save_track+0x18/0x40
[   14.140043]  kasan_save_alloc_info+0x3b/0x50
[   14.140317]  __kasan_kmalloc+0xb7/0xc0
[   14.140539]  __kmalloc_cache_noprof+0x189/0x420
[   14.140884]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.141099]  kunit_try_run_case+0x1a5/0x480
[   14.141338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.141626]  kthread+0x337/0x6f0
[   14.141785]  ret_from_fork+0x116/0x1d0
[   14.142235]  ret_from_fork_asm+0x1a/0x30
[   14.142438] 
[   14.142533] The buggy address belongs to the object at ffff888103332200
[   14.142533]  which belongs to the cache kmalloc-128 of size 128
[   14.143176] The buggy address is located 12 bytes to the right of
[   14.143176]  allocated 115-byte region [ffff888103332200, ffff888103332273)
[   14.143883] 
[   14.143977] The buggy address belongs to the physical page:
[   14.144185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.144473] flags: 0x200000000000000(node=0|zone=2)
[   14.144733] page_type: f5(slab)
[   14.144933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.145339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.145757] page dumped because: kasan: bad access detected
[   14.146038] 
[   14.146124] Memory state around the buggy address:
[   14.146311]  ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.146578]  ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.147474] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.148065]                                                                 ^
[   14.148458]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.148780]  ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.149155] ==================================================================