Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.116910] ==================================================================
[   16.116974] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.117358] Read of size 1 at addr fff00000c63f3973 by task kunit_try_catch/194
[   16.117590] 
[   16.117755] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.117862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.118027] Hardware name: linux,dummy-virt (DT)
[   16.118091] Call trace:
[   16.118140]  show_stack+0x20/0x38 (C)
[   16.118254]  dump_stack_lvl+0x8c/0xd0
[   16.118308]  print_report+0x118/0x608
[   16.118427]  kasan_report+0xdc/0x128
[   16.118533]  __asan_report_load1_noabort+0x20/0x30
[   16.118601]  ksize_unpoisons_memory+0x628/0x740
[   16.118651]  kunit_try_run_case+0x170/0x3f0
[   16.118701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.118756]  kthread+0x328/0x630
[   16.118921]  ret_from_fork+0x10/0x20
[   16.118985] 
[   16.119004] Allocated by task 194:
[   16.119034]  kasan_save_stack+0x3c/0x68
[   16.119097]  kasan_save_track+0x20/0x40
[   16.119182]  kasan_save_alloc_info+0x40/0x58
[   16.119224]  __kasan_kmalloc+0xd4/0xd8
[   16.119282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.119493]  ksize_unpoisons_memory+0xc0/0x740
[   16.119537]  kunit_try_run_case+0x170/0x3f0
[   16.119623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.119691]  kthread+0x328/0x630
[   16.119820]  ret_from_fork+0x10/0x20
[   16.119900] 
[   16.119920] The buggy address belongs to the object at fff00000c63f3900
[   16.119920]  which belongs to the cache kmalloc-128 of size 128
[   16.119983] The buggy address is located 0 bytes to the right of
[   16.119983]  allocated 115-byte region [fff00000c63f3900, fff00000c63f3973)
[   16.120048] 
[   16.120075] The buggy address belongs to the physical page:
[   16.120117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.120167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.120507] page_type: f5(slab)
[   16.120582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.120631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.120672] page dumped because: kasan: bad access detected
[   16.120703] 
[   16.121200] Memory state around the buggy address:
[   16.121239]  fff00000c63f3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.121323]  fff00000c63f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.121583] >fff00000c63f3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.121747]                                                              ^
[   16.121788]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.121839]  fff00000c63f3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.121877] ==================================================================
[   16.123524] ==================================================================
[   16.123961] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.124229] Read of size 1 at addr fff00000c63f3978 by task kunit_try_catch/194
[   16.124564] 
[   16.124625] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.124936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.124984] Hardware name: linux,dummy-virt (DT)
[   16.125015] Call trace:
[   16.125038]  show_stack+0x20/0x38 (C)
[   16.125103]  dump_stack_lvl+0x8c/0xd0
[   16.125153]  print_report+0x118/0x608
[   16.125201]  kasan_report+0xdc/0x128
[   16.125248]  __asan_report_load1_noabort+0x20/0x30
[   16.125624]  ksize_unpoisons_memory+0x618/0x740
[   16.125828]  kunit_try_run_case+0x170/0x3f0
[   16.126143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.126312]  kthread+0x328/0x630
[   16.126358]  ret_from_fork+0x10/0x20
[   16.126408] 
[   16.126472] Allocated by task 194:
[   16.126529]  kasan_save_stack+0x3c/0x68
[   16.126621]  kasan_save_track+0x20/0x40
[   16.126689]  kasan_save_alloc_info+0x40/0x58
[   16.126785]  __kasan_kmalloc+0xd4/0xd8
[   16.126822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.127004]  ksize_unpoisons_memory+0xc0/0x740
[   16.127203]  kunit_try_run_case+0x170/0x3f0
[   16.127254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.127298]  kthread+0x328/0x630
[   16.127330]  ret_from_fork+0x10/0x20
[   16.127399] 
[   16.127418] The buggy address belongs to the object at fff00000c63f3900
[   16.127418]  which belongs to the cache kmalloc-128 of size 128
[   16.127523] The buggy address is located 5 bytes to the right of
[   16.127523]  allocated 115-byte region [fff00000c63f3900, fff00000c63f3973)
[   16.127654] 
[   16.127754] The buggy address belongs to the physical page:
[   16.127808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.127859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.127971] page_type: f5(slab)
[   16.128010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.128105] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.128146] page dumped because: kasan: bad access detected
[   16.128177] 
[   16.128500] Memory state around the buggy address:
[   16.128688]  fff00000c63f3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.128736]  fff00000c63f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.128933] >fff00000c63f3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.129183]                                                                 ^
[   16.129323]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129666]  fff00000c63f3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129824] ==================================================================
[   16.131844] ==================================================================
[   16.131914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.131991] Read of size 1 at addr fff00000c63f397f by task kunit_try_catch/194
[   16.132381] 
[   16.132424] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.132607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.132834] Hardware name: linux,dummy-virt (DT)
[   16.132887] Call trace:
[   16.132962]  show_stack+0x20/0x38 (C)
[   16.133019]  dump_stack_lvl+0x8c/0xd0
[   16.133220]  print_report+0x118/0x608
[   16.133399]  kasan_report+0xdc/0x128
[   16.133499]  __asan_report_load1_noabort+0x20/0x30
[   16.133551]  ksize_unpoisons_memory+0x690/0x740
[   16.133599]  kunit_try_run_case+0x170/0x3f0
[   16.133659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.133712]  kthread+0x328/0x630
[   16.134098]  ret_from_fork+0x10/0x20
[   16.134150] 
[   16.134168] Allocated by task 194:
[   16.134197]  kasan_save_stack+0x3c/0x68
[   16.134237]  kasan_save_track+0x20/0x40
[   16.134432]  kasan_save_alloc_info+0x40/0x58
[   16.134553]  __kasan_kmalloc+0xd4/0xd8
[   16.134631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.134786]  ksize_unpoisons_memory+0xc0/0x740
[   16.134880]  kunit_try_run_case+0x170/0x3f0
[   16.134918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.135223]  kthread+0x328/0x630
[   16.135266]  ret_from_fork+0x10/0x20
[   16.135348] 
[   16.135367] The buggy address belongs to the object at fff00000c63f3900
[   16.135367]  which belongs to the cache kmalloc-128 of size 128
[   16.135425] The buggy address is located 12 bytes to the right of
[   16.135425]  allocated 115-byte region [fff00000c63f3900, fff00000c63f3973)
[   16.135499] 
[   16.135519] The buggy address belongs to the physical page:
[   16.135550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.135962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.136020] page_type: f5(slab)
[   16.136058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.136120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.136161] page dumped because: kasan: bad access detected
[   16.136192] 
[   16.136219] Memory state around the buggy address:
[   16.136251]  fff00000c63f3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.136294]  fff00000c63f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136706] >fff00000c63f3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.136753]                                                                 ^
[   16.137149]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137257]  fff00000c63f3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137295] ==================================================================

[   13.149619] ==================================================================
[   13.150400] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.151214] Read of size 1 at addr ffff888102d5f77f by task kunit_try_catch/211
[   13.151893] 
[   13.152009] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.152049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.152060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.152079] Call Trace:
[   13.152091]  <TASK>
[   13.152106]  dump_stack_lvl+0x73/0xb0
[   13.152135]  print_report+0xd1/0x650
[   13.152157]  ? __virt_addr_valid+0x1db/0x2d0
[   13.152186]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.152209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.152231]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.152255]  kasan_report+0x141/0x180
[   13.152276]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.152304]  __asan_report_load1_noabort+0x18/0x20
[   13.152328]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.152352]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.152386]  ? finish_task_switch.isra.0+0x153/0x700
[   13.152618]  ? __switch_to+0x47/0xf50
[   13.152645]  ? __schedule+0x10cc/0x2b60
[   13.152899]  ? __pfx_read_tsc+0x10/0x10
[   13.152922]  ? ktime_get_ts64+0x86/0x230
[   13.152946]  kunit_try_run_case+0x1a5/0x480
[   13.152970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.152992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.153016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.153039]  ? __kthread_parkme+0x82/0x180
[   13.153060]  ? preempt_count_sub+0x50/0x80
[   13.153083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.153110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.153134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.153159]  kthread+0x337/0x6f0
[   13.153177]  ? trace_preempt_on+0x20/0xc0
[   13.153200]  ? __pfx_kthread+0x10/0x10
[   13.153221]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.153242]  ? calculate_sigpending+0x7b/0xa0
[   13.153265]  ? __pfx_kthread+0x10/0x10
[   13.153286]  ret_from_fork+0x116/0x1d0
[   13.153304]  ? __pfx_kthread+0x10/0x10
[   13.153324]  ret_from_fork_asm+0x1a/0x30
[   13.153378]  </TASK>
[   13.153389] 
[   13.165732] Allocated by task 211:
[   13.165885]  kasan_save_stack+0x45/0x70
[   13.166199]  kasan_save_track+0x18/0x40
[   13.166791]  kasan_save_alloc_info+0x3b/0x50
[   13.166997]  __kasan_kmalloc+0xb7/0xc0
[   13.167479]  __kmalloc_cache_noprof+0x189/0x420
[   13.167694]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.167903]  kunit_try_run_case+0x1a5/0x480
[   13.168110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.168342]  kthread+0x337/0x6f0
[   13.168957]  ret_from_fork+0x116/0x1d0
[   13.169147]  ret_from_fork_asm+0x1a/0x30
[   13.169481] 
[   13.169582] The buggy address belongs to the object at ffff888102d5f700
[   13.169582]  which belongs to the cache kmalloc-128 of size 128
[   13.170761] The buggy address is located 12 bytes to the right of
[   13.170761]  allocated 115-byte region [ffff888102d5f700, ffff888102d5f773)
[   13.171268] 
[   13.171374] The buggy address belongs to the physical page:
[   13.171966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.172403] flags: 0x200000000000000(node=0|zone=2)
[   13.172837] page_type: f5(slab)
[   13.173116] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.173761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.174171] page dumped because: kasan: bad access detected
[   13.174654] 
[   13.174758] Memory state around the buggy address:
[   13.174980]  ffff888102d5f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.175253]  ffff888102d5f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.176058] >ffff888102d5f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.176530]                                                                 ^
[   13.177219]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.177742]  ffff888102d5f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.178201] ==================================================================
[   13.116078] ==================================================================
[   13.117071] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.117309] Read of size 1 at addr ffff888102d5f778 by task kunit_try_catch/211
[   13.117631] 
[   13.117888] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.117930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.117940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.117958] Call Trace:
[   13.117974]  <TASK>
[   13.117989]  dump_stack_lvl+0x73/0xb0
[   13.118017]  print_report+0xd1/0x650
[   13.118039]  ? __virt_addr_valid+0x1db/0x2d0
[   13.118060]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.118082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.118139]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.118164]  kasan_report+0x141/0x180
[   13.118185]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.118224]  __asan_report_load1_noabort+0x18/0x20
[   13.118276]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.118301]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.118324]  ? finish_task_switch.isra.0+0x153/0x700
[   13.118437]  ? __switch_to+0x47/0xf50
[   13.118464]  ? __schedule+0x10cc/0x2b60
[   13.118486]  ? __pfx_read_tsc+0x10/0x10
[   13.118507]  ? ktime_get_ts64+0x86/0x230
[   13.118530]  kunit_try_run_case+0x1a5/0x480
[   13.118555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.118577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.118600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.118624]  ? __kthread_parkme+0x82/0x180
[   13.118644]  ? preempt_count_sub+0x50/0x80
[   13.118666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.118690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.118714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.118740]  kthread+0x337/0x6f0
[   13.118759]  ? trace_preempt_on+0x20/0xc0
[   13.118781]  ? __pfx_kthread+0x10/0x10
[   13.118802]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.118823]  ? calculate_sigpending+0x7b/0xa0
[   13.118847]  ? __pfx_kthread+0x10/0x10
[   13.118867]  ret_from_fork+0x116/0x1d0
[   13.118885]  ? __pfx_kthread+0x10/0x10
[   13.118905]  ret_from_fork_asm+0x1a/0x30
[   13.118936]  </TASK>
[   13.118946] 
[   13.133872] Allocated by task 211:
[   13.134236]  kasan_save_stack+0x45/0x70
[   13.134713]  kasan_save_track+0x18/0x40
[   13.135097]  kasan_save_alloc_info+0x3b/0x50
[   13.135568]  __kasan_kmalloc+0xb7/0xc0
[   13.135911]  __kmalloc_cache_noprof+0x189/0x420
[   13.136071]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.136229]  kunit_try_run_case+0x1a5/0x480
[   13.136402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.137015]  kthread+0x337/0x6f0
[   13.137382]  ret_from_fork+0x116/0x1d0
[   13.137855]  ret_from_fork_asm+0x1a/0x30
[   13.138304] 
[   13.138510] The buggy address belongs to the object at ffff888102d5f700
[   13.138510]  which belongs to the cache kmalloc-128 of size 128
[   13.139823] The buggy address is located 5 bytes to the right of
[   13.139823]  allocated 115-byte region [ffff888102d5f700, ffff888102d5f773)
[   13.140884] 
[   13.141048] The buggy address belongs to the physical page:
[   13.141621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.142166] flags: 0x200000000000000(node=0|zone=2)
[   13.142564] page_type: f5(slab)
[   13.142953] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.143477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.144043] page dumped because: kasan: bad access detected
[   13.144226] 
[   13.144296] Memory state around the buggy address:
[   13.144473]  ffff888102d5f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.145085]  ffff888102d5f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.145786] >ffff888102d5f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.146525]                                                                 ^
[   13.147171]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.148042]  ffff888102d5f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.148815] ==================================================================
[   13.084278] ==================================================================
[   13.085797] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.086889] Read of size 1 at addr ffff888102d5f773 by task kunit_try_catch/211
[   13.087764] 
[   13.087952] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.087999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.088045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.088066] Call Trace:
[   13.088078]  <TASK>
[   13.088096]  dump_stack_lvl+0x73/0xb0
[   13.088128]  print_report+0xd1/0x650
[   13.088151]  ? __virt_addr_valid+0x1db/0x2d0
[   13.088174]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.088207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.088230]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.088254]  kasan_report+0x141/0x180
[   13.088275]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.088303]  __asan_report_load1_noabort+0x18/0x20
[   13.088327]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.088376]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.088400]  ? finish_task_switch.isra.0+0x153/0x700
[   13.088424]  ? __switch_to+0x47/0xf50
[   13.088496]  ? __schedule+0x10cc/0x2b60
[   13.088662]  ? __pfx_read_tsc+0x10/0x10
[   13.088686]  ? ktime_get_ts64+0x86/0x230
[   13.088711]  kunit_try_run_case+0x1a5/0x480
[   13.088737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.088760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.088784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.088807]  ? __kthread_parkme+0x82/0x180
[   13.088828]  ? preempt_count_sub+0x50/0x80
[   13.088851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.088875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.088899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.088923]  kthread+0x337/0x6f0
[   13.088942]  ? trace_preempt_on+0x20/0xc0
[   13.088966]  ? __pfx_kthread+0x10/0x10
[   13.088986]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.089007]  ? calculate_sigpending+0x7b/0xa0
[   13.089031]  ? __pfx_kthread+0x10/0x10
[   13.089052]  ret_from_fork+0x116/0x1d0
[   13.089071]  ? __pfx_kthread+0x10/0x10
[   13.089091]  ret_from_fork_asm+0x1a/0x30
[   13.089121]  </TASK>
[   13.089132] 
[   13.100766] Allocated by task 211:
[   13.100907]  kasan_save_stack+0x45/0x70
[   13.101052]  kasan_save_track+0x18/0x40
[   13.101185]  kasan_save_alloc_info+0x3b/0x50
[   13.101330]  __kasan_kmalloc+0xb7/0xc0
[   13.101804]  __kmalloc_cache_noprof+0x189/0x420
[   13.102241]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.102786]  kunit_try_run_case+0x1a5/0x480
[   13.103203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.103924]  kthread+0x337/0x6f0
[   13.104286]  ret_from_fork+0x116/0x1d0
[   13.104759]  ret_from_fork_asm+0x1a/0x30
[   13.105235] 
[   13.105502] The buggy address belongs to the object at ffff888102d5f700
[   13.105502]  which belongs to the cache kmalloc-128 of size 128
[   13.106424] The buggy address is located 0 bytes to the right of
[   13.106424]  allocated 115-byte region [ffff888102d5f700, ffff888102d5f773)
[   13.107743] 
[   13.107919] The buggy address belongs to the physical page:
[   13.108231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.108906] flags: 0x200000000000000(node=0|zone=2)
[   13.109458] page_type: f5(slab)
[   13.109800] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.110282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.110906] page dumped because: kasan: bad access detected
[   13.111100] 
[   13.111240] Memory state around the buggy address:
[   13.111888]  ffff888102d5f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.112551]  ffff888102d5f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.112938] >ffff888102d5f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.113155]                                                              ^
[   13.113421]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.114139]  ffff888102d5f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.114892] ==================================================================