Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.987993] ==================================================================
[   16.988042] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.988091] Read of size 1 at addr fff00000c6f3f97f by task kunit_try_catch/195
[   16.988371] 
[   16.988859] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.989308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.989449] Hardware name: linux,dummy-virt (DT)
[   16.989562] Call trace:
[   16.989585]  show_stack+0x20/0x38 (C)
[   16.989940]  dump_stack_lvl+0x8c/0xd0
[   16.989990]  print_report+0x118/0x608
[   16.990284]  kasan_report+0xdc/0x128
[   16.990597]  __asan_report_load1_noabort+0x20/0x30
[   16.990649]  ksize_unpoisons_memory+0x690/0x740
[   16.990695]  kunit_try_run_case+0x170/0x3f0
[   16.991225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.991490]  kthread+0x328/0x630
[   16.991534]  ret_from_fork+0x10/0x20
[   16.991582] 
[   16.991600] Allocated by task 195:
[   16.991628]  kasan_save_stack+0x3c/0x68
[   16.992779]  kasan_save_track+0x20/0x40
[   16.992831]  kasan_save_alloc_info+0x40/0x58
[   16.992881]  __kasan_kmalloc+0xd4/0xd8
[   16.992918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.992956]  ksize_unpoisons_memory+0xc0/0x740
[   16.993676]  kunit_try_run_case+0x170/0x3f0
[   16.994207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.994699]  kthread+0x328/0x630
[   16.994860]  ret_from_fork+0x10/0x20
[   16.995167] 
[   16.995483] The buggy address belongs to the object at fff00000c6f3f900
[   16.995483]  which belongs to the cache kmalloc-128 of size 128
[   16.995568] The buggy address is located 12 bytes to the right of
[   16.995568]  allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973)
[   16.995633] 
[   16.996190] The buggy address belongs to the physical page:
[   16.996439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.996825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.997185] page_type: f5(slab)
[   16.997763] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.998116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.998204] page dumped because: kasan: bad access detected
[   16.998828] 
[   16.999216] Memory state around the buggy address:
[   16.999259]  fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.999564]  fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.000004] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.000560]                                                                 ^
[   17.000611]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.001050]  fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.001369] ==================================================================
[   16.978863] ==================================================================
[   16.978986] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.979064] Read of size 1 at addr fff00000c6f3f978 by task kunit_try_catch/195
[   16.979117] 
[   16.979147] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.979229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.979254] Hardware name: linux,dummy-virt (DT)
[   16.979285] Call trace:
[   16.979307]  show_stack+0x20/0x38 (C)
[   16.979362]  dump_stack_lvl+0x8c/0xd0
[   16.979409]  print_report+0x118/0x608
[   16.980391]  kasan_report+0xdc/0x128
[   16.980721]  __asan_report_load1_noabort+0x20/0x30
[   16.980912]  ksize_unpoisons_memory+0x618/0x740
[   16.980963]  kunit_try_run_case+0x170/0x3f0
[   16.981018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.981071]  kthread+0x328/0x630
[   16.981112]  ret_from_fork+0x10/0x20
[   16.981630] 
[   16.981654] Allocated by task 195:
[   16.981685]  kasan_save_stack+0x3c/0x68
[   16.981907]  kasan_save_track+0x20/0x40
[   16.981996]  kasan_save_alloc_info+0x40/0x58
[   16.982350]  __kasan_kmalloc+0xd4/0xd8
[   16.982393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.982438]  ksize_unpoisons_memory+0xc0/0x740
[   16.982770]  kunit_try_run_case+0x170/0x3f0
[   16.982821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.983000]  kthread+0x328/0x630
[   16.983039]  ret_from_fork+0x10/0x20
[   16.983076] 
[   16.983094] The buggy address belongs to the object at fff00000c6f3f900
[   16.983094]  which belongs to the cache kmalloc-128 of size 128
[   16.983189] The buggy address is located 5 bytes to the right of
[   16.983189]  allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973)
[   16.983252] 
[   16.983272] The buggy address belongs to the physical page:
[   16.983600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.983771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.983891] page_type: f5(slab)
[   16.984188] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.984461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.984762] page dumped because: kasan: bad access detected
[   16.985090] 
[   16.985110] Memory state around the buggy address:
[   16.985142]  fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.985186]  fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.985657] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.985904]                                                                 ^
[   16.985950]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.985994]  fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986036] ==================================================================
[   16.968850] ==================================================================
[   16.968972] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.969041] Read of size 1 at addr fff00000c6f3f973 by task kunit_try_catch/195
[   16.969092] 
[   16.969130] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.969217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.969244] Hardware name: linux,dummy-virt (DT)
[   16.969692] Call trace:
[   16.970102]  show_stack+0x20/0x38 (C)
[   16.970161]  dump_stack_lvl+0x8c/0xd0
[   16.970209]  print_report+0x118/0x608
[   16.970254]  kasan_report+0xdc/0x128
[   16.970299]  __asan_report_load1_noabort+0x20/0x30
[   16.970351]  ksize_unpoisons_memory+0x628/0x740
[   16.970806]  kunit_try_run_case+0x170/0x3f0
[   16.970883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.970989]  kthread+0x328/0x630
[   16.971059]  ret_from_fork+0x10/0x20
[   16.971113] 
[   16.971131] Allocated by task 195:
[   16.971160]  kasan_save_stack+0x3c/0x68
[   16.971266]  kasan_save_track+0x20/0x40
[   16.971307]  kasan_save_alloc_info+0x40/0x58
[   16.971426]  __kasan_kmalloc+0xd4/0xd8
[   16.971765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.971808]  ksize_unpoisons_memory+0xc0/0x740
[   16.972149]  kunit_try_run_case+0x170/0x3f0
[   16.972195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.972238]  kthread+0x328/0x630
[   16.972525]  ret_from_fork+0x10/0x20
[   16.972807] 
[   16.972835] The buggy address belongs to the object at fff00000c6f3f900
[   16.972835]  which belongs to the cache kmalloc-128 of size 128
[   16.972909] The buggy address is located 0 bytes to the right of
[   16.972909]  allocated 115-byte region [fff00000c6f3f900, fff00000c6f3f973)
[   16.973066] 
[   16.973097] The buggy address belongs to the physical page:
[   16.973146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.973434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.973725] page_type: f5(slab)
[   16.973767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.974004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.974489] page dumped because: kasan: bad access detected
[   16.974529] 
[   16.974547] Memory state around the buggy address:
[   16.974652]  fff00000c6f3f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.974740]  fff00000c6f3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.975152] >fff00000c6f3f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.975194]                                                              ^
[   16.975235]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.975275]  fff00000c6f3fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.975314] ==================================================================

[   12.803538] ==================================================================
[   12.803838] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.804327] Read of size 1 at addr ffff8881029f2e7f by task kunit_try_catch/211
[   12.804542] 
[   12.804622] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.804677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.804688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.804707] Call Trace:
[   12.804719]  <TASK>
[   12.804732]  dump_stack_lvl+0x73/0xb0
[   12.804760]  print_report+0xd1/0x650
[   12.804783]  ? __virt_addr_valid+0x1db/0x2d0
[   12.804806]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.804828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.804852]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.804876]  kasan_report+0x141/0x180
[   12.804897]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.804935]  __asan_report_load1_noabort+0x18/0x20
[   12.804960]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.804984]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.805007]  ? finish_task_switch.isra.0+0x153/0x700
[   12.805029]  ? __switch_to+0x47/0xf50
[   12.805054]  ? __schedule+0x10cc/0x2b60
[   12.805076]  ? __pfx_read_tsc+0x10/0x10
[   12.805097]  ? ktime_get_ts64+0x86/0x230
[   12.805121]  kunit_try_run_case+0x1a5/0x480
[   12.805145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.805193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.805217]  ? __kthread_parkme+0x82/0x180
[   12.805236]  ? preempt_count_sub+0x50/0x80
[   12.805260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.805308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.805332]  kthread+0x337/0x6f0
[   12.805350]  ? trace_preempt_on+0x20/0xc0
[   12.805374]  ? __pfx_kthread+0x10/0x10
[   12.805394]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.805415]  ? calculate_sigpending+0x7b/0xa0
[   12.805439]  ? __pfx_kthread+0x10/0x10
[   12.805460]  ret_from_fork+0x116/0x1d0
[   12.805478]  ? __pfx_kthread+0x10/0x10
[   12.805498]  ret_from_fork_asm+0x1a/0x30
[   12.805531]  </TASK>
[   12.805540] 
[   12.813181] Allocated by task 211:
[   12.813520]  kasan_save_stack+0x45/0x70
[   12.813671]  kasan_save_track+0x18/0x40
[   12.813902]  kasan_save_alloc_info+0x3b/0x50
[   12.814229]  __kasan_kmalloc+0xb7/0xc0
[   12.814389]  __kmalloc_cache_noprof+0x189/0x420
[   12.814556]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.814711]  kunit_try_run_case+0x1a5/0x480
[   12.814857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.815069]  kthread+0x337/0x6f0
[   12.815237]  ret_from_fork+0x116/0x1d0
[   12.815423]  ret_from_fork_asm+0x1a/0x30
[   12.815661] 
[   12.815769] The buggy address belongs to the object at ffff8881029f2e00
[   12.815769]  which belongs to the cache kmalloc-128 of size 128
[   12.816659] The buggy address is located 12 bytes to the right of
[   12.816659]  allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73)
[   12.818690] 
[   12.818796] The buggy address belongs to the physical page:
[   12.819428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.819679] flags: 0x200000000000000(node=0|zone=2)
[   12.819887] page_type: f5(slab)
[   12.820164] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.820509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.820853] page dumped because: kasan: bad access detected
[   12.821152] 
[   12.821238] Memory state around the buggy address:
[   12.821446]  ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.821675]  ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.822002] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.822310]                                                                 ^
[   12.822544]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.822984]  ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.823284] ==================================================================
[   12.751937] ==================================================================
[   12.752959] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.753566] Read of size 1 at addr ffff8881029f2e73 by task kunit_try_catch/211
[   12.754080] 
[   12.754448] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.754508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.754520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.754577] Call Trace:
[   12.754592]  <TASK>
[   12.754611]  dump_stack_lvl+0x73/0xb0
[   12.754646]  print_report+0xd1/0x650
[   12.754669]  ? __virt_addr_valid+0x1db/0x2d0
[   12.754694]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.754717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.754740]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.754781]  kasan_report+0x141/0x180
[   12.754803]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.754832]  __asan_report_load1_noabort+0x18/0x20
[   12.754857]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.754880]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.754903]  ? finish_task_switch.isra.0+0x153/0x700
[   12.754939]  ? __switch_to+0x47/0xf50
[   12.754966]  ? __schedule+0x10cc/0x2b60
[   12.754989]  ? __pfx_read_tsc+0x10/0x10
[   12.755020]  ? ktime_get_ts64+0x86/0x230
[   12.755046]  kunit_try_run_case+0x1a5/0x480
[   12.755071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.755094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.755118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.755141]  ? __kthread_parkme+0x82/0x180
[   12.755163]  ? preempt_count_sub+0x50/0x80
[   12.755186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.755210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.755235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.755259]  kthread+0x337/0x6f0
[   12.755278]  ? trace_preempt_on+0x20/0xc0
[   12.755301]  ? __pfx_kthread+0x10/0x10
[   12.755321]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.755343]  ? calculate_sigpending+0x7b/0xa0
[   12.755367]  ? __pfx_kthread+0x10/0x10
[   12.755389]  ret_from_fork+0x116/0x1d0
[   12.755406]  ? __pfx_kthread+0x10/0x10
[   12.755427]  ret_from_fork_asm+0x1a/0x30
[   12.755459]  </TASK>
[   12.755471] 
[   12.764989] Allocated by task 211:
[   12.765194]  kasan_save_stack+0x45/0x70
[   12.765375]  kasan_save_track+0x18/0x40
[   12.765514]  kasan_save_alloc_info+0x3b/0x50
[   12.765664]  __kasan_kmalloc+0xb7/0xc0
[   12.765798]  __kmalloc_cache_noprof+0x189/0x420
[   12.766029]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.766381]  kunit_try_run_case+0x1a5/0x480
[   12.766544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.766721]  kthread+0x337/0x6f0
[   12.766985]  ret_from_fork+0x116/0x1d0
[   12.767348]  ret_from_fork_asm+0x1a/0x30
[   12.767550] 
[   12.767632] The buggy address belongs to the object at ffff8881029f2e00
[   12.767632]  which belongs to the cache kmalloc-128 of size 128
[   12.768148] The buggy address is located 0 bytes to the right of
[   12.768148]  allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73)
[   12.768667] 
[   12.768739] The buggy address belongs to the physical page:
[   12.768911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.769261] flags: 0x200000000000000(node=0|zone=2)
[   12.769498] page_type: f5(slab)
[   12.769637] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.769867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.770103] page dumped because: kasan: bad access detected
[   12.770274] 
[   12.770377] Memory state around the buggy address:
[   12.770627]  ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.771022]  ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.771238] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.771448]                                                              ^
[   12.771650]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.771860]  ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.772155] ==================================================================
[   12.772649] ==================================================================
[   12.772885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.773778] Read of size 1 at addr ffff8881029f2e78 by task kunit_try_catch/211
[   12.774122] 
[   12.774289] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.774331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.774342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.774360] Call Trace:
[   12.774375]  <TASK>
[   12.774389]  dump_stack_lvl+0x73/0xb0
[   12.774417]  print_report+0xd1/0x650
[   12.774438]  ? __virt_addr_valid+0x1db/0x2d0
[   12.774461]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.774484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.774513]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.774536]  kasan_report+0x141/0x180
[   12.774558]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.774586]  __asan_report_load1_noabort+0x18/0x20
[   12.774611]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.774635]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.774658]  ? finish_task_switch.isra.0+0x153/0x700
[   12.774680]  ? __switch_to+0x47/0xf50
[   12.774704]  ? __schedule+0x10cc/0x2b60
[   12.774726]  ? __pfx_read_tsc+0x10/0x10
[   12.774764]  ? ktime_get_ts64+0x86/0x230
[   12.774788]  kunit_try_run_case+0x1a5/0x480
[   12.774811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.776377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.776427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.776453]  ? __kthread_parkme+0x82/0x180
[   12.776474]  ? preempt_count_sub+0x50/0x80
[   12.776498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.776524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.776550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.776576]  kthread+0x337/0x6f0
[   12.776595]  ? trace_preempt_on+0x20/0xc0
[   12.776618]  ? __pfx_kthread+0x10/0x10
[   12.776639]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.776660]  ? calculate_sigpending+0x7b/0xa0
[   12.776684]  ? __pfx_kthread+0x10/0x10
[   12.776705]  ret_from_fork+0x116/0x1d0
[   12.776724]  ? __pfx_kthread+0x10/0x10
[   12.776744]  ret_from_fork_asm+0x1a/0x30
[   12.776967]  </TASK>
[   12.776977] 
[   12.789524] Allocated by task 211:
[   12.789653]  kasan_save_stack+0x45/0x70
[   12.789850]  kasan_save_track+0x18/0x40
[   12.790651]  kasan_save_alloc_info+0x3b/0x50
[   12.791164]  __kasan_kmalloc+0xb7/0xc0
[   12.791513]  __kmalloc_cache_noprof+0x189/0x420
[   12.791938]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.792503]  kunit_try_run_case+0x1a5/0x480
[   12.792890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.793440]  kthread+0x337/0x6f0
[   12.793650]  ret_from_fork+0x116/0x1d0
[   12.793811]  ret_from_fork_asm+0x1a/0x30
[   12.794239] 
[   12.794404] The buggy address belongs to the object at ffff8881029f2e00
[   12.794404]  which belongs to the cache kmalloc-128 of size 128
[   12.795060] The buggy address is located 5 bytes to the right of
[   12.795060]  allocated 115-byte region [ffff8881029f2e00, ffff8881029f2e73)
[   12.796166] 
[   12.796362] The buggy address belongs to the physical page:
[   12.796611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.796998] flags: 0x200000000000000(node=0|zone=2)
[   12.797491] page_type: f5(slab)
[   12.798006] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.798708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.799321] page dumped because: kasan: bad access detected
[   12.799744] 
[   12.799815] Memory state around the buggy address:
[   12.799981]  ffff8881029f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.800610]  ffff8881029f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.801432] >ffff8881029f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.801991]                                                                 ^
[   12.802587]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.802822]  ffff8881029f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.803117] ==================================================================