Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.861446] ==================================================================
[   16.861517] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.861570] Read of size 1 at addr fff00000c585ef73 by task kunit_try_catch/194
[   16.861621] 
[   16.861653] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.861763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.861801] Hardware name: linux,dummy-virt (DT)
[   16.861833] Call trace:
[   16.861863]  show_stack+0x20/0x38 (C)
[   16.861921]  dump_stack_lvl+0x8c/0xd0
[   16.861978]  print_report+0x118/0x5d0
[   16.862025]  kasan_report+0xdc/0x128
[   16.862070]  __asan_report_load1_noabort+0x20/0x30
[   16.862122]  ksize_unpoisons_memory+0x628/0x740
[   16.862182]  kunit_try_run_case+0x170/0x3f0
[   16.862231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.862285]  kthread+0x328/0x630
[   16.862329]  ret_from_fork+0x10/0x20
[   16.862376] 
[   16.862394] Allocated by task 194:
[   16.862422]  kasan_save_stack+0x3c/0x68
[   16.862463]  kasan_save_track+0x20/0x40
[   16.862932]  kasan_save_alloc_info+0x40/0x58
[   16.863013]  __kasan_kmalloc+0xd4/0xd8
[   16.863072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.863118]  ksize_unpoisons_memory+0xc0/0x740
[   16.863422]  kunit_try_run_case+0x170/0x3f0
[   16.863513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.863559]  kthread+0x328/0x630
[   16.863591]  ret_from_fork+0x10/0x20
[   16.863628] 
[   16.863648] The buggy address belongs to the object at fff00000c585ef00
[   16.863648]  which belongs to the cache kmalloc-128 of size 128
[   16.863749] The buggy address is located 0 bytes to the right of
[   16.863749]  allocated 115-byte region [fff00000c585ef00, fff00000c585ef73)
[   16.864053] 
[   16.864077] The buggy address belongs to the physical page:
[   16.864150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.864317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.864406] page_type: f5(slab)
[   16.864511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.864598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.864703] page dumped because: kasan: bad access detected
[   16.864818] 
[   16.864870] Memory state around the buggy address:
[   16.864995]  fff00000c585ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.865039]  fff00000c585ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865160] >fff00000c585ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.865503]                                                              ^
[   16.865581]  fff00000c585ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865714]  fff00000c585f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.865813] ==================================================================
[   16.873880] ==================================================================
[   16.873935] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.874304] Read of size 1 at addr fff00000c585ef7f by task kunit_try_catch/194
[   16.874370] 
[   16.874419] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.874512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.874566] Hardware name: linux,dummy-virt (DT)
[   16.874640] Call trace:
[   16.874689]  show_stack+0x20/0x38 (C)
[   16.874745]  dump_stack_lvl+0x8c/0xd0
[   16.874807]  print_report+0x118/0x5d0
[   16.874907]  kasan_report+0xdc/0x128
[   16.874993]  __asan_report_load1_noabort+0x20/0x30
[   16.875046]  ksize_unpoisons_memory+0x690/0x740
[   16.875094]  kunit_try_run_case+0x170/0x3f0
[   16.875264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.875431]  kthread+0x328/0x630
[   16.875642]  ret_from_fork+0x10/0x20
[   16.875790] 
[   16.875888] Allocated by task 194:
[   16.875965]  kasan_save_stack+0x3c/0x68
[   16.876116]  kasan_save_track+0x20/0x40
[   16.876200]  kasan_save_alloc_info+0x40/0x58
[   16.876282]  __kasan_kmalloc+0xd4/0xd8
[   16.876340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.876378]  ksize_unpoisons_memory+0xc0/0x740
[   16.876437]  kunit_try_run_case+0x170/0x3f0
[   16.876736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.876790]  kthread+0x328/0x630
[   16.876889]  ret_from_fork+0x10/0x20
[   16.876965] 
[   16.877089] The buggy address belongs to the object at fff00000c585ef00
[   16.877089]  which belongs to the cache kmalloc-128 of size 128
[   16.877235] The buggy address is located 12 bytes to the right of
[   16.877235]  allocated 115-byte region [fff00000c585ef00, fff00000c585ef73)
[   16.877408] 
[   16.877497] The buggy address belongs to the physical page:
[   16.877623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.877689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.877975] page_type: f5(slab)
[   16.878159] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.878348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.878490] page dumped because: kasan: bad access detected
[   16.878603] 
[   16.878671] Memory state around the buggy address:
[   16.878786]  fff00000c585ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.878850]  fff00000c585ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.878926] >fff00000c585ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.878967]                                                                 ^
[   16.879299]  fff00000c585ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.879354]  fff00000c585f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.879505] ==================================================================
[   16.866855] ==================================================================
[   16.866933] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.866982] Read of size 1 at addr fff00000c585ef78 by task kunit_try_catch/194
[   16.867070] 
[   16.867118] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.867363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867518] Hardware name: linux,dummy-virt (DT)
[   16.867618] Call trace:
[   16.867659]  show_stack+0x20/0x38 (C)
[   16.867706]  dump_stack_lvl+0x8c/0xd0
[   16.867752]  print_report+0x118/0x5d0
[   16.868315]  kasan_report+0xdc/0x128
[   16.868447]  __asan_report_load1_noabort+0x20/0x30
[   16.868543]  ksize_unpoisons_memory+0x618/0x740
[   16.868668]  kunit_try_run_case+0x170/0x3f0
[   16.868787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.868918]  kthread+0x328/0x630
[   16.868995]  ret_from_fork+0x10/0x20
[   16.869067] 
[   16.869084] Allocated by task 194:
[   16.869112]  kasan_save_stack+0x3c/0x68
[   16.869471]  kasan_save_track+0x20/0x40
[   16.869636]  kasan_save_alloc_info+0x40/0x58
[   16.869724]  __kasan_kmalloc+0xd4/0xd8
[   16.869878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.869997]  ksize_unpoisons_memory+0xc0/0x740
[   16.870075]  kunit_try_run_case+0x170/0x3f0
[   16.870386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.870441]  kthread+0x328/0x630
[   16.870475]  ret_from_fork+0x10/0x20
[   16.870787] 
[   16.870937] The buggy address belongs to the object at fff00000c585ef00
[   16.870937]  which belongs to the cache kmalloc-128 of size 128
[   16.871081] The buggy address is located 5 bytes to the right of
[   16.871081]  allocated 115-byte region [fff00000c585ef00, fff00000c585ef73)
[   16.871253] 
[   16.871324] The buggy address belongs to the physical page:
[   16.871354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.871431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.871481] page_type: f5(slab)
[   16.871518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.871807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.871914] page dumped because: kasan: bad access detected
[   16.872021] 
[   16.872158] Memory state around the buggy address:
[   16.872311]  fff00000c585ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.872395]  fff00000c585ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.872459] >fff00000c585ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.872598]                                                                 ^
[   16.872679]  fff00000c585ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.872907]  fff00000c585f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.872973] ==================================================================

[   13.389828] ==================================================================
[   13.390631] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.391226] Read of size 1 at addr ffff8881029ef873 by task kunit_try_catch/211
[   13.392280] 
[   13.392480] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.392527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.392539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.392559] Call Trace:
[   13.392571]  <TASK>
[   13.392587]  dump_stack_lvl+0x73/0xb0
[   13.392620]  print_report+0xd1/0x610
[   13.392642]  ? __virt_addr_valid+0x1db/0x2d0
[   13.392667]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.392690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.392713]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.392736]  kasan_report+0x141/0x180
[   13.392757]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.392786]  __asan_report_load1_noabort+0x18/0x20
[   13.392811]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.392835]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.392858]  ? finish_task_switch.isra.0+0x153/0x700
[   13.392883]  ? __switch_to+0x47/0xf50
[   13.392909]  ? __schedule+0x10cc/0x2b60
[   13.392931]  ? __pfx_read_tsc+0x10/0x10
[   13.392952]  ? ktime_get_ts64+0x86/0x230
[   13.392977]  kunit_try_run_case+0x1a5/0x480
[   13.393023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.393081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.393104]  ? __kthread_parkme+0x82/0x180
[   13.393125]  ? preempt_count_sub+0x50/0x80
[   13.393148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.393196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.393221]  kthread+0x337/0x6f0
[   13.393240]  ? trace_preempt_on+0x20/0xc0
[   13.393275]  ? __pfx_kthread+0x10/0x10
[   13.393297]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.393319]  ? calculate_sigpending+0x7b/0xa0
[   13.393344]  ? __pfx_kthread+0x10/0x10
[   13.393365]  ret_from_fork+0x116/0x1d0
[   13.393383]  ? __pfx_kthread+0x10/0x10
[   13.393403]  ret_from_fork_asm+0x1a/0x30
[   13.393434]  </TASK>
[   13.393444] 
[   13.408915] Allocated by task 211:
[   13.409472]  kasan_save_stack+0x45/0x70
[   13.409659]  kasan_save_track+0x18/0x40
[   13.409888]  kasan_save_alloc_info+0x3b/0x50
[   13.410242]  __kasan_kmalloc+0xb7/0xc0
[   13.410414]  __kmalloc_cache_noprof+0x189/0x420
[   13.410596]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.410787]  kunit_try_run_case+0x1a5/0x480
[   13.410966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.411179]  kthread+0x337/0x6f0
[   13.411317]  ret_from_fork+0x116/0x1d0
[   13.411498]  ret_from_fork_asm+0x1a/0x30
[   13.411691] 
[   13.411782] The buggy address belongs to the object at ffff8881029ef800
[   13.411782]  which belongs to the cache kmalloc-128 of size 128
[   13.412245] The buggy address is located 0 bytes to the right of
[   13.412245]  allocated 115-byte region [ffff8881029ef800, ffff8881029ef873)
[   13.413692] 
[   13.413804] The buggy address belongs to the physical page:
[   13.414308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   13.414763] flags: 0x200000000000000(node=0|zone=2)
[   13.414987] page_type: f5(slab)
[   13.415329] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.415774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.416342] page dumped because: kasan: bad access detected
[   13.416555] 
[   13.416647] Memory state around the buggy address:
[   13.417064]  ffff8881029ef700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.417583]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.417914] >ffff8881029ef800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.418476]                                                              ^
[   13.418779]  ffff8881029ef880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.419362]  ffff8881029ef900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.419743] ==================================================================
[   13.420507] ==================================================================
[   13.420824] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.421470] Read of size 1 at addr ffff8881029ef878 by task kunit_try_catch/211
[   13.421772] 
[   13.421879] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.421923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.421936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.421957] Call Trace:
[   13.421975]  <TASK>
[   13.422302]  dump_stack_lvl+0x73/0xb0
[   13.422342]  print_report+0xd1/0x610
[   13.422365]  ? __virt_addr_valid+0x1db/0x2d0
[   13.422388]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.422412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.422435]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.422459]  kasan_report+0x141/0x180
[   13.422481]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.422509]  __asan_report_load1_noabort+0x18/0x20
[   13.422533]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.422557]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.422580]  ? finish_task_switch.isra.0+0x153/0x700
[   13.422603]  ? __switch_to+0x47/0xf50
[   13.422629]  ? __schedule+0x10cc/0x2b60
[   13.422651]  ? __pfx_read_tsc+0x10/0x10
[   13.422671]  ? ktime_get_ts64+0x86/0x230
[   13.422695]  kunit_try_run_case+0x1a5/0x480
[   13.422727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.422750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.422774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.422797]  ? __kthread_parkme+0x82/0x180
[   13.422817]  ? preempt_count_sub+0x50/0x80
[   13.422840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.422864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.422889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.422914]  kthread+0x337/0x6f0
[   13.422933]  ? trace_preempt_on+0x20/0xc0
[   13.422956]  ? __pfx_kthread+0x10/0x10
[   13.423029]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.423053]  ? calculate_sigpending+0x7b/0xa0
[   13.423077]  ? __pfx_kthread+0x10/0x10
[   13.423098]  ret_from_fork+0x116/0x1d0
[   13.423116]  ? __pfx_kthread+0x10/0x10
[   13.423136]  ret_from_fork_asm+0x1a/0x30
[   13.423167]  </TASK>
[   13.423177] 
[   13.432971] Allocated by task 211:
[   13.433509]  kasan_save_stack+0x45/0x70
[   13.433772]  kasan_save_track+0x18/0x40
[   13.434017]  kasan_save_alloc_info+0x3b/0x50
[   13.434406]  __kasan_kmalloc+0xb7/0xc0
[   13.434749]  __kmalloc_cache_noprof+0x189/0x420
[   13.435039]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.435290]  kunit_try_run_case+0x1a5/0x480
[   13.435488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.435719]  kthread+0x337/0x6f0
[   13.435880]  ret_from_fork+0x116/0x1d0
[   13.436330]  ret_from_fork_asm+0x1a/0x30
[   13.436580] 
[   13.436684] The buggy address belongs to the object at ffff8881029ef800
[   13.436684]  which belongs to the cache kmalloc-128 of size 128
[   13.437553] The buggy address is located 5 bytes to the right of
[   13.437553]  allocated 115-byte region [ffff8881029ef800, ffff8881029ef873)
[   13.438350] 
[   13.438439] The buggy address belongs to the physical page:
[   13.438692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   13.439037] flags: 0x200000000000000(node=0|zone=2)
[   13.439258] page_type: f5(slab)
[   13.439409] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.439738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.440049] page dumped because: kasan: bad access detected
[   13.440350] 
[   13.440422] Memory state around the buggy address:
[   13.440577]  ffff8881029ef700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.440818]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.441216] >ffff8881029ef800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.441613]                                                                 ^
[   13.441989]  ffff8881029ef880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.442274]  ffff8881029ef900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.442558] ==================================================================
[   13.443159] ==================================================================
[   13.443464] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.443777] Read of size 1 at addr ffff8881029ef87f by task kunit_try_catch/211
[   13.444277] 
[   13.444371] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.444415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.444426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.444445] Call Trace:
[   13.444460]  <TASK>
[   13.444475]  dump_stack_lvl+0x73/0xb0
[   13.444504]  print_report+0xd1/0x610
[   13.444526]  ? __virt_addr_valid+0x1db/0x2d0
[   13.444549]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.444572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.444595]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.444619]  kasan_report+0x141/0x180
[   13.444640]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.444668]  __asan_report_load1_noabort+0x18/0x20
[   13.444692]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.444716]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.444739]  ? finish_task_switch.isra.0+0x153/0x700
[   13.444762]  ? __switch_to+0x47/0xf50
[   13.444787]  ? __schedule+0x10cc/0x2b60
[   13.444809]  ? __pfx_read_tsc+0x10/0x10
[   13.444829]  ? ktime_get_ts64+0x86/0x230
[   13.444853]  kunit_try_run_case+0x1a5/0x480
[   13.444877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.444900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.444923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.444947]  ? __kthread_parkme+0x82/0x180
[   13.444967]  ? preempt_count_sub+0x50/0x80
[   13.445275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.445304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.445329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.445355]  kthread+0x337/0x6f0
[   13.445374]  ? trace_preempt_on+0x20/0xc0
[   13.445398]  ? __pfx_kthread+0x10/0x10
[   13.445418]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.445440]  ? calculate_sigpending+0x7b/0xa0
[   13.445463]  ? __pfx_kthread+0x10/0x10
[   13.445484]  ret_from_fork+0x116/0x1d0
[   13.445502]  ? __pfx_kthread+0x10/0x10
[   13.445522]  ret_from_fork_asm+0x1a/0x30
[   13.445553]  </TASK>
[   13.445563] 
[   13.453253] Allocated by task 211:
[   13.453400]  kasan_save_stack+0x45/0x70
[   13.453571]  kasan_save_track+0x18/0x40
[   13.453764]  kasan_save_alloc_info+0x3b/0x50
[   13.454030]  __kasan_kmalloc+0xb7/0xc0
[   13.454227]  __kmalloc_cache_noprof+0x189/0x420
[   13.454461]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.454676]  kunit_try_run_case+0x1a5/0x480
[   13.454893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.455209]  kthread+0x337/0x6f0
[   13.455359]  ret_from_fork+0x116/0x1d0
[   13.455527]  ret_from_fork_asm+0x1a/0x30
[   13.455721] 
[   13.455811] The buggy address belongs to the object at ffff8881029ef800
[   13.455811]  which belongs to the cache kmalloc-128 of size 128
[   13.456460] The buggy address is located 12 bytes to the right of
[   13.456460]  allocated 115-byte region [ffff8881029ef800, ffff8881029ef873)
[   13.456919] 
[   13.456991] The buggy address belongs to the physical page:
[   13.457163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   13.457484] flags: 0x200000000000000(node=0|zone=2)
[   13.458126] page_type: f5(slab)
[   13.458314] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.458656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.458899] page dumped because: kasan: bad access detected
[   13.459366] 
[   13.459468] Memory state around the buggy address:
[   13.459675]  ffff8881029ef700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.459977]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.460258] >ffff8881029ef800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.460529]                                                                 ^
[   13.460744]  ffff8881029ef880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.461054]  ffff8881029ef900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.461488] ==================================================================