Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.596287] ==================================================================
[   19.596336] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.596403] Read of size 1 at addr fff00000c6343e7f by task kunit_try_catch/194
[   19.596453] 
[   19.596480] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.596604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.596631] Hardware name: linux,dummy-virt (DT)
[   19.596661] Call trace:
[   19.596681]  show_stack+0x20/0x38 (C)
[   19.596730]  dump_stack_lvl+0x8c/0xd0
[   19.596844]  print_report+0x118/0x608
[   19.596890]  kasan_report+0xdc/0x128
[   19.596934]  __asan_report_load1_noabort+0x20/0x30
[   19.596984]  ksize_unpoisons_memory+0x690/0x740
[   19.597031]  kunit_try_run_case+0x170/0x3f0
[   19.597076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.597129]  kthread+0x328/0x630
[   19.597180]  ret_from_fork+0x10/0x20
[   19.597226] 
[   19.597243] Allocated by task 194:
[   19.597269]  kasan_save_stack+0x3c/0x68
[   19.597309]  kasan_save_track+0x20/0x40
[   19.597344]  kasan_save_alloc_info+0x40/0x58
[   19.597386]  __kasan_kmalloc+0xd4/0xd8
[   19.597431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.597471]  ksize_unpoisons_memory+0xc0/0x740
[   19.597507]  kunit_try_run_case+0x170/0x3f0
[   19.597582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.597625]  kthread+0x328/0x630
[   19.597743]  ret_from_fork+0x10/0x20
[   19.597780] 
[   19.597798] The buggy address belongs to the object at fff00000c6343e00
[   19.597798]  which belongs to the cache kmalloc-128 of size 128
[   19.597854] The buggy address is located 12 bytes to the right of
[   19.597854]  allocated 115-byte region [fff00000c6343e00, fff00000c6343e73)
[   19.597928] 
[   19.597977] The buggy address belongs to the physical page:
[   19.598093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.598212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.598282] page_type: f5(slab)
[   19.598320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.598369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.598440] page dumped because: kasan: bad access detected
[   19.598471] 
[   19.598487] Memory state around the buggy address:
[   19.598519]  fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.598573]  fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.598673] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.598819]                                                                 ^
[   19.598861]  fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.598907]  fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.599118] ==================================================================
[   19.592558] ==================================================================
[   19.592608] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.592657] Read of size 1 at addr fff00000c6343e78 by task kunit_try_catch/194
[   19.592890] 
[   19.593139] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.593235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.593268] Hardware name: linux,dummy-virt (DT)
[   19.593395] Call trace:
[   19.593479]  show_stack+0x20/0x38 (C)
[   19.593542]  dump_stack_lvl+0x8c/0xd0
[   19.593589]  print_report+0x118/0x608
[   19.593638]  kasan_report+0xdc/0x128
[   19.593684]  __asan_report_load1_noabort+0x20/0x30
[   19.593735]  ksize_unpoisons_memory+0x618/0x740
[   19.593789]  kunit_try_run_case+0x170/0x3f0
[   19.593992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594091]  kthread+0x328/0x630
[   19.594295]  ret_from_fork+0x10/0x20
[   19.594369] 
[   19.594387] Allocated by task 194:
[   19.594415]  kasan_save_stack+0x3c/0x68
[   19.594456]  kasan_save_track+0x20/0x40
[   19.594493]  kasan_save_alloc_info+0x40/0x58
[   19.594534]  __kasan_kmalloc+0xd4/0xd8
[   19.594570]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.594607]  ksize_unpoisons_memory+0xc0/0x740
[   19.594646]  kunit_try_run_case+0x170/0x3f0
[   19.594684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594725]  kthread+0x328/0x630
[   19.594757]  ret_from_fork+0x10/0x20
[   19.594791] 
[   19.594810] The buggy address belongs to the object at fff00000c6343e00
[   19.594810]  which belongs to the cache kmalloc-128 of size 128
[   19.594873] The buggy address is located 5 bytes to the right of
[   19.594873]  allocated 115-byte region [fff00000c6343e00, fff00000c6343e73)
[   19.595170] 
[   19.595190] The buggy address belongs to the physical page:
[   19.595220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.595273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.595322] page_type: f5(slab)
[   19.595359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.595538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.595584] page dumped because: kasan: bad access detected
[   19.595676] 
[   19.595694] Memory state around the buggy address:
[   19.595744]  fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.595786]  fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595828] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.595868]                                                                 ^
[   19.595909]  fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595950]  fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.596001] ==================================================================
[   19.586683] ==================================================================
[   19.586743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.586794] Read of size 1 at addr fff00000c6343e73 by task kunit_try_catch/194
[   19.586844] 
[   19.586877] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.586964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.586992] Hardware name: linux,dummy-virt (DT)
[   19.587025] Call trace:
[   19.587049]  show_stack+0x20/0x38 (C)
[   19.587097]  dump_stack_lvl+0x8c/0xd0
[   19.587143]  print_report+0x118/0x608
[   19.587202]  kasan_report+0xdc/0x128
[   19.587649]  __asan_report_load1_noabort+0x20/0x30
[   19.587723]  ksize_unpoisons_memory+0x628/0x740
[   19.587858]  kunit_try_run_case+0x170/0x3f0
[   19.588117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588330]  kthread+0x328/0x630
[   19.588404]  ret_from_fork+0x10/0x20
[   19.588520] 
[   19.588539] Allocated by task 194:
[   19.588569]  kasan_save_stack+0x3c/0x68
[   19.588640]  kasan_save_track+0x20/0x40
[   19.588697]  kasan_save_alloc_info+0x40/0x58
[   19.588925]  __kasan_kmalloc+0xd4/0xd8
[   19.589203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.589364]  ksize_unpoisons_memory+0xc0/0x740
[   19.589403]  kunit_try_run_case+0x170/0x3f0
[   19.589441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.589495]  kthread+0x328/0x630
[   19.589526]  ret_from_fork+0x10/0x20
[   19.589722] 
[   19.589743] The buggy address belongs to the object at fff00000c6343e00
[   19.589743]  which belongs to the cache kmalloc-128 of size 128
[   19.589988] The buggy address is located 0 bytes to the right of
[   19.589988]  allocated 115-byte region [fff00000c6343e00, fff00000c6343e73)
[   19.590054] 
[   19.590074] The buggy address belongs to the physical page:
[   19.590233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.590289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.590336] page_type: f5(slab)
[   19.590374] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.590734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.590807] page dumped because: kasan: bad access detected
[   19.590876] 
[   19.590920] Memory state around the buggy address:
[   19.590952]  fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.591037]  fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.591111] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.591205]                                                              ^
[   19.591363]  fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.591418]  fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.591458] ==================================================================

[   12.939456] ==================================================================
[   12.940441] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.941062] Read of size 1 at addr ffff888102662f78 by task kunit_try_catch/212
[   12.941538] 
[   12.941839] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.941970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.941985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.942006] Call Trace:
[   12.942027]  <TASK>
[   12.942048]  dump_stack_lvl+0x73/0xb0
[   12.942082]  print_report+0xd1/0x650
[   12.942105]  ? __virt_addr_valid+0x1db/0x2d0
[   12.942128]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.942152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.942174]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.942198]  kasan_report+0x141/0x180
[   12.942220]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.942248]  __asan_report_load1_noabort+0x18/0x20
[   12.942272]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.942296]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.942319]  ? finish_task_switch.isra.0+0x153/0x700
[   12.942341]  ? __switch_to+0x47/0xf50
[   12.942367]  ? __schedule+0x10cc/0x2b60
[   12.942389]  ? __pfx_read_tsc+0x10/0x10
[   12.942410]  ? ktime_get_ts64+0x86/0x230
[   12.942435]  kunit_try_run_case+0x1a5/0x480
[   12.942460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.942482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.942695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.942724]  ? __kthread_parkme+0x82/0x180
[   12.942746]  ? preempt_count_sub+0x50/0x80
[   12.942771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.942796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.942821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.942846]  kthread+0x337/0x6f0
[   12.942864]  ? trace_preempt_on+0x20/0xc0
[   12.942888]  ? __pfx_kthread+0x10/0x10
[   12.942908]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.942978]  ? calculate_sigpending+0x7b/0xa0
[   12.943005]  ? __pfx_kthread+0x10/0x10
[   12.943029]  ret_from_fork+0x116/0x1d0
[   12.943047]  ? __pfx_kthread+0x10/0x10
[   12.943067]  ret_from_fork_asm+0x1a/0x30
[   12.943099]  </TASK>
[   12.943109] 
[   12.956035] Allocated by task 212:
[   12.956202]  kasan_save_stack+0x45/0x70
[   12.956440]  kasan_save_track+0x18/0x40
[   12.956888]  kasan_save_alloc_info+0x3b/0x50
[   12.957272]  __kasan_kmalloc+0xb7/0xc0
[   12.957673]  __kmalloc_cache_noprof+0x189/0x420
[   12.957904]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.958494]  kunit_try_run_case+0x1a5/0x480
[   12.958810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.959243]  kthread+0x337/0x6f0
[   12.959511]  ret_from_fork+0x116/0x1d0
[   12.959699]  ret_from_fork_asm+0x1a/0x30
[   12.959897] 
[   12.960271] The buggy address belongs to the object at ffff888102662f00
[   12.960271]  which belongs to the cache kmalloc-128 of size 128
[   12.960895] The buggy address is located 5 bytes to the right of
[   12.960895]  allocated 115-byte region [ffff888102662f00, ffff888102662f73)
[   12.961551] 
[   12.961886] The buggy address belongs to the physical page:
[   12.962273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   12.962870] flags: 0x200000000000000(node=0|zone=2)
[   12.963308] page_type: f5(slab)
[   12.963466] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.963924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.964278] page dumped because: kasan: bad access detected
[   12.964638] 
[   12.964742] Memory state around the buggy address:
[   12.964901]  ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.965219]  ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.965849] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.966365]                                                                 ^
[   12.967124]  ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.967542]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.968021] ==================================================================
[   12.909420] ==================================================================
[   12.910380] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.910774] Read of size 1 at addr ffff888102662f73 by task kunit_try_catch/212
[   12.911148] 
[   12.911271] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.911317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.911328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.911348] Call Trace:
[   12.911361]  <TASK>
[   12.911378]  dump_stack_lvl+0x73/0xb0
[   12.911409]  print_report+0xd1/0x650
[   12.911432]  ? __virt_addr_valid+0x1db/0x2d0
[   12.911455]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.911611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.911635]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.911659]  kasan_report+0x141/0x180
[   12.911680]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.911710]  __asan_report_load1_noabort+0x18/0x20
[   12.911735]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.911759]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.911781]  ? finish_task_switch.isra.0+0x153/0x700
[   12.911805]  ? __switch_to+0x47/0xf50
[   12.911832]  ? __schedule+0x10cc/0x2b60
[   12.911855]  ? __pfx_read_tsc+0x10/0x10
[   12.911876]  ? ktime_get_ts64+0x86/0x230
[   12.911900]  kunit_try_run_case+0x1a5/0x480
[   12.911980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.912007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.912032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.912055]  ? __kthread_parkme+0x82/0x180
[   12.912076]  ? preempt_count_sub+0x50/0x80
[   12.912099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.912123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.912148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.912173]  kthread+0x337/0x6f0
[   12.912191]  ? trace_preempt_on+0x20/0xc0
[   12.912215]  ? __pfx_kthread+0x10/0x10
[   12.912236]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.912257]  ? calculate_sigpending+0x7b/0xa0
[   12.912281]  ? __pfx_kthread+0x10/0x10
[   12.912302]  ret_from_fork+0x116/0x1d0
[   12.912320]  ? __pfx_kthread+0x10/0x10
[   12.912341]  ret_from_fork_asm+0x1a/0x30
[   12.912372]  </TASK>
[   12.912383] 
[   12.924017] Allocated by task 212:
[   12.924410]  kasan_save_stack+0x45/0x70
[   12.924656]  kasan_save_track+0x18/0x40
[   12.925038]  kasan_save_alloc_info+0x3b/0x50
[   12.925256]  __kasan_kmalloc+0xb7/0xc0
[   12.925443]  __kmalloc_cache_noprof+0x189/0x420
[   12.925951]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.926435]  kunit_try_run_case+0x1a5/0x480
[   12.926759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.927216]  kthread+0x337/0x6f0
[   12.927349]  ret_from_fork+0x116/0x1d0
[   12.927703]  ret_from_fork_asm+0x1a/0x30
[   12.928034] 
[   12.928141] The buggy address belongs to the object at ffff888102662f00
[   12.928141]  which belongs to the cache kmalloc-128 of size 128
[   12.928928] The buggy address is located 0 bytes to the right of
[   12.928928]  allocated 115-byte region [ffff888102662f00, ffff888102662f73)
[   12.929801] 
[   12.929908] The buggy address belongs to the physical page:
[   12.930366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   12.930941] flags: 0x200000000000000(node=0|zone=2)
[   12.931347] page_type: f5(slab)
[   12.931674] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.932282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.932765] page dumped because: kasan: bad access detected
[   12.933132] 
[   12.933231] Memory state around the buggy address:
[   12.933435]  ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.934148]  ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.934825] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.936261]                                                              ^
[   12.936715]  ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.937411]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.938350] ==================================================================
[   12.969560] ==================================================================
[   12.969918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.970511] Read of size 1 at addr ffff888102662f7f by task kunit_try_catch/212
[   12.971090] 
[   12.971206] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.971251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.971262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.971283] Call Trace:
[   12.971301]  <TASK>
[   12.971319]  dump_stack_lvl+0x73/0xb0
[   12.971351]  print_report+0xd1/0x650
[   12.971374]  ? __virt_addr_valid+0x1db/0x2d0
[   12.971397]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.971420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.971442]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.971466]  kasan_report+0x141/0x180
[   12.971487]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.971968]  __asan_report_load1_noabort+0x18/0x20
[   12.972001]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.972027]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.972051]  ? finish_task_switch.isra.0+0x153/0x700
[   12.972073]  ? __switch_to+0x47/0xf50
[   12.972099]  ? __schedule+0x10cc/0x2b60
[   12.972121]  ? __pfx_read_tsc+0x10/0x10
[   12.972142]  ? ktime_get_ts64+0x86/0x230
[   12.972167]  kunit_try_run_case+0x1a5/0x480
[   12.972192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.972214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.972238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.972263]  ? __kthread_parkme+0x82/0x180
[   12.972283]  ? preempt_count_sub+0x50/0x80
[   12.972306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.972330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.972355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.972379]  kthread+0x337/0x6f0
[   12.972397]  ? trace_preempt_on+0x20/0xc0
[   12.972421]  ? __pfx_kthread+0x10/0x10
[   12.972441]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.972462]  ? calculate_sigpending+0x7b/0xa0
[   12.972487]  ? __pfx_kthread+0x10/0x10
[   12.972508]  ret_from_fork+0x116/0x1d0
[   12.972537]  ? __pfx_kthread+0x10/0x10
[   12.972557]  ret_from_fork_asm+0x1a/0x30
[   12.972614]  </TASK>
[   12.972624] 
[   12.983591] Allocated by task 212:
[   12.983747]  kasan_save_stack+0x45/0x70
[   12.984190]  kasan_save_track+0x18/0x40
[   12.984374]  kasan_save_alloc_info+0x3b/0x50
[   12.984797]  __kasan_kmalloc+0xb7/0xc0
[   12.985072]  __kmalloc_cache_noprof+0x189/0x420
[   12.985367]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.985678]  kunit_try_run_case+0x1a5/0x480
[   12.986034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.986350]  kthread+0x337/0x6f0
[   12.986618]  ret_from_fork+0x116/0x1d0
[   12.986811]  ret_from_fork_asm+0x1a/0x30
[   12.987279] 
[   12.987377] The buggy address belongs to the object at ffff888102662f00
[   12.987377]  which belongs to the cache kmalloc-128 of size 128
[   12.988180] The buggy address is located 12 bytes to the right of
[   12.988180]  allocated 115-byte region [ffff888102662f00, ffff888102662f73)
[   12.988756] 
[   12.988985] The buggy address belongs to the physical page:
[   12.989338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   12.989791] flags: 0x200000000000000(node=0|zone=2)
[   12.990154] page_type: f5(slab)
[   12.990284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.990778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.991273] page dumped because: kasan: bad access detected
[   12.991534] 
[   12.991620] Memory state around the buggy address:
[   12.991820]  ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.992193]  ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.992490] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.992780]                                                                 ^
[   12.993066]  ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.993358]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.994174] ==================================================================