Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.849976] ==================================================================
[   16.850038] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.850091] Read of size 1 at addr fff00000c669197f by task kunit_try_catch/194
[   16.850460] 
[   16.850509] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.850743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.850881] Hardware name: linux,dummy-virt (DT)
[   16.850917] Call trace:
[   16.850941]  show_stack+0x20/0x38 (C)
[   16.851117]  dump_stack_lvl+0x8c/0xd0
[   16.851339]  print_report+0x118/0x5d0
[   16.851400]  kasan_report+0xdc/0x128
[   16.851494]  __asan_report_load1_noabort+0x20/0x30
[   16.851548]  ksize_unpoisons_memory+0x690/0x740
[   16.851621]  kunit_try_run_case+0x170/0x3f0
[   16.851948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852083]  kthread+0x328/0x630
[   16.852190]  ret_from_fork+0x10/0x20
[   16.852244] 
[   16.852262] Allocated by task 194:
[   16.852290]  kasan_save_stack+0x3c/0x68
[   16.852560]  kasan_save_track+0x20/0x40
[   16.852983]  kasan_save_alloc_info+0x40/0x58
[   16.853119]  __kasan_kmalloc+0xd4/0xd8
[   16.853233]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.853320]  ksize_unpoisons_memory+0xc0/0x740
[   16.853360]  kunit_try_run_case+0x170/0x3f0
[   16.853806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.853976]  kthread+0x328/0x630
[   16.854129]  ret_from_fork+0x10/0x20
[   16.854212] 
[   16.854302] The buggy address belongs to the object at fff00000c6691900
[   16.854302]  which belongs to the cache kmalloc-128 of size 128
[   16.854560] The buggy address is located 12 bytes to the right of
[   16.854560]  allocated 115-byte region [fff00000c6691900, fff00000c6691973)
[   16.855017] 
[   16.855090] The buggy address belongs to the physical page:
[   16.855182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.855273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.855324] page_type: f5(slab)
[   16.855373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.855424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.855461] page dumped because: kasan: bad access detected
[   16.855492] 
[   16.855511] Memory state around the buggy address:
[   16.855547]  fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.855604]  fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855657] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.855696]                                                                 ^
[   16.855737]  fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856316]  fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856372] ==================================================================
[   16.841341] ==================================================================
[   16.841423] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.841478] Read of size 1 at addr fff00000c6691978 by task kunit_try_catch/194
[   16.841854] 
[   16.841944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.842094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.842135] Hardware name: linux,dummy-virt (DT)
[   16.842167] Call trace:
[   16.842217]  show_stack+0x20/0x38 (C)
[   16.842577]  dump_stack_lvl+0x8c/0xd0
[   16.842877]  print_report+0x118/0x5d0
[   16.843099]  kasan_report+0xdc/0x128
[   16.843200]  __asan_report_load1_noabort+0x20/0x30
[   16.843469]  ksize_unpoisons_memory+0x618/0x740
[   16.843675]  kunit_try_run_case+0x170/0x3f0
[   16.843951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.844251]  kthread+0x328/0x630
[   16.844383]  ret_from_fork+0x10/0x20
[   16.844439] 
[   16.844467] Allocated by task 194:
[   16.844494]  kasan_save_stack+0x3c/0x68
[   16.844537]  kasan_save_track+0x20/0x40
[   16.844575]  kasan_save_alloc_info+0x40/0x58
[   16.844613]  __kasan_kmalloc+0xd4/0xd8
[   16.844659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.844714]  ksize_unpoisons_memory+0xc0/0x740
[   16.844752]  kunit_try_run_case+0x170/0x3f0
[   16.844790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.844842]  kthread+0x328/0x630
[   16.844897]  ret_from_fork+0x10/0x20
[   16.844934] 
[   16.844952] The buggy address belongs to the object at fff00000c6691900
[   16.844952]  which belongs to the cache kmalloc-128 of size 128
[   16.845009] The buggy address is located 5 bytes to the right of
[   16.845009]  allocated 115-byte region [fff00000c6691900, fff00000c6691973)
[   16.845082] 
[   16.845102] The buggy address belongs to the physical page:
[   16.845151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.845204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.845253] page_type: f5(slab)
[   16.845290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.845356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.845396] page dumped because: kasan: bad access detected
[   16.845435] 
[   16.845456] Memory state around the buggy address:
[   16.845495]  fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.845548]  fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845600] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.845639]                                                                 ^
[   16.845695]  fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845738]  fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845791] ==================================================================
[   16.831240] ==================================================================
[   16.831311] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.831817] Read of size 1 at addr fff00000c6691973 by task kunit_try_catch/194
[   16.832368] 
[   16.832788] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.833099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.833159] Hardware name: linux,dummy-virt (DT)
[   16.833194] Call trace:
[   16.833219]  show_stack+0x20/0x38 (C)
[   16.833426]  dump_stack_lvl+0x8c/0xd0
[   16.833950]  print_report+0x118/0x5d0
[   16.834054]  kasan_report+0xdc/0x128
[   16.834105]  __asan_report_load1_noabort+0x20/0x30
[   16.834315]  ksize_unpoisons_memory+0x628/0x740
[   16.834474]  kunit_try_run_case+0x170/0x3f0
[   16.835046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.835206]  kthread+0x328/0x630
[   16.835369]  ret_from_fork+0x10/0x20
[   16.835557] 
[   16.835632] Allocated by task 194:
[   16.835681]  kasan_save_stack+0x3c/0x68
[   16.835882]  kasan_save_track+0x20/0x40
[   16.836077]  kasan_save_alloc_info+0x40/0x58
[   16.836194]  __kasan_kmalloc+0xd4/0xd8
[   16.836235]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.836274]  ksize_unpoisons_memory+0xc0/0x740
[   16.836339]  kunit_try_run_case+0x170/0x3f0
[   16.836537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.836830]  kthread+0x328/0x630
[   16.836895]  ret_from_fork+0x10/0x20
[   16.837092] 
[   16.837218] The buggy address belongs to the object at fff00000c6691900
[   16.837218]  which belongs to the cache kmalloc-128 of size 128
[   16.837613] The buggy address is located 0 bytes to the right of
[   16.837613]  allocated 115-byte region [fff00000c6691900, fff00000c6691973)
[   16.837872] 
[   16.837910] The buggy address belongs to the physical page:
[   16.838111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.838204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.838371] page_type: f5(slab)
[   16.838416] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.838601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.838656] page dumped because: kasan: bad access detected
[   16.838685] 
[   16.838703] Memory state around the buggy address:
[   16.838747]  fff00000c6691800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.838791]  fff00000c6691880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.838844] >fff00000c6691900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.838912]                                                              ^
[   16.838960]  fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.839001]  fff00000c6691a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.839039] ==================================================================

[   12.740548] ==================================================================
[   12.740805] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.741544] Read of size 1 at addr ffff888102f4217f by task kunit_try_catch/211
[   12.742025] 
[   12.742137] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.742295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.742307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.742330] Call Trace:
[   12.742347]  <TASK>
[   12.742366]  dump_stack_lvl+0x73/0xb0
[   12.742396]  print_report+0xd1/0x610
[   12.742418]  ? __virt_addr_valid+0x1db/0x2d0
[   12.742508]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.742532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.742554]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.742577]  kasan_report+0x141/0x180
[   12.742654]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.742684]  __asan_report_load1_noabort+0x18/0x20
[   12.742707]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.742731]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.742752]  ? finish_task_switch.isra.0+0x153/0x700
[   12.742776]  ? __switch_to+0x47/0xf50
[   12.742802]  ? __schedule+0x10cc/0x2b60
[   12.742825]  ? __pfx_read_tsc+0x10/0x10
[   12.742845]  ? ktime_get_ts64+0x86/0x230
[   12.742869]  kunit_try_run_case+0x1a5/0x480
[   12.742893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.742915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.742938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.742961]  ? __kthread_parkme+0x82/0x180
[   12.742981]  ? preempt_count_sub+0x50/0x80
[   12.743004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.743027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.743061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.743084]  kthread+0x337/0x6f0
[   12.743103]  ? trace_preempt_on+0x20/0xc0
[   12.743126]  ? __pfx_kthread+0x10/0x10
[   12.743145]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.743167]  ? calculate_sigpending+0x7b/0xa0
[   12.743190]  ? __pfx_kthread+0x10/0x10
[   12.743213]  ret_from_fork+0x116/0x1d0
[   12.743230]  ? __pfx_kthread+0x10/0x10
[   12.743250]  ret_from_fork_asm+0x1a/0x30
[   12.743286]  </TASK>
[   12.743298] 
[   12.754608] Allocated by task 211:
[   12.754787]  kasan_save_stack+0x45/0x70
[   12.755233]  kasan_save_track+0x18/0x40
[   12.755436]  kasan_save_alloc_info+0x3b/0x50
[   12.755794]  __kasan_kmalloc+0xb7/0xc0
[   12.756276]  __kmalloc_cache_noprof+0x189/0x420
[   12.756497]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.756878]  kunit_try_run_case+0x1a5/0x480
[   12.757217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.757526]  kthread+0x337/0x6f0
[   12.757700]  ret_from_fork+0x116/0x1d0
[   12.757884]  ret_from_fork_asm+0x1a/0x30
[   12.758339] 
[   12.758417] The buggy address belongs to the object at ffff888102f42100
[   12.758417]  which belongs to the cache kmalloc-128 of size 128
[   12.759190] The buggy address is located 12 bytes to the right of
[   12.759190]  allocated 115-byte region [ffff888102f42100, ffff888102f42173)
[   12.760195] 
[   12.760299] The buggy address belongs to the physical page:
[   12.760512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   12.761143] flags: 0x200000000000000(node=0|zone=2)
[   12.761456] page_type: f5(slab)
[   12.761593] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.762174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.762472] page dumped because: kasan: bad access detected
[   12.763040] 
[   12.763150] Memory state around the buggy address:
[   12.763351]  ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.763648]  ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.764330] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.764793]                                                                 ^
[   12.765180]  ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.765558]  ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.765867] ==================================================================
[   12.682744] ==================================================================
[   12.683763] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.684133] Read of size 1 at addr ffff888102f42173 by task kunit_try_catch/211
[   12.684649] 
[   12.684779] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.684830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.684841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.684864] Call Trace:
[   12.684876]  <TASK>
[   12.684894]  dump_stack_lvl+0x73/0xb0
[   12.684927]  print_report+0xd1/0x610
[   12.684950]  ? __virt_addr_valid+0x1db/0x2d0
[   12.684973]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.684996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.685018]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.685041]  kasan_report+0x141/0x180
[   12.685076]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.685351]  __asan_report_load1_noabort+0x18/0x20
[   12.685381]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.685406]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.685428]  ? finish_task_switch.isra.0+0x153/0x700
[   12.685451]  ? __switch_to+0x47/0xf50
[   12.685478]  ? __schedule+0x10cc/0x2b60
[   12.685501]  ? __pfx_read_tsc+0x10/0x10
[   12.685522]  ? ktime_get_ts64+0x86/0x230
[   12.685547]  kunit_try_run_case+0x1a5/0x480
[   12.685572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.685636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.685659]  ? __kthread_parkme+0x82/0x180
[   12.685680]  ? preempt_count_sub+0x50/0x80
[   12.685703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.685772]  kthread+0x337/0x6f0
[   12.685790]  ? trace_preempt_on+0x20/0xc0
[   12.685822]  ? __pfx_kthread+0x10/0x10
[   12.685841]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.685862]  ? calculate_sigpending+0x7b/0xa0
[   12.685887]  ? __pfx_kthread+0x10/0x10
[   12.685907]  ret_from_fork+0x116/0x1d0
[   12.685925]  ? __pfx_kthread+0x10/0x10
[   12.685945]  ret_from_fork_asm+0x1a/0x30
[   12.685977]  </TASK>
[   12.685987] 
[   12.696422] Allocated by task 211:
[   12.696814]  kasan_save_stack+0x45/0x70
[   12.697095]  kasan_save_track+0x18/0x40
[   12.697300]  kasan_save_alloc_info+0x3b/0x50
[   12.697492]  __kasan_kmalloc+0xb7/0xc0
[   12.697683]  __kmalloc_cache_noprof+0x189/0x420
[   12.698227]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.698408]  kunit_try_run_case+0x1a5/0x480
[   12.698774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.699268]  kthread+0x337/0x6f0
[   12.699449]  ret_from_fork+0x116/0x1d0
[   12.699817]  ret_from_fork_asm+0x1a/0x30
[   12.700200] 
[   12.700296] The buggy address belongs to the object at ffff888102f42100
[   12.700296]  which belongs to the cache kmalloc-128 of size 128
[   12.701016] The buggy address is located 0 bytes to the right of
[   12.701016]  allocated 115-byte region [ffff888102f42100, ffff888102f42173)
[   12.701565] 
[   12.701880] The buggy address belongs to the physical page:
[   12.702226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   12.702616] flags: 0x200000000000000(node=0|zone=2)
[   12.702979] page_type: f5(slab)
[   12.703165] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.703497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.704710] page dumped because: kasan: bad access detected
[   12.704908] 
[   12.704983] Memory state around the buggy address:
[   12.705155]  ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.705375]  ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.705594] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.705808]                                                              ^
[   12.706015]  ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.707252]  ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.707487] ==================================================================
[   12.709222] ==================================================================
[   12.710139] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.711171] Read of size 1 at addr ffff888102f42178 by task kunit_try_catch/211
[   12.712135] 
[   12.712244] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.712290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.712301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.712323] Call Trace:
[   12.712341]  <TASK>
[   12.712358]  dump_stack_lvl+0x73/0xb0
[   12.712391]  print_report+0xd1/0x610
[   12.712413]  ? __virt_addr_valid+0x1db/0x2d0
[   12.712436]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.712458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.712480]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.712503]  kasan_report+0x141/0x180
[   12.712525]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.712553]  __asan_report_load1_noabort+0x18/0x20
[   12.712840]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.712884]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.712908]  ? finish_task_switch.isra.0+0x153/0x700
[   12.712978]  ? __switch_to+0x47/0xf50
[   12.713005]  ? __schedule+0x10cc/0x2b60
[   12.713028]  ? __pfx_read_tsc+0x10/0x10
[   12.713048]  ? ktime_get_ts64+0x86/0x230
[   12.713084]  kunit_try_run_case+0x1a5/0x480
[   12.713108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.713130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.713153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.713176]  ? __kthread_parkme+0x82/0x180
[   12.713196]  ? preempt_count_sub+0x50/0x80
[   12.713218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.713241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.713264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.713287]  kthread+0x337/0x6f0
[   12.713306]  ? trace_preempt_on+0x20/0xc0
[   12.713329]  ? __pfx_kthread+0x10/0x10
[   12.713349]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.713370]  ? calculate_sigpending+0x7b/0xa0
[   12.713393]  ? __pfx_kthread+0x10/0x10
[   12.713414]  ret_from_fork+0x116/0x1d0
[   12.713431]  ? __pfx_kthread+0x10/0x10
[   12.713451]  ret_from_fork_asm+0x1a/0x30
[   12.713482]  </TASK>
[   12.713491] 
[   12.728498] Allocated by task 211:
[   12.728698]  kasan_save_stack+0x45/0x70
[   12.729327]  kasan_save_track+0x18/0x40
[   12.729482]  kasan_save_alloc_info+0x3b/0x50
[   12.729821]  __kasan_kmalloc+0xb7/0xc0
[   12.730204]  __kmalloc_cache_noprof+0x189/0x420
[   12.730411]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.730626]  kunit_try_run_case+0x1a5/0x480
[   12.731276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.731502]  kthread+0x337/0x6f0
[   12.731835]  ret_from_fork+0x116/0x1d0
[   12.732177]  ret_from_fork_asm+0x1a/0x30
[   12.732374] 
[   12.732449] The buggy address belongs to the object at ffff888102f42100
[   12.732449]  which belongs to the cache kmalloc-128 of size 128
[   12.733240] The buggy address is located 5 bytes to the right of
[   12.733240]  allocated 115-byte region [ffff888102f42100, ffff888102f42173)
[   12.733916] 
[   12.734237] The buggy address belongs to the physical page:
[   12.734492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   12.735039] flags: 0x200000000000000(node=0|zone=2)
[   12.735392] page_type: f5(slab)
[   12.735631] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.736233] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.736644] page dumped because: kasan: bad access detected
[   12.737048] 
[   12.737147] Memory state around the buggy address:
[   12.737357]  ffff888102f42000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.737665]  ffff888102f42080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.738289] >ffff888102f42100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.738605]                                                                 ^
[   12.739123]  ffff888102f42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.739485]  ffff888102f42200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.739963] ==================================================================