Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.829881] ==================================================================
[   15.829932] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.829984] Read of size 1 at addr fff00000c592ce78 by task kunit_try_catch/195
[   15.830033] 
[   15.830064] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.831526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.831573] Hardware name: linux,dummy-virt (DT)
[   15.831870] Call trace:
[   15.832007]  show_stack+0x20/0x38 (C)
[   15.832061]  dump_stack_lvl+0x8c/0xd0
[   15.832384]  print_report+0x118/0x5d0
[   15.832540]  kasan_report+0xdc/0x128
[   15.832588]  __asan_report_load1_noabort+0x20/0x30
[   15.832864]  ksize_unpoisons_memory+0x618/0x740
[   15.833200]  kunit_try_run_case+0x170/0x3f0
[   15.833547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.833833]  kthread+0x328/0x630
[   15.834077]  ret_from_fork+0x10/0x20
[   15.834131] 
[   15.834270] Allocated by task 195:
[   15.834343]  kasan_save_stack+0x3c/0x68
[   15.834721]  kasan_save_track+0x20/0x40
[   15.834763]  kasan_save_alloc_info+0x40/0x58
[   15.834915]  __kasan_kmalloc+0xd4/0xd8
[   15.835134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.835494]  ksize_unpoisons_memory+0xc0/0x740
[   15.835541]  kunit_try_run_case+0x170/0x3f0
[   15.835776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.835826]  kthread+0x328/0x630
[   15.836253]  ret_from_fork+0x10/0x20
[   15.836370] 
[   15.836389] The buggy address belongs to the object at fff00000c592ce00
[   15.836389]  which belongs to the cache kmalloc-128 of size 128
[   15.836948] The buggy address is located 5 bytes to the right of
[   15.836948]  allocated 115-byte region [fff00000c592ce00, fff00000c592ce73)
[   15.837220] 
[   15.837244] The buggy address belongs to the physical page:
[   15.837419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c
[   15.837512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.837914] page_type: f5(slab)
[   15.838325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.838624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.838896] page dumped because: kasan: bad access detected
[   15.839273] 
[   15.839360] Memory state around the buggy address:
[   15.839815]  fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.839989]  fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840239] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.840283]                                                                 ^
[   15.840326]  fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840370]  fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840410] ==================================================================
[   15.816405] ==================================================================
[   15.816479] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.816537] Read of size 1 at addr fff00000c592ce73 by task kunit_try_catch/195
[   15.816589] 
[   15.816624] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.816706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.818730] Hardware name: linux,dummy-virt (DT)
[   15.818784] Call trace:
[   15.818853]  show_stack+0x20/0x38 (C)
[   15.818911]  dump_stack_lvl+0x8c/0xd0
[   15.818961]  print_report+0x118/0x5d0
[   15.819008]  kasan_report+0xdc/0x128
[   15.819053]  __asan_report_load1_noabort+0x20/0x30
[   15.819104]  ksize_unpoisons_memory+0x628/0x740
[   15.819152]  kunit_try_run_case+0x170/0x3f0
[   15.819297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.819683]  kthread+0x328/0x630
[   15.819968]  ret_from_fork+0x10/0x20
[   15.820023] 
[   15.820042] Allocated by task 195:
[   15.820455]  kasan_save_stack+0x3c/0x68
[   15.820554]  kasan_save_track+0x20/0x40
[   15.820812]  kasan_save_alloc_info+0x40/0x58
[   15.820910]  __kasan_kmalloc+0xd4/0xd8
[   15.821275]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.821618]  ksize_unpoisons_memory+0xc0/0x740
[   15.821944]  kunit_try_run_case+0x170/0x3f0
[   15.822398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.822551]  kthread+0x328/0x630
[   15.822954]  ret_from_fork+0x10/0x20
[   15.823431] 
[   15.823510] The buggy address belongs to the object at fff00000c592ce00
[   15.823510]  which belongs to the cache kmalloc-128 of size 128
[   15.823572] The buggy address is located 0 bytes to the right of
[   15.823572]  allocated 115-byte region [fff00000c592ce00, fff00000c592ce73)
[   15.823646] 
[   15.823993] The buggy address belongs to the physical page:
[   15.824208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c
[   15.824839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.824944] page_type: f5(slab)
[   15.825515] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.825647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.825899] page dumped because: kasan: bad access detected
[   15.826072] 
[   15.826089] Memory state around the buggy address:
[   15.826518]  fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.826685]  fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826969] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.827212]                                                              ^
[   15.827413]  fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.827640]  fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.827882] ==================================================================
[   15.841903] ==================================================================
[   15.841956] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.842009] Read of size 1 at addr fff00000c592ce7f by task kunit_try_catch/195
[   15.842060] 
[   15.843241] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.843382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.843410] Hardware name: linux,dummy-virt (DT)
[   15.843900] Call trace:
[   15.843937]  show_stack+0x20/0x38 (C)
[   15.844166]  dump_stack_lvl+0x8c/0xd0
[   15.844391]  print_report+0x118/0x5d0
[   15.844613]  kasan_report+0xdc/0x128
[   15.845031]  __asan_report_load1_noabort+0x20/0x30
[   15.845399]  ksize_unpoisons_memory+0x690/0x740
[   15.845656]  kunit_try_run_case+0x170/0x3f0
[   15.845818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.845874]  kthread+0x328/0x630
[   15.846252]  ret_from_fork+0x10/0x20
[   15.846680] 
[   15.846785] Allocated by task 195:
[   15.846820]  kasan_save_stack+0x3c/0x68
[   15.847327]  kasan_save_track+0x20/0x40
[   15.847897]  kasan_save_alloc_info+0x40/0x58
[   15.848004]  __kasan_kmalloc+0xd4/0xd8
[   15.848333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.848388]  ksize_unpoisons_memory+0xc0/0x740
[   15.848751]  kunit_try_run_case+0x170/0x3f0
[   15.848795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.848838]  kthread+0x328/0x630
[   15.848869]  ret_from_fork+0x10/0x20
[   15.848905] 
[   15.848925] The buggy address belongs to the object at fff00000c592ce00
[   15.848925]  which belongs to the cache kmalloc-128 of size 128
[   15.848993] The buggy address is located 12 bytes to the right of
[   15.848993]  allocated 115-byte region [fff00000c592ce00, fff00000c592ce73)
[   15.849699] 
[   15.849723] The buggy address belongs to the physical page:
[   15.849767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c
[   15.850003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.850054] page_type: f5(slab)
[   15.850386] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.850462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.850540] page dumped because: kasan: bad access detected
[   15.850584] 
[   15.850663] Memory state around the buggy address:
[   15.850696]  fff00000c592cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.850743]  fff00000c592cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.850788] >fff00000c592ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.850827]                                                                 ^
[   15.851383]  fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.851946]  fff00000c592cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.851991] ==================================================================

[   12.998970] ==================================================================
[   12.999957] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.000739] Read of size 1 at addr ffff888102afc47f by task kunit_try_catch/211
[   13.001439] 
[   13.001729] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.001785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.001797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.001816] Call Trace:
[   13.001843]  <TASK>
[   13.001859]  dump_stack_lvl+0x73/0xb0
[   13.001889]  print_report+0xd1/0x610
[   13.001923]  ? __virt_addr_valid+0x1db/0x2d0
[   13.001946]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.001970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.001994]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.002018]  kasan_report+0x141/0x180
[   13.002039]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.002068]  __asan_report_load1_noabort+0x18/0x20
[   13.002092]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.002117]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.002140]  ? finish_task_switch.isra.0+0x153/0x700
[   13.002162]  ? __switch_to+0x47/0xf50
[   13.002187]  ? __schedule+0x10cc/0x2b60
[   13.002210]  ? __pfx_read_tsc+0x10/0x10
[   13.002231]  ? ktime_get_ts64+0x86/0x230
[   13.002256]  kunit_try_run_case+0x1a5/0x480
[   13.002280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.002303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.002344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.002368]  ? __kthread_parkme+0x82/0x180
[   13.002395]  ? preempt_count_sub+0x50/0x80
[   13.002418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.002511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.002538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.002563]  kthread+0x337/0x6f0
[   13.002583]  ? trace_preempt_on+0x20/0xc0
[   13.002606]  ? __pfx_kthread+0x10/0x10
[   13.002626]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.002648]  ? calculate_sigpending+0x7b/0xa0
[   13.002672]  ? __pfx_kthread+0x10/0x10
[   13.002693]  ret_from_fork+0x116/0x1d0
[   13.002711]  ? __pfx_kthread+0x10/0x10
[   13.002732]  ret_from_fork_asm+0x1a/0x30
[   13.002776]  </TASK>
[   13.002786] 
[   13.015570] Allocated by task 211:
[   13.016055]  kasan_save_stack+0x45/0x70
[   13.016548]  kasan_save_track+0x18/0x40
[   13.016933]  kasan_save_alloc_info+0x3b/0x50
[   13.017270]  __kasan_kmalloc+0xb7/0xc0
[   13.017618]  __kmalloc_cache_noprof+0x189/0x420
[   13.018121]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.018568]  kunit_try_run_case+0x1a5/0x480
[   13.018922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.019105]  kthread+0x337/0x6f0
[   13.019228]  ret_from_fork+0x116/0x1d0
[   13.019576]  ret_from_fork_asm+0x1a/0x30
[   13.020099] 
[   13.020260] The buggy address belongs to the object at ffff888102afc400
[   13.020260]  which belongs to the cache kmalloc-128 of size 128
[   13.021635] The buggy address is located 12 bytes to the right of
[   13.021635]  allocated 115-byte region [ffff888102afc400, ffff888102afc473)
[   13.022767] 
[   13.022954] The buggy address belongs to the physical page:
[   13.023292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   13.023965] flags: 0x200000000000000(node=0|zone=2)
[   13.024136] page_type: f5(slab)
[   13.024258] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.024970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.025769] page dumped because: kasan: bad access detected
[   13.026435] 
[   13.026639] Memory state around the buggy address:
[   13.027110]  ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.027529]  ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.027750] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.027978]                                                                 ^
[   13.028191]  ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.028556]  ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.028862] ==================================================================
[   12.964941] ==================================================================
[   12.965242] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.966674] Read of size 1 at addr ffff888102afc478 by task kunit_try_catch/211
[   12.967452] 
[   12.967886] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.967933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.967958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.967978] Call Trace:
[   12.967993]  <TASK>
[   12.968036]  dump_stack_lvl+0x73/0xb0
[   12.968069]  print_report+0xd1/0x610
[   12.968091]  ? __virt_addr_valid+0x1db/0x2d0
[   12.968113]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.968137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.968160]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.968184]  kasan_report+0x141/0x180
[   12.968206]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.968234]  __asan_report_load1_noabort+0x18/0x20
[   12.968259]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.968284]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.968307]  ? finish_task_switch.isra.0+0x153/0x700
[   12.968518]  ? __switch_to+0x47/0xf50
[   12.968551]  ? __schedule+0x10cc/0x2b60
[   12.968574]  ? __pfx_read_tsc+0x10/0x10
[   12.968595]  ? ktime_get_ts64+0x86/0x230
[   12.968618]  kunit_try_run_case+0x1a5/0x480
[   12.968643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.968666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.968690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.968714]  ? __kthread_parkme+0x82/0x180
[   12.968733]  ? preempt_count_sub+0x50/0x80
[   12.968771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.968796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.968821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.968847]  kthread+0x337/0x6f0
[   12.968866]  ? trace_preempt_on+0x20/0xc0
[   12.968889]  ? __pfx_kthread+0x10/0x10
[   12.968909]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.968931]  ? calculate_sigpending+0x7b/0xa0
[   12.968955]  ? __pfx_kthread+0x10/0x10
[   12.968976]  ret_from_fork+0x116/0x1d0
[   12.968994]  ? __pfx_kthread+0x10/0x10
[   12.969015]  ret_from_fork_asm+0x1a/0x30
[   12.969045]  </TASK>
[   12.969054] 
[   12.983637] Allocated by task 211:
[   12.984140]  kasan_save_stack+0x45/0x70
[   12.984630]  kasan_save_track+0x18/0x40
[   12.985035]  kasan_save_alloc_info+0x3b/0x50
[   12.985606]  __kasan_kmalloc+0xb7/0xc0
[   12.985751]  __kmalloc_cache_noprof+0x189/0x420
[   12.985924]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.986078]  kunit_try_run_case+0x1a5/0x480
[   12.986225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.986726]  kthread+0x337/0x6f0
[   12.987088]  ret_from_fork+0x116/0x1d0
[   12.987593]  ret_from_fork_asm+0x1a/0x30
[   12.988094] 
[   12.988254] The buggy address belongs to the object at ffff888102afc400
[   12.988254]  which belongs to the cache kmalloc-128 of size 128
[   12.989676] The buggy address is located 5 bytes to the right of
[   12.989676]  allocated 115-byte region [ffff888102afc400, ffff888102afc473)
[   12.990983] 
[   12.991188] The buggy address belongs to the physical page:
[   12.991560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   12.992163] flags: 0x200000000000000(node=0|zone=2)
[   12.992404] page_type: f5(slab)
[   12.992784] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.993466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.994367] page dumped because: kasan: bad access detected
[   12.994611] 
[   12.994682] Memory state around the buggy address:
[   12.994850]  ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.995068]  ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.995288] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.995839]                                                                 ^
[   12.996482]  ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.997273]  ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.998096] ==================================================================
[   12.943176] ==================================================================
[   12.943565] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.943858] Read of size 1 at addr ffff888102afc473 by task kunit_try_catch/211
[   12.944416] 
[   12.944643] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.944689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.944701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.944721] Call Trace:
[   12.944731]  <TASK>
[   12.944747]  dump_stack_lvl+0x73/0xb0
[   12.944788]  print_report+0xd1/0x610
[   12.944810]  ? __virt_addr_valid+0x1db/0x2d0
[   12.944833]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.944856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.944880]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.944905]  kasan_report+0x141/0x180
[   12.944926]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.944955]  __asan_report_load1_noabort+0x18/0x20
[   12.944980]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.945005]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.945028]  ? finish_task_switch.isra.0+0x153/0x700
[   12.945051]  ? __switch_to+0x47/0xf50
[   12.945078]  ? __schedule+0x10cc/0x2b60
[   12.945099]  ? __pfx_read_tsc+0x10/0x10
[   12.945119]  ? ktime_get_ts64+0x86/0x230
[   12.945143]  kunit_try_run_case+0x1a5/0x480
[   12.945169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.945191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.945215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.945239]  ? __kthread_parkme+0x82/0x180
[   12.945260]  ? preempt_count_sub+0x50/0x80
[   12.945282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.945307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.945338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.945363]  kthread+0x337/0x6f0
[   12.945382]  ? trace_preempt_on+0x20/0xc0
[   12.945406]  ? __pfx_kthread+0x10/0x10
[   12.945426]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.945448]  ? calculate_sigpending+0x7b/0xa0
[   12.945472]  ? __pfx_kthread+0x10/0x10
[   12.945493]  ret_from_fork+0x116/0x1d0
[   12.945511]  ? __pfx_kthread+0x10/0x10
[   12.945531]  ret_from_fork_asm+0x1a/0x30
[   12.945562]  </TASK>
[   12.945572] 
[   12.953706] Allocated by task 211:
[   12.953904]  kasan_save_stack+0x45/0x70
[   12.954108]  kasan_save_track+0x18/0x40
[   12.954299]  kasan_save_alloc_info+0x3b/0x50
[   12.954586]  __kasan_kmalloc+0xb7/0xc0
[   12.954771]  __kmalloc_cache_noprof+0x189/0x420
[   12.954967]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.955163]  kunit_try_run_case+0x1a5/0x480
[   12.955450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.955704]  kthread+0x337/0x6f0
[   12.955880]  ret_from_fork+0x116/0x1d0
[   12.956056]  ret_from_fork_asm+0x1a/0x30
[   12.956225] 
[   12.956501] The buggy address belongs to the object at ffff888102afc400
[   12.956501]  which belongs to the cache kmalloc-128 of size 128
[   12.957030] The buggy address is located 0 bytes to the right of
[   12.957030]  allocated 115-byte region [ffff888102afc400, ffff888102afc473)
[   12.957619] 
[   12.957717] The buggy address belongs to the physical page:
[   12.957976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   12.958249] flags: 0x200000000000000(node=0|zone=2)
[   12.958578] page_type: f5(slab)
[   12.958742] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.959068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.959407] page dumped because: kasan: bad access detected
[   12.959653] 
[   12.959751] Memory state around the buggy address:
[   12.959934]  ffff888102afc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.960152]  ffff888102afc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.960534] >ffff888102afc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.960887]                                                              ^
[   12.961193]  ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.961619]  ffff888102afc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.961961] ==================================================================