Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.620538] ==================================================================
[   15.620595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.620651] Read of size 1 at addr fff00000c3f5617f by task kunit_try_catch/194
[   15.621142] 
[   15.621567] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.622192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.622348] Hardware name: linux,dummy-virt (DT)
[   15.622503] Call trace:
[   15.622531]  show_stack+0x20/0x38 (C)
[   15.622718]  dump_stack_lvl+0x8c/0xd0
[   15.623019]  print_report+0x118/0x5d0
[   15.623096]  kasan_report+0xdc/0x128
[   15.623386]  __asan_report_load1_noabort+0x20/0x30
[   15.623487]  ksize_unpoisons_memory+0x690/0x740
[   15.623732]  kunit_try_run_case+0x170/0x3f0
[   15.623821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.624011]  kthread+0x328/0x630
[   15.624257]  ret_from_fork+0x10/0x20
[   15.624517] 
[   15.624617] Allocated by task 194:
[   15.624654]  kasan_save_stack+0x3c/0x68
[   15.624938]  kasan_save_track+0x20/0x40
[   15.625138]  kasan_save_alloc_info+0x40/0x58
[   15.625359]  __kasan_kmalloc+0xd4/0xd8
[   15.625588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.625656]  ksize_unpoisons_memory+0xc0/0x740
[   15.625700]  kunit_try_run_case+0x170/0x3f0
[   15.625740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.626074]  kthread+0x328/0x630
[   15.626210]  ret_from_fork+0x10/0x20
[   15.626257] 
[   15.626303] The buggy address belongs to the object at fff00000c3f56100
[   15.626303]  which belongs to the cache kmalloc-128 of size 128
[   15.626386] The buggy address is located 12 bytes to the right of
[   15.626386]  allocated 115-byte region [fff00000c3f56100, fff00000c3f56173)
[   15.626468] 
[   15.626499] The buggy address belongs to the physical page:
[   15.626539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.626619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.626680] page_type: f5(slab)
[   15.626746] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.626802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.626843] page dumped because: kasan: bad access detected
[   15.626876] 
[   15.626896] Memory state around the buggy address:
[   15.626951]  fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.627022]  fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.627067] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.627108]                                                                 ^
[   15.627153]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.627199]  fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.627240] ==================================================================
[   15.611712] ==================================================================
[   15.612086] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.612160] Read of size 1 at addr fff00000c3f56178 by task kunit_try_catch/194
[   15.612217] 
[   15.612436] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.612606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.612652] Hardware name: linux,dummy-virt (DT)
[   15.612703] Call trace:
[   15.612729]  show_stack+0x20/0x38 (C)
[   15.612782]  dump_stack_lvl+0x8c/0xd0
[   15.613130]  print_report+0x118/0x5d0
[   15.613278]  kasan_report+0xdc/0x128
[   15.613380]  __asan_report_load1_noabort+0x20/0x30
[   15.613481]  ksize_unpoisons_memory+0x618/0x740
[   15.613636]  kunit_try_run_case+0x170/0x3f0
[   15.613866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.614091]  kthread+0x328/0x630
[   15.614231]  ret_from_fork+0x10/0x20
[   15.614449] 
[   15.614511] Allocated by task 194:
[   15.614581]  kasan_save_stack+0x3c/0x68
[   15.614717]  kasan_save_track+0x20/0x40
[   15.614891]  kasan_save_alloc_info+0x40/0x58
[   15.614997]  __kasan_kmalloc+0xd4/0xd8
[   15.615300]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.615431]  ksize_unpoisons_memory+0xc0/0x740
[   15.615542]  kunit_try_run_case+0x170/0x3f0
[   15.615990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.616066]  kthread+0x328/0x630
[   15.616165]  ret_from_fork+0x10/0x20
[   15.616253] 
[   15.616308] The buggy address belongs to the object at fff00000c3f56100
[   15.616308]  which belongs to the cache kmalloc-128 of size 128
[   15.616493] The buggy address is located 5 bytes to the right of
[   15.616493]  allocated 115-byte region [fff00000c3f56100, fff00000c3f56173)
[   15.616581] 
[   15.616611] The buggy address belongs to the physical page:
[   15.616851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.617058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.617209] page_type: f5(slab)
[   15.617290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.617444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.617489] page dumped because: kasan: bad access detected
[   15.617523] 
[   15.617541] Memory state around the buggy address:
[   15.617959]  fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.618175]  fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618266] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.618404]                                                                 ^
[   15.618479]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618533]  fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618794] ==================================================================
[   15.604173] ==================================================================
[   15.604238] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.604295] Read of size 1 at addr fff00000c3f56173 by task kunit_try_catch/194
[   15.604370] 
[   15.604403] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.604485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.604511] Hardware name: linux,dummy-virt (DT)
[   15.604543] Call trace:
[   15.604573]  show_stack+0x20/0x38 (C)
[   15.604626]  dump_stack_lvl+0x8c/0xd0
[   15.604674]  print_report+0x118/0x5d0
[   15.604722]  kasan_report+0xdc/0x128
[   15.604769]  __asan_report_load1_noabort+0x20/0x30
[   15.604834]  ksize_unpoisons_memory+0x628/0x740
[   15.604885]  kunit_try_run_case+0x170/0x3f0
[   15.604941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.605005]  kthread+0x328/0x630
[   15.605049]  ret_from_fork+0x10/0x20
[   15.605097] 
[   15.605114] Allocated by task 194:
[   15.605143]  kasan_save_stack+0x3c/0x68
[   15.605192]  kasan_save_track+0x20/0x40
[   15.605230]  kasan_save_alloc_info+0x40/0x58
[   15.605271]  __kasan_kmalloc+0xd4/0xd8
[   15.605619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.605881]  ksize_unpoisons_memory+0xc0/0x740
[   15.606276]  kunit_try_run_case+0x170/0x3f0
[   15.606755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.606854]  kthread+0x328/0x630
[   15.606907]  ret_from_fork+0x10/0x20
[   15.607022] 
[   15.607103] The buggy address belongs to the object at fff00000c3f56100
[   15.607103]  which belongs to the cache kmalloc-128 of size 128
[   15.607571] The buggy address is located 0 bytes to the right of
[   15.607571]  allocated 115-byte region [fff00000c3f56100, fff00000c3f56173)
[   15.607694] 
[   15.607745] The buggy address belongs to the physical page:
[   15.607861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.607958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.608132] page_type: f5(slab)
[   15.608212] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.608606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.608847] page dumped because: kasan: bad access detected
[   15.608920] 
[   15.609053] Memory state around the buggy address:
[   15.609124]  fff00000c3f56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.609224]  fff00000c3f56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609467] >fff00000c3f56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.609643]                                                              ^
[   15.609819]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609900]  fff00000c3f56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.610054] ==================================================================

[   12.579870] ==================================================================
[   12.581424] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.581912] Read of size 1 at addr ffff8881029ce373 by task kunit_try_catch/213
[   12.582388] 
[   12.582481] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.582525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.582536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.582555] Call Trace:
[   12.582567]  <TASK>
[   12.582581]  dump_stack_lvl+0x73/0xb0
[   12.582611]  print_report+0xd1/0x610
[   12.582632]  ? __virt_addr_valid+0x1db/0x2d0
[   12.582654]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.582677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.582698]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.582721]  kasan_report+0x141/0x180
[   12.582742]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.582770]  __asan_report_load1_noabort+0x18/0x20
[   12.582794]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.582817]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.582839]  ? finish_task_switch.isra.0+0x153/0x700
[   12.582861]  ? __switch_to+0x47/0xf50
[   12.582886]  ? __schedule+0x10cc/0x2b60
[   12.582908]  ? __pfx_read_tsc+0x10/0x10
[   12.582927]  ? ktime_get_ts64+0x86/0x230
[   12.582950]  kunit_try_run_case+0x1a5/0x480
[   12.582974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.582996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.583031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.583055]  ? __kthread_parkme+0x82/0x180
[   12.583076]  ? preempt_count_sub+0x50/0x80
[   12.583099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.583121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.583144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.583168]  kthread+0x337/0x6f0
[   12.583187]  ? trace_preempt_on+0x20/0xc0
[   12.583210]  ? __pfx_kthread+0x10/0x10
[   12.583229]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.583250]  ? calculate_sigpending+0x7b/0xa0
[   12.583273]  ? __pfx_kthread+0x10/0x10
[   12.583308]  ret_from_fork+0x116/0x1d0
[   12.583326]  ? __pfx_kthread+0x10/0x10
[   12.583345]  ret_from_fork_asm+0x1a/0x30
[   12.583375]  </TASK>
[   12.583385] 
[   12.598582] Allocated by task 213:
[   12.598725]  kasan_save_stack+0x45/0x70
[   12.598880]  kasan_save_track+0x18/0x40
[   12.599077]  kasan_save_alloc_info+0x3b/0x50
[   12.599471]  __kasan_kmalloc+0xb7/0xc0
[   12.599860]  __kmalloc_cache_noprof+0x189/0x420
[   12.600365]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.600821]  kunit_try_run_case+0x1a5/0x480
[   12.601273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.601785]  kthread+0x337/0x6f0
[   12.602079]  ret_from_fork+0x116/0x1d0
[   12.602345]  ret_from_fork_asm+0x1a/0x30
[   12.602720] 
[   12.603089] The buggy address belongs to the object at ffff8881029ce300
[   12.603089]  which belongs to the cache kmalloc-128 of size 128
[   12.604310] The buggy address is located 0 bytes to the right of
[   12.604310]  allocated 115-byte region [ffff8881029ce300, ffff8881029ce373)
[   12.605088] 
[   12.605252] The buggy address belongs to the physical page:
[   12.605747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.606628] flags: 0x200000000000000(node=0|zone=2)
[   12.606805] page_type: f5(slab)
[   12.606928] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.607535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.608242] page dumped because: kasan: bad access detected
[   12.608781] 
[   12.609010] Memory state around the buggy address:
[   12.609554]  ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.609988]  ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.610793] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.611334]                                                              ^
[   12.611657]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.612302]  ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.612913] ==================================================================
[   12.613590] ==================================================================
[   12.614459] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615138] Read of size 1 at addr ffff8881029ce378 by task kunit_try_catch/213
[   12.615608] 
[   12.615789] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.615831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.615842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.615861] Call Trace:
[   12.615872]  <TASK>
[   12.615886]  dump_stack_lvl+0x73/0xb0
[   12.615915]  print_report+0xd1/0x610
[   12.615936]  ? __virt_addr_valid+0x1db/0x2d0
[   12.615957]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.616002]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.616025]  kasan_report+0x141/0x180
[   12.616046]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.616074]  __asan_report_load1_noabort+0x18/0x20
[   12.616098]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.616121]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.616143]  ? finish_task_switch.isra.0+0x153/0x700
[   12.616186]  ? __switch_to+0x47/0xf50
[   12.616211]  ? __schedule+0x10cc/0x2b60
[   12.616241]  ? __pfx_read_tsc+0x10/0x10
[   12.616260]  ? ktime_get_ts64+0x86/0x230
[   12.616293]  kunit_try_run_case+0x1a5/0x480
[   12.616317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.616338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.616362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.616385]  ? __kthread_parkme+0x82/0x180
[   12.616405]  ? preempt_count_sub+0x50/0x80
[   12.616427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.616450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.616475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.616498]  kthread+0x337/0x6f0
[   12.616517]  ? trace_preempt_on+0x20/0xc0
[   12.616540]  ? __pfx_kthread+0x10/0x10
[   12.616559]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.616580]  ? calculate_sigpending+0x7b/0xa0
[   12.616604]  ? __pfx_kthread+0x10/0x10
[   12.616633]  ret_from_fork+0x116/0x1d0
[   12.616650]  ? __pfx_kthread+0x10/0x10
[   12.616670]  ret_from_fork_asm+0x1a/0x30
[   12.616700]  </TASK>
[   12.616709] 
[   12.631267] Allocated by task 213:
[   12.631412]  kasan_save_stack+0x45/0x70
[   12.631595]  kasan_save_track+0x18/0x40
[   12.631969]  kasan_save_alloc_info+0x3b/0x50
[   12.632524]  __kasan_kmalloc+0xb7/0xc0
[   12.632883]  __kmalloc_cache_noprof+0x189/0x420
[   12.633389]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.633585]  kunit_try_run_case+0x1a5/0x480
[   12.633991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.634560]  kthread+0x337/0x6f0
[   12.634852]  ret_from_fork+0x116/0x1d0
[   12.635271]  ret_from_fork_asm+0x1a/0x30
[   12.635603] 
[   12.635770] The buggy address belongs to the object at ffff8881029ce300
[   12.635770]  which belongs to the cache kmalloc-128 of size 128
[   12.636787] The buggy address is located 5 bytes to the right of
[   12.636787]  allocated 115-byte region [ffff8881029ce300, ffff8881029ce373)
[   12.637779] 
[   12.637856] The buggy address belongs to the physical page:
[   12.638081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.638930] flags: 0x200000000000000(node=0|zone=2)
[   12.639476] page_type: f5(slab)
[   12.639792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.640404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.641044] page dumped because: kasan: bad access detected
[   12.641533] 
[   12.641719] Memory state around the buggy address:
[   12.642010]  ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.642231]  ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.642639] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.643343]                                                                 ^
[   12.643843]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.644119]  ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.644815] ==================================================================
[   12.645976] ==================================================================
[   12.646535] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.646775] Read of size 1 at addr ffff8881029ce37f by task kunit_try_catch/213
[   12.646998] 
[   12.647270] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.647325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.647345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.647365] Call Trace:
[   12.647378]  <TASK>
[   12.647391]  dump_stack_lvl+0x73/0xb0
[   12.647431]  print_report+0xd1/0x610
[   12.647452]  ? __virt_addr_valid+0x1db/0x2d0
[   12.647474]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.647496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.647518]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.647541]  kasan_report+0x141/0x180
[   12.647562]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.647591]  __asan_report_load1_noabort+0x18/0x20
[   12.647615]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.647638]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.647660]  ? finish_task_switch.isra.0+0x153/0x700
[   12.647682]  ? __switch_to+0x47/0xf50
[   12.647706]  ? __schedule+0x10cc/0x2b60
[   12.647727]  ? __pfx_read_tsc+0x10/0x10
[   12.647746]  ? ktime_get_ts64+0x86/0x230
[   12.647769]  kunit_try_run_case+0x1a5/0x480
[   12.647792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.647813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.647836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.647858]  ? __kthread_parkme+0x82/0x180
[   12.647878]  ? preempt_count_sub+0x50/0x80
[   12.647900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.647923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.647946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.647969]  kthread+0x337/0x6f0
[   12.647989]  ? trace_preempt_on+0x20/0xc0
[   12.648010]  ? __pfx_kthread+0x10/0x10
[   12.648078]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.648113]  ? calculate_sigpending+0x7b/0xa0
[   12.648136]  ? __pfx_kthread+0x10/0x10
[   12.648156]  ret_from_fork+0x116/0x1d0
[   12.648174]  ? __pfx_kthread+0x10/0x10
[   12.648194]  ret_from_fork_asm+0x1a/0x30
[   12.648223]  </TASK>
[   12.648232] 
[   12.663901] Allocated by task 213:
[   12.664054]  kasan_save_stack+0x45/0x70
[   12.664204]  kasan_save_track+0x18/0x40
[   12.664481]  kasan_save_alloc_info+0x3b/0x50
[   12.664862]  __kasan_kmalloc+0xb7/0xc0
[   12.665454]  __kmalloc_cache_noprof+0x189/0x420
[   12.665895]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.666407]  kunit_try_run_case+0x1a5/0x480
[   12.666814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.667329]  kthread+0x337/0x6f0
[   12.667679]  ret_from_fork+0x116/0x1d0
[   12.668034]  ret_from_fork_asm+0x1a/0x30
[   12.668467] 
[   12.668665] The buggy address belongs to the object at ffff8881029ce300
[   12.668665]  which belongs to the cache kmalloc-128 of size 128
[   12.669196] The buggy address is located 12 bytes to the right of
[   12.669196]  allocated 115-byte region [ffff8881029ce300, ffff8881029ce373)
[   12.670468] 
[   12.670634] The buggy address belongs to the physical page:
[   12.671181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.671691] flags: 0x200000000000000(node=0|zone=2)
[   12.671857] page_type: f5(slab)
[   12.671976] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.672721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.673613] page dumped because: kasan: bad access detected
[   12.674000] 
[   12.674169] Memory state around the buggy address:
[   12.674551]  ffff8881029ce200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.674775]  ffff8881029ce280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.674990] >ffff8881029ce300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.675812]                                                                 ^
[   12.676483]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.677296]  ffff8881029ce400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.677930] ==================================================================