Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.545070] ==================================================================
[   15.545363] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.545497] Read of size 1 at addr fff00000c6e6507f by task kunit_try_catch/195
[   15.545559] 
[   15.545588] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.545923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.545955] Hardware name: linux,dummy-virt (DT)
[   15.546274] Call trace:
[   15.546475]  show_stack+0x20/0x38 (C)
[   15.547623]  dump_stack_lvl+0x8c/0xd0
[   15.547686]  print_report+0x118/0x5d0
[   15.548031]  kasan_report+0xdc/0x128
[   15.548158]  __asan_report_load1_noabort+0x20/0x30
[   15.548209]  ksize_unpoisons_memory+0x690/0x740
[   15.548586]  kunit_try_run_case+0x170/0x3f0
[   15.548771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.548896]  kthread+0x328/0x630
[   15.548939]  ret_from_fork+0x10/0x20
[   15.548989] 
[   15.549027] Allocated by task 195:
[   15.549133]  kasan_save_stack+0x3c/0x68
[   15.549174]  kasan_save_track+0x20/0x40
[   15.549212]  kasan_save_alloc_info+0x40/0x58
[   15.549251]  __kasan_kmalloc+0xd4/0xd8
[   15.549289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.549327]  ksize_unpoisons_memory+0xc0/0x740
[   15.549406]  kunit_try_run_case+0x170/0x3f0
[   15.549614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.550132]  kthread+0x328/0x630
[   15.550205]  ret_from_fork+0x10/0x20
[   15.550245] 
[   15.550264] The buggy address belongs to the object at fff00000c6e65000
[   15.550264]  which belongs to the cache kmalloc-128 of size 128
[   15.550322] The buggy address is located 12 bytes to the right of
[   15.550322]  allocated 115-byte region [fff00000c6e65000, fff00000c6e65073)
[   15.550703] 
[   15.550730] The buggy address belongs to the physical page:
[   15.550763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.550857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.550905] page_type: f5(slab)
[   15.550943] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.550994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.551043] page dumped because: kasan: bad access detected
[   15.551162] 
[   15.551180] Memory state around the buggy address:
[   15.551212]  fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.551257]  fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.551300] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.551668]                                                                 ^
[   15.551734]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553290]  fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553337] ==================================================================
[   15.534586] ==================================================================
[   15.534829] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.534884] Read of size 1 at addr fff00000c6e65078 by task kunit_try_catch/195
[   15.534931] 
[   15.534968] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.535048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.535085] Hardware name: linux,dummy-virt (DT)
[   15.535117] Call trace:
[   15.535139]  show_stack+0x20/0x38 (C)
[   15.535487]  dump_stack_lvl+0x8c/0xd0
[   15.536032]  print_report+0x118/0x5d0
[   15.536284]  kasan_report+0xdc/0x128
[   15.536344]  __asan_report_load1_noabort+0x20/0x30
[   15.536449]  ksize_unpoisons_memory+0x618/0x740
[   15.536497]  kunit_try_run_case+0x170/0x3f0
[   15.536557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.536609]  kthread+0x328/0x630
[   15.536651]  ret_from_fork+0x10/0x20
[   15.537516] 
[   15.537550] Allocated by task 195:
[   15.537580]  kasan_save_stack+0x3c/0x68
[   15.537670]  kasan_save_track+0x20/0x40
[   15.537709]  kasan_save_alloc_info+0x40/0x58
[   15.538171]  __kasan_kmalloc+0xd4/0xd8
[   15.538391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.538441]  ksize_unpoisons_memory+0xc0/0x740
[   15.538518]  kunit_try_run_case+0x170/0x3f0
[   15.538569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.539019]  kthread+0x328/0x630
[   15.539253]  ret_from_fork+0x10/0x20
[   15.539381] 
[   15.539420] The buggy address belongs to the object at fff00000c6e65000
[   15.539420]  which belongs to the cache kmalloc-128 of size 128
[   15.539481] The buggy address is located 5 bytes to the right of
[   15.539481]  allocated 115-byte region [fff00000c6e65000, fff00000c6e65073)
[   15.539565] 
[   15.539584] The buggy address belongs to the physical page:
[   15.539615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.540071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.540144] page_type: f5(slab)
[   15.540501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.540699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.540743] page dumped because: kasan: bad access detected
[   15.540792] 
[   15.540810] Memory state around the buggy address:
[   15.540842]  fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.541149]  fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.541251] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.541292]                                                                 ^
[   15.541334]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.541377]  fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543210] ==================================================================
[   15.524436] ==================================================================
[   15.524497] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.524562] Read of size 1 at addr fff00000c6e65073 by task kunit_try_catch/195
[   15.524614] 
[   15.524648] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.525125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525278] Hardware name: linux,dummy-virt (DT)
[   15.525328] Call trace:
[   15.526401]  show_stack+0x20/0x38 (C)
[   15.526790]  dump_stack_lvl+0x8c/0xd0
[   15.527184]  print_report+0x118/0x5d0
[   15.527800]  kasan_report+0xdc/0x128
[   15.527859]  __asan_report_load1_noabort+0x20/0x30
[   15.527941]  ksize_unpoisons_memory+0x628/0x740
[   15.528167]  kunit_try_run_case+0x170/0x3f0
[   15.528325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.528480]  kthread+0x328/0x630
[   15.528522]  ret_from_fork+0x10/0x20
[   15.528611] 
[   15.528630] Allocated by task 195:
[   15.528660]  kasan_save_stack+0x3c/0x68
[   15.528701]  kasan_save_track+0x20/0x40
[   15.528767]  kasan_save_alloc_info+0x40/0x58
[   15.529004]  __kasan_kmalloc+0xd4/0xd8
[   15.529082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.529186]  ksize_unpoisons_memory+0xc0/0x740
[   15.529262]  kunit_try_run_case+0x170/0x3f0
[   15.529300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.529378]  kthread+0x328/0x630
[   15.529411]  ret_from_fork+0x10/0x20
[   15.529492] 
[   15.530162] The buggy address belongs to the object at fff00000c6e65000
[   15.530162]  which belongs to the cache kmalloc-128 of size 128
[   15.530240] The buggy address is located 0 bytes to the right of
[   15.530240]  allocated 115-byte region [fff00000c6e65000, fff00000c6e65073)
[   15.530309] 
[   15.530332] The buggy address belongs to the physical page:
[   15.530363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.530421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.530563] page_type: f5(slab)
[   15.530632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.530681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.530722] page dumped because: kasan: bad access detected
[   15.530753] 
[   15.530771] Memory state around the buggy address:
[   15.531123]  fff00000c6e64f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531260]  fff00000c6e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531304] >fff00000c6e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.531380]                                                              ^
[   15.531421]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531691]  fff00000c6e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531751] ==================================================================

[   12.479634] ==================================================================
[   12.480002] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.480732] Read of size 1 at addr ffff888102f59878 by task kunit_try_catch/212
[   12.481093] 
[   12.481231] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.481275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.481286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.481309] Call Trace:
[   12.481322]  <TASK>
[   12.481338]  dump_stack_lvl+0x73/0xb0
[   12.481366]  print_report+0xd1/0x610
[   12.481387]  ? __virt_addr_valid+0x1db/0x2d0
[   12.481410]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.481432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.481454]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.481476]  kasan_report+0x141/0x180
[   12.481507]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.481534]  __asan_report_load1_noabort+0x18/0x20
[   12.481558]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.481581]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.481605]  ? __kasan_check_write+0x18/0x20
[   12.481623]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.481646]  ? irqentry_exit+0x2a/0x60
[   12.481667]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.481691]  ? trace_hardirqs_on+0x37/0xe0
[   12.481714]  ? __pfx_read_tsc+0x10/0x10
[   12.481733]  ? ktime_get_ts64+0x86/0x230
[   12.481757]  kunit_try_run_case+0x1a5/0x480
[   12.481781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.481805]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.481827]  ? __kthread_parkme+0x82/0x180
[   12.481847]  ? preempt_count_sub+0x50/0x80
[   12.481871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.481894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.481917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.481940]  kthread+0x337/0x6f0
[   12.481958]  ? trace_preempt_on+0x20/0xc0
[   12.481979]  ? __pfx_kthread+0x10/0x10
[   12.481999]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.482020]  ? calculate_sigpending+0x7b/0xa0
[   12.482079]  ? __pfx_kthread+0x10/0x10
[   12.482102]  ret_from_fork+0x116/0x1d0
[   12.482121]  ? __pfx_kthread+0x10/0x10
[   12.482140]  ret_from_fork_asm+0x1a/0x30
[   12.482170]  </TASK>
[   12.482180] 
[   12.490730] Allocated by task 212:
[   12.490922]  kasan_save_stack+0x45/0x70
[   12.491265]  kasan_save_track+0x18/0x40
[   12.491470]  kasan_save_alloc_info+0x3b/0x50
[   12.491672]  __kasan_kmalloc+0xb7/0xc0
[   12.491838]  __kmalloc_cache_noprof+0x189/0x420
[   12.492035]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.492282]  kunit_try_run_case+0x1a5/0x480
[   12.492506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.492712]  kthread+0x337/0x6f0
[   12.492835]  ret_from_fork+0x116/0x1d0
[   12.493021]  ret_from_fork_asm+0x1a/0x30
[   12.493344] 
[   12.493441] The buggy address belongs to the object at ffff888102f59800
[   12.493441]  which belongs to the cache kmalloc-128 of size 128
[   12.493880] The buggy address is located 5 bytes to the right of
[   12.493880]  allocated 115-byte region [ffff888102f59800, ffff888102f59873)
[   12.494686] 
[   12.494768] The buggy address belongs to the physical page:
[   12.494959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   12.495640] flags: 0x200000000000000(node=0|zone=2)
[   12.495870] page_type: f5(slab)
[   12.496011] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.496424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.496672] page dumped because: kasan: bad access detected
[   12.496842] 
[   12.496910] Memory state around the buggy address:
[   12.497074]  ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.497768]  ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.498082] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.498357]                                                                 ^
[   12.498582]  ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.498992]  ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.499712] ==================================================================
[   12.500206] ==================================================================
[   12.500526] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.500762] Read of size 1 at addr ffff888102f5987f by task kunit_try_catch/212
[   12.501405] 
[   12.501546] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.501593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.501603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.501624] Call Trace:
[   12.501641]  <TASK>
[   12.501658]  dump_stack_lvl+0x73/0xb0
[   12.501689]  print_report+0xd1/0x610
[   12.501710]  ? __virt_addr_valid+0x1db/0x2d0
[   12.501733]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.501755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.501777]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.501800]  kasan_report+0x141/0x180
[   12.501821]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.501849]  __asan_report_load1_noabort+0x18/0x20
[   12.501873]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.501897]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.501921]  ? __kasan_check_write+0x18/0x20
[   12.501939]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.501962]  ? irqentry_exit+0x2a/0x60
[   12.501983]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.502006]  ? trace_hardirqs_on+0x37/0xe0
[   12.502029]  ? __pfx_read_tsc+0x10/0x10
[   12.502104]  ? ktime_get_ts64+0x86/0x230
[   12.502128]  kunit_try_run_case+0x1a5/0x480
[   12.502152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.502175]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.502204]  ? __kthread_parkme+0x82/0x180
[   12.502224]  ? preempt_count_sub+0x50/0x80
[   12.502247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.502270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.502293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.502316]  kthread+0x337/0x6f0
[   12.502334]  ? trace_preempt_on+0x20/0xc0
[   12.502355]  ? __pfx_kthread+0x10/0x10
[   12.502374]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.502394]  ? calculate_sigpending+0x7b/0xa0
[   12.502419]  ? __pfx_kthread+0x10/0x10
[   12.502439]  ret_from_fork+0x116/0x1d0
[   12.502457]  ? __pfx_kthread+0x10/0x10
[   12.502476]  ret_from_fork_asm+0x1a/0x30
[   12.502519]  </TASK>
[   12.502528] 
[   12.510394] Allocated by task 212:
[   12.510590]  kasan_save_stack+0x45/0x70
[   12.510793]  kasan_save_track+0x18/0x40
[   12.510968]  kasan_save_alloc_info+0x3b/0x50
[   12.511225]  __kasan_kmalloc+0xb7/0xc0
[   12.511404]  __kmalloc_cache_noprof+0x189/0x420
[   12.511621]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.511800]  kunit_try_run_case+0x1a5/0x480
[   12.511947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.512122]  kthread+0x337/0x6f0
[   12.512242]  ret_from_fork+0x116/0x1d0
[   12.512374]  ret_from_fork_asm+0x1a/0x30
[   12.512522] 
[   12.512616] The buggy address belongs to the object at ffff888102f59800
[   12.512616]  which belongs to the cache kmalloc-128 of size 128
[   12.513330] The buggy address is located 12 bytes to the right of
[   12.513330]  allocated 115-byte region [ffff888102f59800, ffff888102f59873)
[   12.514586] 
[   12.514659] The buggy address belongs to the physical page:
[   12.514830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   12.515226] flags: 0x200000000000000(node=0|zone=2)
[   12.515475] page_type: f5(slab)
[   12.515656] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.515972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.516368] page dumped because: kasan: bad access detected
[   12.516596] 
[   12.516687] Memory state around the buggy address:
[   12.516896]  ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.517264]  ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.517565] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.517842]                                                                 ^
[   12.518147]  ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.518532]  ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.518814] ==================================================================
[   12.460770] ==================================================================
[   12.461317] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.461649] Read of size 1 at addr ffff888102f59873 by task kunit_try_catch/212
[   12.461947] 
[   12.462040] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.462086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.462097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.462118] Call Trace:
[   12.462130]  <TASK>
[   12.462147]  dump_stack_lvl+0x73/0xb0
[   12.462378]  print_report+0xd1/0x610
[   12.462400]  ? __virt_addr_valid+0x1db/0x2d0
[   12.462423]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.462445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.462467]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.462490]  kasan_report+0x141/0x180
[   12.462524]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.462551]  __asan_report_load1_noabort+0x18/0x20
[   12.462575]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.462598]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.462622]  ? __kasan_check_write+0x18/0x20
[   12.462640]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.462664]  ? irqentry_exit+0x2a/0x60
[   12.462685]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.462708]  ? trace_hardirqs_on+0x37/0xe0
[   12.462731]  ? __pfx_read_tsc+0x10/0x10
[   12.462751]  ? ktime_get_ts64+0x86/0x230
[   12.462775]  kunit_try_run_case+0x1a5/0x480
[   12.462800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.462823]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.462846]  ? __kthread_parkme+0x82/0x180
[   12.462866]  ? preempt_count_sub+0x50/0x80
[   12.462889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.462912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.462935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.462958]  kthread+0x337/0x6f0
[   12.462977]  ? trace_preempt_on+0x20/0xc0
[   12.462997]  ? __pfx_kthread+0x10/0x10
[   12.463017]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.463038]  ? calculate_sigpending+0x7b/0xa0
[   12.463206]  ? __pfx_kthread+0x10/0x10
[   12.463227]  ret_from_fork+0x116/0x1d0
[   12.463246]  ? __pfx_kthread+0x10/0x10
[   12.463265]  ret_from_fork_asm+0x1a/0x30
[   12.463295]  </TASK>
[   12.463306] 
[   12.471131] Allocated by task 212:
[   12.471327]  kasan_save_stack+0x45/0x70
[   12.471540]  kasan_save_track+0x18/0x40
[   12.471712]  kasan_save_alloc_info+0x3b/0x50
[   12.471908]  __kasan_kmalloc+0xb7/0xc0
[   12.472042]  __kmalloc_cache_noprof+0x189/0x420
[   12.472364]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.472564]  kunit_try_run_case+0x1a5/0x480
[   12.472753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.472960]  kthread+0x337/0x6f0
[   12.473127]  ret_from_fork+0x116/0x1d0
[   12.473297]  ret_from_fork_asm+0x1a/0x30
[   12.473438] 
[   12.473517] The buggy address belongs to the object at ffff888102f59800
[   12.473517]  which belongs to the cache kmalloc-128 of size 128
[   12.473965] The buggy address is located 0 bytes to the right of
[   12.473965]  allocated 115-byte region [ffff888102f59800, ffff888102f59873)
[   12.474640] 
[   12.474723] The buggy address belongs to the physical page:
[   12.474943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f59
[   12.475222] flags: 0x200000000000000(node=0|zone=2)
[   12.475564] page_type: f5(slab)
[   12.475693] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.475994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.476486] page dumped because: kasan: bad access detected
[   12.476725] 
[   12.476819] Memory state around the buggy address:
[   12.477007]  ffff888102f59700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.477710]  ffff888102f59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.478002] >ffff888102f59800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.478233]                                                              ^
[   12.478440]  ffff888102f59880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.478667]  ffff888102f59900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.478879] ==================================================================