Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.409395] ==================================================================
[   15.409444] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.409506] Read of size 1 at addr fff00000c6417b7f by task kunit_try_catch/194
[   15.409555] 
[   15.409584] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.409672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.409712] Hardware name: linux,dummy-virt (DT)
[   15.410074] Call trace:
[   15.410372]  show_stack+0x20/0x38 (C)
[   15.410461]  dump_stack_lvl+0x8c/0xd0
[   15.410514]  print_report+0x118/0x5d0
[   15.410712]  kasan_report+0xdc/0x128
[   15.410981]  __asan_report_load1_noabort+0x20/0x30
[   15.411052]  ksize_unpoisons_memory+0x690/0x740
[   15.411398]  kunit_try_run_case+0x170/0x3f0
[   15.411526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.411641]  kthread+0x328/0x630
[   15.411873]  ret_from_fork+0x10/0x20
[   15.412085] 
[   15.412152] Allocated by task 194:
[   15.412504]  kasan_save_stack+0x3c/0x68
[   15.412600]  kasan_save_track+0x20/0x40
[   15.412772]  kasan_save_alloc_info+0x40/0x58
[   15.412906]  __kasan_kmalloc+0xd4/0xd8
[   15.412976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.413039]  ksize_unpoisons_memory+0xc0/0x740
[   15.413368]  kunit_try_run_case+0x170/0x3f0
[   15.413664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.413752]  kthread+0x328/0x630
[   15.413852]  ret_from_fork+0x10/0x20
[   15.413932] 
[   15.414153] The buggy address belongs to the object at fff00000c6417b00
[   15.414153]  which belongs to the cache kmalloc-128 of size 128
[   15.414441] The buggy address is located 12 bytes to the right of
[   15.414441]  allocated 115-byte region [fff00000c6417b00, fff00000c6417b73)
[   15.414658] 
[   15.414711] The buggy address belongs to the physical page:
[   15.415108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   15.415184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.415341] page_type: f5(slab)
[   15.415390] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.415592] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.415682] page dumped because: kasan: bad access detected
[   15.416111] 
[   15.416200] Memory state around the buggy address:
[   15.416355]  fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.416462]  fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416583] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.416624]                                                                 ^
[   15.416701]  fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416747]  fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416935] ==================================================================
[   15.390360] ==================================================================
[   15.390519] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.390622] Read of size 1 at addr fff00000c6417b73 by task kunit_try_catch/194
[   15.391071] 
[   15.391122] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.391465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.391667] Hardware name: linux,dummy-virt (DT)
[   15.391753] Call trace:
[   15.391777]  show_stack+0x20/0x38 (C)
[   15.391832]  dump_stack_lvl+0x8c/0xd0
[   15.392297]  print_report+0x118/0x5d0
[   15.392377]  kasan_report+0xdc/0x128
[   15.392430]  __asan_report_load1_noabort+0x20/0x30
[   15.392681]  ksize_unpoisons_memory+0x628/0x740
[   15.392984]  kunit_try_run_case+0x170/0x3f0
[   15.393113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.393248]  kthread+0x328/0x630
[   15.393591]  ret_from_fork+0x10/0x20
[   15.394091] 
[   15.394196] Allocated by task 194:
[   15.394254]  kasan_save_stack+0x3c/0x68
[   15.394573]  kasan_save_track+0x20/0x40
[   15.394868]  kasan_save_alloc_info+0x40/0x58
[   15.394940]  __kasan_kmalloc+0xd4/0xd8
[   15.395149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.395372]  ksize_unpoisons_memory+0xc0/0x740
[   15.395794]  kunit_try_run_case+0x170/0x3f0
[   15.395974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.396027]  kthread+0x328/0x630
[   15.396061]  ret_from_fork+0x10/0x20
[   15.396123] 
[   15.396144] The buggy address belongs to the object at fff00000c6417b00
[   15.396144]  which belongs to the cache kmalloc-128 of size 128
[   15.396359] The buggy address is located 0 bytes to the right of
[   15.396359]  allocated 115-byte region [fff00000c6417b00, fff00000c6417b73)
[   15.396531] 
[   15.396554] The buggy address belongs to the physical page:
[   15.396648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   15.396745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.396813] page_type: f5(slab)
[   15.396853] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.396905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.396958] page dumped because: kasan: bad access detected
[   15.396989] 
[   15.397019] Memory state around the buggy address:
[   15.397063]  fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.397110]  fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397155] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.397205]                                                              ^
[   15.397256]  fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397297]  fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397347] ==================================================================
[   15.403079] ==================================================================
[   15.403154] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.403291] Read of size 1 at addr fff00000c6417b78 by task kunit_try_catch/194
[   15.403406] 
[   15.403440] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.403707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.403909] Hardware name: linux,dummy-virt (DT)
[   15.404266] Call trace:
[   15.404330]  show_stack+0x20/0x38 (C)
[   15.404445]  dump_stack_lvl+0x8c/0xd0
[   15.404495]  print_report+0x118/0x5d0
[   15.404543]  kasan_report+0xdc/0x128
[   15.404947]  __asan_report_load1_noabort+0x20/0x30
[   15.405072]  ksize_unpoisons_memory+0x618/0x740
[   15.405346]  kunit_try_run_case+0x170/0x3f0
[   15.405558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.405983]  kthread+0x328/0x630
[   15.406110]  ret_from_fork+0x10/0x20
[   15.406207] 
[   15.406306] Allocated by task 194:
[   15.406524]  kasan_save_stack+0x3c/0x68
[   15.406569]  kasan_save_track+0x20/0x40
[   15.406631]  kasan_save_alloc_info+0x40/0x58
[   15.406925]  __kasan_kmalloc+0xd4/0xd8
[   15.407080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.407242]  ksize_unpoisons_memory+0xc0/0x740
[   15.407428]  kunit_try_run_case+0x170/0x3f0
[   15.407483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.407978]  kthread+0x328/0x630
[   15.408042]  ret_from_fork+0x10/0x20
[   15.408079] 
[   15.408120] The buggy address belongs to the object at fff00000c6417b00
[   15.408120]  which belongs to the cache kmalloc-128 of size 128
[   15.408180] The buggy address is located 5 bytes to the right of
[   15.408180]  allocated 115-byte region [fff00000c6417b00, fff00000c6417b73)
[   15.408245] 
[   15.408266] The buggy address belongs to the physical page:
[   15.408298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   15.408362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.408412] page_type: f5(slab)
[   15.408449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.408502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.408553] page dumped because: kasan: bad access detected
[   15.408585] 
[   15.408602] Memory state around the buggy address:
[   15.408651]  fff00000c6417a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.408715]  fff00000c6417a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.408760] >fff00000c6417b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.408798]                                                                 ^
[   15.408839]  fff00000c6417b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.408891]  fff00000c6417c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.408929] ==================================================================

[   12.475100] ==================================================================
[   12.475554] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.475893] Read of size 1 at addr ffff888102fd127f by task kunit_try_catch/211
[   12.476202] 
[   12.476283] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.476322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.476333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.476425] Call Trace:
[   12.476439]  <TASK>
[   12.476452]  dump_stack_lvl+0x73/0xb0
[   12.476480]  print_report+0xd1/0x610
[   12.476500]  ? __virt_addr_valid+0x1db/0x2d0
[   12.476521]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.476542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.476562]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.476584]  kasan_report+0x141/0x180
[   12.476604]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.476631]  __asan_report_load1_noabort+0x18/0x20
[   12.476653]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.476675]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.476710]  ? __kasan_check_write+0x18/0x20
[   12.476727]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.476749]  ? irqentry_exit+0x2a/0x60
[   12.476790]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.476812]  ? trace_hardirqs_on+0x37/0xe0
[   12.476834]  ? __pfx_read_tsc+0x10/0x10
[   12.476864]  ? ktime_get_ts64+0x86/0x230
[   12.476888]  kunit_try_run_case+0x1a5/0x480
[   12.476910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.476933]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.476955]  ? __kthread_parkme+0x82/0x180
[   12.476980]  ? preempt_count_sub+0x50/0x80
[   12.477018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.477041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.477062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.477095]  kthread+0x337/0x6f0
[   12.477113]  ? trace_preempt_on+0x20/0xc0
[   12.477133]  ? __pfx_kthread+0x10/0x10
[   12.477153]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.477172]  ? calculate_sigpending+0x7b/0xa0
[   12.477194]  ? __pfx_kthread+0x10/0x10
[   12.477223]  ret_from_fork+0x116/0x1d0
[   12.477240]  ? __pfx_kthread+0x10/0x10
[   12.477259]  ret_from_fork_asm+0x1a/0x30
[   12.477298]  </TASK>
[   12.477307] 
[   12.485663] Allocated by task 211:
[   12.485870]  kasan_save_stack+0x45/0x70
[   12.486083]  kasan_save_track+0x18/0x40
[   12.486263]  kasan_save_alloc_info+0x3b/0x50
[   12.486674]  __kasan_kmalloc+0xb7/0xc0
[   12.486857]  __kmalloc_cache_noprof+0x189/0x420
[   12.487097]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.487308]  kunit_try_run_case+0x1a5/0x480
[   12.487648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.487910]  kthread+0x337/0x6f0
[   12.488102]  ret_from_fork+0x116/0x1d0
[   12.488270]  ret_from_fork_asm+0x1a/0x30
[   12.488479] 
[   12.488553] The buggy address belongs to the object at ffff888102fd1200
[   12.488553]  which belongs to the cache kmalloc-128 of size 128
[   12.488989] The buggy address is located 12 bytes to the right of
[   12.488989]  allocated 115-byte region [ffff888102fd1200, ffff888102fd1273)
[   12.489658] 
[   12.489756] The buggy address belongs to the physical page:
[   12.489956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1
[   12.490310] flags: 0x200000000000000(node=0|zone=2)
[   12.490708] page_type: f5(slab)
[   12.490835] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.491203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.491645] page dumped because: kasan: bad access detected
[   12.491889] 
[   12.492013] Memory state around the buggy address:
[   12.492183]  ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.492581]  ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.492899] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.493216]                                                                 ^
[   12.493613]  ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.493888]  ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.494116] ==================================================================
[   12.436680] ==================================================================
[   12.437178] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.437518] Read of size 1 at addr ffff888102fd1273 by task kunit_try_catch/211
[   12.438107] 
[   12.438223] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.438267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.438277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.438298] Call Trace:
[   12.438309]  <TASK>
[   12.438323]  dump_stack_lvl+0x73/0xb0
[   12.438353]  print_report+0xd1/0x610
[   12.438375]  ? __virt_addr_valid+0x1db/0x2d0
[   12.438473]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.438504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.438527]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.438549]  kasan_report+0x141/0x180
[   12.438570]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.438597]  __asan_report_load1_noabort+0x18/0x20
[   12.438620]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.438643]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.438666]  ? __kasan_check_write+0x18/0x20
[   12.438683]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.438706]  ? irqentry_exit+0x2a/0x60
[   12.438727]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.438750]  ? trace_hardirqs_on+0x37/0xe0
[   12.438772]  ? __pfx_read_tsc+0x10/0x10
[   12.438792]  ? ktime_get_ts64+0x86/0x230
[   12.438815]  kunit_try_run_case+0x1a5/0x480
[   12.438838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.438861]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.438882]  ? __kthread_parkme+0x82/0x180
[   12.438902]  ? preempt_count_sub+0x50/0x80
[   12.438924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.438947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.438968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.438990]  kthread+0x337/0x6f0
[   12.439020]  ? trace_preempt_on+0x20/0xc0
[   12.439041]  ? __pfx_kthread+0x10/0x10
[   12.439060]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.439079]  ? calculate_sigpending+0x7b/0xa0
[   12.439102]  ? __pfx_kthread+0x10/0x10
[   12.439122]  ret_from_fork+0x116/0x1d0
[   12.439139]  ? __pfx_kthread+0x10/0x10
[   12.439158]  ret_from_fork_asm+0x1a/0x30
[   12.439187]  </TASK>
[   12.439198] 
[   12.447127] Allocated by task 211:
[   12.447282]  kasan_save_stack+0x45/0x70
[   12.447495]  kasan_save_track+0x18/0x40
[   12.447689]  kasan_save_alloc_info+0x3b/0x50
[   12.447861]  __kasan_kmalloc+0xb7/0xc0
[   12.448054]  __kmalloc_cache_noprof+0x189/0x420
[   12.448228]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.448468]  kunit_try_run_case+0x1a5/0x480
[   12.448633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.448865]  kthread+0x337/0x6f0
[   12.448990]  ret_from_fork+0x116/0x1d0
[   12.449130]  ret_from_fork_asm+0x1a/0x30
[   12.449294] 
[   12.449385] The buggy address belongs to the object at ffff888102fd1200
[   12.449385]  which belongs to the cache kmalloc-128 of size 128
[   12.449903] The buggy address is located 0 bytes to the right of
[   12.449903]  allocated 115-byte region [ffff888102fd1200, ffff888102fd1273)
[   12.450677] 
[   12.450759] The buggy address belongs to the physical page:
[   12.450931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1
[   12.451188] flags: 0x200000000000000(node=0|zone=2)
[   12.451353] page_type: f5(slab)
[   12.451474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.451811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.452164] page dumped because: kasan: bad access detected
[   12.452456] 
[   12.452553] Memory state around the buggy address:
[   12.452820]  ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.453161]  ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.453702] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.454035]                                                              ^
[   12.454298]  ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.454655]  ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.454912] ==================================================================
[   12.455307] ==================================================================
[   12.456064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.456526] Read of size 1 at addr ffff888102fd1278 by task kunit_try_catch/211
[   12.456833] 
[   12.456934] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.456981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.456991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.457022] Call Trace:
[   12.457035]  <TASK>
[   12.457049]  dump_stack_lvl+0x73/0xb0
[   12.457075]  print_report+0xd1/0x610
[   12.457096]  ? __virt_addr_valid+0x1db/0x2d0
[   12.457116]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.457138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.457159]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.457181]  kasan_report+0x141/0x180
[   12.457201]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.457227]  __asan_report_load1_noabort+0x18/0x20
[   12.457250]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.457272]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.457295]  ? __kasan_check_write+0x18/0x20
[   12.457313]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.457335]  ? irqentry_exit+0x2a/0x60
[   12.457355]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.457395]  ? trace_hardirqs_on+0x37/0xe0
[   12.457416]  ? __pfx_read_tsc+0x10/0x10
[   12.457437]  ? ktime_get_ts64+0x86/0x230
[   12.457460]  kunit_try_run_case+0x1a5/0x480
[   12.457483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.457506]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.457528]  ? __kthread_parkme+0x82/0x180
[   12.457547]  ? preempt_count_sub+0x50/0x80
[   12.457569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.457592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.457614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.457636]  kthread+0x337/0x6f0
[   12.457654]  ? trace_preempt_on+0x20/0xc0
[   12.457675]  ? __pfx_kthread+0x10/0x10
[   12.457694]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.457714]  ? calculate_sigpending+0x7b/0xa0
[   12.457736]  ? __pfx_kthread+0x10/0x10
[   12.457757]  ret_from_fork+0x116/0x1d0
[   12.457774]  ? __pfx_kthread+0x10/0x10
[   12.457793]  ret_from_fork_asm+0x1a/0x30
[   12.457821]  </TASK>
[   12.457831] 
[   12.465813] Allocated by task 211:
[   12.465941]  kasan_save_stack+0x45/0x70
[   12.466100]  kasan_save_track+0x18/0x40
[   12.466234]  kasan_save_alloc_info+0x3b/0x50
[   12.466592]  __kasan_kmalloc+0xb7/0xc0
[   12.466819]  __kmalloc_cache_noprof+0x189/0x420
[   12.467102]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.467448]  kunit_try_run_case+0x1a5/0x480
[   12.467697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.467952]  kthread+0x337/0x6f0
[   12.468130]  ret_from_fork+0x116/0x1d0
[   12.468317]  ret_from_fork_asm+0x1a/0x30
[   12.468615] 
[   12.468714] The buggy address belongs to the object at ffff888102fd1200
[   12.468714]  which belongs to the cache kmalloc-128 of size 128
[   12.469287] The buggy address is located 5 bytes to the right of
[   12.469287]  allocated 115-byte region [ffff888102fd1200, ffff888102fd1273)
[   12.469923] 
[   12.470053] The buggy address belongs to the physical page:
[   12.470234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1
[   12.470648] flags: 0x200000000000000(node=0|zone=2)
[   12.470846] page_type: f5(slab)
[   12.471024] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.471451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.471821] page dumped because: kasan: bad access detected
[   12.472086] 
[   12.472183] Memory state around the buggy address:
[   12.472507]  ffff888102fd1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.472828]  ffff888102fd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.473177] >ffff888102fd1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.473552]                                                                 ^
[   12.473782]  ffff888102fd1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.473996]  ffff888102fd1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.474547] ==================================================================