Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.267553] ==================================================================
[   18.267607] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.267660] Read of size 1 at addr fff00000c68f1878 by task kunit_try_catch/194
[   18.267985] 
[   18.268034] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.268122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.268148] Hardware name: linux,dummy-virt (DT)
[   18.268300] Call trace:
[   18.268509]  show_stack+0x20/0x38 (C)
[   18.268635]  dump_stack_lvl+0x8c/0xd0
[   18.268770]  print_report+0x118/0x608
[   18.268867]  kasan_report+0xdc/0x128
[   18.268962]  __asan_report_load1_noabort+0x20/0x30
[   18.269225]  ksize_unpoisons_memory+0x618/0x740
[   18.269303]  kunit_try_run_case+0x170/0x3f0
[   18.269387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269457]  kthread+0x328/0x630
[   18.269690]  ret_from_fork+0x10/0x20
[   18.270026] 
[   18.270064] Allocated by task 194:
[   18.270177]  kasan_save_stack+0x3c/0x68
[   18.270511]  kasan_save_track+0x20/0x40
[   18.270608]  kasan_save_alloc_info+0x40/0x58
[   18.270825]  __kasan_kmalloc+0xd4/0xd8
[   18.271019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.271274]  ksize_unpoisons_memory+0xc0/0x740
[   18.271507]  kunit_try_run_case+0x170/0x3f0
[   18.271651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.271826]  kthread+0x328/0x630
[   18.271948]  ret_from_fork+0x10/0x20
[   18.272115] 
[   18.272145] The buggy address belongs to the object at fff00000c68f1800
[   18.272145]  which belongs to the cache kmalloc-128 of size 128
[   18.272557] The buggy address is located 5 bytes to the right of
[   18.272557]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.272740] 
[   18.272790] The buggy address belongs to the physical page:
[   18.272829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.272882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.272932] page_type: f5(slab)
[   18.272984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.273035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.273084] page dumped because: kasan: bad access detected
[   18.273115] 
[   18.273141] Memory state around the buggy address:
[   18.273184]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.273235]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273278] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.273326]                                                                 ^
[   18.273378]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273421]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.273464] ==================================================================
[   18.252728] ==================================================================
[   18.252784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.252836] Read of size 1 at addr fff00000c68f1873 by task kunit_try_catch/194
[   18.252886] 
[   18.252944] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.253038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.253066] Hardware name: linux,dummy-virt (DT)
[   18.253102] Call trace:
[   18.253124]  show_stack+0x20/0x38 (C)
[   18.253187]  dump_stack_lvl+0x8c/0xd0
[   18.253232]  print_report+0x118/0x608
[   18.253690]  kasan_report+0xdc/0x128
[   18.253865]  __asan_report_load1_noabort+0x20/0x30
[   18.254449]  ksize_unpoisons_memory+0x628/0x740
[   18.254510]  kunit_try_run_case+0x170/0x3f0
[   18.255540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.255763]  kthread+0x328/0x630
[   18.255827]  ret_from_fork+0x10/0x20
[   18.256128] 
[   18.256346] Allocated by task 194:
[   18.256450]  kasan_save_stack+0x3c/0x68
[   18.256621]  kasan_save_track+0x20/0x40
[   18.256907]  kasan_save_alloc_info+0x40/0x58
[   18.257051]  __kasan_kmalloc+0xd4/0xd8
[   18.257280]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.257701]  ksize_unpoisons_memory+0xc0/0x740
[   18.257934]  kunit_try_run_case+0x170/0x3f0
[   18.257976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.258046]  kthread+0x328/0x630
[   18.258356]  ret_from_fork+0x10/0x20
[   18.258506] 
[   18.258549] The buggy address belongs to the object at fff00000c68f1800
[   18.258549]  which belongs to the cache kmalloc-128 of size 128
[   18.258887] The buggy address is located 0 bytes to the right of
[   18.258887]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.259025] 
[   18.259048] The buggy address belongs to the physical page:
[   18.259244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.259472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.259527] page_type: f5(slab)
[   18.259567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.259934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.260074] page dumped because: kasan: bad access detected
[   18.260166] 
[   18.260184] Memory state around the buggy address:
[   18.260246]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.260310]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.260494] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.260760]                                                              ^
[   18.261110]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.261224]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.261322] ==================================================================
[   18.275711] ==================================================================
[   18.275765] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.275840] Read of size 1 at addr fff00000c68f187f by task kunit_try_catch/194
[   18.275892] 
[   18.275928] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   18.276197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.276426] Hardware name: linux,dummy-virt (DT)
[   18.276471] Call trace:
[   18.276579]  show_stack+0x20/0x38 (C)
[   18.276651]  dump_stack_lvl+0x8c/0xd0
[   18.276727]  print_report+0x118/0x608
[   18.276849]  kasan_report+0xdc/0x128
[   18.277054]  __asan_report_load1_noabort+0x20/0x30
[   18.277253]  ksize_unpoisons_memory+0x690/0x740
[   18.277366]  kunit_try_run_case+0x170/0x3f0
[   18.277418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.277472]  kthread+0x328/0x630
[   18.277584]  ret_from_fork+0x10/0x20
[   18.277635] 
[   18.277653] Allocated by task 194:
[   18.277768]  kasan_save_stack+0x3c/0x68
[   18.277814]  kasan_save_track+0x20/0x40
[   18.278468]  kasan_save_alloc_info+0x40/0x58
[   18.278568]  __kasan_kmalloc+0xd4/0xd8
[   18.278731]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.279121]  ksize_unpoisons_memory+0xc0/0x740
[   18.279322]  kunit_try_run_case+0x170/0x3f0
[   18.279448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.279666]  kthread+0x328/0x630
[   18.279986]  ret_from_fork+0x10/0x20
[   18.280254] 
[   18.280387] The buggy address belongs to the object at fff00000c68f1800
[   18.280387]  which belongs to the cache kmalloc-128 of size 128
[   18.280519] The buggy address is located 12 bytes to the right of
[   18.280519]  allocated 115-byte region [fff00000c68f1800, fff00000c68f1873)
[   18.280693] 
[   18.280735] The buggy address belongs to the physical page:
[   18.281132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068f1
[   18.281327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.281534] page_type: f5(slab)
[   18.281600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.281680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.282030] page dumped because: kasan: bad access detected
[   18.282103] 
[   18.282541] Memory state around the buggy address:
[   18.282592]  fff00000c68f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.282638]  fff00000c68f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283066] >fff00000c68f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.283149]                                                                 ^
[   18.283202]  fff00000c68f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283346]  fff00000c68f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.283387] ==================================================================


[   14.540253] ==================================================================
[   14.540927] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   14.541209] Read of size 1 at addr ffff888102b48f78 by task kunit_try_catch/212
[   14.541884] 
[   14.542100] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.542199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.542231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.542270] Call Trace:
[   14.542298]  <TASK>
[   14.542339]  dump_stack_lvl+0x73/0xb0
[   14.542401]  print_report+0xd1/0x650
[   14.542449]  ? __virt_addr_valid+0x1db/0x2d0
[   14.542660]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.542746]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542799]  kasan_report+0x141/0x180
[   14.542842]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542905]  __asan_report_load1_noabort+0x18/0x20
[   14.542938]  ksize_unpoisons_memory+0x7e9/0x9b0
[   14.542978]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.543016]  ? finish_task_switch.isra.0+0x153/0x700
[   14.543056]  ? __switch_to+0x47/0xf50
[   14.543104]  ? __schedule+0x10cc/0x2b60
[   14.543150]  ? __pfx_read_tsc+0x10/0x10
[   14.543189]  ? ktime_get_ts64+0x86/0x230
[   14.543246]  kunit_try_run_case+0x1a5/0x480
[   14.543290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.543342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.543363]  ? __kthread_parkme+0x82/0x180
[   14.543385]  ? preempt_count_sub+0x50/0x80
[   14.543407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.543469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.543541]  kthread+0x337/0x6f0
[   14.543576]  ? trace_preempt_on+0x20/0xc0
[   14.543627]  ? __pfx_kthread+0x10/0x10
[   14.543650]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.543671]  ? calculate_sigpending+0x7b/0xa0
[   14.543695]  ? __pfx_kthread+0x10/0x10
[   14.543716]  ret_from_fork+0x116/0x1d0
[   14.543734]  ? __pfx_kthread+0x10/0x10
[   14.543754]  ret_from_fork_asm+0x1a/0x30
[   14.543785]  </TASK>
[   14.543797] 
[   14.556847] Allocated by task 212:
[   14.557169]  kasan_save_stack+0x45/0x70
[   14.557515]  kasan_save_track+0x18/0x40
[   14.557806]  kasan_save_alloc_info+0x3b/0x50
[   14.558024]  __kasan_kmalloc+0xb7/0xc0
[   14.558356]  __kmalloc_cache_noprof+0x189/0x420
[   14.558589]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.559035]  kunit_try_run_case+0x1a5/0x480
[   14.559349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559722]  kthread+0x337/0x6f0
[   14.559924]  ret_from_fork+0x116/0x1d0
[   14.560090]  ret_from_fork_asm+0x1a/0x30
[   14.561134] 
[   14.561320] The buggy address belongs to the object at ffff888102b48f00
[   14.561320]  which belongs to the cache kmalloc-128 of size 128
[   14.562022] The buggy address is located 5 bytes to the right of
[   14.562022]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.562721] 
[   14.562976] The buggy address belongs to the physical page:
[   14.563897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.564215] flags: 0x200000000000000(node=0|zone=2)
[   14.565076] page_type: f5(slab)
[   14.565270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.565499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.565859] page dumped because: kasan: bad access detected
[   14.566785] 
[   14.567105] Memory state around the buggy address:
[   14.567302]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.567658]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.568083] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.568375]                                                                 ^
[   14.568839]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569241]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.569592] ==================================================================
[   14.512077] ==================================================================
[   14.512564] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   14.513157] Read of size 1 at addr ffff888102b48f73 by task kunit_try_catch/212
[   14.513761] 
[   14.513880] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.513937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.513949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.513972] Call Trace:
[   14.513987]  <TASK>
[   14.514008]  dump_stack_lvl+0x73/0xb0
[   14.514042]  print_report+0xd1/0x650
[   14.514067]  ? __virt_addr_valid+0x1db/0x2d0
[   14.514090]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.514135]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514158]  kasan_report+0x141/0x180
[   14.514179]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.514207]  __asan_report_load1_noabort+0x18/0x20
[   14.514246]  ksize_unpoisons_memory+0x81c/0x9b0
[   14.514272]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.514294]  ? finish_task_switch.isra.0+0x153/0x700
[   14.514319]  ? __switch_to+0x47/0xf50
[   14.514362]  ? __schedule+0x10cc/0x2b60
[   14.514387]  ? __pfx_read_tsc+0x10/0x10
[   14.514410]  ? ktime_get_ts64+0x86/0x230
[   14.514436]  kunit_try_run_case+0x1a5/0x480
[   14.514474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.514508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.514547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.514584]  ? __kthread_parkme+0x82/0x180
[   14.514622]  ? preempt_count_sub+0x50/0x80
[   14.514670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.514716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.514760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.514948]  kthread+0x337/0x6f0
[   14.515001]  ? trace_preempt_on+0x20/0xc0
[   14.515053]  ? __pfx_kthread+0x10/0x10
[   14.515097]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.515136]  ? calculate_sigpending+0x7b/0xa0
[   14.515176]  ? __pfx_kthread+0x10/0x10
[   14.515213]  ret_from_fork+0x116/0x1d0
[   14.515262]  ? __pfx_kthread+0x10/0x10
[   14.515300]  ret_from_fork_asm+0x1a/0x30
[   14.515364]  </TASK>
[   14.515389] 
[   14.526426] Allocated by task 212:
[   14.526909]  kasan_save_stack+0x45/0x70
[   14.527162]  kasan_save_track+0x18/0x40
[   14.527667]  kasan_save_alloc_info+0x3b/0x50
[   14.527957]  __kasan_kmalloc+0xb7/0xc0
[   14.528156]  __kmalloc_cache_noprof+0x189/0x420
[   14.528737]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.529089]  kunit_try_run_case+0x1a5/0x480
[   14.529449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.529915]  kthread+0x337/0x6f0
[   14.530164]  ret_from_fork+0x116/0x1d0
[   14.530629]  ret_from_fork_asm+0x1a/0x30
[   14.530873] 
[   14.531038] The buggy address belongs to the object at ffff888102b48f00
[   14.531038]  which belongs to the cache kmalloc-128 of size 128
[   14.531743] The buggy address is located 0 bytes to the right of
[   14.531743]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.532367] 
[   14.532694] The buggy address belongs to the physical page:
[   14.532992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.533423] flags: 0x200000000000000(node=0|zone=2)
[   14.533979] page_type: f5(slab)
[   14.534277] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.534882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.535319] page dumped because: kasan: bad access detected
[   14.535797] 
[   14.535903] Memory state around the buggy address:
[   14.536125]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.536366]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536860] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.537139]                                                              ^
[   14.537775]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538158]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.538831] ==================================================================
[   14.572160] ==================================================================
[   14.572855] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   14.573365] Read of size 1 at addr ffff888102b48f7f by task kunit_try_catch/212
[   14.573670] 
[   14.573921] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   14.574045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.574071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.574114] Call Trace:
[   14.574142]  <TASK>
[   14.574177]  dump_stack_lvl+0x73/0xb0
[   14.574247]  print_report+0xd1/0x650
[   14.574293]  ? __virt_addr_valid+0x1db/0x2d0
[   14.574410]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.574499]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574546]  kasan_report+0x141/0x180
[   14.574587]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574644]  __asan_report_load1_noabort+0x18/0x20
[   14.574683]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.574712]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.574734]  ? finish_task_switch.isra.0+0x153/0x700
[   14.574759]  ? __switch_to+0x47/0xf50
[   14.574786]  ? __schedule+0x10cc/0x2b60
[   14.574809]  ? __pfx_read_tsc+0x10/0x10
[   14.574831]  ? ktime_get_ts64+0x86/0x230
[   14.574855]  kunit_try_run_case+0x1a5/0x480
[   14.574882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.574903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.574925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.574947]  ? __kthread_parkme+0x82/0x180
[   14.574970]  ? preempt_count_sub+0x50/0x80
[   14.574993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.575015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.575037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.575058]  kthread+0x337/0x6f0
[   14.575077]  ? trace_preempt_on+0x20/0xc0
[   14.575101]  ? __pfx_kthread+0x10/0x10
[   14.575122]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.575142]  ? calculate_sigpending+0x7b/0xa0
[   14.575166]  ? __pfx_kthread+0x10/0x10
[   14.575187]  ret_from_fork+0x116/0x1d0
[   14.575204]  ? __pfx_kthread+0x10/0x10
[   14.575245]  ret_from_fork_asm+0x1a/0x30
[   14.575280]  </TASK>
[   14.575292] 
[   14.583581] Allocated by task 212:
[   14.583934]  kasan_save_stack+0x45/0x70
[   14.584300]  kasan_save_track+0x18/0x40
[   14.584574]  kasan_save_alloc_info+0x3b/0x50
[   14.584894]  __kasan_kmalloc+0xb7/0xc0
[   14.585186]  __kmalloc_cache_noprof+0x189/0x420
[   14.585583]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.585943]  kunit_try_run_case+0x1a5/0x480
[   14.586232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.586571]  kthread+0x337/0x6f0
[   14.586734]  ret_from_fork+0x116/0x1d0
[   14.586907]  ret_from_fork_asm+0x1a/0x30
[   14.587083] 
[   14.587190] The buggy address belongs to the object at ffff888102b48f00
[   14.587190]  which belongs to the cache kmalloc-128 of size 128
[   14.587577] The buggy address is located 12 bytes to the right of
[   14.587577]  allocated 115-byte region [ffff888102b48f00, ffff888102b48f73)
[   14.588447] 
[   14.588645] The buggy address belongs to the physical page:
[   14.589024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.589637] flags: 0x200000000000000(node=0|zone=2)
[   14.590045] page_type: f5(slab)
[   14.590331] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.590876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.591446] page dumped because: kasan: bad access detected
[   14.591822] 
[   14.591966] Memory state around the buggy address:
[   14.592275]  ffff888102b48e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.592688]  ffff888102b48e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.592972] >ffff888102b48f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.593201]                                                                 ^
[   14.593727]  ffff888102b48f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.594247]  ffff888102b49000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.594630] ==================================================================