Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   31.073984] ==================================================================
[   31.081004] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.088378] Read of size 1 at addr ffff000803eb5878 by task kunit_try_catch/238
[   31.095670] 
[   31.097155] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.097210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.097225] Hardware name: WinLink E850-96 board (DT)
[   31.097246] Call trace:
[   31.097260]  show_stack+0x20/0x38 (C)
[   31.097295]  dump_stack_lvl+0x8c/0xd0
[   31.097331]  print_report+0x118/0x608
[   31.097366]  kasan_report+0xdc/0x128
[   31.097398]  __asan_report_load1_noabort+0x20/0x30
[   31.097429]  ksize_unpoisons_memory+0x618/0x740
[   31.097460]  kunit_try_run_case+0x170/0x3f0
[   31.097494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.097532]  kthread+0x328/0x630
[   31.097560]  ret_from_fork+0x10/0x20
[   31.097596] 
[   31.161207] Allocated by task 238:
[   31.164595]  kasan_save_stack+0x3c/0x68
[   31.168412]  kasan_save_track+0x20/0x40
[   31.172231]  kasan_save_alloc_info+0x40/0x58
[   31.176484]  __kasan_kmalloc+0xd4/0xd8
[   31.180217]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.184731]  ksize_unpoisons_memory+0xc0/0x740
[   31.189157]  kunit_try_run_case+0x170/0x3f0
[   31.193325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.198793]  kthread+0x328/0x630
[   31.202005]  ret_from_fork+0x10/0x20
[   31.205564] 
[   31.207039] The buggy address belongs to the object at ffff000803eb5800
[   31.207039]  which belongs to the cache kmalloc-128 of size 128
[   31.219539] The buggy address is located 5 bytes to the right of
[   31.219539]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   31.232473] 
[   31.233951] The buggy address belongs to the physical page:
[   31.239507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.247492] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.255129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.262075] page_type: f5(slab)
[   31.265210] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.272930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.280657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.288468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.296281] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.304093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.311899] page dumped because: kasan: bad access detected
[   31.317456] 
[   31.318930] Memory state around the buggy address:
[   31.323709]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.330913]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.338117] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.345319]                                                                 ^
[   31.352440]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359645]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.366846] ==================================================================
[   30.771339] ==================================================================
[   30.781008] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.788384] Read of size 1 at addr ffff000803eb5873 by task kunit_try_catch/238
[   30.795675] 
[   30.797163] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.797221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.797236] Hardware name: WinLink E850-96 board (DT)
[   30.797256] Call trace:
[   30.797273]  show_stack+0x20/0x38 (C)
[   30.797310]  dump_stack_lvl+0x8c/0xd0
[   30.797351]  print_report+0x118/0x608
[   30.797387]  kasan_report+0xdc/0x128
[   30.797418]  __asan_report_load1_noabort+0x20/0x30
[   30.797448]  ksize_unpoisons_memory+0x628/0x740
[   30.797481]  kunit_try_run_case+0x170/0x3f0
[   30.797519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.797559]  kthread+0x328/0x630
[   30.797590]  ret_from_fork+0x10/0x20
[   30.797627] 
[   30.861211] Allocated by task 238:
[   30.864599]  kasan_save_stack+0x3c/0x68
[   30.868416]  kasan_save_track+0x20/0x40
[   30.872235]  kasan_save_alloc_info+0x40/0x58
[   30.876489]  __kasan_kmalloc+0xd4/0xd8
[   30.880223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.884735]  ksize_unpoisons_memory+0xc0/0x740
[   30.889162]  kunit_try_run_case+0x170/0x3f0
[   30.893329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.898798]  kthread+0x328/0x630
[   30.902009]  ret_from_fork+0x10/0x20
[   30.905568] 
[   30.907046] The buggy address belongs to the object at ffff000803eb5800
[   30.907046]  which belongs to the cache kmalloc-128 of size 128
[   30.919547] The buggy address is located 0 bytes to the right of
[   30.919547]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   30.932477] 
[   30.933956] The buggy address belongs to the physical page:
[   30.939514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   30.947497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.955137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.962079] page_type: f5(slab)
[   30.965217] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.972935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.980663] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.988473] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.996286] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.004097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.011903] page dumped because: kasan: bad access detected
[   31.017460] 
[   31.018934] Memory state around the buggy address:
[   31.023715]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.030917]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038122] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.045323]                                                              ^
[   31.052184]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.059389]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.066590] ==================================================================
[   31.374165] ==================================================================
[   31.381260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.388637] Read of size 1 at addr ffff000803eb587f by task kunit_try_catch/238
[   31.395925] 
[   31.397410] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.397462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.397479] Hardware name: WinLink E850-96 board (DT)
[   31.397499] Call trace:
[   31.397511]  show_stack+0x20/0x38 (C)
[   31.397546]  dump_stack_lvl+0x8c/0xd0
[   31.397582]  print_report+0x118/0x608
[   31.397619]  kasan_report+0xdc/0x128
[   31.397651]  __asan_report_load1_noabort+0x20/0x30
[   31.397679]  ksize_unpoisons_memory+0x690/0x740
[   31.397710]  kunit_try_run_case+0x170/0x3f0
[   31.397743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.397783]  kthread+0x328/0x630
[   31.397811]  ret_from_fork+0x10/0x20
[   31.397846] 
[   31.461463] Allocated by task 238:
[   31.464848]  kasan_save_stack+0x3c/0x68
[   31.468668]  kasan_save_track+0x20/0x40
[   31.472487]  kasan_save_alloc_info+0x40/0x58
[   31.476740]  __kasan_kmalloc+0xd4/0xd8
[   31.480473]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.484987]  ksize_unpoisons_memory+0xc0/0x740
[   31.489414]  kunit_try_run_case+0x170/0x3f0
[   31.493580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.499049]  kthread+0x328/0x630
[   31.502261]  ret_from_fork+0x10/0x20
[   31.505820] 
[   31.507297] The buggy address belongs to the object at ffff000803eb5800
[   31.507297]  which belongs to the cache kmalloc-128 of size 128
[   31.519796] The buggy address is located 12 bytes to the right of
[   31.519796]  allocated 115-byte region [ffff000803eb5800, ffff000803eb5873)
[   31.532816] 
[   31.534295] The buggy address belongs to the physical page:
[   31.539850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.547836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.555473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.562416] page_type: f5(slab)
[   31.565552] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.573273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.581001] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.588811] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.596624] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.604436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.612242] page dumped because: kasan: bad access detected
[   31.617798] 
[   31.619273] Memory state around the buggy address:
[   31.624053]  ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.631256]  ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.638460] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.645661]                                                                 ^
[   31.652782]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.659987]  ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.667189] ==================================================================

[   25.225453] ==================================================================
[   25.225621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.225784] Read of size 1 at addr fff00000c77e8273 by task kunit_try_catch/195
[   25.225899] 
[   25.225983] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.226183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.226249] Hardware name: linux,dummy-virt (DT)
[   25.226324] Call trace:
[   25.226375]  show_stack+0x20/0x38 (C)
[   25.226502]  dump_stack_lvl+0x8c/0xd0
[   25.226622]  print_report+0x118/0x608
[   25.226777]  kasan_report+0xdc/0x128
[   25.226895]  __asan_report_load1_noabort+0x20/0x30
[   25.227010]  ksize_unpoisons_memory+0x628/0x740
[   25.227133]  kunit_try_run_case+0x170/0x3f0
[   25.227258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.227389]  kthread+0x328/0x630
[   25.228810]  ret_from_fork+0x10/0x20
[   25.229083] 
[   25.229134] Allocated by task 195:
[   25.229207]  kasan_save_stack+0x3c/0x68
[   25.229391]  kasan_save_track+0x20/0x40
[   25.229750]  kasan_save_alloc_info+0x40/0x58
[   25.230422]  __kasan_kmalloc+0xd4/0xd8
[   25.230539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.230668]  ksize_unpoisons_memory+0xc0/0x740
[   25.231832]  kunit_try_run_case+0x170/0x3f0
[   25.232046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.232572]  kthread+0x328/0x630
[   25.233053]  ret_from_fork+0x10/0x20
[   25.233191] 
[   25.233474] The buggy address belongs to the object at fff00000c77e8200
[   25.233474]  which belongs to the cache kmalloc-128 of size 128
[   25.233746] The buggy address is located 0 bytes to the right of
[   25.233746]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.234040] 
[   25.234093] The buggy address belongs to the physical page:
[   25.234569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.234882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.235016] page_type: f5(slab)
[   25.235324] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.235466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.236048] page dumped because: kasan: bad access detected
[   25.236146] 
[   25.236199] Memory state around the buggy address:
[   25.236788]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.237496]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237631] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.237988]                                                              ^
[   25.238278]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238386]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238481] ==================================================================
[   25.241366] ==================================================================
[   25.241472] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.241587] Read of size 1 at addr fff00000c77e8278 by task kunit_try_catch/195
[   25.241722] 
[   25.241799] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.241993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.242056] Hardware name: linux,dummy-virt (DT)
[   25.242135] Call trace:
[   25.242187]  show_stack+0x20/0x38 (C)
[   25.243640]  dump_stack_lvl+0x8c/0xd0
[   25.243905]  print_report+0x118/0x608
[   25.244040]  kasan_report+0xdc/0x128
[   25.244202]  __asan_report_load1_noabort+0x20/0x30
[   25.244454]  ksize_unpoisons_memory+0x618/0x740
[   25.245286]  kunit_try_run_case+0x170/0x3f0
[   25.245700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.246323]  kthread+0x328/0x630
[   25.246795]  ret_from_fork+0x10/0x20
[   25.247174] 
[   25.247223] Allocated by task 195:
[   25.247299]  kasan_save_stack+0x3c/0x68
[   25.247405]  kasan_save_track+0x20/0x40
[   25.247497]  kasan_save_alloc_info+0x40/0x58
[   25.248202]  __kasan_kmalloc+0xd4/0xd8
[   25.248492]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.249401]  ksize_unpoisons_memory+0xc0/0x740
[   25.249722]  kunit_try_run_case+0x170/0x3f0
[   25.250261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.250489]  kthread+0x328/0x630
[   25.250699]  ret_from_fork+0x10/0x20
[   25.251171] 
[   25.251222] The buggy address belongs to the object at fff00000c77e8200
[   25.251222]  which belongs to the cache kmalloc-128 of size 128
[   25.251643] The buggy address is located 5 bytes to the right of
[   25.251643]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.252241] 
[   25.252503] The buggy address belongs to the physical page:
[   25.252572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.252715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.252830] page_type: f5(slab)
[   25.252925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.253044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.254352] page dumped because: kasan: bad access detected
[   25.254458] 
[   25.254509] Memory state around the buggy address:
[   25.254595]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.254777]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.254838] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.254894]                                                                 ^
[   25.254999]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255138]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255258] ==================================================================
[   25.256853] ==================================================================
[   25.256967] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.257283] Read of size 1 at addr fff00000c77e827f by task kunit_try_catch/195
[   25.257405] 
[   25.257474] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.257667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.257751] Hardware name: linux,dummy-virt (DT)
[   25.257826] Call trace:
[   25.257890]  show_stack+0x20/0x38 (C)
[   25.258145]  dump_stack_lvl+0x8c/0xd0
[   25.258290]  print_report+0x118/0x608
[   25.258430]  kasan_report+0xdc/0x128
[   25.258577]  __asan_report_load1_noabort+0x20/0x30
[   25.258822]  ksize_unpoisons_memory+0x690/0x740
[   25.259079]  kunit_try_run_case+0x170/0x3f0
[   25.259250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.259381]  kthread+0x328/0x630
[   25.259486]  ret_from_fork+0x10/0x20
[   25.259613] 
[   25.259735] Allocated by task 195:
[   25.259820]  kasan_save_stack+0x3c/0x68
[   25.260135]  kasan_save_track+0x20/0x40
[   25.260337]  kasan_save_alloc_info+0x40/0x58
[   25.260984]  __kasan_kmalloc+0xd4/0xd8
[   25.261168]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.261279]  ksize_unpoisons_memory+0xc0/0x740
[   25.261394]  kunit_try_run_case+0x170/0x3f0
[   25.261670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.262072]  kthread+0x328/0x630
[   25.262813]  ret_from_fork+0x10/0x20
[   25.263362] 
[   25.263431] The buggy address belongs to the object at fff00000c77e8200
[   25.263431]  which belongs to the cache kmalloc-128 of size 128
[   25.263584] The buggy address is located 12 bytes to the right of
[   25.263584]  allocated 115-byte region [fff00000c77e8200, fff00000c77e8273)
[   25.263994] 
[   25.264063] The buggy address belongs to the physical page:
[   25.264137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.264260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.264379] page_type: f5(slab)
[   25.264477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.264612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.264891] page dumped because: kasan: bad access detected
[   25.264979] 
[   25.265107] Memory state around the buggy address:
[   25.265181]  fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.265369]  fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.265607] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.265720]                                                                 ^
[   25.265822]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.266008]  fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.266164] ==================================================================

[   18.930349] ==================================================================
[   18.931034] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   18.931737] Read of size 1 at addr ffff888102b56378 by task kunit_try_catch/211
[   18.932366] 
[   18.932649] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   18.932769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.932788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.932820] Call Trace:
[   18.932847]  <TASK>
[   18.932897]  dump_stack_lvl+0x73/0xb0
[   18.932981]  print_report+0xd1/0x650
[   18.933940]  ? __virt_addr_valid+0x1db/0x2d0
[   18.933979]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.934040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.934075]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.934110]  kasan_report+0x141/0x180
[   18.934142]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.934303]  __asan_report_load1_noabort+0x18/0x20
[   18.934345]  ksize_unpoisons_memory+0x7e9/0x9b0
[   18.934382]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.934417]  ? finish_task_switch.isra.0+0x153/0x700
[   18.934448]  ? __switch_to+0x47/0xf50
[   18.934484]  ? __schedule+0x10cc/0x2b60
[   18.934519]  ? __pfx_read_tsc+0x10/0x10
[   18.934549]  ? ktime_get_ts64+0x86/0x230
[   18.934583]  kunit_try_run_case+0x1a5/0x480
[   18.934613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.934640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.934676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.934711]  ? __kthread_parkme+0x82/0x180
[   18.934768]  ? preempt_count_sub+0x50/0x80
[   18.934803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.934832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.934868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.934903]  kthread+0x337/0x6f0
[   18.934931]  ? trace_preempt_on+0x20/0xc0
[   18.934964]  ? __pfx_kthread+0x10/0x10
[   18.934993]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.935051]  ? calculate_sigpending+0x7b/0xa0
[   18.935086]  ? __pfx_kthread+0x10/0x10
[   18.935116]  ret_from_fork+0x116/0x1d0
[   18.935140]  ? __pfx_kthread+0x10/0x10
[   18.935180]  ret_from_fork_asm+0x1a/0x30
[   18.935241]  </TASK>
[   18.935257] 
[   18.954879] Allocated by task 211:
[   18.955446]  kasan_save_stack+0x45/0x70
[   18.955922]  kasan_save_track+0x18/0x40
[   18.956341]  kasan_save_alloc_info+0x3b/0x50
[   18.956979]  __kasan_kmalloc+0xb7/0xc0
[   18.957526]  __kmalloc_cache_noprof+0x189/0x420
[   18.958087]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.959022]  kunit_try_run_case+0x1a5/0x480
[   18.959623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.960335]  kthread+0x337/0x6f0
[   18.960787]  ret_from_fork+0x116/0x1d0
[   18.961313]  ret_from_fork_asm+0x1a/0x30
[   18.961841] 
[   18.962067] The buggy address belongs to the object at ffff888102b56300
[   18.962067]  which belongs to the cache kmalloc-128 of size 128
[   18.963616] The buggy address is located 5 bytes to the right of
[   18.963616]  allocated 115-byte region [ffff888102b56300, ffff888102b56373)
[   18.964761] 
[   18.965065] The buggy address belongs to the physical page:
[   18.965762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   18.966593] flags: 0x200000000000000(node=0|zone=2)
[   18.967399] page_type: f5(slab)
[   18.967808] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.968647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.969403] page dumped because: kasan: bad access detected
[   18.970151] 
[   18.970941] Memory state around the buggy address:
[   18.971303]  ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.972238]  ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.972918] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.973518]                                                                 ^
[   18.974564]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.975052]  ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.976380] ==================================================================
[   18.978890] ==================================================================
[   18.979523] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   18.980674] Read of size 1 at addr ffff888102b5637f by task kunit_try_catch/211
[   18.981673] 
[   18.982134] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   18.982503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.982542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.982595] Call Trace:
[   18.982614]  <TASK>
[   18.982633]  dump_stack_lvl+0x73/0xb0
[   18.982671]  print_report+0xd1/0x650
[   18.982703]  ? __virt_addr_valid+0x1db/0x2d0
[   18.982779]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.982818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.982851]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.982884]  kasan_report+0x141/0x180
[   18.982916]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.982955]  __asan_report_load1_noabort+0x18/0x20
[   18.982985]  ksize_unpoisons_memory+0x7b6/0x9b0
[   18.983045]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.983081]  ? finish_task_switch.isra.0+0x153/0x700
[   18.983112]  ? __switch_to+0x47/0xf50
[   18.983147]  ? __schedule+0x10cc/0x2b60
[   18.983229]  ? __pfx_read_tsc+0x10/0x10
[   18.983305]  ? ktime_get_ts64+0x86/0x230
[   18.983343]  kunit_try_run_case+0x1a5/0x480
[   18.983374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.983402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.983436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.983472]  ? __kthread_parkme+0x82/0x180
[   18.983500]  ? preempt_count_sub+0x50/0x80
[   18.983532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.983561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.983595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.983630]  kthread+0x337/0x6f0
[   18.983656]  ? trace_preempt_on+0x20/0xc0
[   18.983688]  ? __pfx_kthread+0x10/0x10
[   18.983716]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.983783]  ? calculate_sigpending+0x7b/0xa0
[   18.983821]  ? __pfx_kthread+0x10/0x10
[   18.983851]  ret_from_fork+0x116/0x1d0
[   18.983875]  ? __pfx_kthread+0x10/0x10
[   18.983903]  ret_from_fork_asm+0x1a/0x30
[   18.983943]  </TASK>
[   18.983957] 
[   19.004210] Allocated by task 211:
[   19.004608]  kasan_save_stack+0x45/0x70
[   19.005187]  kasan_save_track+0x18/0x40
[   19.005658]  kasan_save_alloc_info+0x3b/0x50
[   19.006155]  __kasan_kmalloc+0xb7/0xc0
[   19.006809]  __kmalloc_cache_noprof+0x189/0x420
[   19.007181]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.007780]  kunit_try_run_case+0x1a5/0x480
[   19.008341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.008949]  kthread+0x337/0x6f0
[   19.009263]  ret_from_fork+0x116/0x1d0
[   19.009736]  ret_from_fork_asm+0x1a/0x30
[   19.010205] 
[   19.010846] The buggy address belongs to the object at ffff888102b56300
[   19.010846]  which belongs to the cache kmalloc-128 of size 128
[   19.012168] The buggy address is located 12 bytes to the right of
[   19.012168]  allocated 115-byte region [ffff888102b56300, ffff888102b56373)
[   19.013256] 
[   19.013443] The buggy address belongs to the physical page:
[   19.014021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   19.015240] flags: 0x200000000000000(node=0|zone=2)
[   19.015712] page_type: f5(slab)
[   19.016057] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.016646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.017840] page dumped because: kasan: bad access detected
[   19.018773] 
[   19.018961] Memory state around the buggy address:
[   19.019687]  ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.020542]  ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.021374] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.022120]                                                                 ^
[   19.023094]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.023873]  ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.024624] ==================================================================
[   18.868445] ==================================================================
[   18.869895] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   18.870847] Read of size 1 at addr ffff888102b56373 by task kunit_try_catch/211
[   18.871866] 
[   18.872474] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   18.872582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.872603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.872633] Call Trace:
[   18.872653]  <TASK>
[   18.872676]  dump_stack_lvl+0x73/0xb0
[   18.872716]  print_report+0xd1/0x650
[   18.872780]  ? __virt_addr_valid+0x1db/0x2d0
[   18.872816]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.872849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.872881]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.872914]  kasan_report+0x141/0x180
[   18.872945]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.872984]  __asan_report_load1_noabort+0x18/0x20
[   18.873201]  ksize_unpoisons_memory+0x81c/0x9b0
[   18.873289]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.873364]  ? finish_task_switch.isra.0+0x153/0x700
[   18.873469]  ? __switch_to+0x47/0xf50
[   18.873545]  ? __schedule+0x10cc/0x2b60
[   18.873583]  ? __pfx_read_tsc+0x10/0x10
[   18.873614]  ? ktime_get_ts64+0x86/0x230
[   18.873648]  kunit_try_run_case+0x1a5/0x480
[   18.873679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.873706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.873777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.873816]  ? __kthread_parkme+0x82/0x180
[   18.873845]  ? preempt_count_sub+0x50/0x80
[   18.873876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.873904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.873941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.873975]  kthread+0x337/0x6f0
[   18.874022]  ? trace_preempt_on+0x20/0xc0
[   18.874063]  ? __pfx_kthread+0x10/0x10
[   18.874093]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.874125]  ? calculate_sigpending+0x7b/0xa0
[   18.874158]  ? __pfx_kthread+0x10/0x10
[   18.874308]  ret_from_fork+0x116/0x1d0
[   18.874341]  ? __pfx_kthread+0x10/0x10
[   18.874370]  ret_from_fork_asm+0x1a/0x30
[   18.874413]  </TASK>
[   18.874428] 
[   18.898311] Allocated by task 211:
[   18.898812]  kasan_save_stack+0x45/0x70
[   18.899931]  kasan_save_track+0x18/0x40
[   18.901278]  kasan_save_alloc_info+0x3b/0x50
[   18.902241]  __kasan_kmalloc+0xb7/0xc0
[   18.902849]  __kmalloc_cache_noprof+0x189/0x420
[   18.904295]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.906354]  kunit_try_run_case+0x1a5/0x480
[   18.906720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.908765]  kthread+0x337/0x6f0
[   18.909069]  ret_from_fork+0x116/0x1d0
[   18.909360]  ret_from_fork_asm+0x1a/0x30
[   18.909653] 
[   18.909807] The buggy address belongs to the object at ffff888102b56300
[   18.909807]  which belongs to the cache kmalloc-128 of size 128
[   18.910841] The buggy address is located 0 bytes to the right of
[   18.910841]  allocated 115-byte region [ffff888102b56300, ffff888102b56373)
[   18.911904] 
[   18.912188] The buggy address belongs to the physical page:
[   18.912688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   18.917087] flags: 0x200000000000000(node=0|zone=2)
[   18.917915] page_type: f5(slab)
[   18.918907] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.919695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.920740] page dumped because: kasan: bad access detected
[   18.921371] 
[   18.921466] Memory state around the buggy address:
[   18.921641]  ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.922592]  ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.923941] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.924653]                                                              ^
[   18.925567]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.926893]  ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.927466] ==================================================================

[   57.735504] ==================================================================
[   57.742767] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908
[   57.750213] Read of size 1 at addr cc78ee78 by task kunit_try_catch/246
[   57.756896] 
[   57.758392] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   57.758422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.758422] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.758422] Call trace: 
[   57.758453]  unwind_backtrace from show_stack+0x18/0x1c
[   57.758453]  show_stack from dump_stack_lvl+0x70/0x90
[   57.758483]  dump_stack_lvl from print_report+0x158/0x528
[   57.758514]  print_report from kasan_report+0xdc/0x118
[   57.758544]  kasan_report from ksize_unpoisons_memory+0x7f0/0x908
[   57.758575]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.758575]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.758605]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.758636]  kthread from ret_from_fork+0x14/0x20
[   57.758666] Exception stack(0xf232bfb0 to 0xf232bff8)
[   57.758666] bfa0:                                     00000000 00000000 00000000 00000000
[   57.758697] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.758697] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.758728] 
[   57.865325] Allocated by task 246:
[   57.868743]  kasan_save_track+0x30/0x5c
[   57.872619]  __kasan_kmalloc+0x8c/0x94
[   57.876403]  ksize_unpoisons_memory+0xe8/0x908
[   57.880889]  kunit_try_run_case+0x22c/0x5a8
[   57.885101]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.890624]  kthread+0x464/0x810
[   57.893890]  ret_from_fork+0x14/0x20
[   57.897491] 
[   57.898986] The buggy address belongs to the object at cc78ee00
[   57.898986]  which belongs to the cache kmalloc-128 of size 128
[   57.910888] The buggy address is located 5 bytes to the right of
[   57.910888]  allocated 115-byte region [cc78ee00, cc78ee73)
[   57.922546] 
[   57.924041] The buggy address belongs to the physical page:
[   57.929626] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   57.936920] flags: 0x0(zone=0)
[   57.939971] page_type: f5(slab)
[   57.943145] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.951293] raw: 00000000
[   57.953948] page dumped because: kasan: bad access detected
[   57.959533] 
[   57.961059] Memory state around the buggy address:
[   57.965881]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.972442]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.979003] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.985565]                                                         ^
[   57.992065]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.998626]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.005187] ==================================================================
[   57.454284] ==================================================================
[   57.465759] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908
[   57.473205] Read of size 1 at addr cc78ee73 by task kunit_try_catch/246
[   57.479858] 
[   57.481384] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   57.481414] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.481414] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.481414] Call trace: 
[   57.481445]  unwind_backtrace from show_stack+0x18/0x1c
[   57.481445]  show_stack from dump_stack_lvl+0x70/0x90
[   57.481475]  dump_stack_lvl from print_report+0x158/0x528
[   57.481506]  print_report from kasan_report+0xdc/0x118
[   57.481536]  kasan_report from ksize_unpoisons_memory+0x7f8/0x908
[   57.481567]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.481567]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.481597]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.481628]  kthread from ret_from_fork+0x14/0x20
[   57.481658] Exception stack(0xf232bfb0 to 0xf232bff8)
[   57.481658] bfa0:                                     00000000 00000000 00000000 00000000
[   57.481689] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.481689] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.481719] 
[   57.588317] Allocated by task 246:
[   57.591766]  kasan_save_track+0x30/0x5c
[   57.595611]  __kasan_kmalloc+0x8c/0x94
[   57.599395]  ksize_unpoisons_memory+0xe8/0x908
[   57.603881]  kunit_try_run_case+0x22c/0x5a8
[   57.608093]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.613616]  kthread+0x464/0x810
[   57.616882]  ret_from_fork+0x14/0x20
[   57.620483] 
[   57.621978] The buggy address belongs to the object at cc78ee00
[   57.621978]  which belongs to the cache kmalloc-128 of size 128
[   57.633880] The buggy address is located 0 bytes to the right of
[   57.633880]  allocated 115-byte region [cc78ee00, cc78ee73)
[   57.645538] 
[   57.647033] The buggy address belongs to the physical page:
[   57.652618] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   57.659912] flags: 0x0(zone=0)
[   57.662994] page_type: f5(slab)
[   57.666137] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.674285] raw: 00000000
[   57.676940] page dumped because: kasan: bad access detected
[   57.682556] 
[   57.684051] Memory state around the buggy address:
[   57.688873]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.695434]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.702026] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.708587]                                                      ^
[   57.714813]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.721374]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.727935] ==================================================================
[   58.012603] ==================================================================
[   58.019866] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908
[   58.027313] Read of size 1 at addr cc78ee7f by task kunit_try_catch/246
[   58.033966] 
[   58.035461] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.035491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.035522] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.035522] Call trace: 
[   58.035522]  unwind_backtrace from show_stack+0x18/0x1c
[   58.035552]  show_stack from dump_stack_lvl+0x70/0x90
[   58.035583]  dump_stack_lvl from print_report+0x158/0x528
[   58.035614]  print_report from kasan_report+0xdc/0x118
[   58.035614]  kasan_report from ksize_unpoisons_memory+0x858/0x908
[   58.035644]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.035675]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.035705]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.035736]  kthread from ret_from_fork+0x14/0x20
[   58.035736] Exception stack(0xf232bfb0 to 0xf232bff8)
[   58.035766] bfa0:                                     00000000 00000000 00000000 00000000
[   58.035766] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.035797] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.035797] 
[   58.142425] Allocated by task 246:
[   58.145843]  kasan_save_track+0x30/0x5c
[   58.149719]  __kasan_kmalloc+0x8c/0x94
[   58.153503]  ksize_unpoisons_memory+0xe8/0x908
[   58.157958]  kunit_try_run_case+0x22c/0x5a8
[   58.162200]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.167724]  kthread+0x464/0x810
[   58.170959]  ret_from_fork+0x14/0x20
[   58.174591] 
[   58.176086] The buggy address belongs to the object at cc78ee00
[   58.176086]  which belongs to the cache kmalloc-128 of size 128
[   58.187988] The buggy address is located 12 bytes to the right of
[   58.187988]  allocated 115-byte region [cc78ee00, cc78ee73)
[   58.199707] 
[   58.201202] The buggy address belongs to the physical page:
[   58.206817] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.214080] flags: 0x0(zone=0)
[   58.217163] page_type: f5(slab)
[   58.220336] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.228454] raw: 00000000
[   58.231109] page dumped because: kasan: bad access detected
[   58.236724] 
[   58.238220] Memory state around the buggy address:
[   58.243041]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.249603]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.256164] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.262756]                                                         ^
[   58.269226]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.275787]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.282379] ==================================================================