Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.472862] ==================================================================
[   18.472934] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.472999] Read of size 1 at addr fff00000c65b1578 by task kunit_try_catch/194
[   18.473063] 
[   18.473113] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.473214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.473243] Hardware name: linux,dummy-virt (DT)
[   18.473275] Call trace:
[   18.473295]  show_stack+0x20/0x38 (C)
[   18.473407]  dump_stack_lvl+0x8c/0xd0
[   18.473527]  print_report+0x118/0x608
[   18.473596]  kasan_report+0xdc/0x128
[   18.473672]  __asan_report_load1_noabort+0x20/0x30
[   18.473739]  ksize_unpoisons_memory+0x618/0x740
[   18.473807]  kunit_try_run_case+0x170/0x3f0
[   18.473880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.473933]  kthread+0x328/0x630
[   18.473999]  ret_from_fork+0x10/0x20
[   18.474046] 
[   18.474065] Allocated by task 194:
[   18.474193]  kasan_save_stack+0x3c/0x68
[   18.474341]  kasan_save_track+0x20/0x40
[   18.474378]  kasan_save_alloc_info+0x40/0x58
[   18.474414]  __kasan_kmalloc+0xd4/0xd8
[   18.474460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.474518]  ksize_unpoisons_memory+0xc0/0x740
[   18.474575]  kunit_try_run_case+0x170/0x3f0
[   18.474642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.474736]  kthread+0x328/0x630
[   18.474769]  ret_from_fork+0x10/0x20
[   18.474802] 
[   18.474827] The buggy address belongs to the object at fff00000c65b1500
[   18.474827]  which belongs to the cache kmalloc-128 of size 128
[   18.475023] The buggy address is located 5 bytes to the right of
[   18.475023]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.475098] 
[   18.475204] The buggy address belongs to the physical page:
[   18.475253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.475321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.475376] page_type: f5(slab)
[   18.475445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.475603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.475713] page dumped because: kasan: bad access detected
[   18.475745] 
[   18.475763] Memory state around the buggy address:
[   18.475794]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.475857]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.475900] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.475938]                                                                 ^
[   18.475977]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.476040]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.476227] ==================================================================
[   18.477353] ==================================================================
[   18.477409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.477491] Read of size 1 at addr fff00000c65b157f by task kunit_try_catch/194
[   18.477558] 
[   18.477606] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.477696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.477724] Hardware name: linux,dummy-virt (DT)
[   18.477754] Call trace:
[   18.477880]  show_stack+0x20/0x38 (C)
[   18.477939]  dump_stack_lvl+0x8c/0xd0
[   18.478000]  print_report+0x118/0x608
[   18.478045]  kasan_report+0xdc/0x128
[   18.478095]  __asan_report_load1_noabort+0x20/0x30
[   18.478144]  ksize_unpoisons_memory+0x690/0x740
[   18.478194]  kunit_try_run_case+0x170/0x3f0
[   18.478241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.478292]  kthread+0x328/0x630
[   18.478335]  ret_from_fork+0x10/0x20
[   18.478380] 
[   18.478414] Allocated by task 194:
[   18.478460]  kasan_save_stack+0x3c/0x68
[   18.478500]  kasan_save_track+0x20/0x40
[   18.478545]  kasan_save_alloc_info+0x40/0x58
[   18.478581]  __kasan_kmalloc+0xd4/0xd8
[   18.478616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.478670]  ksize_unpoisons_memory+0xc0/0x740
[   18.478706]  kunit_try_run_case+0x170/0x3f0
[   18.478744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.478786]  kthread+0x328/0x630
[   18.478817]  ret_from_fork+0x10/0x20
[   18.478852] 
[   18.478875] The buggy address belongs to the object at fff00000c65b1500
[   18.478875]  which belongs to the cache kmalloc-128 of size 128
[   18.478930] The buggy address is located 12 bytes to the right of
[   18.478930]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.478994] 
[   18.479013] The buggy address belongs to the physical page:
[   18.479052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.479103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.479150] page_type: f5(slab)
[   18.479187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.479237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.479290] page dumped because: kasan: bad access detected
[   18.479322] 
[   18.479339] Memory state around the buggy address:
[   18.479405]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.479460]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479503] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.479542]                                                                 ^
[   18.479581]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479623]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.479662] ==================================================================
[   18.467730] ==================================================================
[   18.467858] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.467951] Read of size 1 at addr fff00000c65b1573 by task kunit_try_catch/194
[   18.468085] 
[   18.468175] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   18.468300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.468382] Hardware name: linux,dummy-virt (DT)
[   18.468497] Call trace:
[   18.468580]  show_stack+0x20/0x38 (C)
[   18.468680]  dump_stack_lvl+0x8c/0xd0
[   18.468780]  print_report+0x118/0x608
[   18.468883]  kasan_report+0xdc/0x128
[   18.468930]  __asan_report_load1_noabort+0x20/0x30
[   18.469006]  ksize_unpoisons_memory+0x628/0x740
[   18.469055]  kunit_try_run_case+0x170/0x3f0
[   18.469104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.469288]  kthread+0x328/0x630
[   18.469334]  ret_from_fork+0x10/0x20
[   18.469383] 
[   18.469402] Allocated by task 194:
[   18.469516]  kasan_save_stack+0x3c/0x68
[   18.469590]  kasan_save_track+0x20/0x40
[   18.469628]  kasan_save_alloc_info+0x40/0x58
[   18.469712]  __kasan_kmalloc+0xd4/0xd8
[   18.469800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.469862]  ksize_unpoisons_memory+0xc0/0x740
[   18.469939]  kunit_try_run_case+0x170/0x3f0
[   18.470035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.470077]  kthread+0x328/0x630
[   18.470155]  ret_from_fork+0x10/0x20
[   18.470299] 
[   18.470320] The buggy address belongs to the object at fff00000c65b1500
[   18.470320]  which belongs to the cache kmalloc-128 of size 128
[   18.470399] The buggy address is located 0 bytes to the right of
[   18.470399]  allocated 115-byte region [fff00000c65b1500, fff00000c65b1573)
[   18.470510] 
[   18.470558] The buggy address belongs to the physical page:
[   18.470630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.470716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.470824] page_type: f5(slab)
[   18.470904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.470956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.470996] page dumped because: kasan: bad access detected
[   18.471275] 
[   18.471337] Memory state around the buggy address:
[   18.471471]  fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.471555]  fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471597] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.471636]                                                              ^
[   18.471702]  fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471745]  fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471785] ==================================================================


[   15.143297] ==================================================================
[   15.143710] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   15.144698] Read of size 1 at addr ffff8881033dc17f by task kunit_try_catch/211
[   15.145280] 
[   15.145540] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.145649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.145678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.145726] Call Trace:
[   15.145765]  <TASK>
[   15.145793]  dump_stack_lvl+0x73/0xb0
[   15.145840]  print_report+0xd1/0x650
[   15.145867]  ? __virt_addr_valid+0x1db/0x2d0
[   15.145897]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.145938]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.145967]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.145993]  kasan_report+0x141/0x180
[   15.146018]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   15.146048]  __asan_report_load1_noabort+0x18/0x20
[   15.146071]  ksize_unpoisons_memory+0x7b6/0x9b0
[   15.146098]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.146123]  ? finish_task_switch.isra.0+0x153/0x700
[   15.146148]  ? __switch_to+0x47/0xf50
[   15.146176]  ? __schedule+0x10cc/0x2b60
[   15.146211]  ? __pfx_read_tsc+0x10/0x10
[   15.146538]  ? ktime_get_ts64+0x86/0x230
[   15.146622]  kunit_try_run_case+0x1a5/0x480
[   15.146678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.146772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.146800]  ? __kthread_parkme+0x82/0x180
[   15.146824]  ? preempt_count_sub+0x50/0x80
[   15.146849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.146899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.146925]  kthread+0x337/0x6f0
[   15.146947]  ? trace_preempt_on+0x20/0xc0
[   15.146973]  ? __pfx_kthread+0x10/0x10
[   15.146996]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.147021]  ? calculate_sigpending+0x7b/0xa0
[   15.147050]  ? __pfx_kthread+0x10/0x10
[   15.147073]  ret_from_fork+0x116/0x1d0
[   15.147094]  ? __pfx_kthread+0x10/0x10
[   15.147116]  ret_from_fork_asm+0x1a/0x30
[   15.147150]  </TASK>
[   15.147164] 
[   15.162874] Allocated by task 211:
[   15.163659]  kasan_save_stack+0x45/0x70
[   15.163957]  kasan_save_track+0x18/0x40
[   15.164176]  kasan_save_alloc_info+0x3b/0x50
[   15.164807]  __kasan_kmalloc+0xb7/0xc0
[   15.165032]  __kmalloc_cache_noprof+0x189/0x420
[   15.165242]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.165761]  kunit_try_run_case+0x1a5/0x480
[   15.166345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167096]  kthread+0x337/0x6f0
[   15.167318]  ret_from_fork+0x116/0x1d0
[   15.167505]  ret_from_fork_asm+0x1a/0x30
[   15.167674] 
[   15.167774] The buggy address belongs to the object at ffff8881033dc100
[   15.167774]  which belongs to the cache kmalloc-128 of size 128
[   15.168172] The buggy address is located 12 bytes to the right of
[   15.168172]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.168582] 
[   15.168676] The buggy address belongs to the physical page:
[   15.168876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.169140] flags: 0x200000000000000(node=0|zone=2)
[   15.169332] page_type: f5(slab)
[   15.170704] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.171091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.171356] page dumped because: kasan: bad access detected
[   15.172236] 
[   15.172420] Memory state around the buggy address:
[   15.172872]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.174190]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174735] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.175700]                                                                 ^
[   15.176032]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.176574]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177112] ==================================================================
[   15.066074] ==================================================================
[   15.066637] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   15.067403] Read of size 1 at addr ffff8881033dc173 by task kunit_try_catch/211
[   15.067907] 
[   15.068902] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.069300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.069324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.069350] Call Trace:
[   15.069370]  <TASK>
[   15.069396]  dump_stack_lvl+0x73/0xb0
[   15.069443]  print_report+0xd1/0x650
[   15.069496]  ? __virt_addr_valid+0x1db/0x2d0
[   15.069524]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.069575]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069601]  kasan_report+0x141/0x180
[   15.069625]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   15.069655]  __asan_report_load1_noabort+0x18/0x20
[   15.069677]  ksize_unpoisons_memory+0x81c/0x9b0
[   15.069752]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.069800]  ? finish_task_switch.isra.0+0x153/0x700
[   15.069842]  ? __switch_to+0x47/0xf50
[   15.069885]  ? __schedule+0x10cc/0x2b60
[   15.069925]  ? __pfx_read_tsc+0x10/0x10
[   15.069960]  ? ktime_get_ts64+0x86/0x230
[   15.069999]  kunit_try_run_case+0x1a5/0x480
[   15.070037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.070103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.070140]  ? __kthread_parkme+0x82/0x180
[   15.070174]  ? preempt_count_sub+0x50/0x80
[   15.070225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.070381]  kthread+0x337/0x6f0
[   15.070405]  ? trace_preempt_on+0x20/0xc0
[   15.070432]  ? __pfx_kthread+0x10/0x10
[   15.070473]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.070505]  ? calculate_sigpending+0x7b/0xa0
[   15.070534]  ? __pfx_kthread+0x10/0x10
[   15.070557]  ret_from_fork+0x116/0x1d0
[   15.070579]  ? __pfx_kthread+0x10/0x10
[   15.070602]  ret_from_fork_asm+0x1a/0x30
[   15.070639]  </TASK>
[   15.070653] 
[   15.085618] Allocated by task 211:
[   15.085990]  kasan_save_stack+0x45/0x70
[   15.086260]  kasan_save_track+0x18/0x40
[   15.086574]  kasan_save_alloc_info+0x3b/0x50
[   15.086860]  __kasan_kmalloc+0xb7/0xc0
[   15.087130]  __kmalloc_cache_noprof+0x189/0x420
[   15.087418]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.088825]  kunit_try_run_case+0x1a5/0x480
[   15.089063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090122]  kthread+0x337/0x6f0
[   15.090426]  ret_from_fork+0x116/0x1d0
[   15.090612]  ret_from_fork_asm+0x1a/0x30
[   15.091274] 
[   15.091549] The buggy address belongs to the object at ffff8881033dc100
[   15.091549]  which belongs to the cache kmalloc-128 of size 128
[   15.091947] The buggy address is located 0 bytes to the right of
[   15.091947]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.093637] 
[   15.093936] The buggy address belongs to the physical page:
[   15.094207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.094791] flags: 0x200000000000000(node=0|zone=2)
[   15.095158] page_type: f5(slab)
[   15.096119] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.096726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.097514] page dumped because: kasan: bad access detected
[   15.098277] 
[   15.098531] Memory state around the buggy address:
[   15.099145]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.099480]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100536] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.100923]                                                              ^
[   15.101341]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.101758]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102204] ==================================================================
[   15.103042] ==================================================================
[   15.103801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   15.104257] Read of size 1 at addr ffff8881033dc178 by task kunit_try_catch/211
[   15.105541] 
[   15.105896] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   15.106009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.106038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.106079] Call Trace:
[   15.106121]  <TASK>
[   15.106157]  dump_stack_lvl+0x73/0xb0
[   15.106228]  print_report+0xd1/0x650
[   15.106282]  ? __virt_addr_valid+0x1db/0x2d0
[   15.106333]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.106437]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106502]  kasan_report+0x141/0x180
[   15.106546]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106605]  __asan_report_load1_noabort+0x18/0x20
[   15.106647]  ksize_unpoisons_memory+0x7e9/0x9b0
[   15.106692]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   15.106876]  ? finish_task_switch.isra.0+0x153/0x700
[   15.106930]  ? __switch_to+0x47/0xf50
[   15.106983]  ? __schedule+0x10cc/0x2b60
[   15.107030]  ? __pfx_read_tsc+0x10/0x10
[   15.107070]  ? ktime_get_ts64+0x86/0x230
[   15.107120]  kunit_try_run_case+0x1a5/0x480
[   15.107170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.107280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.107309]  ? __kthread_parkme+0x82/0x180
[   15.107333]  ? preempt_count_sub+0x50/0x80
[   15.107370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.107448]  kthread+0x337/0x6f0
[   15.107495]  ? trace_preempt_on+0x20/0xc0
[   15.107521]  ? __pfx_kthread+0x10/0x10
[   15.107545]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.107570]  ? calculate_sigpending+0x7b/0xa0
[   15.107598]  ? __pfx_kthread+0x10/0x10
[   15.107622]  ret_from_fork+0x116/0x1d0
[   15.107642]  ? __pfx_kthread+0x10/0x10
[   15.107665]  ret_from_fork_asm+0x1a/0x30
[   15.107741]  </TASK>
[   15.107772] 
[   15.123262] Allocated by task 211:
[   15.124564]  kasan_save_stack+0x45/0x70
[   15.125164]  kasan_save_track+0x18/0x40
[   15.125884]  kasan_save_alloc_info+0x3b/0x50
[   15.126553]  __kasan_kmalloc+0xb7/0xc0
[   15.126761]  __kmalloc_cache_noprof+0x189/0x420
[   15.127306]  ksize_unpoisons_memory+0xc7/0x9b0
[   15.127776]  kunit_try_run_case+0x1a5/0x480
[   15.128008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128407]  kthread+0x337/0x6f0
[   15.128668]  ret_from_fork+0x116/0x1d0
[   15.128938]  ret_from_fork_asm+0x1a/0x30
[   15.129148] 
[   15.129451] The buggy address belongs to the object at ffff8881033dc100
[   15.129451]  which belongs to the cache kmalloc-128 of size 128
[   15.130857] The buggy address is located 5 bytes to the right of
[   15.130857]  allocated 115-byte region [ffff8881033dc100, ffff8881033dc173)
[   15.131837] 
[   15.132606] The buggy address belongs to the physical page:
[   15.132940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc
[   15.134047] flags: 0x200000000000000(node=0|zone=2)
[   15.134359] page_type: f5(slab)
[   15.134553] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.135414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.136397] page dumped because: kasan: bad access detected
[   15.136719] 
[   15.137192] Memory state around the buggy address:
[   15.137622]  ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.138088]  ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.138628] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.139321]                                                                 ^
[   15.140064]  ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.140937]  ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141307] ==================================================================