Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.538275] ==================================================================
[   25.538433] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.538569] Read of size 1 at addr fff00000c6419773 by task kunit_try_catch/194
[   25.538709] 
[   25.538880] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.539776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.539852] Hardware name: linux,dummy-virt (DT)
[   25.539946] Call trace:
[   25.540026]  show_stack+0x20/0x38 (C)
[   25.540164]  dump_stack_lvl+0x8c/0xd0
[   25.540552]  print_report+0x118/0x608
[   25.540896]  kasan_report+0xdc/0x128
[   25.541019]  __asan_report_load1_noabort+0x20/0x30
[   25.541140]  ksize_unpoisons_memory+0x628/0x740
[   25.541268]  kunit_try_run_case+0x170/0x3f0
[   25.541428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.541567]  kthread+0x328/0x630
[   25.541681]  ret_from_fork+0x10/0x20
[   25.541798] 
[   25.541843] Allocated by task 194:
[   25.541930]  kasan_save_stack+0x3c/0x68
[   25.542050]  kasan_save_track+0x20/0x40
[   25.542169]  kasan_save_alloc_info+0x40/0x58
[   25.542497]  __kasan_kmalloc+0xd4/0xd8
[   25.542951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.543190]  ksize_unpoisons_memory+0xc0/0x740
[   25.543304]  kunit_try_run_case+0x170/0x3f0
[   25.543427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.543561]  kthread+0x328/0x630
[   25.543664]  ret_from_fork+0x10/0x20
[   25.544007] 
[   25.544278] The buggy address belongs to the object at fff00000c6419700
[   25.544278]  which belongs to the cache kmalloc-128 of size 128
[   25.544437] The buggy address is located 0 bytes to the right of
[   25.544437]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.545061] 
[   25.545197] The buggy address belongs to the physical page:
[   25.545271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.545447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.545560] page_type: f5(slab)
[   25.545651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.545776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.545871] page dumped because: kasan: bad access detected
[   25.545945] 
[   25.546012] Memory state around the buggy address:
[   25.546088]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.546194]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546301] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.546415]                                                              ^
[   25.546509]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546615]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.546732] ==================================================================
[   25.558931] ==================================================================
[   25.559143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.559349] Read of size 1 at addr fff00000c641977f by task kunit_try_catch/194
[   25.559476] 
[   25.559541] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.559737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.559804] Hardware name: linux,dummy-virt (DT)
[   25.560361] Call trace:
[   25.560450]  show_stack+0x20/0x38 (C)
[   25.560577]  dump_stack_lvl+0x8c/0xd0
[   25.560804]  print_report+0x118/0x608
[   25.561065]  kasan_report+0xdc/0x128
[   25.561350]  __asan_report_load1_noabort+0x20/0x30
[   25.561937]  ksize_unpoisons_memory+0x690/0x740
[   25.562088]  kunit_try_run_case+0x170/0x3f0
[   25.562210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.562360]  kthread+0x328/0x630
[   25.562549]  ret_from_fork+0x10/0x20
[   25.563269] 
[   25.563423] Allocated by task 194:
[   25.563847]  kasan_save_stack+0x3c/0x68
[   25.563959]  kasan_save_track+0x20/0x40
[   25.564083]  kasan_save_alloc_info+0x40/0x58
[   25.564616]  __kasan_kmalloc+0xd4/0xd8
[   25.564959]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.565076]  ksize_unpoisons_memory+0xc0/0x740
[   25.565175]  kunit_try_run_case+0x170/0x3f0
[   25.565858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.566113]  kthread+0x328/0x630
[   25.566552]  ret_from_fork+0x10/0x20
[   25.566926] 
[   25.567417] The buggy address belongs to the object at fff00000c6419700
[   25.567417]  which belongs to the cache kmalloc-128 of size 128
[   25.567600] The buggy address is located 12 bytes to the right of
[   25.567600]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.568378] 
[   25.568442] The buggy address belongs to the physical page:
[   25.568483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.568549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.568666] page_type: f5(slab)
[   25.568715] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.568781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.568832] page dumped because: kasan: bad access detected
[   25.568872] 
[   25.568893] Memory state around the buggy address:
[   25.568932]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.568991]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569047] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.569095]                                                                 ^
[   25.569145]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569203]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.569254] ==================================================================
[   25.548566] ==================================================================
[   25.548688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.548881] Read of size 1 at addr fff00000c6419778 by task kunit_try_catch/194
[   25.549433] 
[   25.549650] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.550179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.550440] Hardware name: linux,dummy-virt (DT)
[   25.550544] Call trace:
[   25.550596]  show_stack+0x20/0x38 (C)
[   25.550714]  dump_stack_lvl+0x8c/0xd0
[   25.551193]  print_report+0x118/0x608
[   25.551592]  kasan_report+0xdc/0x128
[   25.551729]  __asan_report_load1_noabort+0x20/0x30
[   25.551918]  ksize_unpoisons_memory+0x618/0x740
[   25.551998]  kunit_try_run_case+0x170/0x3f0
[   25.552059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.552182]  kthread+0x328/0x630
[   25.552240]  ret_from_fork+0x10/0x20
[   25.552301] 
[   25.552323] Allocated by task 194:
[   25.552469]  kasan_save_stack+0x3c/0x68
[   25.552631]  kasan_save_track+0x20/0x40
[   25.552831]  kasan_save_alloc_info+0x40/0x58
[   25.552944]  __kasan_kmalloc+0xd4/0xd8
[   25.553043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.553216]  ksize_unpoisons_memory+0xc0/0x740
[   25.553449]  kunit_try_run_case+0x170/0x3f0
[   25.553581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.553883]  kthread+0x328/0x630
[   25.554103]  ret_from_fork+0x10/0x20
[   25.554194] 
[   25.554293] The buggy address belongs to the object at fff00000c6419700
[   25.554293]  which belongs to the cache kmalloc-128 of size 128
[   25.555046] The buggy address is located 5 bytes to the right of
[   25.555046]  allocated 115-byte region [fff00000c6419700, fff00000c6419773)
[   25.555223] 
[   25.555278] The buggy address belongs to the physical page:
[   25.555377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.555687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.555828] page_type: f5(slab)
[   25.555966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.556090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.556242] page dumped because: kasan: bad access detected
[   25.556348] 
[   25.556424] Memory state around the buggy address:
[   25.556549]  fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.556864]  fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556977] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.557125]                                                                 ^
[   25.557383]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557539]  fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557679] ==================================================================


[   11.829942] ==================================================================
[   11.830171] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.830410] Read of size 1 at addr ffff88810276e77f by task kunit_try_catch/211
[   11.830633] 
[   11.830717] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.830758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.830769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.830787] Call Trace:
[   11.830800]  <TASK>
[   11.830812]  dump_stack_lvl+0x73/0xb0
[   11.830834]  print_report+0xd1/0x650
[   11.830856]  ? __virt_addr_valid+0x1db/0x2d0
[   11.830879]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.830967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.830992]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.831016]  kasan_report+0x141/0x180
[   11.831039]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.831067]  __asan_report_load1_noabort+0x18/0x20
[   11.831092]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.831176]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.831201]  ? finish_task_switch.isra.0+0x153/0x700
[   11.831224]  ? __switch_to+0x47/0xf50
[   11.831249]  ? __schedule+0x10cc/0x2b60
[   11.831271]  ? __pfx_read_tsc+0x10/0x10
[   11.831292]  ? ktime_get_ts64+0x86/0x230
[   11.831315]  kunit_try_run_case+0x1a5/0x480
[   11.831337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.831357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.831382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.831407]  ? __kthread_parkme+0x82/0x180
[   11.831427]  ? preempt_count_sub+0x50/0x80
[   11.831450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.831474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.831500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.831527]  kthread+0x337/0x6f0
[   11.831546]  ? trace_preempt_on+0x20/0xc0
[   11.831568]  ? __pfx_kthread+0x10/0x10
[   11.831588]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.831611]  ? calculate_sigpending+0x7b/0xa0
[   11.831635]  ? __pfx_kthread+0x10/0x10
[   11.831656]  ret_from_fork+0x116/0x1d0
[   11.831674]  ? __pfx_kthread+0x10/0x10
[   11.831694]  ret_from_fork_asm+0x1a/0x30
[   11.831725]  </TASK>
[   11.831734] 
[   11.849855] Allocated by task 211:
[   11.850268]  kasan_save_stack+0x45/0x70
[   11.850882]  kasan_save_track+0x18/0x40
[   11.851265]  kasan_save_alloc_info+0x3b/0x50
[   11.851422]  __kasan_kmalloc+0xb7/0xc0
[   11.851555]  __kmalloc_cache_noprof+0x189/0x420
[   11.851964]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.852540]  kunit_try_run_case+0x1a5/0x480
[   11.853086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.853619]  kthread+0x337/0x6f0
[   11.854042]  ret_from_fork+0x116/0x1d0
[   11.854452]  ret_from_fork_asm+0x1a/0x30
[   11.854778] 
[   11.855149] The buggy address belongs to the object at ffff88810276e700
[   11.855149]  which belongs to the cache kmalloc-128 of size 128
[   11.855638] The buggy address is located 12 bytes to the right of
[   11.855638]  allocated 115-byte region [ffff88810276e700, ffff88810276e773)
[   11.857030] 
[   11.857269] The buggy address belongs to the physical page:
[   11.857466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e
[   11.857938] flags: 0x200000000000000(node=0|zone=2)
[   11.858613] page_type: f5(slab)
[   11.859055] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.859623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.859853] page dumped because: kasan: bad access detected
[   11.860541] 
[   11.860664] Memory state around the buggy address:
[   11.860824]  ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.861444]  ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.862174] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.862966]                                                                 ^
[   11.863391]  ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.863611]  ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.864359] ==================================================================
[   11.791006] ==================================================================
[   11.791570] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.791997] Read of size 1 at addr ffff88810276e773 by task kunit_try_catch/211
[   11.792270] 
[   11.792382] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.792427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.792438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.792458] Call Trace:
[   11.792468]  <TASK>
[   11.792482]  dump_stack_lvl+0x73/0xb0
[   11.792508]  print_report+0xd1/0x650
[   11.792531]  ? __virt_addr_valid+0x1db/0x2d0
[   11.792556]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.792580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.792604]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.792639]  kasan_report+0x141/0x180
[   11.792662]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.792691]  __asan_report_load1_noabort+0x18/0x20
[   11.792716]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.792741]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.792765]  ? finish_task_switch.isra.0+0x153/0x700
[   11.792789]  ? __switch_to+0x47/0xf50
[   11.792816]  ? __schedule+0x10cc/0x2b60
[   11.792839]  ? __pfx_read_tsc+0x10/0x10
[   11.792861]  ? ktime_get_ts64+0x86/0x230
[   11.792885]  kunit_try_run_case+0x1a5/0x480
[   11.792920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.792940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.792966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.792991]  ? __kthread_parkme+0x82/0x180
[   11.793012]  ? preempt_count_sub+0x50/0x80
[   11.793036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.793062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.793088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.793114]  kthread+0x337/0x6f0
[   11.793134]  ? trace_preempt_on+0x20/0xc0
[   11.793157]  ? __pfx_kthread+0x10/0x10
[   11.793223]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.793249]  ? calculate_sigpending+0x7b/0xa0
[   11.793276]  ? __pfx_kthread+0x10/0x10
[   11.793298]  ret_from_fork+0x116/0x1d0
[   11.793317]  ? __pfx_kthread+0x10/0x10
[   11.793338]  ret_from_fork_asm+0x1a/0x30
[   11.793369]  </TASK>
[   11.793379] 
[   11.801585] Allocated by task 211:
[   11.801768]  kasan_save_stack+0x45/0x70
[   11.801926]  kasan_save_track+0x18/0x40
[   11.802063]  kasan_save_alloc_info+0x3b/0x50
[   11.802271]  __kasan_kmalloc+0xb7/0xc0
[   11.802464]  __kmalloc_cache_noprof+0x189/0x420
[   11.802784]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.803010]  kunit_try_run_case+0x1a5/0x480
[   11.803155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.803668]  kthread+0x337/0x6f0
[   11.803850]  ret_from_fork+0x116/0x1d0
[   11.804111]  ret_from_fork_asm+0x1a/0x30
[   11.804321] 
[   11.804392] The buggy address belongs to the object at ffff88810276e700
[   11.804392]  which belongs to the cache kmalloc-128 of size 128
[   11.805083] The buggy address is located 0 bytes to the right of
[   11.805083]  allocated 115-byte region [ffff88810276e700, ffff88810276e773)
[   11.805470] 
[   11.805541] The buggy address belongs to the physical page:
[   11.805716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e
[   11.806082] flags: 0x200000000000000(node=0|zone=2)
[   11.806312] page_type: f5(slab)
[   11.806476] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.807118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.807354] page dumped because: kasan: bad access detected
[   11.807799] 
[   11.807910] Memory state around the buggy address:
[   11.808155]  ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.808401]  ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.808617] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.809057]                                                              ^
[   11.809367]  ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.809649]  ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.809989] ==================================================================
[   11.810445] ==================================================================
[   11.810804] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.811267] Read of size 1 at addr ffff88810276e778 by task kunit_try_catch/211
[   11.811579] 
[   11.811692] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.811732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.811743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.811762] Call Trace:
[   11.811774]  <TASK>
[   11.811786]  dump_stack_lvl+0x73/0xb0
[   11.811811]  print_report+0xd1/0x650
[   11.811833]  ? __virt_addr_valid+0x1db/0x2d0
[   11.811856]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.811881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.811920]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.811990]  kasan_report+0x141/0x180
[   11.812016]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.812045]  __asan_report_load1_noabort+0x18/0x20
[   11.812071]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.812096]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.812120]  ? finish_task_switch.isra.0+0x153/0x700
[   11.812144]  ? __switch_to+0x47/0xf50
[   11.812169]  ? __schedule+0x10cc/0x2b60
[   11.812192]  ? __pfx_read_tsc+0x10/0x10
[   11.812213]  ? ktime_get_ts64+0x86/0x230
[   11.812237]  kunit_try_run_case+0x1a5/0x480
[   11.812259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.812281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.812308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.812333]  ? __kthread_parkme+0x82/0x180
[   11.812353]  ? preempt_count_sub+0x50/0x80
[   11.812376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.812399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.812425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.812452]  kthread+0x337/0x6f0
[   11.812472]  ? trace_preempt_on+0x20/0xc0
[   11.812494]  ? __pfx_kthread+0x10/0x10
[   11.812515]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.812538]  ? calculate_sigpending+0x7b/0xa0
[   11.812562]  ? __pfx_kthread+0x10/0x10
[   11.812584]  ret_from_fork+0x116/0x1d0
[   11.812603]  ? __pfx_kthread+0x10/0x10
[   11.812623]  ret_from_fork_asm+0x1a/0x30
[   11.812666]  </TASK>
[   11.812676] 
[   11.820709] Allocated by task 211:
[   11.820837]  kasan_save_stack+0x45/0x70
[   11.820993]  kasan_save_track+0x18/0x40
[   11.821133]  kasan_save_alloc_info+0x3b/0x50
[   11.821390]  __kasan_kmalloc+0xb7/0xc0
[   11.821589]  __kmalloc_cache_noprof+0x189/0x420
[   11.821818]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.822055]  kunit_try_run_case+0x1a5/0x480
[   11.822457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.822733]  kthread+0x337/0x6f0
[   11.822890]  ret_from_fork+0x116/0x1d0
[   11.823198]  ret_from_fork_asm+0x1a/0x30
[   11.823370] 
[   11.823442] The buggy address belongs to the object at ffff88810276e700
[   11.823442]  which belongs to the cache kmalloc-128 of size 128
[   11.823798] The buggy address is located 5 bytes to the right of
[   11.823798]  allocated 115-byte region [ffff88810276e700, ffff88810276e773)
[   11.824349] 
[   11.824442] The buggy address belongs to the physical page:
[   11.824744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e
[   11.825112] flags: 0x200000000000000(node=0|zone=2)
[   11.825318] page_type: f5(slab)
[   11.825435] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.825766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.826528] page dumped because: kasan: bad access detected
[   11.826932] 
[   11.827068] Memory state around the buggy address:
[   11.827305]  ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.827603]  ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.827854] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.828843]                                                                 ^
[   11.829090]  ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.829317]  ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.829529] ==================================================================