Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.090233] ==================================================================
[   17.090442] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.090546] Read of size 1 at addr fff00000c748ab73 by task kunit_try_catch/203
[   17.090859] 
[   17.091087] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.091477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.091640] Hardware name: linux,dummy-virt (DT)
[   17.091692] Call trace:
[   17.091738]  show_stack+0x20/0x38 (C)
[   17.091991]  dump_stack_lvl+0x8c/0xd0
[   17.092490]  print_report+0x118/0x608
[   17.092654]  kasan_report+0xdc/0x128
[   17.092751]  __asan_report_load1_noabort+0x20/0x30
[   17.093012]  ksize_unpoisons_memory+0x628/0x740
[   17.093223]  kunit_try_run_case+0x170/0x3f0
[   17.093301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.093427]  kthread+0x328/0x630
[   17.093511]  ret_from_fork+0x10/0x20
[   17.093778] 
[   17.094049] Allocated by task 203:
[   17.094118]  kasan_save_stack+0x3c/0x68
[   17.094526]  kasan_save_track+0x20/0x40
[   17.094604]  kasan_save_alloc_info+0x40/0x58
[   17.094758]  __kasan_kmalloc+0xd4/0xd8
[   17.094846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.094999]  ksize_unpoisons_memory+0xc0/0x740
[   17.095067]  kunit_try_run_case+0x170/0x3f0
[   17.095105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.095152]  kthread+0x328/0x630
[   17.095186]  ret_from_fork+0x10/0x20
[   17.095703] 
[   17.095766] The buggy address belongs to the object at fff00000c748ab00
[   17.095766]  which belongs to the cache kmalloc-128 of size 128
[   17.095874] The buggy address is located 0 bytes to the right of
[   17.095874]  allocated 115-byte region [fff00000c748ab00, fff00000c748ab73)
[   17.096077] 
[   17.096116] The buggy address belongs to the physical page:
[   17.096161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.096369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.096541] page_type: f5(slab)
[   17.096626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.096859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.097013] page dumped because: kasan: bad access detected
[   17.097084] 
[   17.097103] Memory state around the buggy address:
[   17.097138]  fff00000c748aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.097194]  fff00000c748aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.097532] >fff00000c748ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.097657]                                                              ^
[   17.097774]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.097904]  fff00000c748ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.097999] ==================================================================
[   17.105784] ==================================================================
[   17.105842] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.105897] Read of size 1 at addr fff00000c748ab7f by task kunit_try_catch/203
[   17.105960] 
[   17.106128] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.106230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.106311] Hardware name: linux,dummy-virt (DT)
[   17.106438] Call trace:
[   17.106597]  show_stack+0x20/0x38 (C)
[   17.106692]  dump_stack_lvl+0x8c/0xd0
[   17.106772]  print_report+0x118/0x608
[   17.106959]  kasan_report+0xdc/0x128
[   17.107046]  __asan_report_load1_noabort+0x20/0x30
[   17.107172]  ksize_unpoisons_memory+0x690/0x740
[   17.107657]  kunit_try_run_case+0x170/0x3f0
[   17.107762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.107838]  kthread+0x328/0x630
[   17.108001]  ret_from_fork+0x10/0x20
[   17.108063] 
[   17.108088] Allocated by task 203:
[   17.108301]  kasan_save_stack+0x3c/0x68
[   17.108465]  kasan_save_track+0x20/0x40
[   17.108584]  kasan_save_alloc_info+0x40/0x58
[   17.108671]  __kasan_kmalloc+0xd4/0xd8
[   17.108806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.108873]  ksize_unpoisons_memory+0xc0/0x740
[   17.108942]  kunit_try_run_case+0x170/0x3f0
[   17.109126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.109363]  kthread+0x328/0x630
[   17.109426]  ret_from_fork+0x10/0x20
[   17.109591] 
[   17.109652] The buggy address belongs to the object at fff00000c748ab00
[   17.109652]  which belongs to the cache kmalloc-128 of size 128
[   17.110061] The buggy address is located 12 bytes to the right of
[   17.110061]  allocated 115-byte region [fff00000c748ab00, fff00000c748ab73)
[   17.110168] 
[   17.110315] The buggy address belongs to the physical page:
[   17.110365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.110510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.110579] page_type: f5(slab)
[   17.110620] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.110687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.111069] page dumped because: kasan: bad access detected
[   17.111181] 
[   17.111244] Memory state around the buggy address:
[   17.111313]  fff00000c748aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.111439]  fff00000c748aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.111506] >fff00000c748ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.111770]                                                                 ^
[   17.111863]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.112182]  fff00000c748ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.112300] ==================================================================
[   17.099421] ==================================================================
[   17.099480] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.100000] Read of size 1 at addr fff00000c748ab78 by task kunit_try_catch/203
[   17.100082] 
[   17.100117] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.100273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.100333] Hardware name: linux,dummy-virt (DT)
[   17.100378] Call trace:
[   17.100401]  show_stack+0x20/0x38 (C)
[   17.100834]  dump_stack_lvl+0x8c/0xd0
[   17.101000]  print_report+0x118/0x608
[   17.101065]  kasan_report+0xdc/0x128
[   17.101129]  __asan_report_load1_noabort+0x20/0x30
[   17.101182]  ksize_unpoisons_memory+0x618/0x740
[   17.101230]  kunit_try_run_case+0x170/0x3f0
[   17.101318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.101386]  kthread+0x328/0x630
[   17.101431]  ret_from_fork+0x10/0x20
[   17.101481] 
[   17.101499] Allocated by task 203:
[   17.101529]  kasan_save_stack+0x3c/0x68
[   17.101579]  kasan_save_track+0x20/0x40
[   17.101619]  kasan_save_alloc_info+0x40/0x58
[   17.101657]  __kasan_kmalloc+0xd4/0xd8
[   17.101695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.101736]  ksize_unpoisons_memory+0xc0/0x740
[   17.101775]  kunit_try_run_case+0x170/0x3f0
[   17.101814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.101857]  kthread+0x328/0x630
[   17.101891]  ret_from_fork+0x10/0x20
[   17.101939] 
[   17.101958] The buggy address belongs to the object at fff00000c748ab00
[   17.101958]  which belongs to the cache kmalloc-128 of size 128
[   17.102019] The buggy address is located 5 bytes to the right of
[   17.102019]  allocated 115-byte region [fff00000c748ab00, fff00000c748ab73)
[   17.102504] 
[   17.102527] The buggy address belongs to the physical page:
[   17.102738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.102985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.103126] page_type: f5(slab)
[   17.103261] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.103339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.103474] page dumped because: kasan: bad access detected
[   17.103510] 
[   17.103664] Memory state around the buggy address:
[   17.103919]  fff00000c748aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.104081]  fff00000c748aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104146] >fff00000c748ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.104290]                                                                 ^
[   17.104356]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104636]  fff00000c748ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104716] ==================================================================

[   18.635684] ==================================================================
[   18.636200] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   18.637021] Read of size 1 at addr ffff888100ab8578 by task kunit_try_catch/221
[   18.637711] 
[   18.637976] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.638097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.638132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.638188] Call Trace:
[   18.638243]  <TASK>
[   18.638288]  dump_stack_lvl+0x73/0xb0
[   18.638379]  print_report+0xd1/0x650
[   18.638459]  ? __virt_addr_valid+0x1db/0x2d0
[   18.638528]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.638599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.638669]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.638745]  kasan_report+0x141/0x180
[   18.638817]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.638921]  __asan_report_load1_noabort+0x18/0x20
[   18.639000]  ksize_unpoisons_memory+0x7e9/0x9b0
[   18.639075]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.639150]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.639238]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.639321]  kunit_try_run_case+0x1a5/0x480
[   18.639397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.639468]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.639550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.639631]  ? __kthread_parkme+0x82/0x180
[   18.639702]  ? preempt_count_sub+0x50/0x80
[   18.639779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.640047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.640131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.640209]  kthread+0x337/0x6f0
[   18.640274]  ? trace_preempt_on+0x20/0xc0
[   18.640390]  ? __pfx_kthread+0x10/0x10
[   18.640426]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.640464]  ? calculate_sigpending+0x7b/0xa0
[   18.640499]  ? __pfx_kthread+0x10/0x10
[   18.640530]  ret_from_fork+0x116/0x1d0
[   18.640556]  ? __pfx_kthread+0x10/0x10
[   18.640584]  ret_from_fork_asm+0x1a/0x30
[   18.640627]  </TASK>
[   18.640641] 
[   18.654739] Allocated by task 221:
[   18.655020]  kasan_save_stack+0x45/0x70
[   18.655787]  kasan_save_track+0x18/0x40
[   18.656186]  kasan_save_alloc_info+0x3b/0x50
[   18.656792]  __kasan_kmalloc+0xb7/0xc0
[   18.657184]  __kmalloc_cache_noprof+0x189/0x420
[   18.657851]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.658418]  kunit_try_run_case+0x1a5/0x480
[   18.658847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.659771]  kthread+0x337/0x6f0
[   18.660073]  ret_from_fork+0x116/0x1d0
[   18.660367]  ret_from_fork_asm+0x1a/0x30
[   18.660938] 
[   18.661152] The buggy address belongs to the object at ffff888100ab8500
[   18.661152]  which belongs to the cache kmalloc-128 of size 128
[   18.662416] The buggy address is located 5 bytes to the right of
[   18.662416]  allocated 115-byte region [ffff888100ab8500, ffff888100ab8573)
[   18.663829] 
[   18.664082] The buggy address belongs to the physical page:
[   18.664547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   18.665527] flags: 0x200000000000000(node=0|zone=2)
[   18.665950] page_type: f5(slab)
[   18.666471] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.667140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.668139] page dumped because: kasan: bad access detected
[   18.668777] 
[   18.668996] Memory state around the buggy address:
[   18.669398]  ffff888100ab8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.669858]  ffff888100ab8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.670475] >ffff888100ab8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.671627]                                                                 ^
[   18.672378]  ffff888100ab8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.673017]  ffff888100ab8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.673636] ==================================================================
[   18.676578] ==================================================================
[   18.677156] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   18.677948] Read of size 1 at addr ffff888100ab857f by task kunit_try_catch/221
[   18.678958] 
[   18.679921] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.679992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.680010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.680039] Call Trace:
[   18.680056]  <TASK>
[   18.680075]  dump_stack_lvl+0x73/0xb0
[   18.680118]  print_report+0xd1/0x650
[   18.680150]  ? __virt_addr_valid+0x1db/0x2d0
[   18.680181]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.680215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.680284]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.680361]  kasan_report+0x141/0x180
[   18.680431]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.680473]  __asan_report_load1_noabort+0x18/0x20
[   18.680507]  ksize_unpoisons_memory+0x7b6/0x9b0
[   18.680540]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.680571]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.680610]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.680647]  kunit_try_run_case+0x1a5/0x480
[   18.680680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.680711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.680740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.680777]  ? __kthread_parkme+0x82/0x180
[   18.680803]  ? preempt_count_sub+0x50/0x80
[   18.680859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.680897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.680929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.680961]  kthread+0x337/0x6f0
[   18.680986]  ? trace_preempt_on+0x20/0xc0
[   18.681019]  ? __pfx_kthread+0x10/0x10
[   18.681046]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.681081]  ? calculate_sigpending+0x7b/0xa0
[   18.681116]  ? __pfx_kthread+0x10/0x10
[   18.681146]  ret_from_fork+0x116/0x1d0
[   18.681171]  ? __pfx_kthread+0x10/0x10
[   18.681198]  ret_from_fork_asm+0x1a/0x30
[   18.681264]  </TASK>
[   18.681302] 
[   18.699858] Allocated by task 221:
[   18.700228]  kasan_save_stack+0x45/0x70
[   18.701150]  kasan_save_track+0x18/0x40
[   18.701931]  kasan_save_alloc_info+0x3b/0x50
[   18.702604]  __kasan_kmalloc+0xb7/0xc0
[   18.703107]  __kmalloc_cache_noprof+0x189/0x420
[   18.703713]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.704152]  kunit_try_run_case+0x1a5/0x480
[   18.704721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.705225]  kthread+0x337/0x6f0
[   18.705566]  ret_from_fork+0x116/0x1d0
[   18.705920]  ret_from_fork_asm+0x1a/0x30
[   18.706314] 
[   18.706883] The buggy address belongs to the object at ffff888100ab8500
[   18.706883]  which belongs to the cache kmalloc-128 of size 128
[   18.707620] The buggy address is located 12 bytes to the right of
[   18.707620]  allocated 115-byte region [ffff888100ab8500, ffff888100ab8573)
[   18.708809] 
[   18.709276] The buggy address belongs to the physical page:
[   18.709804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   18.711052] flags: 0x200000000000000(node=0|zone=2)
[   18.711746] page_type: f5(slab)
[   18.712135] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.712999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.713819] page dumped because: kasan: bad access detected
[   18.714368] 
[   18.714553] Memory state around the buggy address:
[   18.715076]  ffff888100ab8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.715990]  ffff888100ab8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.716772] >ffff888100ab8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.717398]                                                                 ^
[   18.718076]  ffff888100ab8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.718890]  ffff888100ab8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.719673] ==================================================================
[   18.593794] ==================================================================
[   18.595003] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   18.595794] Read of size 1 at addr ffff888100ab8573 by task kunit_try_catch/221
[   18.596733] 
[   18.596997] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.597158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.597197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.597268] Call Trace:
[   18.597307]  <TASK>
[   18.597355]  dump_stack_lvl+0x73/0xb0
[   18.597444]  print_report+0xd1/0x650
[   18.597518]  ? __virt_addr_valid+0x1db/0x2d0
[   18.597600]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.597676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.597749]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.597824]  kasan_report+0x141/0x180
[   18.597917]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.597984]  __asan_report_load1_noabort+0x18/0x20
[   18.598022]  ksize_unpoisons_memory+0x81c/0x9b0
[   18.598058]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.598091]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.598131]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.598169]  kunit_try_run_case+0x1a5/0x480
[   18.598204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.598281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.598358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.598403]  ? __kthread_parkme+0x82/0x180
[   18.598434]  ? preempt_count_sub+0x50/0x80
[   18.598467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.598500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.598534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.598568]  kthread+0x337/0x6f0
[   18.598596]  ? trace_preempt_on+0x20/0xc0
[   18.598630]  ? __pfx_kthread+0x10/0x10
[   18.598659]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.598695]  ? calculate_sigpending+0x7b/0xa0
[   18.598731]  ? __pfx_kthread+0x10/0x10
[   18.598761]  ret_from_fork+0x116/0x1d0
[   18.598787]  ? __pfx_kthread+0x10/0x10
[   18.598816]  ret_from_fork_asm+0x1a/0x30
[   18.598886]  </TASK>
[   18.598902] 
[   18.614194] Allocated by task 221:
[   18.614453]  kasan_save_stack+0x45/0x70
[   18.614742]  kasan_save_track+0x18/0x40
[   18.615487]  kasan_save_alloc_info+0x3b/0x50
[   18.615957]  __kasan_kmalloc+0xb7/0xc0
[   18.616327]  __kmalloc_cache_noprof+0x189/0x420
[   18.616770]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.617976]  kunit_try_run_case+0x1a5/0x480
[   18.619138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.620612]  kthread+0x337/0x6f0
[   18.621046]  ret_from_fork+0x116/0x1d0
[   18.621806]  ret_from_fork_asm+0x1a/0x30
[   18.622265] 
[   18.622482] The buggy address belongs to the object at ffff888100ab8500
[   18.622482]  which belongs to the cache kmalloc-128 of size 128
[   18.624169] The buggy address is located 0 bytes to the right of
[   18.624169]  allocated 115-byte region [ffff888100ab8500, ffff888100ab8573)
[   18.625080] 
[   18.625291] The buggy address belongs to the physical page:
[   18.625766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   18.626360] flags: 0x200000000000000(node=0|zone=2)
[   18.626805] page_type: f5(slab)
[   18.627658] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.628363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.628959] page dumped because: kasan: bad access detected
[   18.629526] 
[   18.629732] Memory state around the buggy address:
[   18.630109]  ffff888100ab8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.631055]  ffff888100ab8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631653] >ffff888100ab8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.632265]                                                              ^
[   18.632880]  ffff888100ab8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.633505]  ffff888100ab8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.634104] ==================================================================