Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.352553] ==================================================================
[   21.352810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   21.353210] Read of size 1 at addr fff00000c6423b78 by task kunit_try_catch/204
[   21.353457] 
[   21.353678] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.354178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.354226] Hardware name: linux,dummy-virt (DT)
[   21.354302] Call trace:
[   21.354384]  show_stack+0x20/0x38 (C)
[   21.354552]  dump_stack_lvl+0x8c/0xd0
[   21.354684]  print_report+0x118/0x608
[   21.354810]  kasan_report+0xdc/0x128
[   21.354925]  __asan_report_load1_noabort+0x20/0x30
[   21.355209]  ksize_unpoisons_memory+0x618/0x740
[   21.355336]  kunit_try_run_case+0x170/0x3f0
[   21.355438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.355550]  kthread+0x328/0x630
[   21.355670]  ret_from_fork+0x10/0x20
[   21.355792] 
[   21.355832] Allocated by task 204:
[   21.355896]  kasan_save_stack+0x3c/0x68
[   21.356000]  kasan_save_track+0x20/0x40
[   21.356106]  kasan_save_alloc_info+0x40/0x58
[   21.356200]  __kasan_kmalloc+0xd4/0xd8
[   21.356295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.356396]  ksize_unpoisons_memory+0xc0/0x740
[   21.356493]  kunit_try_run_case+0x170/0x3f0
[   21.356597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.356730]  kthread+0x328/0x630
[   21.356813]  ret_from_fork+0x10/0x20
[   21.356914] 
[   21.356986] The buggy address belongs to the object at fff00000c6423b00
[   21.356986]  which belongs to the cache kmalloc-128 of size 128
[   21.357138] The buggy address is located 5 bytes to the right of
[   21.357138]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.357301] 
[   21.357356] The buggy address belongs to the physical page:
[   21.357867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.358141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.358259] page_type: f5(slab)
[   21.358342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.358458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.358562] page dumped because: kasan: bad access detected
[   21.358637] 
[   21.358679] Memory state around the buggy address:
[   21.358753]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.358854]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358957] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.359528]                                                                 ^
[   21.359834]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.360109]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.360337] ==================================================================
[   21.339912] ==================================================================
[   21.340100] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   21.340246] Read of size 1 at addr fff00000c6423b73 by task kunit_try_catch/204
[   21.340364] 
[   21.340450] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.340692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.340777] Hardware name: linux,dummy-virt (DT)
[   21.340853] Call trace:
[   21.340908]  show_stack+0x20/0x38 (C)
[   21.341671]  dump_stack_lvl+0x8c/0xd0
[   21.342116]  print_report+0x118/0x608
[   21.342381]  kasan_report+0xdc/0x128
[   21.342612]  __asan_report_load1_noabort+0x20/0x30
[   21.342820]  ksize_unpoisons_memory+0x628/0x740
[   21.343161]  kunit_try_run_case+0x170/0x3f0
[   21.343349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.343476]  kthread+0x328/0x630
[   21.343609]  ret_from_fork+0x10/0x20
[   21.343742] 
[   21.343833] Allocated by task 204:
[   21.343940]  kasan_save_stack+0x3c/0x68
[   21.344295]  kasan_save_track+0x20/0x40
[   21.344433]  kasan_save_alloc_info+0x40/0x58
[   21.344549]  __kasan_kmalloc+0xd4/0xd8
[   21.344638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.344804]  ksize_unpoisons_memory+0xc0/0x740
[   21.345016]  kunit_try_run_case+0x170/0x3f0
[   21.345412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.345610]  kthread+0x328/0x630
[   21.345733]  ret_from_fork+0x10/0x20
[   21.346042] 
[   21.346124] The buggy address belongs to the object at fff00000c6423b00
[   21.346124]  which belongs to the cache kmalloc-128 of size 128
[   21.346305] The buggy address is located 0 bytes to the right of
[   21.346305]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.346725] 
[   21.346777] The buggy address belongs to the physical page:
[   21.346852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.347004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.347124] page_type: f5(slab)
[   21.347340] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.347711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.347892] page dumped because: kasan: bad access detected
[   21.347962] 
[   21.348003] Memory state around the buggy address:
[   21.348085]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.348281]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.348469] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.348758]                                                              ^
[   21.348861]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349035]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349260] ==================================================================
[   21.362704] ==================================================================
[   21.362810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   21.363136] Read of size 1 at addr fff00000c6423b7f by task kunit_try_catch/204
[   21.363361] 
[   21.363439] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   21.363651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.363718] Hardware name: linux,dummy-virt (DT)
[   21.363843] Call trace:
[   21.363906]  show_stack+0x20/0x38 (C)
[   21.364102]  dump_stack_lvl+0x8c/0xd0
[   21.364245]  print_report+0x118/0x608
[   21.364378]  kasan_report+0xdc/0x128
[   21.364515]  __asan_report_load1_noabort+0x20/0x30
[   21.364659]  ksize_unpoisons_memory+0x690/0x740
[   21.364784]  kunit_try_run_case+0x170/0x3f0
[   21.364893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.365353]  kthread+0x328/0x630
[   21.365523]  ret_from_fork+0x10/0x20
[   21.365659] 
[   21.365696] Allocated by task 204:
[   21.365771]  kasan_save_stack+0x3c/0x68
[   21.365857]  kasan_save_track+0x20/0x40
[   21.365957]  kasan_save_alloc_info+0x40/0x58
[   21.366120]  __kasan_kmalloc+0xd4/0xd8
[   21.366201]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.366348]  ksize_unpoisons_memory+0xc0/0x740
[   21.366482]  kunit_try_run_case+0x170/0x3f0
[   21.366565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.366661]  kthread+0x328/0x630
[   21.366734]  ret_from_fork+0x10/0x20
[   21.366828] 
[   21.366889] The buggy address belongs to the object at fff00000c6423b00
[   21.366889]  which belongs to the cache kmalloc-128 of size 128
[   21.367057] The buggy address is located 12 bytes to the right of
[   21.367057]  allocated 115-byte region [fff00000c6423b00, fff00000c6423b73)
[   21.367230] 
[   21.367295] The buggy address belongs to the physical page:
[   21.367404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423
[   21.367582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.367715] page_type: f5(slab)
[   21.367829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.368000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.368155] page dumped because: kasan: bad access detected
[   21.368237] 
[   21.368272] Memory state around the buggy address:
[   21.368335]  fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.368452]  fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368560] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.368659]                                                                 ^
[   21.368751]  fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368850]  fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368996] ==================================================================

[   11.560305] ==================================================================
[   11.560763] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.561016] Read of size 1 at addr ffff888102c54a78 by task kunit_try_catch/220
[   11.561339] 
[   11.561510] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.561554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.561565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.561585] Call Trace:
[   11.561597]  <TASK>
[   11.561611]  dump_stack_lvl+0x73/0xb0
[   11.561636]  print_report+0xd1/0x650
[   11.561656]  ? __virt_addr_valid+0x1db/0x2d0
[   11.561677]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.561698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.561722]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.561743]  kasan_report+0x141/0x180
[   11.561762]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.561788]  __asan_report_load1_noabort+0x18/0x20
[   11.561810]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.561832]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.561852]  ? finish_task_switch.isra.0+0x153/0x700
[   11.561872]  ? __switch_to+0x47/0xf50
[   11.561896]  ? __schedule+0x10cc/0x2b60
[   11.561917]  ? __pfx_read_tsc+0x10/0x10
[   11.561936]  ? ktime_get_ts64+0x86/0x230
[   11.561961]  kunit_try_run_case+0x1a5/0x480
[   11.561983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.562003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.562024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.562045]  ? __kthread_parkme+0x82/0x180
[   11.562064]  ? preempt_count_sub+0x50/0x80
[   11.562086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.562107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.562128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.562150]  kthread+0x337/0x6f0
[   11.562168]  ? trace_preempt_on+0x20/0xc0
[   11.562191]  ? __pfx_kthread+0x10/0x10
[   11.562222]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.562240]  ? calculate_sigpending+0x7b/0xa0
[   11.562263]  ? __pfx_kthread+0x10/0x10
[   11.562283]  ret_from_fork+0x116/0x1d0
[   11.562300]  ? __pfx_kthread+0x10/0x10
[   11.562319]  ret_from_fork_asm+0x1a/0x30
[   11.562348]  </TASK>
[   11.562357] 
[   11.574821] Allocated by task 220:
[   11.574951]  kasan_save_stack+0x45/0x70
[   11.575156]  kasan_save_track+0x18/0x40
[   11.575718]  kasan_save_alloc_info+0x3b/0x50
[   11.576094]  __kasan_kmalloc+0xb7/0xc0
[   11.576466]  __kmalloc_cache_noprof+0x189/0x420
[   11.576979]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.577179]  kunit_try_run_case+0x1a5/0x480
[   11.577482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.577990]  kthread+0x337/0x6f0
[   11.578309]  ret_from_fork+0x116/0x1d0
[   11.578659]  ret_from_fork_asm+0x1a/0x30
[   11.579157] 
[   11.579333] The buggy address belongs to the object at ffff888102c54a00
[   11.579333]  which belongs to the cache kmalloc-128 of size 128
[   11.580173] The buggy address is located 5 bytes to the right of
[   11.580173]  allocated 115-byte region [ffff888102c54a00, ffff888102c54a73)
[   11.580670] 
[   11.580822] The buggy address belongs to the physical page:
[   11.581332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54
[   11.582060] flags: 0x200000000000000(node=0|zone=2)
[   11.582697] page_type: f5(slab)
[   11.582986] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.583575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.583801] page dumped because: kasan: bad access detected
[   11.583963] 
[   11.584024] Memory state around the buggy address:
[   11.584170]  ffff888102c54900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.584459]  ffff888102c54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.584754] >ffff888102c54a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.584964]                                                                 ^
[   11.585337]  ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.585592]  ffff888102c54b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.586035] ==================================================================
[   11.587244] ==================================================================
[   11.587557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.587869] Read of size 1 at addr ffff888102c54a7f by task kunit_try_catch/220
[   11.588091] 
[   11.588166] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.588221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.588232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.588253] Call Trace:
[   11.588269]  <TASK>
[   11.588284]  dump_stack_lvl+0x73/0xb0
[   11.588310]  print_report+0xd1/0x650
[   11.588329]  ? __virt_addr_valid+0x1db/0x2d0
[   11.588350]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.588371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.588396]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.588417]  kasan_report+0x141/0x180
[   11.588437]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.588463]  __asan_report_load1_noabort+0x18/0x20
[   11.588485]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.588507]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.588528]  ? finish_task_switch.isra.0+0x153/0x700
[   11.588548]  ? __switch_to+0x47/0xf50
[   11.588572]  ? __schedule+0x10cc/0x2b60
[   11.588592]  ? __pfx_read_tsc+0x10/0x10
[   11.588612]  ? ktime_get_ts64+0x86/0x230
[   11.588635]  kunit_try_run_case+0x1a5/0x480
[   11.588661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.588681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.588703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.588724]  ? __kthread_parkme+0x82/0x180
[   11.588742]  ? preempt_count_sub+0x50/0x80
[   11.588764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.588785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.588806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.588828]  kthread+0x337/0x6f0
[   11.588846]  ? trace_preempt_on+0x20/0xc0
[   11.588868]  ? __pfx_kthread+0x10/0x10
[   11.588887]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.588906]  ? calculate_sigpending+0x7b/0xa0
[   11.588929]  ? __pfx_kthread+0x10/0x10
[   11.588950]  ret_from_fork+0x116/0x1d0
[   11.588967]  ? __pfx_kthread+0x10/0x10
[   11.588986]  ret_from_fork_asm+0x1a/0x30
[   11.589014]  </TASK>
[   11.589024] 
[   11.603728] Allocated by task 220:
[   11.603935]  kasan_save_stack+0x45/0x70
[   11.604167]  kasan_save_track+0x18/0x40
[   11.604411]  kasan_save_alloc_info+0x3b/0x50
[   11.604721]  __kasan_kmalloc+0xb7/0xc0
[   11.604918]  __kmalloc_cache_noprof+0x189/0x420
[   11.605153]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.605386]  kunit_try_run_case+0x1a5/0x480
[   11.605583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.606304]  kthread+0x337/0x6f0
[   11.606670]  ret_from_fork+0x116/0x1d0
[   11.606868]  ret_from_fork_asm+0x1a/0x30
[   11.607075] 
[   11.607150] The buggy address belongs to the object at ffff888102c54a00
[   11.607150]  which belongs to the cache kmalloc-128 of size 128
[   11.607762] The buggy address is located 12 bytes to the right of
[   11.607762]  allocated 115-byte region [ffff888102c54a00, ffff888102c54a73)
[   11.608290] 
[   11.608399] The buggy address belongs to the physical page:
[   11.608685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54
[   11.608998] flags: 0x200000000000000(node=0|zone=2)
[   11.609156] page_type: f5(slab)
[   11.609376] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.609872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.610221] page dumped because: kasan: bad access detected
[   11.610440] 
[   11.610624] Memory state around the buggy address:
[   11.610932]  ffff888102c54900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.611246]  ffff888102c54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.611667] >ffff888102c54a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.611959]                                                                 ^
[   11.612249]  ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.612627]  ffff888102c54b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.612889] ==================================================================
[   11.528956] ==================================================================
[   11.530191] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.530447] Read of size 1 at addr ffff888102c54a73 by task kunit_try_catch/220
[   11.531402] 
[   11.531692] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   11.531753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.531765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.531785] Call Trace:
[   11.531797]  <TASK>
[   11.531813]  dump_stack_lvl+0x73/0xb0
[   11.531842]  print_report+0xd1/0x650
[   11.531862]  ? __virt_addr_valid+0x1db/0x2d0
[   11.531884]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.531906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.531931]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.531952]  kasan_report+0x141/0x180
[   11.531972]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.531998]  __asan_report_load1_noabort+0x18/0x20
[   11.532020]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.532042]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.532063]  ? finish_task_switch.isra.0+0x153/0x700
[   11.532083]  ? __switch_to+0x47/0xf50
[   11.532108]  ? __schedule+0x10cc/0x2b60
[   11.532128]  ? __pfx_read_tsc+0x10/0x10
[   11.532148]  ? ktime_get_ts64+0x86/0x230
[   11.532172]  kunit_try_run_case+0x1a5/0x480
[   11.532194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.532225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.532246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.532266]  ? __kthread_parkme+0x82/0x180
[   11.532285]  ? preempt_count_sub+0x50/0x80
[   11.532306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.532327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.532348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.532369]  kthread+0x337/0x6f0
[   11.532387]  ? trace_preempt_on+0x20/0xc0
[   11.532409]  ? __pfx_kthread+0x10/0x10
[   11.532428]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.532447]  ? calculate_sigpending+0x7b/0xa0
[   11.532470]  ? __pfx_kthread+0x10/0x10
[   11.532490]  ret_from_fork+0x116/0x1d0
[   11.532507]  ? __pfx_kthread+0x10/0x10
[   11.532526]  ret_from_fork_asm+0x1a/0x30
[   11.532554]  </TASK>
[   11.532564] 
[   11.545426] Allocated by task 220:
[   11.545725]  kasan_save_stack+0x45/0x70
[   11.546130]  kasan_save_track+0x18/0x40
[   11.546538]  kasan_save_alloc_info+0x3b/0x50
[   11.546976]  __kasan_kmalloc+0xb7/0xc0
[   11.547375]  __kmalloc_cache_noprof+0x189/0x420
[   11.547801]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.548294]  kunit_try_run_case+0x1a5/0x480
[   11.548758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.549317]  kthread+0x337/0x6f0
[   11.549713]  ret_from_fork+0x116/0x1d0
[   11.550089]  ret_from_fork_asm+0x1a/0x30
[   11.550468] 
[   11.550613] The buggy address belongs to the object at ffff888102c54a00
[   11.550613]  which belongs to the cache kmalloc-128 of size 128
[   11.551396] The buggy address is located 0 bytes to the right of
[   11.551396]  allocated 115-byte region [ffff888102c54a00, ffff888102c54a73)
[   11.551755] 
[   11.551821] The buggy address belongs to the physical page:
[   11.552203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54
[   11.552884] flags: 0x200000000000000(node=0|zone=2)
[   11.553354] page_type: f5(slab)
[   11.553702] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.554434] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.555051] page dumped because: kasan: bad access detected
[   11.555577] 
[   11.555760] Memory state around the buggy address:
[   11.556260]  ffff888102c54900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.556911]  ffff888102c54980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.557360] >ffff888102c54a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.557784]                                                              ^
[   11.558422]  ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.559099]  ffff888102c54b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.559810] ==================================================================