Hay
Date
June 19, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.853245] ==================================================================
[   30.853600] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.854941] Read of size 1 at addr fff00000c6466d73 by task kunit_try_catch/205
[   30.855354] 
[   30.855473] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.856199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.856279] Hardware name: linux,dummy-virt (DT)
[   30.856818] Call trace:
[   30.856941]  show_stack+0x20/0x38 (C)
[   30.857169]  dump_stack_lvl+0x8c/0xd0
[   30.857363]  print_report+0x118/0x608
[   30.857528]  kasan_report+0xdc/0x128
[   30.857652]  __asan_report_load1_noabort+0x20/0x30
[   30.857772]  ksize_unpoisons_memory+0x628/0x740
[   30.857883]  kunit_try_run_case+0x170/0x3f0
[   30.858001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.858747]  kthread+0x328/0x630
[   30.859369]  ret_from_fork+0x10/0x20
[   30.859732] 
[   30.859830] Allocated by task 205:
[   30.860001]  kasan_save_stack+0x3c/0x68
[   30.860192]  kasan_save_track+0x20/0x40
[   30.860294]  kasan_save_alloc_info+0x40/0x58
[   30.860404]  __kasan_kmalloc+0xd4/0xd8
[   30.860827]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.861096]  ksize_unpoisons_memory+0xc0/0x740
[   30.861205]  kunit_try_run_case+0x170/0x3f0
[   30.861760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.861892]  kthread+0x328/0x630
[   30.861979]  ret_from_fork+0x10/0x20
[   30.862066] 
[   30.862212] The buggy address belongs to the object at fff00000c6466d00
[   30.862212]  which belongs to the cache kmalloc-128 of size 128
[   30.862801] The buggy address is located 0 bytes to the right of
[   30.862801]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.863090] 
[   30.863157] The buggy address belongs to the physical page:
[   30.863359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.863589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.863775] page_type: f5(slab)
[   30.864099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.864502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.864716] page dumped because: kasan: bad access detected
[   30.864845] 
[   30.864912] Memory state around the buggy address:
[   30.864999]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.865110]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.865225] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.865659]                                                              ^
[   30.866340]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866469]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.867040] ==================================================================
[   30.870543] ==================================================================
[   30.870619] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.870695] Read of size 1 at addr fff00000c6466d78 by task kunit_try_catch/205
[   30.870756] 
[   30.870804] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.870959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.871019] Hardware name: linux,dummy-virt (DT)
[   30.871090] Call trace:
[   30.871199]  show_stack+0x20/0x38 (C)
[   30.871353]  dump_stack_lvl+0x8c/0xd0
[   30.871485]  print_report+0x118/0x608
[   30.871607]  kasan_report+0xdc/0x128
[   30.872410]  __asan_report_load1_noabort+0x20/0x30
[   30.872994]  ksize_unpoisons_memory+0x618/0x740
[   30.873382]  kunit_try_run_case+0x170/0x3f0
[   30.873693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.874417]  kthread+0x328/0x630
[   30.874826]  ret_from_fork+0x10/0x20
[   30.875055] 
[   30.875284] Allocated by task 205:
[   30.875358]  kasan_save_stack+0x3c/0x68
[   30.875470]  kasan_save_track+0x20/0x40
[   30.875567]  kasan_save_alloc_info+0x40/0x58
[   30.875713]  __kasan_kmalloc+0xd4/0xd8
[   30.875952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.876134]  ksize_unpoisons_memory+0xc0/0x740
[   30.876583]  kunit_try_run_case+0x170/0x3f0
[   30.876744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.876954]  kthread+0x328/0x630
[   30.877055]  ret_from_fork+0x10/0x20
[   30.877147] 
[   30.877301] The buggy address belongs to the object at fff00000c6466d00
[   30.877301]  which belongs to the cache kmalloc-128 of size 128
[   30.877537] The buggy address is located 5 bytes to the right of
[   30.877537]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.877931] 
[   30.877988] The buggy address belongs to the physical page:
[   30.878063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.878193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.878427] page_type: f5(slab)
[   30.878689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.879084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.879334] page dumped because: kasan: bad access detected
[   30.879419] 
[   30.879621] Memory state around the buggy address:
[   30.879823]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.880070]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880350] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.880574]                                                                 ^
[   30.880765]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880893]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.881327] ==================================================================
[   30.883735] ==================================================================
[   30.883867] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.885030] Read of size 1 at addr fff00000c6466d7f by task kunit_try_catch/205
[   30.885195] 
[   30.885294] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   30.885782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.886049] Hardware name: linux,dummy-virt (DT)
[   30.886485] Call trace:
[   30.886589]  show_stack+0x20/0x38 (C)
[   30.886808]  dump_stack_lvl+0x8c/0xd0
[   30.887011]  print_report+0x118/0x608
[   30.887315]  kasan_report+0xdc/0x128
[   30.887438]  __asan_report_load1_noabort+0x20/0x30
[   30.887565]  ksize_unpoisons_memory+0x690/0x740
[   30.887686]  kunit_try_run_case+0x170/0x3f0
[   30.887809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.887951]  kthread+0x328/0x630
[   30.888045]  ret_from_fork+0x10/0x20
[   30.888161] 
[   30.888200] Allocated by task 205:
[   30.888272]  kasan_save_stack+0x3c/0x68
[   30.888370]  kasan_save_track+0x20/0x40
[   30.888440]  kasan_save_alloc_info+0x40/0x58
[   30.888513]  __kasan_kmalloc+0xd4/0xd8
[   30.888572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.888649]  ksize_unpoisons_memory+0xc0/0x740
[   30.888727]  kunit_try_run_case+0x170/0x3f0
[   30.888996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.889254]  kthread+0x328/0x630
[   30.890637]  ret_from_fork+0x10/0x20
[   30.890726] 
[   30.890777] The buggy address belongs to the object at fff00000c6466d00
[   30.890777]  which belongs to the cache kmalloc-128 of size 128
[   30.890939] The buggy address is located 12 bytes to the right of
[   30.890939]  allocated 115-byte region [fff00000c6466d00, fff00000c6466d73)
[   30.891093] 
[   30.891135] The buggy address belongs to the physical page:
[   30.891213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   30.891338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.891446] page_type: f5(slab)
[   30.891528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.891637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.891734] page dumped because: kasan: bad access detected
[   30.891804] 
[   30.891840] Memory state around the buggy address:
[   30.893578]  fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.893707]  fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.893812] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.893926]                                                                 ^
[   30.894019]  fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894113]  fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894198] ==================================================================

[   27.473820] ==================================================================
[   27.474260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   27.474576] Read of size 1 at addr ffff88810377707f by task kunit_try_catch/223
[   27.474842] 
[   27.474991] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   27.475098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.475913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.475966] Call Trace:
[   27.476013]  <TASK>
[   27.476055]  dump_stack_lvl+0x73/0xb0
[   27.476150]  print_report+0xd1/0x650
[   27.476203]  ? __virt_addr_valid+0x1db/0x2d0
[   27.476256]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.476307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.476360]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.476412]  kasan_report+0x141/0x180
[   27.476460]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.476519]  __asan_report_load1_noabort+0x18/0x20
[   27.476936]  ksize_unpoisons_memory+0x7b6/0x9b0
[   27.476990]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.477043]  ? finish_task_switch.isra.0+0x153/0x700
[   27.477086]  ? __switch_to+0x47/0xf50
[   27.477158]  ? __schedule+0x10cc/0x2b60
[   27.477208]  ? __pfx_read_tsc+0x10/0x10
[   27.477254]  ? ktime_get_ts64+0x86/0x230
[   27.477308]  kunit_try_run_case+0x1a5/0x480
[   27.477358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.477401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.477626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.477695]  ? __kthread_parkme+0x82/0x180
[   27.477743]  ? preempt_count_sub+0x50/0x80
[   27.477810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.477858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.477908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.477971]  kthread+0x337/0x6f0
[   27.478173]  ? trace_preempt_on+0x20/0xc0
[   27.478223]  ? __pfx_kthread+0x10/0x10
[   27.478274]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.478319]  ? calculate_sigpending+0x7b/0xa0
[   27.478387]  ? __pfx_kthread+0x10/0x10
[   27.478429]  ret_from_fork+0x116/0x1d0
[   27.478471]  ? __pfx_kthread+0x10/0x10
[   27.478513]  ret_from_fork_asm+0x1a/0x30
[   27.478580]  </TASK>
[   27.478609] 
[   27.491524] Allocated by task 223:
[   27.491869]  kasan_save_stack+0x45/0x70
[   27.492227]  kasan_save_track+0x18/0x40
[   27.492534]  kasan_save_alloc_info+0x3b/0x50
[   27.492735]  __kasan_kmalloc+0xb7/0xc0
[   27.492904]  __kmalloc_cache_noprof+0x189/0x420
[   27.493317]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.493701]  kunit_try_run_case+0x1a5/0x480
[   27.494161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.494430]  kthread+0x337/0x6f0
[   27.494728]  ret_from_fork+0x116/0x1d0
[   27.495116]  ret_from_fork_asm+0x1a/0x30
[   27.495285] 
[   27.495392] The buggy address belongs to the object at ffff888103777000
[   27.495392]  which belongs to the cache kmalloc-128 of size 128
[   27.495804] The buggy address is located 12 bytes to the right of
[   27.495804]  allocated 115-byte region [ffff888103777000, ffff888103777073)
[   27.496707] 
[   27.496876] The buggy address belongs to the physical page:
[   27.497305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103777
[   27.497607] flags: 0x200000000000000(node=0|zone=2)
[   27.497825] page_type: f5(slab)
[   27.497999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.498712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.499453] page dumped because: kasan: bad access detected
[   27.499908] 
[   27.500088] Memory state around the buggy address:
[   27.500503]  ffff888103776f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.500968]  ffff888103776f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.501279] >ffff888103777000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.501523]                                                                 ^
[   27.501874]  ffff888103777080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.502401]  ffff888103777100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.502943] ==================================================================
[   27.447625] ==================================================================
[   27.448052] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   27.448390] Read of size 1 at addr ffff888103777078 by task kunit_try_catch/223
[   27.448957] 
[   27.449183] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   27.449294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.449323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.449371] Call Trace:
[   27.449412]  <TASK>
[   27.449448]  dump_stack_lvl+0x73/0xb0
[   27.449503]  print_report+0xd1/0x650
[   27.449538]  ? __virt_addr_valid+0x1db/0x2d0
[   27.449600]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.449639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.449685]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.449730]  kasan_report+0x141/0x180
[   27.449771]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.449839]  __asan_report_load1_noabort+0x18/0x20
[   27.449922]  ksize_unpoisons_memory+0x7e9/0x9b0
[   27.449967]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.450027]  ? finish_task_switch.isra.0+0x153/0x700
[   27.450071]  ? __switch_to+0x47/0xf50
[   27.450138]  ? __schedule+0x10cc/0x2b60
[   27.450190]  ? __pfx_read_tsc+0x10/0x10
[   27.450232]  ? ktime_get_ts64+0x86/0x230
[   27.450286]  kunit_try_run_case+0x1a5/0x480
[   27.450336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.450392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.450454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.450509]  ? __kthread_parkme+0x82/0x180
[   27.450568]  ? preempt_count_sub+0x50/0x80
[   27.450619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.450670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.450721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.450767]  kthread+0x337/0x6f0
[   27.450803]  ? trace_preempt_on+0x20/0xc0
[   27.450841]  ? __pfx_kthread+0x10/0x10
[   27.450881]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.450920]  ? calculate_sigpending+0x7b/0xa0
[   27.450964]  ? __pfx_kthread+0x10/0x10
[   27.451014]  ret_from_fork+0x116/0x1d0
[   27.451056]  ? __pfx_kthread+0x10/0x10
[   27.451124]  ret_from_fork_asm+0x1a/0x30
[   27.451188]  </TASK>
[   27.451215] 
[   27.460714] Allocated by task 223:
[   27.460921]  kasan_save_stack+0x45/0x70
[   27.461317]  kasan_save_track+0x18/0x40
[   27.461658]  kasan_save_alloc_info+0x3b/0x50
[   27.462048]  __kasan_kmalloc+0xb7/0xc0
[   27.462397]  __kmalloc_cache_noprof+0x189/0x420
[   27.462664]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.463091]  kunit_try_run_case+0x1a5/0x480
[   27.463312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.463528]  kthread+0x337/0x6f0
[   27.463690]  ret_from_fork+0x116/0x1d0
[   27.464014]  ret_from_fork_asm+0x1a/0x30
[   27.464382] 
[   27.464591] The buggy address belongs to the object at ffff888103777000
[   27.464591]  which belongs to the cache kmalloc-128 of size 128
[   27.465641] The buggy address is located 5 bytes to the right of
[   27.465641]  allocated 115-byte region [ffff888103777000, ffff888103777073)
[   27.466064] 
[   27.466236] The buggy address belongs to the physical page:
[   27.466643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103777
[   27.467419] flags: 0x200000000000000(node=0|zone=2)
[   27.467751] page_type: f5(slab)
[   27.467933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.468360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.469084] page dumped because: kasan: bad access detected
[   27.469456] 
[   27.469632] Memory state around the buggy address:
[   27.469905]  ffff888103776f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.470305]  ffff888103776f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.470570] >ffff888103777000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.470820]                                                                 ^
[   27.471294]  ffff888103777080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.471981]  ffff888103777100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.472550] ==================================================================
[   27.415242] ==================================================================
[   27.416675] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   27.417214] Read of size 1 at addr ffff888103777073 by task kunit_try_catch/223
[   27.418059] 
[   27.418265] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   27.418335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.418350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.418376] Call Trace:
[   27.418396]  <TASK>
[   27.418423]  dump_stack_lvl+0x73/0xb0
[   27.418468]  print_report+0xd1/0x650
[   27.418494]  ? __virt_addr_valid+0x1db/0x2d0
[   27.418521]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.418544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.418570]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.418594]  kasan_report+0x141/0x180
[   27.418617]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.418645]  __asan_report_load1_noabort+0x18/0x20
[   27.418669]  ksize_unpoisons_memory+0x81c/0x9b0
[   27.418694]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.418717]  ? finish_task_switch.isra.0+0x153/0x700
[   27.418742]  ? __switch_to+0x47/0xf50
[   27.418770]  ? __schedule+0x10cc/0x2b60
[   27.418794]  ? __pfx_read_tsc+0x10/0x10
[   27.418817]  ? ktime_get_ts64+0x86/0x230
[   27.418845]  kunit_try_run_case+0x1a5/0x480
[   27.418873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.418896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.419258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.419316]  ? __kthread_parkme+0x82/0x180
[   27.419426]  ? preempt_count_sub+0x50/0x80
[   27.419479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.419523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.419551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.419575]  kthread+0x337/0x6f0
[   27.419597]  ? trace_preempt_on+0x20/0xc0
[   27.419623]  ? __pfx_kthread+0x10/0x10
[   27.419645]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.419667]  ? calculate_sigpending+0x7b/0xa0
[   27.419693]  ? __pfx_kthread+0x10/0x10
[   27.419715]  ret_from_fork+0x116/0x1d0
[   27.419737]  ? __pfx_kthread+0x10/0x10
[   27.419758]  ret_from_fork_asm+0x1a/0x30
[   27.419790]  </TASK>
[   27.419803] 
[   27.433752] Allocated by task 223:
[   27.434205]  kasan_save_stack+0x45/0x70
[   27.434524]  kasan_save_track+0x18/0x40
[   27.434708]  kasan_save_alloc_info+0x3b/0x50
[   27.435118]  __kasan_kmalloc+0xb7/0xc0
[   27.435439]  __kmalloc_cache_noprof+0x189/0x420
[   27.435804]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.436150]  kunit_try_run_case+0x1a5/0x480
[   27.436426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.436825]  kthread+0x337/0x6f0
[   27.437150]  ret_from_fork+0x116/0x1d0
[   27.437333]  ret_from_fork_asm+0x1a/0x30
[   27.437516] 
[   27.437623] The buggy address belongs to the object at ffff888103777000
[   27.437623]  which belongs to the cache kmalloc-128 of size 128
[   27.438536] The buggy address is located 0 bytes to the right of
[   27.438536]  allocated 115-byte region [ffff888103777000, ffff888103777073)
[   27.439334] 
[   27.439453] The buggy address belongs to the physical page:
[   27.439867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103777
[   27.440557] flags: 0x200000000000000(node=0|zone=2)
[   27.440801] page_type: f5(slab)
[   27.441197] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.441522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.442060] page dumped because: kasan: bad access detected
[   27.442499] 
[   27.442598] Memory state around the buggy address:
[   27.442795]  ffff888103776f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.443205]  ffff888103776f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.443760] >ffff888103777000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.444469]                                                              ^
[   27.444811]  ffff888103777080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.445127]  ffff888103777100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.445659] ==================================================================