Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.323547] ==================================================================
[   33.323696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   33.323967] Read of size 1 at addr fff00000c63f7473 by task kunit_try_catch/206
[   33.324200] 
[   33.324463] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.324694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324767] Hardware name: linux,dummy-virt (DT)
[   33.324884] Call trace:
[   33.325095]  show_stack+0x20/0x38 (C)
[   33.325338]  dump_stack_lvl+0x8c/0xd0
[   33.325456]  print_report+0x118/0x608
[   33.325572]  kasan_report+0xdc/0x128
[   33.325694]  __asan_report_load1_noabort+0x20/0x30
[   33.326056]  ksize_unpoisons_memory+0x628/0x740
[   33.326403]  kunit_try_run_case+0x170/0x3f0
[   33.326734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.326993]  kthread+0x328/0x630
[   33.327199]  ret_from_fork+0x10/0x20
[   33.327694] 
[   33.327756] Allocated by task 206:
[   33.327840]  kasan_save_stack+0x3c/0x68
[   33.327995]  kasan_save_track+0x20/0x40
[   33.328114]  kasan_save_alloc_info+0x40/0x58
[   33.328224]  __kasan_kmalloc+0xd4/0xd8
[   33.328325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.328429]  ksize_unpoisons_memory+0xc0/0x740
[   33.328522]  kunit_try_run_case+0x170/0x3f0
[   33.328628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.328929]  kthread+0x328/0x630
[   33.329115]  ret_from_fork+0x10/0x20
[   33.329245] 
[   33.329400] The buggy address belongs to the object at fff00000c63f7400
[   33.329400]  which belongs to the cache kmalloc-128 of size 128
[   33.329592] The buggy address is located 0 bytes to the right of
[   33.329592]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.329745] 
[   33.329796] The buggy address belongs to the physical page:
[   33.329935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.330148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.330349] page_type: f5(slab)
[   33.330461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.330589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.330781] page dumped because: kasan: bad access detected
[   33.330867] 
[   33.330914] Memory state around the buggy address:
[   33.331057]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.331255]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331371] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.331469]                                                              ^
[   33.331611]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331794]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.331890] ==================================================================
[   33.333202] ==================================================================
[   33.333301] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   33.333413] Read of size 1 at addr fff00000c63f7478 by task kunit_try_catch/206
[   33.333529] 
[   33.333592] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.333780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.333844] Hardware name: linux,dummy-virt (DT)
[   33.333915] Call trace:
[   33.333967]  show_stack+0x20/0x38 (C)
[   33.334135]  dump_stack_lvl+0x8c/0xd0
[   33.334276]  print_report+0x118/0x608
[   33.334765]  kasan_report+0xdc/0x128
[   33.334963]  __asan_report_load1_noabort+0x20/0x30
[   33.335174]  ksize_unpoisons_memory+0x618/0x740
[   33.335316]  kunit_try_run_case+0x170/0x3f0
[   33.335445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.336019]  kthread+0x328/0x630
[   33.336154]  ret_from_fork+0x10/0x20
[   33.336274] 
[   33.336337] Allocated by task 206:
[   33.336410]  kasan_save_stack+0x3c/0x68
[   33.336520]  kasan_save_track+0x20/0x40
[   33.336822]  kasan_save_alloc_info+0x40/0x58
[   33.336992]  __kasan_kmalloc+0xd4/0xd8
[   33.337136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.337248]  ksize_unpoisons_memory+0xc0/0x740
[   33.337534]  kunit_try_run_case+0x170/0x3f0
[   33.338835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338976]  kthread+0x328/0x630
[   33.339081]  ret_from_fork+0x10/0x20
[   33.339177] 
[   33.339222] The buggy address belongs to the object at fff00000c63f7400
[   33.339222]  which belongs to the cache kmalloc-128 of size 128
[   33.340131] The buggy address is located 5 bytes to the right of
[   33.340131]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.340383] 
[   33.340441] The buggy address belongs to the physical page:
[   33.340512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.341791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.341923] page_type: f5(slab)
[   33.342516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.342837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.342939] page dumped because: kasan: bad access detected
[   33.343575] 
[   33.343626] Memory state around the buggy address:
[   33.343876]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.344146]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344203] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.344272]                                                                 ^
[   33.344440]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344561]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344818] ==================================================================
[   33.345973] ==================================================================
[   33.346094] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   33.346230] Read of size 1 at addr fff00000c63f747f by task kunit_try_catch/206
[   33.346357] 
[   33.346424] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.346689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.346781] Hardware name: linux,dummy-virt (DT)
[   33.346867] Call trace:
[   33.346923]  show_stack+0x20/0x38 (C)
[   33.347077]  dump_stack_lvl+0x8c/0xd0
[   33.347366]  print_report+0x118/0x608
[   33.347535]  kasan_report+0xdc/0x128
[   33.347701]  __asan_report_load1_noabort+0x20/0x30
[   33.347848]  ksize_unpoisons_memory+0x690/0x740
[   33.347996]  kunit_try_run_case+0x170/0x3f0
[   33.348145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348421]  kthread+0x328/0x630
[   33.348733]  ret_from_fork+0x10/0x20
[   33.348915] 
[   33.348962] Allocated by task 206:
[   33.349052]  kasan_save_stack+0x3c/0x68
[   33.349154]  kasan_save_track+0x20/0x40
[   33.349247]  kasan_save_alloc_info+0x40/0x58
[   33.349332]  __kasan_kmalloc+0xd4/0xd8
[   33.349454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.349745]  ksize_unpoisons_memory+0xc0/0x740
[   33.349885]  kunit_try_run_case+0x170/0x3f0
[   33.350006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.350145]  kthread+0x328/0x630
[   33.350250]  ret_from_fork+0x10/0x20
[   33.350356] 
[   33.350412] The buggy address belongs to the object at fff00000c63f7400
[   33.350412]  which belongs to the cache kmalloc-128 of size 128
[   33.350569] The buggy address is located 12 bytes to the right of
[   33.350569]  allocated 115-byte region [fff00000c63f7400, fff00000c63f7473)
[   33.350738] 
[   33.350798] The buggy address belongs to the physical page:
[   33.350873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.350994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.351118] page_type: f5(slab)
[   33.351205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.351442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.351674] page dumped because: kasan: bad access detected
[   33.351755] 
[   33.351813] Memory state around the buggy address:
[   33.351984]  fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.352126]  fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352236] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.352335]                                                                 ^
[   33.352454]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352574]  fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352682] ==================================================================

[   22.243958] ==================================================================
[   22.245133] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   22.245599] Read of size 1 at addr ffff888102b4ed78 by task kunit_try_catch/223
[   22.245961] 
[   22.246256] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.246343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.246365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.246411] Call Trace:
[   22.246437]  <TASK>
[   22.246461]  dump_stack_lvl+0x73/0xb0
[   22.246517]  print_report+0xd1/0x650
[   22.246558]  ? __virt_addr_valid+0x1db/0x2d0
[   22.246599]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.246630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.246669]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.246707]  kasan_report+0x141/0x180
[   22.246743]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.246784]  __asan_report_load1_noabort+0x18/0x20
[   22.246818]  ksize_unpoisons_memory+0x7e9/0x9b0
[   22.246873]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.246907]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.246956]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.247008]  kunit_try_run_case+0x1a5/0x480
[   22.247035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.247053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.247074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.247103]  ? __kthread_parkme+0x82/0x180
[   22.247127]  ? preempt_count_sub+0x50/0x80
[   22.247156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.247185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.247213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.247241]  kthread+0x337/0x6f0
[   22.247261]  ? trace_preempt_on+0x20/0xc0
[   22.247279]  ? __pfx_kthread+0x10/0x10
[   22.247296]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.247313]  ? calculate_sigpending+0x7b/0xa0
[   22.247332]  ? __pfx_kthread+0x10/0x10
[   22.247350]  ret_from_fork+0x116/0x1d0
[   22.247365]  ? __pfx_kthread+0x10/0x10
[   22.247399]  ret_from_fork_asm+0x1a/0x30
[   22.247428]  </TASK>
[   22.247438] 
[   22.255972] Allocated by task 223:
[   22.256288]  kasan_save_stack+0x45/0x70
[   22.256586]  kasan_save_track+0x18/0x40
[   22.256975]  kasan_save_alloc_info+0x3b/0x50
[   22.257306]  __kasan_kmalloc+0xb7/0xc0
[   22.257522]  __kmalloc_cache_noprof+0x189/0x420
[   22.257731]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.258176]  kunit_try_run_case+0x1a5/0x480
[   22.258396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.258590]  kthread+0x337/0x6f0
[   22.258733]  ret_from_fork+0x116/0x1d0
[   22.258939]  ret_from_fork_asm+0x1a/0x30
[   22.259211] 
[   22.259352] The buggy address belongs to the object at ffff888102b4ed00
[   22.259352]  which belongs to the cache kmalloc-128 of size 128
[   22.259948] The buggy address is located 5 bytes to the right of
[   22.259948]  allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73)
[   22.260807] 
[   22.260925] The buggy address belongs to the physical page:
[   22.261197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.262301] flags: 0x200000000000000(node=0|zone=2)
[   22.262702] page_type: f5(slab)
[   22.262858] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.263292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.263611] page dumped because: kasan: bad access detected
[   22.264023] 
[   22.264255] Memory state around the buggy address:
[   22.264441]  ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.264661]  ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.264891] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.265320]                                                                 ^
[   22.266115]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.266603]  ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.266955] ==================================================================
[   22.213526] ==================================================================
[   22.214403] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   22.214871] Read of size 1 at addr ffff888102b4ed73 by task kunit_try_catch/223
[   22.215476] 
[   22.215618] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.215699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.215720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.215755] Call Trace:
[   22.215781]  <TASK>
[   22.215808]  dump_stack_lvl+0x73/0xb0
[   22.215859]  print_report+0xd1/0x650
[   22.215897]  ? __virt_addr_valid+0x1db/0x2d0
[   22.215930]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.215951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.215972]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.215991]  kasan_report+0x141/0x180
[   22.216009]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.216031]  __asan_report_load1_noabort+0x18/0x20
[   22.216057]  ksize_unpoisons_memory+0x81c/0x9b0
[   22.216432]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.216480]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.216522]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.216559]  kunit_try_run_case+0x1a5/0x480
[   22.216593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.216623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.216653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.216683]  ? __kthread_parkme+0x82/0x180
[   22.216710]  ? preempt_count_sub+0x50/0x80
[   22.216742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.216767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.216787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.216806]  kthread+0x337/0x6f0
[   22.216821]  ? trace_preempt_on+0x20/0xc0
[   22.216871]  ? __pfx_kthread+0x10/0x10
[   22.216894]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.216912]  ? calculate_sigpending+0x7b/0xa0
[   22.216932]  ? __pfx_kthread+0x10/0x10
[   22.216950]  ret_from_fork+0x116/0x1d0
[   22.216966]  ? __pfx_kthread+0x10/0x10
[   22.216983]  ret_from_fork_asm+0x1a/0x30
[   22.217009]  </TASK>
[   22.217021] 
[   22.229824] Allocated by task 223:
[   22.229996]  kasan_save_stack+0x45/0x70
[   22.230154]  kasan_save_track+0x18/0x40
[   22.230447]  kasan_save_alloc_info+0x3b/0x50
[   22.230621]  __kasan_kmalloc+0xb7/0xc0
[   22.231205]  __kmalloc_cache_noprof+0x189/0x420
[   22.231723]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.232193]  kunit_try_run_case+0x1a5/0x480
[   22.232428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.232675]  kthread+0x337/0x6f0
[   22.232821]  ret_from_fork+0x116/0x1d0
[   22.232994]  ret_from_fork_asm+0x1a/0x30
[   22.233507] 
[   22.233728] The buggy address belongs to the object at ffff888102b4ed00
[   22.233728]  which belongs to the cache kmalloc-128 of size 128
[   22.234701] The buggy address is located 0 bytes to the right of
[   22.234701]  allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73)
[   22.235422] 
[   22.235588] The buggy address belongs to the physical page:
[   22.236361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.236758] flags: 0x200000000000000(node=0|zone=2)
[   22.237560] page_type: f5(slab)
[   22.237865] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.238569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.239184] page dumped because: kasan: bad access detected
[   22.239612] 
[   22.239697] Memory state around the buggy address:
[   22.240280]  ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.240630]  ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.241324] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.241533]                                                              ^
[   22.242184]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242698]  ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.243184] ==================================================================
[   22.267510] ==================================================================
[   22.267841] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   22.268478] Read of size 1 at addr ffff888102b4ed7f by task kunit_try_catch/223
[   22.268785] 
[   22.268955] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.269027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.269048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.269077] Call Trace:
[   22.269100]  <TASK>
[   22.269123]  dump_stack_lvl+0x73/0xb0
[   22.269175]  print_report+0xd1/0x650
[   22.269213]  ? __virt_addr_valid+0x1db/0x2d0
[   22.269250]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.269289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.269512]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.269574]  kasan_report+0x141/0x180
[   22.269617]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.269667]  __asan_report_load1_noabort+0x18/0x20
[   22.269708]  ksize_unpoisons_memory+0x7b6/0x9b0
[   22.269750]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.269788]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.269838]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.269883]  kunit_try_run_case+0x1a5/0x480
[   22.269925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.269960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.269991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.270058]  ? __kthread_parkme+0x82/0x180
[   22.270207]  ? preempt_count_sub+0x50/0x80
[   22.270254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.270297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.270340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.270392]  kthread+0x337/0x6f0
[   22.270427]  ? trace_preempt_on+0x20/0xc0
[   22.270465]  ? __pfx_kthread+0x10/0x10
[   22.270501]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.270538]  ? calculate_sigpending+0x7b/0xa0
[   22.270578]  ? __pfx_kthread+0x10/0x10
[   22.270616]  ret_from_fork+0x116/0x1d0
[   22.270649]  ? __pfx_kthread+0x10/0x10
[   22.270685]  ret_from_fork_asm+0x1a/0x30
[   22.270741]  </TASK>
[   22.270763] 
[   22.284001] Allocated by task 223:
[   22.284808]  kasan_save_stack+0x45/0x70
[   22.285003]  kasan_save_track+0x18/0x40
[   22.285132]  kasan_save_alloc_info+0x3b/0x50
[   22.285402]  __kasan_kmalloc+0xb7/0xc0
[   22.286237]  __kmalloc_cache_noprof+0x189/0x420
[   22.286455]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.287033]  kunit_try_run_case+0x1a5/0x480
[   22.287412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.287751]  kthread+0x337/0x6f0
[   22.288296]  ret_from_fork+0x116/0x1d0
[   22.288610]  ret_from_fork_asm+0x1a/0x30
[   22.289044] 
[   22.289205] The buggy address belongs to the object at ffff888102b4ed00
[   22.289205]  which belongs to the cache kmalloc-128 of size 128
[   22.289991] The buggy address is located 12 bytes to the right of
[   22.289991]  allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73)
[   22.291347] 
[   22.291788] The buggy address belongs to the physical page:
[   22.291991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.292845] flags: 0x200000000000000(node=0|zone=2)
[   22.293137] page_type: f5(slab)
[   22.293372] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.293714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.294769] page dumped because: kasan: bad access detected
[   22.295176] 
[   22.295273] Memory state around the buggy address:
[   22.295460]  ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.296019]  ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.296596] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.297117]                                                                 ^
[   22.297513]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.297906]  ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.298249] ==================================================================