Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.911648] ==================================================================
[   26.911708] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   26.911761] Read of size 1 at addr fff00000c789527f by task kunit_try_catch/206
[   26.911836] 
[   26.911869] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.912064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.912153] Hardware name: linux,dummy-virt (DT)
[   26.912335] Call trace:
[   26.912358]  show_stack+0x20/0x38 (C)
[   26.912422]  dump_stack_lvl+0x8c/0xd0
[   26.912631]  print_report+0x118/0x608
[   26.912907]  kasan_report+0xdc/0x128
[   26.913012]  __asan_report_load1_noabort+0x20/0x30
[   26.913092]  ksize_unpoisons_memory+0x690/0x740
[   26.913255]  kunit_try_run_case+0x170/0x3f0
[   26.913640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.913767]  kthread+0x328/0x630
[   26.913873]  ret_from_fork+0x10/0x20
[   26.914046] 
[   26.914180] Allocated by task 206:
[   26.914353]  kasan_save_stack+0x3c/0x68
[   26.914640]  kasan_save_track+0x20/0x40
[   26.914715]  kasan_save_alloc_info+0x40/0x58
[   26.914925]  __kasan_kmalloc+0xd4/0xd8
[   26.915052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.915199]  ksize_unpoisons_memory+0xc0/0x740
[   26.915306]  kunit_try_run_case+0x170/0x3f0
[   26.915359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.915786]  kthread+0x328/0x630
[   26.915915]  ret_from_fork+0x10/0x20
[   26.916044] 
[   26.916125] The buggy address belongs to the object at fff00000c7895200
[   26.916125]  which belongs to the cache kmalloc-128 of size 128
[   26.916299] The buggy address is located 12 bytes to the right of
[   26.916299]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.916491] 
[   26.916561] The buggy address belongs to the physical page:
[   26.916691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.916916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.917028] page_type: f5(slab)
[   26.917150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.917268] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.917537] page dumped because: kasan: bad access detected
[   26.917669] 
[   26.917893] Memory state around the buggy address:
[   26.918101]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.918169]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.918531] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.918603]                                                                 ^
[   26.918809]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.918886]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.919146] ==================================================================
[   26.903871] ==================================================================
[   26.904074] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   26.904369] Read of size 1 at addr fff00000c7895278 by task kunit_try_catch/206
[   26.904541] 
[   26.904656] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.905003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.905177] Hardware name: linux,dummy-virt (DT)
[   26.905230] Call trace:
[   26.905255]  show_stack+0x20/0x38 (C)
[   26.905324]  dump_stack_lvl+0x8c/0xd0
[   26.905385]  print_report+0x118/0x608
[   26.905443]  kasan_report+0xdc/0x128
[   26.905500]  __asan_report_load1_noabort+0x20/0x30
[   26.905549]  ksize_unpoisons_memory+0x618/0x740
[   26.905605]  kunit_try_run_case+0x170/0x3f0
[   26.905655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.905717]  kthread+0x328/0x630
[   26.905769]  ret_from_fork+0x10/0x20
[   26.905825] 
[   26.905844] Allocated by task 206:
[   26.905872]  kasan_save_stack+0x3c/0x68
[   26.905912]  kasan_save_track+0x20/0x40
[   26.905950]  kasan_save_alloc_info+0x40/0x58
[   26.905998]  __kasan_kmalloc+0xd4/0xd8
[   26.906036]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.906076]  ksize_unpoisons_memory+0xc0/0x740
[   26.906121]  kunit_try_run_case+0x170/0x3f0
[   26.906169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.906234]  kthread+0x328/0x630
[   26.906266]  ret_from_fork+0x10/0x20
[   26.906311] 
[   26.906331] The buggy address belongs to the object at fff00000c7895200
[   26.906331]  which belongs to the cache kmalloc-128 of size 128
[   26.906688] The buggy address is located 5 bytes to the right of
[   26.906688]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.906939] 
[   26.907316] The buggy address belongs to the physical page:
[   26.907354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.907678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.907781] page_type: f5(slab)
[   26.908148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.908304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.908479] page dumped because: kasan: bad access detected
[   26.908650] 
[   26.908780] Memory state around the buggy address:
[   26.909071]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.909151]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909331] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.909449]                                                                 ^
[   26.909516]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909652]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.909818] ==================================================================
[   26.891768] ==================================================================
[   26.891833] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   26.892434] Read of size 1 at addr fff00000c7895273 by task kunit_try_catch/206
[   26.892960] 
[   26.893081] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.893538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.893707] Hardware name: linux,dummy-virt (DT)
[   26.893973] Call trace:
[   26.894047]  show_stack+0x20/0x38 (C)
[   26.894256]  dump_stack_lvl+0x8c/0xd0
[   26.894470]  print_report+0x118/0x608
[   26.894835]  kasan_report+0xdc/0x128
[   26.895094]  __asan_report_load1_noabort+0x20/0x30
[   26.895458]  ksize_unpoisons_memory+0x628/0x740
[   26.895570]  kunit_try_run_case+0x170/0x3f0
[   26.895825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.896094]  kthread+0x328/0x630
[   26.896252]  ret_from_fork+0x10/0x20
[   26.896307] 
[   26.896328] Allocated by task 206:
[   26.896359]  kasan_save_stack+0x3c/0x68
[   26.896566]  kasan_save_track+0x20/0x40
[   26.896727]  kasan_save_alloc_info+0x40/0x58
[   26.897188]  __kasan_kmalloc+0xd4/0xd8
[   26.897296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.897609]  ksize_unpoisons_memory+0xc0/0x740
[   26.897653]  kunit_try_run_case+0x170/0x3f0
[   26.897919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.898147]  kthread+0x328/0x630
[   26.898218]  ret_from_fork+0x10/0x20
[   26.898536] 
[   26.898569] The buggy address belongs to the object at fff00000c7895200
[   26.898569]  which belongs to the cache kmalloc-128 of size 128
[   26.899051] The buggy address is located 0 bytes to the right of
[   26.899051]  allocated 115-byte region [fff00000c7895200, fff00000c7895273)
[   26.899221] 
[   26.899622] The buggy address belongs to the physical page:
[   26.899695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895
[   26.899943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.900206] page_type: f5(slab)
[   26.900251] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.900309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.900353] page dumped because: kasan: bad access detected
[   26.900902] 
[   26.900932] Memory state around the buggy address:
[   26.901125]  fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.901270]  fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.901600] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.901795]                                                              ^
[   26.901978]  fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.902382]  fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.902534] ==================================================================

[   22.284171] ==================================================================
[   22.284757] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   22.285456] Read of size 1 at addr ffff88810257ec73 by task kunit_try_catch/223
[   22.285698] 
[   22.285810] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   22.285856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.285869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.285891] Call Trace:
[   22.285903]  <TASK>
[   22.285922]  dump_stack_lvl+0x73/0xb0
[   22.285961]  print_report+0xd1/0x650
[   22.285981]  ? __virt_addr_valid+0x1db/0x2d0
[   22.286004]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.286024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.286048]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.286069]  kasan_report+0x141/0x180
[   22.286089]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   22.286114]  __asan_report_load1_noabort+0x18/0x20
[   22.286136]  ksize_unpoisons_memory+0x81c/0x9b0
[   22.286157]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.286178]  ? finish_task_switch.isra.0+0x153/0x700
[   22.286199]  ? __switch_to+0x47/0xf50
[   22.286223]  ? __schedule+0x10cc/0x2b60
[   22.286268]  ? __pfx_read_tsc+0x10/0x10
[   22.287018]  ? ktime_get_ts64+0x86/0x230
[   22.287050]  kunit_try_run_case+0x1a5/0x480
[   22.287078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.287099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.287142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.287166]  ? __kthread_parkme+0x82/0x180
[   22.287186]  ? preempt_count_sub+0x50/0x80
[   22.287208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.287230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.287253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.287275]  kthread+0x337/0x6f0
[   22.287293]  ? trace_preempt_on+0x20/0xc0
[   22.287316]  ? __pfx_kthread+0x10/0x10
[   22.287334]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.287356]  ? calculate_sigpending+0x7b/0xa0
[   22.287379]  ? __pfx_kthread+0x10/0x10
[   22.287398]  ret_from_fork+0x116/0x1d0
[   22.287416]  ? __pfx_kthread+0x10/0x10
[   22.287434]  ret_from_fork_asm+0x1a/0x30
[   22.287463]  </TASK>
[   22.287474] 
[   22.300257] Allocated by task 223:
[   22.300397]  kasan_save_stack+0x45/0x70
[   22.300533]  kasan_save_track+0x18/0x40
[   22.300657]  kasan_save_alloc_info+0x3b/0x50
[   22.300794]  __kasan_kmalloc+0xb7/0xc0
[   22.301068]  __kmalloc_cache_noprof+0x189/0x420
[   22.301465]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.301703]  kunit_try_run_case+0x1a5/0x480
[   22.302136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.302571]  kthread+0x337/0x6f0
[   22.302684]  ret_from_fork+0x116/0x1d0
[   22.302805]  ret_from_fork_asm+0x1a/0x30
[   22.303378] 
[   22.303530] The buggy address belongs to the object at ffff88810257ec00
[   22.303530]  which belongs to the cache kmalloc-128 of size 128
[   22.304757] The buggy address is located 0 bytes to the right of
[   22.304757]  allocated 115-byte region [ffff88810257ec00, ffff88810257ec73)
[   22.305680] 
[   22.305754] The buggy address belongs to the physical page:
[   22.306009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e
[   22.306716] flags: 0x200000000000000(node=0|zone=2)
[   22.307399] page_type: f5(slab)
[   22.307741] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.308296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.308523] page dumped because: kasan: bad access detected
[   22.308685] 
[   22.308746] Memory state around the buggy address:
[   22.309160]  ffff88810257eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.309823]  ffff88810257eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.310494] >ffff88810257ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.311288]                                                              ^
[   22.311872]  ffff88810257ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.312623]  ffff88810257ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.313219] ==================================================================
[   22.335001] ==================================================================
[   22.335359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   22.335603] Read of size 1 at addr ffff88810257ec7f by task kunit_try_catch/223
[   22.335813] 
[   22.336081] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   22.336128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.336139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.336159] Call Trace:
[   22.336172]  <TASK>
[   22.336187]  dump_stack_lvl+0x73/0xb0
[   22.336211]  print_report+0xd1/0x650
[   22.336230]  ? __virt_addr_valid+0x1db/0x2d0
[   22.336252]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.336272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.336296]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.336317]  kasan_report+0x141/0x180
[   22.336341]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   22.336366]  __asan_report_load1_noabort+0x18/0x20
[   22.336388]  ksize_unpoisons_memory+0x7b6/0x9b0
[   22.336410]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.336430]  ? finish_task_switch.isra.0+0x153/0x700
[   22.336450]  ? __switch_to+0x47/0xf50
[   22.336473]  ? __schedule+0x10cc/0x2b60
[   22.336495]  ? __pfx_read_tsc+0x10/0x10
[   22.336515]  ? ktime_get_ts64+0x86/0x230
[   22.336538]  kunit_try_run_case+0x1a5/0x480
[   22.336562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.336583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.336602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.336625]  ? __kthread_parkme+0x82/0x180
[   22.336643]  ? preempt_count_sub+0x50/0x80
[   22.336664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.336687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.336708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.336730]  kthread+0x337/0x6f0
[   22.336760]  ? trace_preempt_on+0x20/0xc0
[   22.336780]  ? __pfx_kthread+0x10/0x10
[   22.336800]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.336888]  ? calculate_sigpending+0x7b/0xa0
[   22.336910]  ? __pfx_kthread+0x10/0x10
[   22.336929]  ret_from_fork+0x116/0x1d0
[   22.336968]  ? __pfx_kthread+0x10/0x10
[   22.336987]  ret_from_fork_asm+0x1a/0x30
[   22.337015]  </TASK>
[   22.337025] 
[   22.345794] Allocated by task 223:
[   22.346080]  kasan_save_stack+0x45/0x70
[   22.346378]  kasan_save_track+0x18/0x40
[   22.346630]  kasan_save_alloc_info+0x3b/0x50
[   22.346770]  __kasan_kmalloc+0xb7/0xc0
[   22.346890]  __kmalloc_cache_noprof+0x189/0x420
[   22.347044]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.347185]  kunit_try_run_case+0x1a5/0x480
[   22.347324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.347679]  kthread+0x337/0x6f0
[   22.347839]  ret_from_fork+0x116/0x1d0
[   22.348022]  ret_from_fork_asm+0x1a/0x30
[   22.348203] 
[   22.348288] The buggy address belongs to the object at ffff88810257ec00
[   22.348288]  which belongs to the cache kmalloc-128 of size 128
[   22.349079] The buggy address is located 12 bytes to the right of
[   22.349079]  allocated 115-byte region [ffff88810257ec00, ffff88810257ec73)
[   22.349434] 
[   22.349498] The buggy address belongs to the physical page:
[   22.349953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e
[   22.350386] flags: 0x200000000000000(node=0|zone=2)
[   22.350571] page_type: f5(slab)
[   22.350683] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.350933] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.351604] page dumped because: kasan: bad access detected
[   22.351924] 
[   22.352005] Memory state around the buggy address:
[   22.352204]  ffff88810257eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.352547]  ffff88810257eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.352991] >ffff88810257ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.353375]                                                                 ^
[   22.353741]  ffff88810257ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.354222]  ffff88810257ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.354454] ==================================================================
[   22.313621] ==================================================================
[   22.314286] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   22.315045] Read of size 1 at addr ffff88810257ec78 by task kunit_try_catch/223
[   22.316082] 
[   22.316294] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   22.316347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.316360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.316379] Call Trace:
[   22.316405]  <TASK>
[   22.316422]  dump_stack_lvl+0x73/0xb0
[   22.316447]  print_report+0xd1/0x650
[   22.316479]  ? __virt_addr_valid+0x1db/0x2d0
[   22.316500]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.316521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.316545]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.316567]  kasan_report+0x141/0x180
[   22.316586]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   22.316612]  __asan_report_load1_noabort+0x18/0x20
[   22.316634]  ksize_unpoisons_memory+0x7e9/0x9b0
[   22.316656]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   22.316677]  ? finish_task_switch.isra.0+0x153/0x700
[   22.316697]  ? __switch_to+0x47/0xf50
[   22.316721]  ? __schedule+0x10cc/0x2b60
[   22.316744]  ? __pfx_read_tsc+0x10/0x10
[   22.316764]  ? ktime_get_ts64+0x86/0x230
[   22.316787]  kunit_try_run_case+0x1a5/0x480
[   22.316821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.316842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.316862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.316885]  ? __kthread_parkme+0x82/0x180
[   22.316903]  ? preempt_count_sub+0x50/0x80
[   22.316924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.316956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.316978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.317000]  kthread+0x337/0x6f0
[   22.317017]  ? trace_preempt_on+0x20/0xc0
[   22.317038]  ? __pfx_kthread+0x10/0x10
[   22.317057]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.317079]  ? calculate_sigpending+0x7b/0xa0
[   22.317100]  ? __pfx_kthread+0x10/0x10
[   22.317120]  ret_from_fork+0x116/0x1d0
[   22.317138]  ? __pfx_kthread+0x10/0x10
[   22.317157]  ret_from_fork_asm+0x1a/0x30
[   22.317185]  </TASK>
[   22.317195] 
[   22.325678] Allocated by task 223:
[   22.325803]  kasan_save_stack+0x45/0x70
[   22.325935]  kasan_save_track+0x18/0x40
[   22.326209]  kasan_save_alloc_info+0x3b/0x50
[   22.326454]  __kasan_kmalloc+0xb7/0xc0
[   22.326660]  __kmalloc_cache_noprof+0x189/0x420
[   22.327100]  ksize_unpoisons_memory+0xc7/0x9b0
[   22.327418]  kunit_try_run_case+0x1a5/0x480
[   22.327648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.327981]  kthread+0x337/0x6f0
[   22.328105]  ret_from_fork+0x116/0x1d0
[   22.328411]  ret_from_fork_asm+0x1a/0x30
[   22.328626] 
[   22.328716] The buggy address belongs to the object at ffff88810257ec00
[   22.328716]  which belongs to the cache kmalloc-128 of size 128
[   22.329275] The buggy address is located 5 bytes to the right of
[   22.329275]  allocated 115-byte region [ffff88810257ec00, ffff88810257ec73)
[   22.330043] 
[   22.330154] The buggy address belongs to the physical page:
[   22.330387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e
[   22.330636] flags: 0x200000000000000(node=0|zone=2)
[   22.330788] page_type: f5(slab)
[   22.330978] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.331303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.331771] page dumped because: kasan: bad access detected
[   22.331929] 
[   22.332000] Memory state around the buggy address:
[   22.332348]  ffff88810257eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.332887]  ffff88810257eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.333231] >ffff88810257ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.333510]                                                                 ^
[   22.333879]  ffff88810257ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.334206]  ffff88810257ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.334489] ==================================================================