Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.359464] ==================================================================
[   31.359878] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.360023] Read of size 1 at addr fff00000c9a9c77f by task kunit_try_catch/225
[   31.360073] 
[   31.360102] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.360229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.360257] Hardware name: linux,dummy-virt (DT)
[   31.360286] Call trace:
[   31.360309]  show_stack+0x20/0x38 (C)
[   31.360356]  dump_stack_lvl+0x8c/0xd0
[   31.360412]  print_report+0x118/0x5d0
[   31.360459]  kasan_report+0xdc/0x128
[   31.360506]  __asan_report_load1_noabort+0x20/0x30
[   31.360569]  ksize_unpoisons_memory+0x690/0x740
[   31.360662]  kunit_try_run_case+0x170/0x3f0
[   31.360756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.360862]  kthread+0x328/0x630
[   31.360954]  ret_from_fork+0x10/0x20
[   31.361051] 
[   31.361124] Allocated by task 225:
[   31.361229]  kasan_save_stack+0x3c/0x68
[   31.361297]  kasan_save_track+0x20/0x40
[   31.361389]  kasan_save_alloc_info+0x40/0x58
[   31.361458]  __kasan_kmalloc+0xd4/0xd8
[   31.361568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.361629]  ksize_unpoisons_memory+0xc0/0x740
[   31.361669]  kunit_try_run_case+0x170/0x3f0
[   31.361708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.361753]  kthread+0x328/0x630
[   31.361785]  ret_from_fork+0x10/0x20
[   31.361962] 
[   31.361982] The buggy address belongs to the object at fff00000c9a9c700
[   31.361982]  which belongs to the cache kmalloc-128 of size 128
[   31.362041] The buggy address is located 12 bytes to the right of
[   31.362041]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.362159] 
[   31.362235] The buggy address belongs to the physical page:
[   31.362277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.362340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.362420] page_type: f5(slab)
[   31.362520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.362590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.362650] page dumped because: kasan: bad access detected
[   31.362679] 
[   31.362711] Memory state around the buggy address:
[   31.362760]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.362829]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.362912] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.362983]                                                                 ^
[   31.363082]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363142]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363180] ==================================================================
[   31.352273] ==================================================================
[   31.352594] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.352817] Read of size 1 at addr fff00000c9a9c773 by task kunit_try_catch/225
[   31.352893] 
[   31.352955] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.353068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.353117] Hardware name: linux,dummy-virt (DT)
[   31.353148] Call trace:
[   31.353172]  show_stack+0x20/0x38 (C)
[   31.353352]  dump_stack_lvl+0x8c/0xd0
[   31.353403]  print_report+0x118/0x5d0
[   31.353452]  kasan_report+0xdc/0x128
[   31.353498]  __asan_report_load1_noabort+0x20/0x30
[   31.353545]  ksize_unpoisons_memory+0x628/0x740
[   31.353644]  kunit_try_run_case+0x170/0x3f0
[   31.353774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.353829]  kthread+0x328/0x630
[   31.353871]  ret_from_fork+0x10/0x20
[   31.354063] 
[   31.354084] Allocated by task 225:
[   31.354113]  kasan_save_stack+0x3c/0x68
[   31.354173]  kasan_save_track+0x20/0x40
[   31.354313]  kasan_save_alloc_info+0x40/0x58
[   31.354382]  __kasan_kmalloc+0xd4/0xd8
[   31.354461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.354560]  ksize_unpoisons_memory+0xc0/0x740
[   31.354630]  kunit_try_run_case+0x170/0x3f0
[   31.354738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.354807]  kthread+0x328/0x630
[   31.354885]  ret_from_fork+0x10/0x20
[   31.354988] 
[   31.355038] The buggy address belongs to the object at fff00000c9a9c700
[   31.355038]  which belongs to the cache kmalloc-128 of size 128
[   31.355273] The buggy address is located 0 bytes to the right of
[   31.355273]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.355339] 
[   31.355360] The buggy address belongs to the physical page:
[   31.355391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.355472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.355552] page_type: f5(slab)
[   31.355675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.355756] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.355814] page dumped because: kasan: bad access detected
[   31.355875] 
[   31.355915] Memory state around the buggy address:
[   31.356023]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.356112]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356250] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.356289]                                                              ^
[   31.356373]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356541]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.356581] ==================================================================
[   31.357104] ==================================================================
[   31.357160] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.357224] Read of size 1 at addr fff00000c9a9c778 by task kunit_try_catch/225
[   31.357280] 
[   31.357318] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.357439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.357467] Hardware name: linux,dummy-virt (DT)
[   31.357515] Call trace:
[   31.357545]  show_stack+0x20/0x38 (C)
[   31.357595]  dump_stack_lvl+0x8c/0xd0
[   31.357654]  print_report+0x118/0x5d0
[   31.357712]  kasan_report+0xdc/0x128
[   31.357760]  __asan_report_load1_noabort+0x20/0x30
[   31.357818]  ksize_unpoisons_memory+0x618/0x740
[   31.357873]  kunit_try_run_case+0x170/0x3f0
[   31.357930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.357984]  kthread+0x328/0x630
[   31.358027]  ret_from_fork+0x10/0x20
[   31.358075] 
[   31.358092] Allocated by task 225:
[   31.358118]  kasan_save_stack+0x3c/0x68
[   31.358158]  kasan_save_track+0x20/0x40
[   31.358202]  kasan_save_alloc_info+0x40/0x58
[   31.358251]  __kasan_kmalloc+0xd4/0xd8
[   31.358294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.358336]  ksize_unpoisons_memory+0xc0/0x740
[   31.358375]  kunit_try_run_case+0x170/0x3f0
[   31.358420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.358464]  kthread+0x328/0x630
[   31.358496]  ret_from_fork+0x10/0x20
[   31.358532] 
[   31.358563] The buggy address belongs to the object at fff00000c9a9c700
[   31.358563]  which belongs to the cache kmalloc-128 of size 128
[   31.358625] The buggy address is located 5 bytes to the right of
[   31.358625]  allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773)
[   31.358706] 
[   31.358738] The buggy address belongs to the physical page:
[   31.358769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.358831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.358878] page_type: f5(slab)
[   31.358916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.358966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.359006] page dumped because: kasan: bad access detected
[   31.359043] 
[   31.359067] Memory state around the buggy address:
[   31.359096]  fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.359140]  fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359187] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.359233]                                                                 ^
[   31.359273]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359314]  fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359352] ==================================================================

[   23.736019] ==================================================================
[   23.736542] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   23.736871] Read of size 1 at addr ffff8881062af073 by task kunit_try_catch/242
[   23.737341] 
[   23.737474] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.737553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.737566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.737682] Call Trace:
[   23.737862]  <TASK>
[   23.737885]  dump_stack_lvl+0x73/0xb0
[   23.737919]  print_report+0xd1/0x610
[   23.737943]  ? __virt_addr_valid+0x1db/0x2d0
[   23.737969]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.737993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.738021]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.738046]  kasan_report+0x141/0x180
[   23.738069]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.738097]  __asan_report_load1_noabort+0x18/0x20
[   23.738124]  ksize_unpoisons_memory+0x81c/0x9b0
[   23.738150]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.738174]  ? finish_task_switch.isra.0+0x153/0x700
[   23.738197]  ? __switch_to+0x47/0xf50
[   23.738228]  ? __schedule+0x10cc/0x2b60
[   23.738270]  ? __pfx_read_tsc+0x10/0x10
[   23.738296]  ? ktime_get_ts64+0x86/0x230
[   23.738323]  kunit_try_run_case+0x1a5/0x480
[   23.738347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.738367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.738389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.738418]  ? __kthread_parkme+0x82/0x180
[   23.738440]  ? preempt_count_sub+0x50/0x80
[   23.738464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.738485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.738512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.738539]  kthread+0x337/0x6f0
[   23.738564]  ? trace_preempt_on+0x20/0xc0
[   23.738592]  ? __pfx_kthread+0x10/0x10
[   23.738616]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.738644]  ? calculate_sigpending+0x7b/0xa0
[   23.738672]  ? __pfx_kthread+0x10/0x10
[   23.738697]  ret_from_fork+0x116/0x1d0
[   23.738716]  ? __pfx_kthread+0x10/0x10
[   23.738739]  ret_from_fork_asm+0x1a/0x30
[   23.738948]  </TASK>
[   23.738969] 
[   23.748924] Allocated by task 242:
[   23.749097]  kasan_save_stack+0x45/0x70
[   23.749471]  kasan_save_track+0x18/0x40
[   23.749728]  kasan_save_alloc_info+0x3b/0x50
[   23.750092]  __kasan_kmalloc+0xb7/0xc0
[   23.750279]  __kmalloc_cache_noprof+0x189/0x420
[   23.750491]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.750682]  kunit_try_run_case+0x1a5/0x480
[   23.751136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.751353]  kthread+0x337/0x6f0
[   23.751522]  ret_from_fork+0x116/0x1d0
[   23.752212]  ret_from_fork_asm+0x1a/0x30
[   23.752408] 
[   23.752605] The buggy address belongs to the object at ffff8881062af000
[   23.752605]  which belongs to the cache kmalloc-128 of size 128
[   23.753649] The buggy address is located 0 bytes to the right of
[   23.753649]  allocated 115-byte region [ffff8881062af000, ffff8881062af073)
[   23.754620] 
[   23.754719] The buggy address belongs to the physical page:
[   23.755152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.755512] flags: 0x200000000000000(node=0|zone=2)
[   23.755723] page_type: f5(slab)
[   23.756098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.756423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.756865] page dumped because: kasan: bad access detected
[   23.757083] 
[   23.757565] Memory state around the buggy address:
[   23.757765]  ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.758422]  ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.758881] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.759166]                                                              ^
[   23.759450]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.759737]  ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.760505] ==================================================================
[   23.791686] ==================================================================
[   23.791947] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   23.792615] Read of size 1 at addr ffff8881062af07f by task kunit_try_catch/242
[   23.793030] 
[   23.793317] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.793373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.793385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.793407] Call Trace:
[   23.793429]  <TASK>
[   23.793449]  dump_stack_lvl+0x73/0xb0
[   23.793481]  print_report+0xd1/0x610
[   23.793505]  ? __virt_addr_valid+0x1db/0x2d0
[   23.793530]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.793554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.793582]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.793606]  kasan_report+0x141/0x180
[   23.793628]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.793657]  __asan_report_load1_noabort+0x18/0x20
[   23.793683]  ksize_unpoisons_memory+0x7b6/0x9b0
[   23.793708]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.793731]  ? finish_task_switch.isra.0+0x153/0x700
[   23.793754]  ? __switch_to+0x47/0xf50
[   23.793832]  ? __schedule+0x10cc/0x2b60
[   23.793862]  ? __pfx_read_tsc+0x10/0x10
[   23.793887]  ? ktime_get_ts64+0x86/0x230
[   23.793915]  kunit_try_run_case+0x1a5/0x480
[   23.793938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.793959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.793981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.794025]  ? __kthread_parkme+0x82/0x180
[   23.794046]  ? preempt_count_sub+0x50/0x80
[   23.794070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.794092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.794118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.794144]  kthread+0x337/0x6f0
[   23.794166]  ? trace_preempt_on+0x20/0xc0
[   23.794192]  ? __pfx_kthread+0x10/0x10
[   23.794214]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.794252]  ? calculate_sigpending+0x7b/0xa0
[   23.794280]  ? __pfx_kthread+0x10/0x10
[   23.794304]  ret_from_fork+0x116/0x1d0
[   23.794323]  ? __pfx_kthread+0x10/0x10
[   23.794345]  ret_from_fork_asm+0x1a/0x30
[   23.794380]  </TASK>
[   23.794392] 
[   23.803869] Allocated by task 242:
[   23.804109]  kasan_save_stack+0x45/0x70
[   23.804280]  kasan_save_track+0x18/0x40
[   23.804532]  kasan_save_alloc_info+0x3b/0x50
[   23.804815]  __kasan_kmalloc+0xb7/0xc0
[   23.804997]  __kmalloc_cache_noprof+0x189/0x420
[   23.805180]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.805338]  kunit_try_run_case+0x1a5/0x480
[   23.805498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.805751]  kthread+0x337/0x6f0
[   23.806012]  ret_from_fork+0x116/0x1d0
[   23.806323]  ret_from_fork_asm+0x1a/0x30
[   23.807417] 
[   23.807500] The buggy address belongs to the object at ffff8881062af000
[   23.807500]  which belongs to the cache kmalloc-128 of size 128
[   23.808333] The buggy address is located 12 bytes to the right of
[   23.808333]  allocated 115-byte region [ffff8881062af000, ffff8881062af073)
[   23.808859] 
[   23.809308] The buggy address belongs to the physical page:
[   23.809636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.810260] flags: 0x200000000000000(node=0|zone=2)
[   23.810547] page_type: f5(slab)
[   23.810739] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.811487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.811983] page dumped because: kasan: bad access detected
[   23.812378] 
[   23.812611] Memory state around the buggy address:
[   23.812896]  ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.813450]  ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.813866] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.814325]                                                                 ^
[   23.814647]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.815361]  ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.815791] ==================================================================
[   23.761580] ==================================================================
[   23.762003] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   23.762421] Read of size 1 at addr ffff8881062af078 by task kunit_try_catch/242
[   23.762945] 
[   23.763134] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.763266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.763280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.763303] Call Trace:
[   23.763323]  <TASK>
[   23.763343]  dump_stack_lvl+0x73/0xb0
[   23.763377]  print_report+0xd1/0x610
[   23.763400]  ? __virt_addr_valid+0x1db/0x2d0
[   23.763424]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.763448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.763477]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.763501]  kasan_report+0x141/0x180
[   23.763523]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.763552]  __asan_report_load1_noabort+0x18/0x20
[   23.763578]  ksize_unpoisons_memory+0x7e9/0x9b0
[   23.763603]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.763627]  ? finish_task_switch.isra.0+0x153/0x700
[   23.763649]  ? __switch_to+0x47/0xf50
[   23.763678]  ? __schedule+0x10cc/0x2b60
[   23.763708]  ? __pfx_read_tsc+0x10/0x10
[   23.763732]  ? ktime_get_ts64+0x86/0x230
[   23.763772]  kunit_try_run_case+0x1a5/0x480
[   23.763795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.763865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.763893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.763923]  ? __kthread_parkme+0x82/0x180
[   23.763945]  ? preempt_count_sub+0x50/0x80
[   23.763968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.763991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.764018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.764045]  kthread+0x337/0x6f0
[   23.764068]  ? trace_preempt_on+0x20/0xc0
[   23.764094]  ? __pfx_kthread+0x10/0x10
[   23.764118]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.764145]  ? calculate_sigpending+0x7b/0xa0
[   23.764173]  ? __pfx_kthread+0x10/0x10
[   23.764197]  ret_from_fork+0x116/0x1d0
[   23.764218]  ? __pfx_kthread+0x10/0x10
[   23.764251]  ret_from_fork_asm+0x1a/0x30
[   23.764286]  </TASK>
[   23.764297] 
[   23.775415] Allocated by task 242:
[   23.775562]  kasan_save_stack+0x45/0x70
[   23.775719]  kasan_save_track+0x18/0x40
[   23.775857]  kasan_save_alloc_info+0x3b/0x50
[   23.776004]  __kasan_kmalloc+0xb7/0xc0
[   23.776129]  __kmalloc_cache_noprof+0x189/0x420
[   23.776362]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.776576]  kunit_try_run_case+0x1a5/0x480
[   23.777653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.777842]  kthread+0x337/0x6f0
[   23.778438]  ret_from_fork+0x116/0x1d0
[   23.779101]  ret_from_fork_asm+0x1a/0x30
[   23.780805] 
[   23.780949] The buggy address belongs to the object at ffff8881062af000
[   23.780949]  which belongs to the cache kmalloc-128 of size 128
[   23.781473] The buggy address is located 5 bytes to the right of
[   23.781473]  allocated 115-byte region [ffff8881062af000, ffff8881062af073)
[   23.783285] 
[   23.783493] The buggy address belongs to the physical page:
[   23.784593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.785484] flags: 0x200000000000000(node=0|zone=2)
[   23.786019] page_type: f5(slab)
[   23.786203] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.786596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.787284] page dumped because: kasan: bad access detected
[   23.787634] 
[   23.787727] Memory state around the buggy address:
[   23.788183]  ffff8881062aef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.788593]  ffff8881062aef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.789132] >ffff8881062af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.789553]                                                                 ^
[   23.789973]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.790290]  ffff8881062af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.790598] ==================================================================