Hay
Date
July 10, 2025, 9:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.692591] ==================================================================
[   29.692649] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.692800] Read of size 1 at addr fff00000c9af0478 by task kunit_try_catch/225
[   29.692886] 
[   29.692913] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.693002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.693027] Hardware name: linux,dummy-virt (DT)
[   29.693058] Call trace:
[   29.693080]  show_stack+0x20/0x38 (C)
[   29.693139]  dump_stack_lvl+0x8c/0xd0
[   29.693184]  print_report+0x118/0x5d0
[   29.693226]  kasan_report+0xdc/0x128
[   29.693269]  __asan_report_load1_noabort+0x20/0x30
[   29.693327]  ksize_unpoisons_memory+0x618/0x740
[   29.693375]  kunit_try_run_case+0x170/0x3f0
[   29.693424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.693478]  kthread+0x328/0x630
[   29.693518]  ret_from_fork+0x10/0x20
[   29.693564] 
[   29.693582] Allocated by task 225:
[   29.693608]  kasan_save_stack+0x3c/0x68
[   29.693648]  kasan_save_track+0x20/0x40
[   29.693686]  kasan_save_alloc_info+0x40/0x58
[   29.693764]  __kasan_kmalloc+0xd4/0xd8
[   29.693918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.694114]  ksize_unpoisons_memory+0xc0/0x740
[   29.694165]  kunit_try_run_case+0x170/0x3f0
[   29.694513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.694718]  kthread+0x328/0x630
[   29.694755]  ret_from_fork+0x10/0x20
[   29.694797] 
[   29.694860] The buggy address belongs to the object at fff00000c9af0400
[   29.694860]  which belongs to the cache kmalloc-128 of size 128
[   29.695098] The buggy address is located 5 bytes to the right of
[   29.695098]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.695176] 
[   29.695196] The buggy address belongs to the physical page:
[   29.695227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.695282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.695330] page_type: f5(slab)
[   29.695373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.695631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.695790] page dumped because: kasan: bad access detected
[   29.695822] 
[   29.695904] Memory state around the buggy address:
[   29.696059]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.696554]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696623] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.696663]                                                                 ^
[   29.696705]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696802]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696843] ==================================================================
[   29.686679] ==================================================================
[   29.686785] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.686839] Read of size 1 at addr fff00000c9af0473 by task kunit_try_catch/225
[   29.686891] 
[   29.687247] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.687335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.687407] Hardware name: linux,dummy-virt (DT)
[   29.687472] Call trace:
[   29.687603]  show_stack+0x20/0x38 (C)
[   29.687674]  dump_stack_lvl+0x8c/0xd0
[   29.687720]  print_report+0x118/0x5d0
[   29.687771]  kasan_report+0xdc/0x128
[   29.687873]  __asan_report_load1_noabort+0x20/0x30
[   29.687998]  ksize_unpoisons_memory+0x628/0x740
[   29.688458]  kunit_try_run_case+0x170/0x3f0
[   29.688539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.688595]  kthread+0x328/0x630
[   29.688638]  ret_from_fork+0x10/0x20
[   29.688685] 
[   29.688703] Allocated by task 225:
[   29.688732]  kasan_save_stack+0x3c/0x68
[   29.688775]  kasan_save_track+0x20/0x40
[   29.688817]  kasan_save_alloc_info+0x40/0x58
[   29.688854]  __kasan_kmalloc+0xd4/0xd8
[   29.688901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.689027]  ksize_unpoisons_memory+0xc0/0x740
[   29.689116]  kunit_try_run_case+0x170/0x3f0
[   29.689164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.689208]  kthread+0x328/0x630
[   29.689239]  ret_from_fork+0x10/0x20
[   29.689274] 
[   29.689292] The buggy address belongs to the object at fff00000c9af0400
[   29.689292]  which belongs to the cache kmalloc-128 of size 128
[   29.689351] The buggy address is located 0 bytes to the right of
[   29.689351]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.689418] 
[   29.689437] The buggy address belongs to the physical page:
[   29.689475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.689530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689577] page_type: f5(slab)
[   29.689614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.689665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.689734] page dumped because: kasan: bad access detected
[   29.689813] 
[   29.689892] Memory state around the buggy address:
[   29.689949]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.690048]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690210] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.690251]                                                              ^
[   29.690297]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690498]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.690682] ==================================================================
[   29.697298] ==================================================================
[   29.697347] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.697469] Read of size 1 at addr fff00000c9af047f by task kunit_try_catch/225
[   29.697582] 
[   29.697680] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.697789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.697816] Hardware name: linux,dummy-virt (DT)
[   29.697847] Call trace:
[   29.697867]  show_stack+0x20/0x38 (C)
[   29.697914]  dump_stack_lvl+0x8c/0xd0
[   29.697957]  print_report+0x118/0x5d0
[   29.697999]  kasan_report+0xdc/0x128
[   29.698068]  __asan_report_load1_noabort+0x20/0x30
[   29.698203]  ksize_unpoisons_memory+0x690/0x740
[   29.698411]  kunit_try_run_case+0x170/0x3f0
[   29.698463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.698518]  kthread+0x328/0x630
[   29.698559]  ret_from_fork+0x10/0x20
[   29.698606] 
[   29.698633] Allocated by task 225:
[   29.698710]  kasan_save_stack+0x3c/0x68
[   29.698809]  kasan_save_track+0x20/0x40
[   29.698848]  kasan_save_alloc_info+0x40/0x58
[   29.698884]  __kasan_kmalloc+0xd4/0xd8
[   29.698921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.698959]  ksize_unpoisons_memory+0xc0/0x740
[   29.698998]  kunit_try_run_case+0x170/0x3f0
[   29.699036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.699087]  kthread+0x328/0x630
[   29.699120]  ret_from_fork+0x10/0x20
[   29.699190] 
[   29.699210] The buggy address belongs to the object at fff00000c9af0400
[   29.699210]  which belongs to the cache kmalloc-128 of size 128
[   29.699268] The buggy address is located 12 bytes to the right of
[   29.699268]  allocated 115-byte region [fff00000c9af0400, fff00000c9af0473)
[   29.699453] 
[   29.699560] The buggy address belongs to the physical page:
[   29.699702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.699776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.699824] page_type: f5(slab)
[   29.699865] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.699962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.700117] page dumped because: kasan: bad access detected
[   29.700162] 
[   29.700243] Memory state around the buggy address:
[   29.700278]  fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.700324]  fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700406] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.700593]                                                                 ^
[   29.700636]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700843]  fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700931] ==================================================================

[   25.448232] ==================================================================
[   25.448753] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   25.449147] Read of size 1 at addr ffff888105182d73 by task kunit_try_catch/242
[   25.449437] 
[   25.449575] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.449624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.449636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.449657] Call Trace:
[   25.449671]  <TASK>
[   25.449689]  dump_stack_lvl+0x73/0xb0
[   25.449734]  print_report+0xd1/0x610
[   25.449757]  ? __virt_addr_valid+0x1db/0x2d0
[   25.449826]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.449852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.449878]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.449900]  kasan_report+0x141/0x180
[   25.449922]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.449949]  __asan_report_load1_noabort+0x18/0x20
[   25.449973]  ksize_unpoisons_memory+0x81c/0x9b0
[   25.449996]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.450018]  ? finish_task_switch.isra.0+0x153/0x700
[   25.450042]  ? __switch_to+0x47/0xf80
[   25.450069]  ? __schedule+0x10cc/0x2b60
[   25.450092]  ? __pfx_read_tsc+0x10/0x10
[   25.450113]  ? ktime_get_ts64+0x86/0x230
[   25.450138]  kunit_try_run_case+0x1a5/0x480
[   25.450160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.450181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.450204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.450227]  ? __kthread_parkme+0x82/0x180
[   25.450248]  ? preempt_count_sub+0x50/0x80
[   25.450271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.450293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.450317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.450342]  kthread+0x337/0x6f0
[   25.450362]  ? trace_preempt_on+0x20/0xc0
[   25.450385]  ? __pfx_kthread+0x10/0x10
[   25.450406]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.450427]  ? calculate_sigpending+0x7b/0xa0
[   25.450450]  ? __pfx_kthread+0x10/0x10
[   25.450472]  ret_from_fork+0x116/0x1d0
[   25.450491]  ? __pfx_kthread+0x10/0x10
[   25.450521]  ret_from_fork_asm+0x1a/0x30
[   25.450552]  </TASK>
[   25.450564] 
[   25.458075] Allocated by task 242:
[   25.458266]  kasan_save_stack+0x45/0x70
[   25.458465]  kasan_save_track+0x18/0x40
[   25.458646]  kasan_save_alloc_info+0x3b/0x50
[   25.458900]  __kasan_kmalloc+0xb7/0xc0
[   25.459083]  __kmalloc_cache_noprof+0x189/0x420
[   25.459267]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.459417]  kunit_try_run_case+0x1a5/0x480
[   25.459558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.459761]  kthread+0x337/0x6f0
[   25.459935]  ret_from_fork+0x116/0x1d0
[   25.460162]  ret_from_fork_asm+0x1a/0x30
[   25.460358] 
[   25.460454] The buggy address belongs to the object at ffff888105182d00
[   25.460454]  which belongs to the cache kmalloc-128 of size 128
[   25.461334] The buggy address is located 0 bytes to the right of
[   25.461334]  allocated 115-byte region [ffff888105182d00, ffff888105182d73)
[   25.462052] 
[   25.462155] The buggy address belongs to the physical page:
[   25.462373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   25.462744] flags: 0x200000000000000(node=0|zone=2)
[   25.463081] page_type: f5(slab)
[   25.463206] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.463433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.463665] page dumped because: kasan: bad access detected
[   25.463941] 
[   25.464029] Memory state around the buggy address:
[   25.464250]  ffff888105182c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.464624]  ffff888105182c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.464998] >ffff888105182d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.465213]                                                              ^
[   25.465417]  ffff888105182d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.465884]  ffff888105182e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.466202] ==================================================================
[   25.488919] ==================================================================
[   25.489287] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   25.489798] Read of size 1 at addr ffff888105182d7f by task kunit_try_catch/242
[   25.490736] 
[   25.491068] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.491120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.491132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.491153] Call Trace:
[   25.491170]  <TASK>
[   25.491187]  dump_stack_lvl+0x73/0xb0
[   25.491217]  print_report+0xd1/0x610
[   25.491241]  ? __virt_addr_valid+0x1db/0x2d0
[   25.491265]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.491288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.491313]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.491335]  kasan_report+0x141/0x180
[   25.491356]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.491383]  __asan_report_load1_noabort+0x18/0x20
[   25.491406]  ksize_unpoisons_memory+0x7b6/0x9b0
[   25.491429]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.491450]  ? finish_task_switch.isra.0+0x153/0x700
[   25.491471]  ? __switch_to+0x47/0xf80
[   25.491505]  ? __schedule+0x10cc/0x2b60
[   25.491527]  ? __pfx_read_tsc+0x10/0x10
[   25.491548]  ? ktime_get_ts64+0x86/0x230
[   25.491572]  kunit_try_run_case+0x1a5/0x480
[   25.491593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.491613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.491635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.491658]  ? __kthread_parkme+0x82/0x180
[   25.491677]  ? preempt_count_sub+0x50/0x80
[   25.491709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.491730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.491756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.491879]  kthread+0x337/0x6f0
[   25.491899]  ? trace_preempt_on+0x20/0xc0
[   25.491923]  ? __pfx_kthread+0x10/0x10
[   25.491943]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.491964]  ? calculate_sigpending+0x7b/0xa0
[   25.491988]  ? __pfx_kthread+0x10/0x10
[   25.492011]  ret_from_fork+0x116/0x1d0
[   25.492030]  ? __pfx_kthread+0x10/0x10
[   25.492050]  ret_from_fork_asm+0x1a/0x30
[   25.492081]  </TASK>
[   25.492092] 
[   25.507177] Allocated by task 242:
[   25.507315]  kasan_save_stack+0x45/0x70
[   25.507467]  kasan_save_track+0x18/0x40
[   25.507617]  kasan_save_alloc_info+0x3b/0x50
[   25.508211]  __kasan_kmalloc+0xb7/0xc0
[   25.508416]  __kmalloc_cache_noprof+0x189/0x420
[   25.509067]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.509236]  kunit_try_run_case+0x1a5/0x480
[   25.509379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.510087]  kthread+0x337/0x6f0
[   25.510423]  ret_from_fork+0x116/0x1d0
[   25.510777]  ret_from_fork_asm+0x1a/0x30
[   25.510973] 
[   25.511064] The buggy address belongs to the object at ffff888105182d00
[   25.511064]  which belongs to the cache kmalloc-128 of size 128
[   25.511560] The buggy address is located 12 bytes to the right of
[   25.511560]  allocated 115-byte region [ffff888105182d00, ffff888105182d73)
[   25.512590] 
[   25.513029] The buggy address belongs to the physical page:
[   25.513343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   25.514028] flags: 0x200000000000000(node=0|zone=2)
[   25.514261] page_type: f5(slab)
[   25.514423] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.515340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.515878] page dumped because: kasan: bad access detected
[   25.516127] 
[   25.516214] Memory state around the buggy address:
[   25.516422]  ffff888105182c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.517263]  ffff888105182c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.517828] >ffff888105182d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.518409]                                                                 ^
[   25.518919]  ffff888105182d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.519225]  ffff888105182e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.519715] ==================================================================
[   25.466920] ==================================================================
[   25.467270] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   25.467650] Read of size 1 at addr ffff888105182d78 by task kunit_try_catch/242
[   25.468191] 
[   25.468313] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.468360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.468373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.468393] Call Trace:
[   25.468410]  <TASK>
[   25.468426]  dump_stack_lvl+0x73/0xb0
[   25.468455]  print_report+0xd1/0x610
[   25.468478]  ? __virt_addr_valid+0x1db/0x2d0
[   25.468518]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.468541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.468566]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.468589]  kasan_report+0x141/0x180
[   25.468611]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.468638]  __asan_report_load1_noabort+0x18/0x20
[   25.468662]  ksize_unpoisons_memory+0x7e9/0x9b0
[   25.468685]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.468721]  ? finish_task_switch.isra.0+0x153/0x700
[   25.468743]  ? __switch_to+0x47/0xf80
[   25.468769]  ? __schedule+0x10cc/0x2b60
[   25.468792]  ? __pfx_read_tsc+0x10/0x10
[   25.468813]  ? ktime_get_ts64+0x86/0x230
[   25.468839]  kunit_try_run_case+0x1a5/0x480
[   25.468861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.468880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.469148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.469177]  ? __kthread_parkme+0x82/0x180
[   25.469198]  ? preempt_count_sub+0x50/0x80
[   25.469220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.469242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.469267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.469292]  kthread+0x337/0x6f0
[   25.469312]  ? trace_preempt_on+0x20/0xc0
[   25.469336]  ? __pfx_kthread+0x10/0x10
[   25.469356]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.469377]  ? calculate_sigpending+0x7b/0xa0
[   25.469400]  ? __pfx_kthread+0x10/0x10
[   25.469421]  ret_from_fork+0x116/0x1d0
[   25.469440]  ? __pfx_kthread+0x10/0x10
[   25.469461]  ret_from_fork_asm+0x1a/0x30
[   25.469492]  </TASK>
[   25.469504] 
[   25.477036] Allocated by task 242:
[   25.477230]  kasan_save_stack+0x45/0x70
[   25.477449]  kasan_save_track+0x18/0x40
[   25.477906]  kasan_save_alloc_info+0x3b/0x50
[   25.478104]  __kasan_kmalloc+0xb7/0xc0
[   25.478290]  __kmalloc_cache_noprof+0x189/0x420
[   25.478446]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.478654]  kunit_try_run_case+0x1a5/0x480
[   25.479091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.479344]  kthread+0x337/0x6f0
[   25.479528]  ret_from_fork+0x116/0x1d0
[   25.479671]  ret_from_fork_asm+0x1a/0x30
[   25.479819] 
[   25.479921] The buggy address belongs to the object at ffff888105182d00
[   25.479921]  which belongs to the cache kmalloc-128 of size 128
[   25.480644] The buggy address is located 5 bytes to the right of
[   25.480644]  allocated 115-byte region [ffff888105182d00, ffff888105182d73)
[   25.481216] 
[   25.481313] The buggy address belongs to the physical page:
[   25.481558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   25.481860] flags: 0x200000000000000(node=0|zone=2)
[   25.482201] page_type: f5(slab)
[   25.482579] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.482866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.483093] page dumped because: kasan: bad access detected
[   25.483261] 
[   25.483326] Memory state around the buggy address:
[   25.484311]  ffff888105182c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.484980]  ffff888105182c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.485317] >ffff888105182d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.485760]                                                                 ^
[   25.486376]  ffff888105182d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.486725]  ffff888105182e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.487254] ==================================================================