Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.801420] ==================================================================
[   30.801484] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.801733] Read of size 1 at addr fff00000c6361e73 by task kunit_try_catch/225
[   30.801827] 
[   30.801940] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.802030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.802058] Hardware name: linux,dummy-virt (DT)
[   30.802160] Call trace:
[   30.802185]  show_stack+0x20/0x38 (C)
[   30.802252]  dump_stack_lvl+0x8c/0xd0
[   30.802360]  print_report+0x118/0x5d0
[   30.802409]  kasan_report+0xdc/0x128
[   30.802590]  __asan_report_load1_noabort+0x20/0x30
[   30.802826]  ksize_unpoisons_memory+0x628/0x740
[   30.802895]  kunit_try_run_case+0x170/0x3f0
[   30.802963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.803083]  kthread+0x328/0x630
[   30.803130]  ret_from_fork+0x10/0x20
[   30.803187] 
[   30.803206] Allocated by task 225:
[   30.803386]  kasan_save_stack+0x3c/0x68
[   30.803438]  kasan_save_track+0x20/0x40
[   30.803595]  kasan_save_alloc_info+0x40/0x58
[   30.803704]  __kasan_kmalloc+0xd4/0xd8
[   30.803769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.803851]  ksize_unpoisons_memory+0xc0/0x740
[   30.803894]  kunit_try_run_case+0x170/0x3f0
[   30.804040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.804137]  kthread+0x328/0x630
[   30.804301]  ret_from_fork+0x10/0x20
[   30.804339] 
[   30.804359] The buggy address belongs to the object at fff00000c6361e00
[   30.804359]  which belongs to the cache kmalloc-128 of size 128
[   30.804438] The buggy address is located 0 bytes to the right of
[   30.804438]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.804668] 
[   30.804864] The buggy address belongs to the physical page:
[   30.804920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.805083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.805264] page_type: f5(slab)
[   30.805382] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.805447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.805553] page dumped because: kasan: bad access detected
[   30.805587] 
[   30.805629] Memory state around the buggy address:
[   30.805874]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.805968]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806105] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.806288]                                                              ^
[   30.806389]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806619]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.806690] ==================================================================
[   30.807758] ==================================================================
[   30.808054] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.808279] Read of size 1 at addr fff00000c6361e78 by task kunit_try_catch/225
[   30.808436] 
[   30.808514] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.808688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.808767] Hardware name: linux,dummy-virt (DT)
[   30.808887] Call trace:
[   30.808988]  show_stack+0x20/0x38 (C)
[   30.809067]  dump_stack_lvl+0x8c/0xd0
[   30.809245]  print_report+0x118/0x5d0
[   30.809395]  kasan_report+0xdc/0x128
[   30.809593]  __asan_report_load1_noabort+0x20/0x30
[   30.809757]  ksize_unpoisons_memory+0x618/0x740
[   30.809947]  kunit_try_run_case+0x170/0x3f0
[   30.810020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.810073]  kthread+0x328/0x630
[   30.810277]  ret_from_fork+0x10/0x20
[   30.810420] 
[   30.810565] Allocated by task 225:
[   30.810635]  kasan_save_stack+0x3c/0x68
[   30.810806]  kasan_save_track+0x20/0x40
[   30.810848]  kasan_save_alloc_info+0x40/0x58
[   30.810952]  __kasan_kmalloc+0xd4/0xd8
[   30.810994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.811035]  ksize_unpoisons_memory+0xc0/0x740
[   30.811076]  kunit_try_run_case+0x170/0x3f0
[   30.811124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.811178]  kthread+0x328/0x630
[   30.811224]  ret_from_fork+0x10/0x20
[   30.811261] 
[   30.811296] The buggy address belongs to the object at fff00000c6361e00
[   30.811296]  which belongs to the cache kmalloc-128 of size 128
[   30.811356] The buggy address is located 5 bytes to the right of
[   30.811356]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.811438] 
[   30.811457] The buggy address belongs to the physical page:
[   30.811489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.811768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.811859] page_type: f5(slab)
[   30.812058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.812240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.812331] page dumped because: kasan: bad access detected
[   30.812528] 
[   30.812601] Memory state around the buggy address:
[   30.812635]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.812796]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813108] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.813229]                                                                 ^
[   30.813318]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813481]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.813611] ==================================================================
[   30.815074] ==================================================================
[   30.815172] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.815346] Read of size 1 at addr fff00000c6361e7f by task kunit_try_catch/225
[   30.815440] 
[   30.815551] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.815641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.815895] Hardware name: linux,dummy-virt (DT)
[   30.816067] Call trace:
[   30.816137]  show_stack+0x20/0x38 (C)
[   30.816297]  dump_stack_lvl+0x8c/0xd0
[   30.816388]  print_report+0x118/0x5d0
[   30.816465]  kasan_report+0xdc/0x128
[   30.816639]  __asan_report_load1_noabort+0x20/0x30
[   30.816693]  ksize_unpoisons_memory+0x690/0x740
[   30.816924]  kunit_try_run_case+0x170/0x3f0
[   30.817123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.817265]  kthread+0x328/0x630
[   30.817364]  ret_from_fork+0x10/0x20
[   30.817589] 
[   30.817649] Allocated by task 225:
[   30.817739]  kasan_save_stack+0x3c/0x68
[   30.817796]  kasan_save_track+0x20/0x40
[   30.817850]  kasan_save_alloc_info+0x40/0x58
[   30.817895]  __kasan_kmalloc+0xd4/0xd8
[   30.817942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.817991]  ksize_unpoisons_memory+0xc0/0x740
[   30.818032]  kunit_try_run_case+0x170/0x3f0
[   30.818069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.818115]  kthread+0x328/0x630
[   30.818148]  ret_from_fork+0x10/0x20
[   30.818184] 
[   30.818203] The buggy address belongs to the object at fff00000c6361e00
[   30.818203]  which belongs to the cache kmalloc-128 of size 128
[   30.818276] The buggy address is located 12 bytes to the right of
[   30.818276]  allocated 115-byte region [fff00000c6361e00, fff00000c6361e73)
[   30.818345] 
[   30.818371] The buggy address belongs to the physical page:
[   30.818422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.818478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.818747] page_type: f5(slab)
[   30.818844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.819062] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.819203] page dumped because: kasan: bad access detected
[   30.819285] 
[   30.819366] Memory state around the buggy address:
[   30.819561]  fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.819632]  fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.819964] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.820157]                                                                 ^
[   30.820310]  fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.820379]  fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.820468] ==================================================================

[   23.737544] ==================================================================
[   23.738107] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   23.738838] Read of size 1 at addr ffff888104a2497f by task kunit_try_catch/243
[   23.739428] 
[   23.739517] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   23.739575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.739587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.739608] Call Trace:
[   23.739627]  <TASK>
[   23.739642]  dump_stack_lvl+0x73/0xb0
[   23.739671]  print_report+0xd1/0x610
[   23.739718]  ? __virt_addr_valid+0x1db/0x2d0
[   23.739740]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.739762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.739786]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.739809]  kasan_report+0x141/0x180
[   23.739829]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.739856]  __asan_report_load1_noabort+0x18/0x20
[   23.739929]  ksize_unpoisons_memory+0x7b6/0x9b0
[   23.739952]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.739974]  ? finish_task_switch.isra.0+0x153/0x700
[   23.739995]  ? __switch_to+0x47/0xf80
[   23.740020]  ? __schedule+0x10c6/0x2b60
[   23.740042]  ? __pfx_read_tsc+0x10/0x10
[   23.740063]  ? ktime_get_ts64+0x86/0x230
[   23.740088]  kunit_try_run_case+0x1a5/0x480
[   23.740111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.740132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.740154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.740176]  ? __kthread_parkme+0x82/0x180
[   23.740195]  ? preempt_count_sub+0x50/0x80
[   23.740217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.740239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.740264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.740303]  kthread+0x337/0x6f0
[   23.740322]  ? trace_preempt_on+0x20/0xc0
[   23.740344]  ? __pfx_kthread+0x10/0x10
[   23.740364]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.740384]  ? calculate_sigpending+0x7b/0xa0
[   23.740407]  ? __pfx_kthread+0x10/0x10
[   23.740427]  ret_from_fork+0x116/0x1d0
[   23.740446]  ? __pfx_kthread+0x10/0x10
[   23.740465]  ret_from_fork_asm+0x1a/0x30
[   23.740495]  </TASK>
[   23.740505] 
[   23.753358] Allocated by task 243:
[   23.753485]  kasan_save_stack+0x45/0x70
[   23.753693]  kasan_save_track+0x18/0x40
[   23.754023]  kasan_save_alloc_info+0x3b/0x50
[   23.754473]  __kasan_kmalloc+0xb7/0xc0
[   23.754854]  __kmalloc_cache_noprof+0x189/0x420
[   23.755529]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.755928]  kunit_try_run_case+0x1a5/0x480
[   23.756382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.756875]  kthread+0x337/0x6f0
[   23.757033]  ret_from_fork+0x116/0x1d0
[   23.757426]  ret_from_fork_asm+0x1a/0x30
[   23.757810] 
[   23.757955] The buggy address belongs to the object at ffff888104a24900
[   23.757955]  which belongs to the cache kmalloc-128 of size 128
[   23.758369] The buggy address is located 12 bytes to the right of
[   23.758369]  allocated 115-byte region [ffff888104a24900, ffff888104a24973)
[   23.759305] 
[   23.759473] The buggy address belongs to the physical page:
[   23.759990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24
[   23.760724] flags: 0x200000000000000(node=0|zone=2)
[   23.761191] page_type: f5(slab)
[   23.761547] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.762117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.762510] page dumped because: kasan: bad access detected
[   23.762805] 
[   23.762970] Memory state around the buggy address:
[   23.763629]  ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.764399]  ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.764713] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.765379]                                                                 ^
[   23.766111]  ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.766341]  ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.766549] ==================================================================
[   23.673211] ==================================================================
[   23.674791] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   23.675764] Read of size 1 at addr ffff888104a24973 by task kunit_try_catch/243
[   23.676801] 
[   23.677293] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   23.677463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.677478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.677501] Call Trace:
[   23.677515]  <TASK>
[   23.677531]  dump_stack_lvl+0x73/0xb0
[   23.677593]  print_report+0xd1/0x610
[   23.677615]  ? __virt_addr_valid+0x1db/0x2d0
[   23.677640]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.677662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.677687]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.677709]  kasan_report+0x141/0x180
[   23.677730]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.677757]  __asan_report_load1_noabort+0x18/0x20
[   23.677779]  ksize_unpoisons_memory+0x81c/0x9b0
[   23.677801]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.677823]  ? finish_task_switch.isra.0+0x153/0x700
[   23.677844]  ? __switch_to+0x47/0xf80
[   23.677888]  ? __schedule+0x10c6/0x2b60
[   23.677910]  ? __pfx_read_tsc+0x10/0x10
[   23.677933]  ? ktime_get_ts64+0x86/0x230
[   23.677959]  kunit_try_run_case+0x1a5/0x480
[   23.677983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.678004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.678026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.678049]  ? __kthread_parkme+0x82/0x180
[   23.678070]  ? preempt_count_sub+0x50/0x80
[   23.678091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.678113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.678138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.678164]  kthread+0x337/0x6f0
[   23.678183]  ? trace_preempt_on+0x20/0xc0
[   23.678206]  ? __pfx_kthread+0x10/0x10
[   23.678226]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.678246]  ? calculate_sigpending+0x7b/0xa0
[   23.678269]  ? __pfx_kthread+0x10/0x10
[   23.678299]  ret_from_fork+0x116/0x1d0
[   23.678317]  ? __pfx_kthread+0x10/0x10
[   23.678337]  ret_from_fork_asm+0x1a/0x30
[   23.678367]  </TASK>
[   23.678378] 
[   23.692384] Allocated by task 243:
[   23.692929]  kasan_save_stack+0x45/0x70
[   23.693448]  kasan_save_track+0x18/0x40
[   23.693977]  kasan_save_alloc_info+0x3b/0x50
[   23.694501]  __kasan_kmalloc+0xb7/0xc0
[   23.695036]  __kmalloc_cache_noprof+0x189/0x420
[   23.695671]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.696272]  kunit_try_run_case+0x1a5/0x480
[   23.696832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.697664]  kthread+0x337/0x6f0
[   23.698128]  ret_from_fork+0x116/0x1d0
[   23.698580]  ret_from_fork_asm+0x1a/0x30
[   23.698978] 
[   23.699244] The buggy address belongs to the object at ffff888104a24900
[   23.699244]  which belongs to the cache kmalloc-128 of size 128
[   23.700343] The buggy address is located 0 bytes to the right of
[   23.700343]  allocated 115-byte region [ffff888104a24900, ffff888104a24973)
[   23.701459] 
[   23.701544] The buggy address belongs to the physical page:
[   23.702463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24
[   23.703356] flags: 0x200000000000000(node=0|zone=2)
[   23.703533] page_type: f5(slab)
[   23.704116] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.705053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.705302] page dumped because: kasan: bad access detected
[   23.705471] 
[   23.705542] Memory state around the buggy address:
[   23.705704]  ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.705936]  ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.706830] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.707121]                                                              ^
[   23.707443]  ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.708406]  ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.709374] ==================================================================
[   23.710210] ==================================================================
[   23.710716] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   23.711144] Read of size 1 at addr ffff888104a24978 by task kunit_try_catch/243
[   23.711453] 
[   23.711575] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   23.711625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.711638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.711658] Call Trace:
[   23.711671]  <TASK>
[   23.711688]  dump_stack_lvl+0x73/0xb0
[   23.711718]  print_report+0xd1/0x610
[   23.712080]  ? __virt_addr_valid+0x1db/0x2d0
[   23.712105]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.712127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.712151]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.712174]  kasan_report+0x141/0x180
[   23.712195]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.712221]  __asan_report_load1_noabort+0x18/0x20
[   23.712244]  ksize_unpoisons_memory+0x7e9/0x9b0
[   23.712267]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.712301]  ? finish_task_switch.isra.0+0x153/0x700
[   23.712322]  ? __switch_to+0x47/0xf80
[   23.712347]  ? __schedule+0x10c6/0x2b60
[   23.712370]  ? __pfx_read_tsc+0x10/0x10
[   23.712391]  ? ktime_get_ts64+0x86/0x230
[   23.712415]  kunit_try_run_case+0x1a5/0x480
[   23.712439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.712461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.712483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.712505]  ? __kthread_parkme+0x82/0x180
[   23.712524]  ? preempt_count_sub+0x50/0x80
[   23.712546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.712580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.712605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.712631]  kthread+0x337/0x6f0
[   23.712649]  ? trace_preempt_on+0x20/0xc0
[   23.712672]  ? __pfx_kthread+0x10/0x10
[   23.712692]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.712711]  ? calculate_sigpending+0x7b/0xa0
[   23.712734]  ? __pfx_kthread+0x10/0x10
[   23.712755]  ret_from_fork+0x116/0x1d0
[   23.712773]  ? __pfx_kthread+0x10/0x10
[   23.712793]  ret_from_fork_asm+0x1a/0x30
[   23.712824]  </TASK>
[   23.712834] 
[   23.723776] Allocated by task 243:
[   23.723908]  kasan_save_stack+0x45/0x70
[   23.724044]  kasan_save_track+0x18/0x40
[   23.724168]  kasan_save_alloc_info+0x3b/0x50
[   23.724381]  __kasan_kmalloc+0xb7/0xc0
[   23.724675]  __kmalloc_cache_noprof+0x189/0x420
[   23.725195]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.725754]  kunit_try_run_case+0x1a5/0x480
[   23.726038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.726474]  kthread+0x337/0x6f0
[   23.726602]  ret_from_fork+0x116/0x1d0
[   23.726994]  ret_from_fork_asm+0x1a/0x30
[   23.727451] 
[   23.727645] The buggy address belongs to the object at ffff888104a24900
[   23.727645]  which belongs to the cache kmalloc-128 of size 128
[   23.728695] The buggy address is located 5 bytes to the right of
[   23.728695]  allocated 115-byte region [ffff888104a24900, ffff888104a24973)
[   23.729430] 
[   23.729503] The buggy address belongs to the physical page:
[   23.729905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24
[   23.730923] flags: 0x200000000000000(node=0|zone=2)
[   23.731093] page_type: f5(slab)
[   23.731207] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.731441] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.731928] page dumped because: kasan: bad access detected
[   23.732532] 
[   23.732718] Memory state around the buggy address:
[   23.733189]  ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.733869]  ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.734642] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.735238]                                                                 ^
[   23.735742]  ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.736164]  ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.736815] ==================================================================