Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.766705] ==================================================================
[   29.766900] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.766983] Read of size 1 at addr fff00000c9b1e373 by task kunit_try_catch/225
[   29.767034] 
[   29.767305] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.767414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.767787] Hardware name: linux,dummy-virt (DT)
[   29.767868] Call trace:
[   29.767894]  show_stack+0x20/0x38 (C)
[   29.767946]  dump_stack_lvl+0x8c/0xd0
[   29.768281]  print_report+0x118/0x5d0
[   29.768359]  kasan_report+0xdc/0x128
[   29.768539]  __asan_report_load1_noabort+0x20/0x30
[   29.768626]  ksize_unpoisons_memory+0x628/0x740
[   29.768760]  kunit_try_run_case+0x170/0x3f0
[   29.768842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.768898]  kthread+0x328/0x630
[   29.768939]  ret_from_fork+0x10/0x20
[   29.768987] 
[   29.769005] Allocated by task 225:
[   29.769033]  kasan_save_stack+0x3c/0x68
[   29.769434]  kasan_save_track+0x20/0x40
[   29.769508]  kasan_save_alloc_info+0x40/0x58
[   29.769546]  __kasan_kmalloc+0xd4/0xd8
[   29.769579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.769627]  ksize_unpoisons_memory+0xc0/0x740
[   29.769686]  kunit_try_run_case+0x170/0x3f0
[   29.769724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769765]  kthread+0x328/0x630
[   29.769796]  ret_from_fork+0x10/0x20
[   29.769832] 
[   29.769862] The buggy address belongs to the object at fff00000c9b1e300
[   29.769862]  which belongs to the cache kmalloc-128 of size 128
[   29.769930] The buggy address is located 0 bytes to the right of
[   29.769930]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.769994] 
[   29.770021] The buggy address belongs to the physical page:
[   29.770064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.770134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.770182] page_type: f5(slab)
[   29.770221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.770282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.770323] page dumped because: kasan: bad access detected
[   29.770356] 
[   29.770381] Memory state around the buggy address:
[   29.770421]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.770465]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770519] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.770568]                                                              ^
[   29.770617]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770662]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.770710] ==================================================================
[   29.773355] ==================================================================
[   29.773418] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.773792] Read of size 1 at addr fff00000c9b1e378 by task kunit_try_catch/225
[   29.774450] 
[   29.774507] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.774607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.774646] Hardware name: linux,dummy-virt (DT)
[   29.774685] Call trace:
[   29.774708]  show_stack+0x20/0x38 (C)
[   29.774760]  dump_stack_lvl+0x8c/0xd0
[   29.774937]  print_report+0x118/0x5d0
[   29.774999]  kasan_report+0xdc/0x128
[   29.775197]  __asan_report_load1_noabort+0x20/0x30
[   29.775261]  ksize_unpoisons_memory+0x618/0x740
[   29.775313]  kunit_try_run_case+0x170/0x3f0
[   29.775639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.775736]  kthread+0x328/0x630
[   29.775979]  ret_from_fork+0x10/0x20
[   29.776046] 
[   29.776117] Allocated by task 225:
[   29.776303]  kasan_save_stack+0x3c/0x68
[   29.776632]  kasan_save_track+0x20/0x40
[   29.776685]  kasan_save_alloc_info+0x40/0x58
[   29.776790]  __kasan_kmalloc+0xd4/0xd8
[   29.776867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.777008]  ksize_unpoisons_memory+0xc0/0x740
[   29.777115]  kunit_try_run_case+0x170/0x3f0
[   29.777195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.777239]  kthread+0x328/0x630
[   29.777421]  ret_from_fork+0x10/0x20
[   29.777601] 
[   29.777629] The buggy address belongs to the object at fff00000c9b1e300
[   29.777629]  which belongs to the cache kmalloc-128 of size 128
[   29.778082] The buggy address is located 5 bytes to the right of
[   29.778082]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.778226] 
[   29.778285] The buggy address belongs to the physical page:
[   29.778350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.778480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.778559] page_type: f5(slab)
[   29.778613] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.778738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.778885] page dumped because: kasan: bad access detected
[   29.778943] 
[   29.778989] Memory state around the buggy address:
[   29.779027]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.779228]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.779446] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.779540]                                                                 ^
[   29.779613]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780097]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780236] ==================================================================
[   29.781719] ==================================================================
[   29.781843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.781928] Read of size 1 at addr fff00000c9b1e37f by task kunit_try_catch/225
[   29.781978] 
[   29.782139] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.782225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.782251] Hardware name: linux,dummy-virt (DT)
[   29.782575] Call trace:
[   29.782635]  show_stack+0x20/0x38 (C)
[   29.782748]  dump_stack_lvl+0x8c/0xd0
[   29.782804]  print_report+0x118/0x5d0
[   29.782850]  kasan_report+0xdc/0x128
[   29.783089]  __asan_report_load1_noabort+0x20/0x30
[   29.783220]  ksize_unpoisons_memory+0x690/0x740
[   29.783280]  kunit_try_run_case+0x170/0x3f0
[   29.783477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.783561]  kthread+0x328/0x630
[   29.783605]  ret_from_fork+0x10/0x20
[   29.783891] 
[   29.783922] Allocated by task 225:
[   29.783961]  kasan_save_stack+0x3c/0x68
[   29.784100]  kasan_save_track+0x20/0x40
[   29.784141]  kasan_save_alloc_info+0x40/0x58
[   29.784205]  __kasan_kmalloc+0xd4/0xd8
[   29.784363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.784571]  ksize_unpoisons_memory+0xc0/0x740
[   29.784652]  kunit_try_run_case+0x170/0x3f0
[   29.784715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.784761]  kthread+0x328/0x630
[   29.784795]  ret_from_fork+0x10/0x20
[   29.785274] 
[   29.785379] The buggy address belongs to the object at fff00000c9b1e300
[   29.785379]  which belongs to the cache kmalloc-128 of size 128
[   29.785452] The buggy address is located 12 bytes to the right of
[   29.785452]  allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373)
[   29.785531] 
[   29.785586] The buggy address belongs to the physical page:
[   29.785624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e
[   29.785680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.785727] page_type: f5(slab)
[   29.785767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.785817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.785859] page dumped because: kasan: bad access detected
[   29.785898] 
[   29.785917] Memory state around the buggy address:
[   29.785946]  fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.785990]  fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786042] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.786106]                                                                 ^
[   29.786148]  fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786190]  fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.786228] ==================================================================

[   26.097366] ==================================================================
[   26.097604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   26.097836] Read of size 1 at addr ffff88810553d87f by task kunit_try_catch/243
[   26.098058] 
[   26.098940] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   26.098997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.099010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.099031] Call Trace:
[   26.099054]  <TASK>
[   26.099068]  dump_stack_lvl+0x73/0xb0
[   26.099108]  print_report+0xd1/0x610
[   26.099130]  ? __virt_addr_valid+0x1db/0x2d0
[   26.099153]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.099176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.099202]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.099225]  kasan_report+0x141/0x180
[   26.099247]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.099306]  __asan_report_load1_noabort+0x18/0x20
[   26.099358]  ksize_unpoisons_memory+0x7b6/0x9b0
[   26.099382]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.099404]  ? finish_task_switch.isra.0+0x153/0x700
[   26.099425]  ? __switch_to+0x47/0xf80
[   26.099450]  ? __schedule+0x10c6/0x2b60
[   26.099473]  ? __pfx_read_tsc+0x10/0x10
[   26.099493]  ? ktime_get_ts64+0x86/0x230
[   26.099517]  kunit_try_run_case+0x1a5/0x480
[   26.099540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.099562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.099584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.099607]  ? __kthread_parkme+0x82/0x180
[   26.099630]  ? preempt_count_sub+0x50/0x80
[   26.099652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.099676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.099698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.099721]  kthread+0x337/0x6f0
[   26.099740]  ? trace_preempt_on+0x20/0xc0
[   26.099763]  ? __pfx_kthread+0x10/0x10
[   26.099783]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.099804]  ? calculate_sigpending+0x7b/0xa0
[   26.099827]  ? __pfx_kthread+0x10/0x10
[   26.099847]  ret_from_fork+0x116/0x1d0
[   26.099866]  ? __pfx_kthread+0x10/0x10
[   26.099885]  ret_from_fork_asm+0x1a/0x30
[   26.099917]  </TASK>
[   26.099927] 
[   26.112138] Allocated by task 243:
[   26.112285]  kasan_save_stack+0x45/0x70
[   26.113011]  kasan_save_track+0x18/0x40
[   26.113404]  kasan_save_alloc_info+0x3b/0x50
[   26.113787]  __kasan_kmalloc+0xb7/0xc0
[   26.113916]  __kmalloc_cache_noprof+0x189/0x420
[   26.114068]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.114221]  kunit_try_run_case+0x1a5/0x480
[   26.114717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.115201]  kthread+0x337/0x6f0
[   26.115582]  ret_from_fork+0x116/0x1d0
[   26.115923]  ret_from_fork_asm+0x1a/0x30
[   26.116335] 
[   26.116488] The buggy address belongs to the object at ffff88810553d800
[   26.116488]  which belongs to the cache kmalloc-128 of size 128
[   26.117622] The buggy address is located 12 bytes to the right of
[   26.117622]  allocated 115-byte region [ffff88810553d800, ffff88810553d873)
[   26.118158] 
[   26.118224] The buggy address belongs to the physical page:
[   26.118930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   26.119720] flags: 0x200000000000000(node=0|zone=2)
[   26.120229] page_type: f5(slab)
[   26.120534] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.121248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.121643] page dumped because: kasan: bad access detected
[   26.121977] 
[   26.122039] Memory state around the buggy address:
[   26.122198]  ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.122651]  ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.122874] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.123499]                                                                 ^
[   26.124198]  ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.124828]  ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.125508] ==================================================================
[   26.076361] ==================================================================
[   26.076695] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   26.076989] Read of size 1 at addr ffff88810553d878 by task kunit_try_catch/243
[   26.077229] 
[   26.077542] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   26.077591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.077602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.077622] Call Trace:
[   26.077636]  <TASK>
[   26.077650]  dump_stack_lvl+0x73/0xb0
[   26.077679]  print_report+0xd1/0x610
[   26.077700]  ? __virt_addr_valid+0x1db/0x2d0
[   26.077723]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.077745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.077771]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.077794]  kasan_report+0x141/0x180
[   26.077815]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.077843]  __asan_report_load1_noabort+0x18/0x20
[   26.077867]  ksize_unpoisons_memory+0x7e9/0x9b0
[   26.077891]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.077913]  ? finish_task_switch.isra.0+0x153/0x700
[   26.077938]  ? __switch_to+0x47/0xf80
[   26.077963]  ? __schedule+0x10c6/0x2b60
[   26.077986]  ? __pfx_read_tsc+0x10/0x10
[   26.078006]  ? ktime_get_ts64+0x86/0x230
[   26.078030]  kunit_try_run_case+0x1a5/0x480
[   26.078053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.078074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.078107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.078131]  ? __kthread_parkme+0x82/0x180
[   26.078154]  ? preempt_count_sub+0x50/0x80
[   26.078176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.078199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.078222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.078480]  kthread+0x337/0x6f0
[   26.078507]  ? trace_preempt_on+0x20/0xc0
[   26.078531]  ? __pfx_kthread+0x10/0x10
[   26.078551]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.078573]  ? calculate_sigpending+0x7b/0xa0
[   26.078596]  ? __pfx_kthread+0x10/0x10
[   26.078617]  ret_from_fork+0x116/0x1d0
[   26.078636]  ? __pfx_kthread+0x10/0x10
[   26.078656]  ret_from_fork_asm+0x1a/0x30
[   26.078687]  </TASK>
[   26.078696] 
[   26.086335] Allocated by task 243:
[   26.086488]  kasan_save_stack+0x45/0x70
[   26.086677]  kasan_save_track+0x18/0x40
[   26.086853]  kasan_save_alloc_info+0x3b/0x50
[   26.087056]  __kasan_kmalloc+0xb7/0xc0
[   26.087245]  __kmalloc_cache_noprof+0x189/0x420
[   26.088156]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.088602]  kunit_try_run_case+0x1a5/0x480
[   26.088795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.089027]  kthread+0x337/0x6f0
[   26.089206]  ret_from_fork+0x116/0x1d0
[   26.089452]  ret_from_fork_asm+0x1a/0x30
[   26.090139] 
[   26.090226] The buggy address belongs to the object at ffff88810553d800
[   26.090226]  which belongs to the cache kmalloc-128 of size 128
[   26.090731] The buggy address is located 5 bytes to the right of
[   26.090731]  allocated 115-byte region [ffff88810553d800, ffff88810553d873)
[   26.091236] 
[   26.091792] The buggy address belongs to the physical page:
[   26.092009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   26.092368] flags: 0x200000000000000(node=0|zone=2)
[   26.092693] page_type: f5(slab)
[   26.092853] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.093160] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.093589] page dumped because: kasan: bad access detected
[   26.093838] 
[   26.093911] Memory state around the buggy address:
[   26.094128]  ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.094559]  ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.094863] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.095156]                                                                 ^
[   26.095537]  ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.095834]  ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096128] ==================================================================
[   26.052681] ==================================================================
[   26.053218] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   26.054460] Read of size 1 at addr ffff88810553d873 by task kunit_try_catch/243
[   26.055584] 
[   26.055740] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   26.055796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.055809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.055830] Call Trace:
[   26.055842]  <TASK>
[   26.055857]  dump_stack_lvl+0x73/0xb0
[   26.055888]  print_report+0xd1/0x610
[   26.055910]  ? __virt_addr_valid+0x1db/0x2d0
[   26.055934]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.056097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.056128]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.056151]  kasan_report+0x141/0x180
[   26.056173]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.056201]  __asan_report_load1_noabort+0x18/0x20
[   26.056224]  ksize_unpoisons_memory+0x81c/0x9b0
[   26.056282]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.056306]  ? finish_task_switch.isra.0+0x153/0x700
[   26.056328]  ? __switch_to+0x47/0xf80
[   26.056354]  ? __schedule+0x10c6/0x2b60
[   26.056377]  ? __pfx_read_tsc+0x10/0x10
[   26.056398]  ? ktime_get_ts64+0x86/0x230
[   26.056422]  kunit_try_run_case+0x1a5/0x480
[   26.056446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.056490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.056513]  ? __kthread_parkme+0x82/0x180
[   26.056536]  ? preempt_count_sub+0x50/0x80
[   26.056558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.056604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.056627]  kthread+0x337/0x6f0
[   26.056645]  ? trace_preempt_on+0x20/0xc0
[   26.056670]  ? __pfx_kthread+0x10/0x10
[   26.056691]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.056712]  ? calculate_sigpending+0x7b/0xa0
[   26.056736]  ? __pfx_kthread+0x10/0x10
[   26.056756]  ret_from_fork+0x116/0x1d0
[   26.056775]  ? __pfx_kthread+0x10/0x10
[   26.056794]  ret_from_fork_asm+0x1a/0x30
[   26.056825]  </TASK>
[   26.056836] 
[   26.067043] Allocated by task 243:
[   26.067182]  kasan_save_stack+0x45/0x70
[   26.067402]  kasan_save_track+0x18/0x40
[   26.067959]  kasan_save_alloc_info+0x3b/0x50
[   26.068132]  __kasan_kmalloc+0xb7/0xc0
[   26.068743]  __kmalloc_cache_noprof+0x189/0x420
[   26.068942]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.069147]  kunit_try_run_case+0x1a5/0x480
[   26.069316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.069641]  kthread+0x337/0x6f0
[   26.069799]  ret_from_fork+0x116/0x1d0
[   26.069932]  ret_from_fork_asm+0x1a/0x30
[   26.070126] 
[   26.070214] The buggy address belongs to the object at ffff88810553d800
[   26.070214]  which belongs to the cache kmalloc-128 of size 128
[   26.070737] The buggy address is located 0 bytes to the right of
[   26.070737]  allocated 115-byte region [ffff88810553d800, ffff88810553d873)
[   26.071196] 
[   26.071346] The buggy address belongs to the physical page:
[   26.071630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   26.071937] flags: 0x200000000000000(node=0|zone=2)
[   26.072128] page_type: f5(slab)
[   26.072244] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.072671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.072903] page dumped because: kasan: bad access detected
[   26.073215] 
[   26.073349] Memory state around the buggy address:
[   26.073700]  ffff88810553d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.073911]  ffff88810553d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.074238] >ffff88810553d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.074830]                                                              ^
[   26.075133]  ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.075437]  ffff88810553d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.075782] ==================================================================