Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.564510] ==================================================================
[   30.564558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   30.564610] Read of size 1 at addr fff00000c3f71f7f by task kunit_try_catch/225
[   30.564848] 
[   30.565280] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.565418] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.565450] Hardware name: linux,dummy-virt (DT)
[   30.565495] Call trace:
[   30.565671]  show_stack+0x20/0x38 (C)
[   30.565924]  dump_stack_lvl+0x8c/0xd0
[   30.566053]  print_report+0x118/0x5e8
[   30.566188]  kasan_report+0xdc/0x128
[   30.566326]  __asan_report_load1_noabort+0x20/0x30
[   30.566485]  ksize_unpoisons_memory+0x690/0x740
[   30.566558]  kunit_try_run_case+0x170/0x3f0
[   30.566837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.567023]  kthread+0x328/0x630
[   30.567179]  ret_from_fork+0x10/0x20
[   30.567390] 
[   30.567501] Allocated by task 225:
[   30.567546]  kasan_save_stack+0x3c/0x68
[   30.567788]  kasan_save_track+0x20/0x40
[   30.567925]  kasan_save_alloc_info+0x40/0x58
[   30.568096]  __kasan_kmalloc+0xd4/0xd8
[   30.568204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.568314]  ksize_unpoisons_memory+0xc0/0x740
[   30.568391]  kunit_try_run_case+0x170/0x3f0
[   30.568745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.568987]  kthread+0x328/0x630
[   30.569093]  ret_from_fork+0x10/0x20
[   30.569216] 
[   30.569297] The buggy address belongs to the object at fff00000c3f71f00
[   30.569297]  which belongs to the cache kmalloc-128 of size 128
[   30.569544] The buggy address is located 12 bytes to the right of
[   30.569544]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.569620] 
[   30.569639] The buggy address belongs to the physical page:
[   30.569675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.569841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.570615] page_type: f5(slab)
[   30.570679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.570749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.570853] page dumped because: kasan: bad access detected
[   30.571007] 
[   30.571071] Memory state around the buggy address:
[   30.571146]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.571838]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572097] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.572181]                                                                 ^
[   30.572378]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.572494]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.572561] ==================================================================
[   30.551438] ==================================================================
[   30.551885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.551964] Read of size 1 at addr fff00000c3f71f73 by task kunit_try_catch/225
[   30.552015] 
[   30.552093] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.552197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.552226] Hardware name: linux,dummy-virt (DT)
[   30.552259] Call trace:
[   30.552290]  show_stack+0x20/0x38 (C)
[   30.552358]  dump_stack_lvl+0x8c/0xd0
[   30.552404]  print_report+0x118/0x5e8
[   30.552449]  kasan_report+0xdc/0x128
[   30.552492]  __asan_report_load1_noabort+0x20/0x30
[   30.552539]  ksize_unpoisons_memory+0x628/0x740
[   30.552589]  kunit_try_run_case+0x170/0x3f0
[   30.552648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.552700]  kthread+0x328/0x630
[   30.552741]  ret_from_fork+0x10/0x20
[   30.552849] 
[   30.553386] Allocated by task 225:
[   30.553446]  kasan_save_stack+0x3c/0x68
[   30.553501]  kasan_save_track+0x20/0x40
[   30.553905]  kasan_save_alloc_info+0x40/0x58
[   30.553976]  __kasan_kmalloc+0xd4/0xd8
[   30.554063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.554162]  ksize_unpoisons_memory+0xc0/0x740
[   30.554253]  kunit_try_run_case+0x170/0x3f0
[   30.554397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.554474]  kthread+0x328/0x630
[   30.554688]  ret_from_fork+0x10/0x20
[   30.554913] 
[   30.554972] The buggy address belongs to the object at fff00000c3f71f00
[   30.554972]  which belongs to the cache kmalloc-128 of size 128
[   30.555085] The buggy address is located 0 bytes to the right of
[   30.555085]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.555205] 
[   30.555322] The buggy address belongs to the physical page:
[   30.555380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.555461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.555861] page_type: f5(slab)
[   30.556161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.556370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.556439] page dumped because: kasan: bad access detected
[   30.556542] 
[   30.556613] Memory state around the buggy address:
[   30.556755]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.556845]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557026] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.557444]                                                              ^
[   30.557554]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557684]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.557773] ==================================================================
[   30.558969] ==================================================================
[   30.559027] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.559081] Read of size 1 at addr fff00000c3f71f78 by task kunit_try_catch/225
[   30.559283] 
[   30.559439] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   30.559539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   30.559762] Hardware name: linux,dummy-virt (DT)
[   30.559837] Call trace:
[   30.559863]  show_stack+0x20/0x38 (C)
[   30.559991]  dump_stack_lvl+0x8c/0xd0
[   30.560339]  print_report+0x118/0x5e8
[   30.560433]  kasan_report+0xdc/0x128
[   30.560541]  __asan_report_load1_noabort+0x20/0x30
[   30.560629]  ksize_unpoisons_memory+0x618/0x740
[   30.560874]  kunit_try_run_case+0x170/0x3f0
[   30.561090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.561162]  kthread+0x328/0x630
[   30.561390]  ret_from_fork+0x10/0x20
[   30.561593] 
[   30.561661] Allocated by task 225:
[   30.561849]  kasan_save_stack+0x3c/0x68
[   30.561988]  kasan_save_track+0x20/0x40
[   30.562080]  kasan_save_alloc_info+0x40/0x58
[   30.562165]  __kasan_kmalloc+0xd4/0xd8
[   30.562200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.562412]  ksize_unpoisons_memory+0xc0/0x740
[   30.562581]  kunit_try_run_case+0x170/0x3f0
[   30.562645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.562691]  kthread+0x328/0x630
[   30.562723]  ret_from_fork+0x10/0x20
[   30.562806] 
[   30.562838] The buggy address belongs to the object at fff00000c3f71f00
[   30.562838]  which belongs to the cache kmalloc-128 of size 128
[   30.562898] The buggy address is located 5 bytes to the right of
[   30.562898]  allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73)
[   30.562964] 
[   30.563005] The buggy address belongs to the physical page:
[   30.563040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   30.563093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.563140] page_type: f5(slab)
[   30.563178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   30.563248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.563288] page dumped because: kasan: bad access detected
[   30.563334] 
[   30.563353] Memory state around the buggy address:
[   30.563393]  fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.563438]  fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563480] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.563519]                                                                 ^
[   30.563559]  fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563600]  fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.563636] ==================================================================

[   25.531354] ==================================================================
[   25.531862] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   25.532321] Read of size 1 at addr ffff8881058a9578 by task kunit_try_catch/242
[   25.532964] 
[   25.533109] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   25.533156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.533177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.533198] Call Trace:
[   25.533213]  <TASK>
[   25.533228]  dump_stack_lvl+0x73/0xb0
[   25.533256]  print_report+0xd1/0x640
[   25.533279]  ? __virt_addr_valid+0x1db/0x2d0
[   25.533302]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.533324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.533351]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.533374]  kasan_report+0x141/0x180
[   25.533396]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.533424]  __asan_report_load1_noabort+0x18/0x20
[   25.533449]  ksize_unpoisons_memory+0x7e9/0x9b0
[   25.533790]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.533821]  ? __kasan_check_write+0x18/0x20
[   25.533859]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.533887]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.533939]  ? __pfx_read_tsc+0x10/0x10
[   25.533962]  ? ktime_get_ts64+0x86/0x230
[   25.533987]  kunit_try_run_case+0x1a5/0x480
[   25.534012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.534035]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.534060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.534086]  ? __kthread_parkme+0x82/0x180
[   25.534106]  ? preempt_count_sub+0x50/0x80
[   25.534129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.534154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.534178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.534202]  kthread+0x337/0x6f0
[   25.534222]  ? trace_preempt_on+0x20/0xc0
[   25.534245]  ? __pfx_kthread+0x10/0x10
[   25.534266]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.534290]  ? calculate_sigpending+0x7b/0xa0
[   25.534314]  ? __pfx_kthread+0x10/0x10
[   25.534336]  ret_from_fork+0x116/0x1d0
[   25.534355]  ? __pfx_kthread+0x10/0x10
[   25.534397]  ret_from_fork_asm+0x1a/0x30
[   25.534428]  </TASK>
[   25.534439] 
[   25.543102] Allocated by task 242:
[   25.543385]  kasan_save_stack+0x45/0x70
[   25.543706]  kasan_save_track+0x18/0x40
[   25.543933]  kasan_save_alloc_info+0x3b/0x50
[   25.544101]  __kasan_kmalloc+0xb7/0xc0
[   25.544406]  __kmalloc_cache_noprof+0x189/0x420
[   25.544574]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.544825]  kunit_try_run_case+0x1a5/0x480
[   25.545343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.545634]  kthread+0x337/0x6f0
[   25.545757]  ret_from_fork+0x116/0x1d0
[   25.546047]  ret_from_fork_asm+0x1a/0x30
[   25.546508] 
[   25.546591] The buggy address belongs to the object at ffff8881058a9500
[   25.546591]  which belongs to the cache kmalloc-128 of size 128
[   25.547101] The buggy address is located 5 bytes to the right of
[   25.547101]  allocated 115-byte region [ffff8881058a9500, ffff8881058a9573)
[   25.547478] 
[   25.547674] The buggy address belongs to the physical page:
[   25.547940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   25.548553] flags: 0x200000000000000(node=0|zone=2)
[   25.548746] page_type: f5(slab)
[   25.548901] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.549321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.549768] page dumped because: kasan: bad access detected
[   25.550003] 
[   25.550072] Memory state around the buggy address:
[   25.550369]  ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.550691]  ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551180] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.551453]                                                                 ^
[   25.551813]  ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.552047]  ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.552331] ==================================================================
[   25.511424] ==================================================================
[   25.512075] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   25.512413] Read of size 1 at addr ffff8881058a9573 by task kunit_try_catch/242
[   25.512814] 
[   25.512945] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   25.512996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.513008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.513030] Call Trace:
[   25.513045]  <TASK>
[   25.513061]  dump_stack_lvl+0x73/0xb0
[   25.513093]  print_report+0xd1/0x640
[   25.513117]  ? __virt_addr_valid+0x1db/0x2d0
[   25.513142]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.513165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.513192]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.513215]  kasan_report+0x141/0x180
[   25.513262]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.513290]  __asan_report_load1_noabort+0x18/0x20
[   25.513314]  ksize_unpoisons_memory+0x81c/0x9b0
[   25.513339]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.513363]  ? __kasan_check_write+0x18/0x20
[   25.513387]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.513414]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.513441]  ? __pfx_read_tsc+0x10/0x10
[   25.513463]  ? ktime_get_ts64+0x86/0x230
[   25.513629]  kunit_try_run_case+0x1a5/0x480
[   25.513661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.513685]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.513709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.513735]  ? __kthread_parkme+0x82/0x180
[   25.513756]  ? preempt_count_sub+0x50/0x80
[   25.513780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.513804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.513842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.513869]  kthread+0x337/0x6f0
[   25.513889]  ? trace_preempt_on+0x20/0xc0
[   25.513915]  ? __pfx_kthread+0x10/0x10
[   25.513936]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.513959]  ? calculate_sigpending+0x7b/0xa0
[   25.513984]  ? __pfx_kthread+0x10/0x10
[   25.514005]  ret_from_fork+0x116/0x1d0
[   25.514025]  ? __pfx_kthread+0x10/0x10
[   25.514045]  ret_from_fork_asm+0x1a/0x30
[   25.514077]  </TASK>
[   25.514088] 
[   25.521963] Allocated by task 242:
[   25.522146]  kasan_save_stack+0x45/0x70
[   25.522371]  kasan_save_track+0x18/0x40
[   25.522633]  kasan_save_alloc_info+0x3b/0x50
[   25.522807]  __kasan_kmalloc+0xb7/0xc0
[   25.523036]  __kmalloc_cache_noprof+0x189/0x420
[   25.523281]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.523569]  kunit_try_run_case+0x1a5/0x480
[   25.523764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.524016]  kthread+0x337/0x6f0
[   25.524197]  ret_from_fork+0x116/0x1d0
[   25.524333]  ret_from_fork_asm+0x1a/0x30
[   25.524514] 
[   25.524605] The buggy address belongs to the object at ffff8881058a9500
[   25.524605]  which belongs to the cache kmalloc-128 of size 128
[   25.525057] The buggy address is located 0 bytes to the right of
[   25.525057]  allocated 115-byte region [ffff8881058a9500, ffff8881058a9573)
[   25.525442] 
[   25.525776] The buggy address belongs to the physical page:
[   25.526071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   25.526721] flags: 0x200000000000000(node=0|zone=2)
[   25.526904] page_type: f5(slab)
[   25.527028] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.527328] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.527690] page dumped because: kasan: bad access detected
[   25.527964] 
[   25.528059] Memory state around the buggy address:
[   25.528515]  ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.528880]  ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.529114] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.529440]                                                              ^
[   25.529899]  ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.530511]  ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.530856] ==================================================================
[   25.552806] ==================================================================
[   25.553557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   25.553883] Read of size 1 at addr ffff8881058a957f by task kunit_try_catch/242
[   25.554328] 
[   25.554461] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   25.554507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.554519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.554538] Call Trace:
[   25.554552]  <TASK>
[   25.554565]  dump_stack_lvl+0x73/0xb0
[   25.554592]  print_report+0xd1/0x640
[   25.554614]  ? __virt_addr_valid+0x1db/0x2d0
[   25.554638]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.554661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.554687]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.554762]  kasan_report+0x141/0x180
[   25.554785]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.554813]  __asan_report_load1_noabort+0x18/0x20
[   25.554856]  ksize_unpoisons_memory+0x7b6/0x9b0
[   25.554881]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.554905]  ? __kasan_check_write+0x18/0x20
[   25.554929]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.554956]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.554983]  ? __pfx_read_tsc+0x10/0x10
[   25.555005]  ? ktime_get_ts64+0x86/0x230
[   25.555029]  kunit_try_run_case+0x1a5/0x480
[   25.555054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.555077]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.555101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.555126]  ? __kthread_parkme+0x82/0x180
[   25.555148]  ? preempt_count_sub+0x50/0x80
[   25.555550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.555584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.555611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.555636]  kthread+0x337/0x6f0
[   25.555656]  ? trace_preempt_on+0x20/0xc0
[   25.555679]  ? __pfx_kthread+0x10/0x10
[   25.555700]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.555724]  ? calculate_sigpending+0x7b/0xa0
[   25.555747]  ? __pfx_kthread+0x10/0x10
[   25.555769]  ret_from_fork+0x116/0x1d0
[   25.555788]  ? __pfx_kthread+0x10/0x10
[   25.555809]  ret_from_fork_asm+0x1a/0x30
[   25.555852]  </TASK>
[   25.555863] 
[   25.564167] Allocated by task 242:
[   25.564349]  kasan_save_stack+0x45/0x70
[   25.564909]  kasan_save_track+0x18/0x40
[   25.565152]  kasan_save_alloc_info+0x3b/0x50
[   25.565398]  __kasan_kmalloc+0xb7/0xc0
[   25.565640]  __kmalloc_cache_noprof+0x189/0x420
[   25.565801]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.566039]  kunit_try_run_case+0x1a5/0x480
[   25.566341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.566591]  kthread+0x337/0x6f0
[   25.566822]  ret_from_fork+0x116/0x1d0
[   25.566991]  ret_from_fork_asm+0x1a/0x30
[   25.567132] 
[   25.567200] The buggy address belongs to the object at ffff8881058a9500
[   25.567200]  which belongs to the cache kmalloc-128 of size 128
[   25.567557] The buggy address is located 12 bytes to the right of
[   25.567557]  allocated 115-byte region [ffff8881058a9500, ffff8881058a9573)
[   25.568161] 
[   25.568260] The buggy address belongs to the physical page:
[   25.568655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9
[   25.568904] flags: 0x200000000000000(node=0|zone=2)
[   25.569061] page_type: f5(slab)
[   25.569411] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.569968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.570403] page dumped because: kasan: bad access detected
[   25.570748] 
[   25.570822] Memory state around the buggy address:
[   25.570988]  ffff8881058a9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.571283]  ffff8881058a9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.571598] >ffff8881058a9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.571953]                                                                 ^
[   25.572224]  ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.572441]  ffff8881058a9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.572760] ==================================================================