Hay
Date
July 24, 2025, 4:41 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.745403] ==================================================================
[   32.745501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.745575] Read of size 1 at addr fff00000c9a8b573 by task kunit_try_catch/225
[   32.745628] 
[   32.745666] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.745768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.745805] Hardware name: linux,dummy-virt (DT)
[   32.745840] Call trace:
[   32.745866]  show_stack+0x20/0x38 (C)
[   32.745918]  dump_stack_lvl+0x8c/0xd0
[   32.745965]  print_report+0x118/0x5e8
[   32.746008]  kasan_report+0xdc/0x128
[   32.746049]  __asan_report_load1_noabort+0x20/0x30
[   32.746097]  ksize_unpoisons_memory+0x628/0x740
[   32.746157]  kunit_try_run_case+0x170/0x3f0
[   32.746205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.746266]  kthread+0x328/0x630
[   32.746308]  ret_from_fork+0x10/0x20
[   32.746364] 
[   32.746383] Allocated by task 225:
[   32.746420]  kasan_save_stack+0x3c/0x68
[   32.746457]  kasan_save_track+0x20/0x40
[   32.746491]  kasan_save_alloc_info+0x40/0x58
[   32.746527]  __kasan_kmalloc+0xd4/0xd8
[   32.746570]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.746614]  ksize_unpoisons_memory+0xc0/0x740
[   32.746651]  kunit_try_run_case+0x170/0x3f0
[   32.746696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.746744]  kthread+0x328/0x630
[   32.746787]  ret_from_fork+0x10/0x20
[   32.746822] 
[   32.746840] The buggy address belongs to the object at fff00000c9a8b500
[   32.746840]  which belongs to the cache kmalloc-128 of size 128
[   32.747873] The buggy address is located 0 bytes to the right of
[   32.747873]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.747972] 
[   32.748003] The buggy address belongs to the physical page:
[   32.748069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.748647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.748763] page_type: f5(slab)
[   32.748933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.749014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.749234] page dumped because: kasan: bad access detected
[   32.749646] 
[   32.749885] Memory state around the buggy address:
[   32.749974]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.750298]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750455] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.750547]                                                              ^
[   32.750709]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750814]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750937] ==================================================================
[   32.764089] ==================================================================
[   32.764143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.764421] Read of size 1 at addr fff00000c9a8b57f by task kunit_try_catch/225
[   32.764696] 
[   32.764760] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.764851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.764879] Hardware name: linux,dummy-virt (DT)
[   32.764916] Call trace:
[   32.765114]  show_stack+0x20/0x38 (C)
[   32.765405]  dump_stack_lvl+0x8c/0xd0
[   32.765479]  print_report+0x118/0x5e8
[   32.765555]  kasan_report+0xdc/0x128
[   32.765599]  __asan_report_load1_noabort+0x20/0x30
[   32.765823]  ksize_unpoisons_memory+0x690/0x740
[   32.765878]  kunit_try_run_case+0x170/0x3f0
[   32.766021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.766257]  kthread+0x328/0x630
[   32.766333]  ret_from_fork+0x10/0x20
[   32.766399] 
[   32.766480] Allocated by task 225:
[   32.766509]  kasan_save_stack+0x3c/0x68
[   32.766549]  kasan_save_track+0x20/0x40
[   32.766583]  kasan_save_alloc_info+0x40/0x58
[   32.766636]  __kasan_kmalloc+0xd4/0xd8
[   32.766672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.766940]  ksize_unpoisons_memory+0xc0/0x740
[   32.767280]  kunit_try_run_case+0x170/0x3f0
[   32.767338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.767421]  kthread+0x328/0x630
[   32.767457]  ret_from_fork+0x10/0x20
[   32.767494] 
[   32.767514] The buggy address belongs to the object at fff00000c9a8b500
[   32.767514]  which belongs to the cache kmalloc-128 of size 128
[   32.767575] The buggy address is located 12 bytes to the right of
[   32.767575]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.767916] 
[   32.768052] The buggy address belongs to the physical page:
[   32.768094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.768426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.768487] page_type: f5(slab)
[   32.768528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.768579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.768621] page dumped because: kasan: bad access detected
[   32.769219] 
[   32.769247] Memory state around the buggy address:
[   32.769282]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.769329]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769382] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.769419]                                                                 ^
[   32.769462]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769505]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769553] ==================================================================
[   32.754701] ==================================================================
[   32.754981] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.755132] Read of size 1 at addr fff00000c9a8b578 by task kunit_try_catch/225
[   32.755368] 
[   32.755429] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   32.755843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.755918] Hardware name: linux,dummy-virt (DT)
[   32.756037] Call trace:
[   32.756134]  show_stack+0x20/0x38 (C)
[   32.756227]  dump_stack_lvl+0x8c/0xd0
[   32.756383]  print_report+0x118/0x5e8
[   32.756480]  kasan_report+0xdc/0x128
[   32.756822]  __asan_report_load1_noabort+0x20/0x30
[   32.757010]  ksize_unpoisons_memory+0x618/0x740
[   32.757149]  kunit_try_run_case+0x170/0x3f0
[   32.757289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.757524]  kthread+0x328/0x630
[   32.757735]  ret_from_fork+0x10/0x20
[   32.757946] 
[   32.758003] Allocated by task 225:
[   32.758134]  kasan_save_stack+0x3c/0x68
[   32.758224]  kasan_save_track+0x20/0x40
[   32.758784]  kasan_save_alloc_info+0x40/0x58
[   32.758868]  __kasan_kmalloc+0xd4/0xd8
[   32.759021]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.759132]  ksize_unpoisons_memory+0xc0/0x740
[   32.759265]  kunit_try_run_case+0x170/0x3f0
[   32.759364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.759567]  kthread+0x328/0x630
[   32.759838]  ret_from_fork+0x10/0x20
[   32.759900] 
[   32.759976] The buggy address belongs to the object at fff00000c9a8b500
[   32.759976]  which belongs to the cache kmalloc-128 of size 128
[   32.760111] The buggy address is located 5 bytes to the right of
[   32.760111]  allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573)
[   32.760290] 
[   32.760315] The buggy address belongs to the physical page:
[   32.760519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   32.760938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.761109] page_type: f5(slab)
[   32.761192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.761451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.761699] page dumped because: kasan: bad access detected
[   32.761798] 
[   32.761934] Memory state around the buggy address:
[   32.762023]  fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.762074]  fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762312] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.762560]                                                                 ^
[   32.762714]  fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762861]  fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.762928] ==================================================================

[   27.267303] ==================================================================
[   27.267787] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   27.268322] Read of size 1 at addr ffff888105454973 by task kunit_try_catch/242
[   27.268628] 
[   27.268760] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   27.268809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.268822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.268842] Call Trace:
[   27.268855]  <TASK>
[   27.268872]  dump_stack_lvl+0x73/0xb0
[   27.268899]  print_report+0xd1/0x640
[   27.268921]  ? __virt_addr_valid+0x1db/0x2d0
[   27.268944]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.268966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.269041]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.269066]  kasan_report+0x141/0x180
[   27.269088]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   27.269147]  __asan_report_load1_noabort+0x18/0x20
[   27.269179]  ksize_unpoisons_memory+0x81c/0x9b0
[   27.269203]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.269227]  ? __kasan_check_write+0x18/0x20
[   27.269249]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.269273]  ? irqentry_exit+0x2a/0x60
[   27.269303]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.269325]  ? trace_hardirqs_on+0x37/0xe0
[   27.269349]  ? __pfx_read_tsc+0x10/0x10
[   27.269381]  ? ktime_get_ts64+0x86/0x230
[   27.269406]  kunit_try_run_case+0x1a5/0x480
[   27.269430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.269454]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.269478]  ? __kthread_parkme+0x82/0x180
[   27.269506]  ? preempt_count_sub+0x50/0x80
[   27.269529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.269552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.269595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.269617]  kthread+0x337/0x6f0
[   27.269637]  ? trace_preempt_on+0x20/0xc0
[   27.269658]  ? __pfx_kthread+0x10/0x10
[   27.269678]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.269700]  ? calculate_sigpending+0x7b/0xa0
[   27.269723]  ? __pfx_kthread+0x10/0x10
[   27.269743]  ret_from_fork+0x116/0x1d0
[   27.269762]  ? __pfx_kthread+0x10/0x10
[   27.269781]  ret_from_fork_asm+0x1a/0x30
[   27.269933]  </TASK>
[   27.269944] 
[   27.278396] Allocated by task 242:
[   27.278566]  kasan_save_stack+0x45/0x70
[   27.278775]  kasan_save_track+0x18/0x40
[   27.278989]  kasan_save_alloc_info+0x3b/0x50
[   27.279245]  __kasan_kmalloc+0xb7/0xc0
[   27.279443]  __kmalloc_cache_noprof+0x189/0x420
[   27.279662]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.279908]  kunit_try_run_case+0x1a5/0x480
[   27.280059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.280371]  kthread+0x337/0x6f0
[   27.280623]  ret_from_fork+0x116/0x1d0
[   27.280758]  ret_from_fork_asm+0x1a/0x30
[   27.280996] 
[   27.281212] The buggy address belongs to the object at ffff888105454900
[   27.281212]  which belongs to the cache kmalloc-128 of size 128
[   27.281727] The buggy address is located 0 bytes to the right of
[   27.281727]  allocated 115-byte region [ffff888105454900, ffff888105454973)
[   27.282481] 
[   27.282606] The buggy address belongs to the physical page:
[   27.282888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454
[   27.283131] flags: 0x200000000000000(node=0|zone=2)
[   27.283295] page_type: f5(slab)
[   27.283409] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.283680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.284004] page dumped because: kasan: bad access detected
[   27.284247] 
[   27.284391] Memory state around the buggy address:
[   27.284656]  ffff888105454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.284965]  ffff888105454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.285289] >ffff888105454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.285505]                                                              ^
[   27.285880]  ffff888105454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.286349]  ffff888105454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.286670] ==================================================================
[   27.306064] ==================================================================
[   27.306299] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   27.306526] Read of size 1 at addr ffff88810545497f by task kunit_try_catch/242
[   27.307080] 
[   27.307212] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   27.307268] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.307293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.307313] Call Trace:
[   27.307329]  <TASK>
[   27.307344]  dump_stack_lvl+0x73/0xb0
[   27.307369]  print_report+0xd1/0x640
[   27.307390]  ? __virt_addr_valid+0x1db/0x2d0
[   27.307423]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.307445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.307470]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.307503]  kasan_report+0x141/0x180
[   27.307525]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   27.307553]  __asan_report_load1_noabort+0x18/0x20
[   27.307594]  ksize_unpoisons_memory+0x7b6/0x9b0
[   27.307617]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.307640]  ? __kasan_check_write+0x18/0x20
[   27.307673]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.307697]  ? irqentry_exit+0x2a/0x60
[   27.307717]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.307738]  ? trace_hardirqs_on+0x37/0xe0
[   27.307761]  ? __pfx_read_tsc+0x10/0x10
[   27.307790]  ? ktime_get_ts64+0x86/0x230
[   27.307815]  kunit_try_run_case+0x1a5/0x480
[   27.307849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.307949]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.307975]  ? __kthread_parkme+0x82/0x180
[   27.308005]  ? preempt_count_sub+0x50/0x80
[   27.308027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.308050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.308084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.308107]  kthread+0x337/0x6f0
[   27.308127]  ? trace_preempt_on+0x20/0xc0
[   27.308149]  ? __pfx_kthread+0x10/0x10
[   27.308169]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.308200]  ? calculate_sigpending+0x7b/0xa0
[   27.308224]  ? __pfx_kthread+0x10/0x10
[   27.308244]  ret_from_fork+0x116/0x1d0
[   27.308273]  ? __pfx_kthread+0x10/0x10
[   27.308293]  ret_from_fork_asm+0x1a/0x30
[   27.308323]  </TASK>
[   27.308333] 
[   27.316541] Allocated by task 242:
[   27.316725]  kasan_save_stack+0x45/0x70
[   27.317044]  kasan_save_track+0x18/0x40
[   27.317222]  kasan_save_alloc_info+0x3b/0x50
[   27.317365]  __kasan_kmalloc+0xb7/0xc0
[   27.317490]  __kmalloc_cache_noprof+0x189/0x420
[   27.317651]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.317795]  kunit_try_run_case+0x1a5/0x480
[   27.317934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.318106]  kthread+0x337/0x6f0
[   27.318222]  ret_from_fork+0x116/0x1d0
[   27.318346]  ret_from_fork_asm+0x1a/0x30
[   27.318478] 
[   27.318612] The buggy address belongs to the object at ffff888105454900
[   27.318612]  which belongs to the cache kmalloc-128 of size 128
[   27.319826] The buggy address is located 12 bytes to the right of
[   27.319826]  allocated 115-byte region [ffff888105454900, ffff888105454973)
[   27.321792] 
[   27.322242] The buggy address belongs to the physical page:
[   27.323241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454
[   27.323634] flags: 0x200000000000000(node=0|zone=2)
[   27.323856] page_type: f5(slab)
[   27.324115] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.324417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.325338] page dumped because: kasan: bad access detected
[   27.325603] 
[   27.325691] Memory state around the buggy address:
[   27.326078]  ffff888105454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.326359]  ffff888105454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.326654] >ffff888105454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.327586]                                                                 ^
[   27.328224]  ffff888105454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.328767]  ffff888105454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.329528] ==================================================================
[   27.287155] ==================================================================
[   27.287387] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   27.287766] Read of size 1 at addr ffff888105454978 by task kunit_try_catch/242
[   27.288082] 
[   27.288180] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   27.288225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.288237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.288256] Call Trace:
[   27.288269]  <TASK>
[   27.288282]  dump_stack_lvl+0x73/0xb0
[   27.288306]  print_report+0xd1/0x640
[   27.288326]  ? __virt_addr_valid+0x1db/0x2d0
[   27.288348]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.288369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.288393]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.288415]  kasan_report+0x141/0x180
[   27.288436]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   27.288462]  __asan_report_load1_noabort+0x18/0x20
[   27.288485]  ksize_unpoisons_memory+0x7e9/0x9b0
[   27.288507]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   27.288530]  ? __kasan_check_write+0x18/0x20
[   27.288552]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.288586]  ? irqentry_exit+0x2a/0x60
[   27.288605]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.288686]  ? trace_hardirqs_on+0x37/0xe0
[   27.288714]  ? __pfx_read_tsc+0x10/0x10
[   27.288734]  ? ktime_get_ts64+0x86/0x230
[   27.288758]  kunit_try_run_case+0x1a5/0x480
[   27.288831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.288872]  ? queued_spin_lock_slowpath+0x116/0xb40
[   27.288897]  ? __kthread_parkme+0x82/0x180
[   27.288916]  ? preempt_count_sub+0x50/0x80
[   27.288960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.288983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.289005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.289028]  kthread+0x337/0x6f0
[   27.289048]  ? trace_preempt_on+0x20/0xc0
[   27.289069]  ? __pfx_kthread+0x10/0x10
[   27.289089]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.289111]  ? calculate_sigpending+0x7b/0xa0
[   27.289135]  ? __pfx_kthread+0x10/0x10
[   27.289155]  ret_from_fork+0x116/0x1d0
[   27.289173]  ? __pfx_kthread+0x10/0x10
[   27.289193]  ret_from_fork_asm+0x1a/0x30
[   27.289223]  </TASK>
[   27.289233] 
[   27.297192] Allocated by task 242:
[   27.297485]  kasan_save_stack+0x45/0x70
[   27.297688]  kasan_save_track+0x18/0x40
[   27.297880]  kasan_save_alloc_info+0x3b/0x50
[   27.298375]  __kasan_kmalloc+0xb7/0xc0
[   27.298565]  __kmalloc_cache_noprof+0x189/0x420
[   27.298837]  ksize_unpoisons_memory+0xc7/0x9b0
[   27.299088]  kunit_try_run_case+0x1a5/0x480
[   27.299294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.299497]  kthread+0x337/0x6f0
[   27.299621]  ret_from_fork+0x116/0x1d0
[   27.299745]  ret_from_fork_asm+0x1a/0x30
[   27.299877] 
[   27.299942] The buggy address belongs to the object at ffff888105454900
[   27.299942]  which belongs to the cache kmalloc-128 of size 128
[   27.300289] The buggy address is located 5 bytes to the right of
[   27.300289]  allocated 115-byte region [ffff888105454900, ffff888105454973)
[   27.300724] 
[   27.300897] The buggy address belongs to the physical page:
[   27.301156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454
[   27.301500] flags: 0x200000000000000(node=0|zone=2)
[   27.301740] page_type: f5(slab)
[   27.302200] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.302554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.303067] page dumped because: kasan: bad access detected
[   27.303247] 
[   27.303313] Memory state around the buggy address:
[   27.303461]  ffff888105454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.303681]  ffff888105454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.303891] >ffff888105454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.304201]                                                                 ^
[   27.304510]  ffff888105454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.304931]  ffff888105454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.305296] ==================================================================