Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.606008] ==================================================================
[   32.606096] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.606192] Read of size 1 at addr fff00000c9726973 by task kunit_try_catch/226
[   32.606265] 
[   32.606297] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.606445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.606489] Hardware name: linux,dummy-virt (DT)
[   32.606520] Call trace:
[   32.606543]  show_stack+0x20/0x38 (C)
[   32.606593]  dump_stack_lvl+0x8c/0xd0
[   32.606659]  print_report+0x118/0x5e8
[   32.606705]  kasan_report+0xdc/0x128
[   32.606755]  __asan_report_load1_noabort+0x20/0x30
[   32.606804]  ksize_unpoisons_memory+0x628/0x740
[   32.606860]  kunit_try_run_case+0x170/0x3f0
[   32.606906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.607494]  kthread+0x328/0x630
[   32.607559]  ret_from_fork+0x10/0x20
[   32.607609] 
[   32.607831] Allocated by task 226:
[   32.607987]  kasan_save_stack+0x3c/0x68
[   32.608208]  kasan_save_track+0x20/0x40
[   32.608295]  kasan_save_alloc_info+0x40/0x58
[   32.608469]  __kasan_kmalloc+0xd4/0xd8
[   32.608621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.608718]  ksize_unpoisons_memory+0xc0/0x740
[   32.608766]  kunit_try_run_case+0x170/0x3f0
[   32.609107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.609367]  kthread+0x328/0x630
[   32.609617]  ret_from_fork+0x10/0x20
[   32.609770] 
[   32.610082] The buggy address belongs to the object at fff00000c9726900
[   32.610082]  which belongs to the cache kmalloc-128 of size 128
[   32.610183] The buggy address is located 0 bytes to the right of
[   32.610183]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.610486] 
[   32.610633] The buggy address belongs to the physical page:
[   32.610896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.611019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.611161] page_type: f5(slab)
[   32.611230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.611279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.611663] page dumped because: kasan: bad access detected
[   32.611796] 
[   32.611857] Memory state around the buggy address:
[   32.611957]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.612090]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612168] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.612302]                                                              ^
[   32.612345]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612439]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.612527] ==================================================================
[   32.618122] ==================================================================
[   32.618457] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.618527] Read of size 1 at addr fff00000c9726978 by task kunit_try_catch/226
[   32.618585] 
[   32.618891] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.619216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.619511] Hardware name: linux,dummy-virt (DT)
[   32.619847] Call trace:
[   32.620114]  show_stack+0x20/0x38 (C)
[   32.620343]  dump_stack_lvl+0x8c/0xd0
[   32.620465]  print_report+0x118/0x5e8
[   32.620592]  kasan_report+0xdc/0x128
[   32.620770]  __asan_report_load1_noabort+0x20/0x30
[   32.620908]  ksize_unpoisons_memory+0x618/0x740
[   32.621047]  kunit_try_run_case+0x170/0x3f0
[   32.621123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.621196]  kthread+0x328/0x630
[   32.621479]  ret_from_fork+0x10/0x20
[   32.621850] 
[   32.621876] Allocated by task 226:
[   32.621915]  kasan_save_stack+0x3c/0x68
[   32.622161]  kasan_save_track+0x20/0x40
[   32.622324]  kasan_save_alloc_info+0x40/0x58
[   32.622417]  __kasan_kmalloc+0xd4/0xd8
[   32.622453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.622497]  ksize_unpoisons_memory+0xc0/0x740
[   32.622539]  kunit_try_run_case+0x170/0x3f0
[   32.622583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.622633]  kthread+0x328/0x630
[   32.622678]  ret_from_fork+0x10/0x20
[   32.622715] 
[   32.622742] The buggy address belongs to the object at fff00000c9726900
[   32.622742]  which belongs to the cache kmalloc-128 of size 128
[   32.622812] The buggy address is located 5 bytes to the right of
[   32.622812]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.622875] 
[   32.622905] The buggy address belongs to the physical page:
[   32.623568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.623631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.623691] page_type: f5(slab)
[   32.623731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.623971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.624195] page dumped because: kasan: bad access detected
[   32.624632] 
[   32.624719] Memory state around the buggy address:
[   32.624806]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.624871]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625358] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.625484]                                                                 ^
[   32.625634]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625881]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625986] ==================================================================
[   32.628291] ==================================================================
[   32.628544] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.628652] Read of size 1 at addr fff00000c972697f by task kunit_try_catch/226
[   32.629060] 
[   32.629112] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   32.629202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.629289] Hardware name: linux,dummy-virt (DT)
[   32.629324] Call trace:
[   32.629345]  show_stack+0x20/0x38 (C)
[   32.629424]  dump_stack_lvl+0x8c/0xd0
[   32.629651]  print_report+0x118/0x5e8
[   32.629704]  kasan_report+0xdc/0x128
[   32.629869]  __asan_report_load1_noabort+0x20/0x30
[   32.629930]  ksize_unpoisons_memory+0x690/0x740
[   32.630110]  kunit_try_run_case+0x170/0x3f0
[   32.630174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.630237]  kthread+0x328/0x630
[   32.630414]  ret_from_fork+0x10/0x20
[   32.630659] 
[   32.630775] Allocated by task 226:
[   32.630841]  kasan_save_stack+0x3c/0x68
[   32.630904]  kasan_save_track+0x20/0x40
[   32.631023]  kasan_save_alloc_info+0x40/0x58
[   32.631175]  __kasan_kmalloc+0xd4/0xd8
[   32.631215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.631278]  ksize_unpoisons_memory+0xc0/0x740
[   32.631553]  kunit_try_run_case+0x170/0x3f0
[   32.631615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631757]  kthread+0x328/0x630
[   32.631854]  ret_from_fork+0x10/0x20
[   32.631976] 
[   32.632040] The buggy address belongs to the object at fff00000c9726900
[   32.632040]  which belongs to the cache kmalloc-128 of size 128
[   32.632247] The buggy address is located 12 bytes to the right of
[   32.632247]  allocated 115-byte region [fff00000c9726900, fff00000c9726973)
[   32.632528] 
[   32.632555] The buggy address belongs to the physical page:
[   32.632589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726
[   32.632675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.632724] page_type: f5(slab)
[   32.632768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.632819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.632880] page dumped because: kasan: bad access detected
[   32.632923] 
[   32.632950] Memory state around the buggy address:
[   32.632984]  fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.633037]  fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633101] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.633137]                                                                 ^
[   32.633185]  fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633227]  fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.633275] ==================================================================

[   26.194219] ==================================================================
[   26.194641] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   26.194926] Read of size 1 at addr ffff888106253173 by task kunit_try_catch/243
[   26.195329] 
[   26.195660] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   26.195706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.195717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.195737] Call Trace:
[   26.195750]  <TASK>
[   26.195766]  dump_stack_lvl+0x73/0xb0
[   26.195795]  print_report+0xd1/0x640
[   26.195818]  ? __virt_addr_valid+0x1db/0x2d0
[   26.195870]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.195894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.195920]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.195952]  kasan_report+0x141/0x180
[   26.195975]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   26.196003]  __asan_report_load1_noabort+0x18/0x20
[   26.196028]  ksize_unpoisons_memory+0x81c/0x9b0
[   26.196052]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.196086]  ? finish_task_switch.isra.0+0x153/0x700
[   26.196108]  ? __switch_to+0x47/0xf80
[   26.196135]  ? __schedule+0x10da/0x2b60
[   26.196157]  ? __pfx_read_tsc+0x10/0x10
[   26.196179]  ? ktime_get_ts64+0x86/0x230
[   26.196204]  kunit_try_run_case+0x1a5/0x480
[   26.196228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.196251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.196272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.196299]  ? __kthread_parkme+0x82/0x180
[   26.196320]  ? preempt_count_sub+0x50/0x80
[   26.196344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.196368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.196391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.196415]  kthread+0x337/0x6f0
[   26.196436]  ? trace_preempt_on+0x20/0xc0
[   26.196458]  ? __pfx_kthread+0x10/0x10
[   26.196479]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.196503]  ? calculate_sigpending+0x7b/0xa0
[   26.196527]  ? __pfx_kthread+0x10/0x10
[   26.196549]  ret_from_fork+0x116/0x1d0
[   26.196568]  ? __pfx_kthread+0x10/0x10
[   26.196589]  ret_from_fork_asm+0x1a/0x30
[   26.196620]  </TASK>
[   26.196631] 
[   26.204367] Allocated by task 243:
[   26.204550]  kasan_save_stack+0x45/0x70
[   26.204749]  kasan_save_track+0x18/0x40
[   26.204968]  kasan_save_alloc_info+0x3b/0x50
[   26.205342]  __kasan_kmalloc+0xb7/0xc0
[   26.205778]  __kmalloc_cache_noprof+0x189/0x420
[   26.206052]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.206257]  kunit_try_run_case+0x1a5/0x480
[   26.206406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.206638]  kthread+0x337/0x6f0
[   26.206829]  ret_from_fork+0x116/0x1d0
[   26.207027]  ret_from_fork_asm+0x1a/0x30
[   26.207291] 
[   26.207376] The buggy address belongs to the object at ffff888106253100
[   26.207376]  which belongs to the cache kmalloc-128 of size 128
[   26.207836] The buggy address is located 0 bytes to the right of
[   26.207836]  allocated 115-byte region [ffff888106253100, ffff888106253173)
[   26.208426] 
[   26.208520] The buggy address belongs to the physical page:
[   26.208761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253
[   26.209211] flags: 0x200000000000000(node=0|zone=2)
[   26.209442] page_type: f5(slab)
[   26.209593] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.209988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.210381] page dumped because: kasan: bad access detected
[   26.210607] 
[   26.210696] Memory state around the buggy address:
[   26.210981]  ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.211301]  ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.211520] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.211733]                                                              ^
[   26.211941]  ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.212285]  ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.213016] ==================================================================
[   26.233070] ==================================================================
[   26.233337] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   26.233567] Read of size 1 at addr ffff88810625317f by task kunit_try_catch/243
[   26.233787] 
[   26.233864] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   26.233908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.233919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.233938] Call Trace:
[   26.234105]  <TASK>
[   26.234122]  dump_stack_lvl+0x73/0xb0
[   26.234152]  print_report+0xd1/0x640
[   26.234175]  ? __virt_addr_valid+0x1db/0x2d0
[   26.234199]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.234222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.234248]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.234272]  kasan_report+0x141/0x180
[   26.234295]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   26.234324]  __asan_report_load1_noabort+0x18/0x20
[   26.234348]  ksize_unpoisons_memory+0x7b6/0x9b0
[   26.234373]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.234396]  ? finish_task_switch.isra.0+0x153/0x700
[   26.234418]  ? __switch_to+0x47/0xf80
[   26.234444]  ? __schedule+0x10da/0x2b60
[   26.234465]  ? __pfx_read_tsc+0x10/0x10
[   26.234487]  ? ktime_get_ts64+0x86/0x230
[   26.234513]  kunit_try_run_case+0x1a5/0x480
[   26.234537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.234560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.234582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.234609]  ? __kthread_parkme+0x82/0x180
[   26.234629]  ? preempt_count_sub+0x50/0x80
[   26.234652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.234677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.234700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.234725]  kthread+0x337/0x6f0
[   26.234745]  ? trace_preempt_on+0x20/0xc0
[   26.234768]  ? __pfx_kthread+0x10/0x10
[   26.234789]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.234813]  ? calculate_sigpending+0x7b/0xa0
[   26.234837]  ? __pfx_kthread+0x10/0x10
[   26.234908]  ret_from_fork+0x116/0x1d0
[   26.234928]  ? __pfx_kthread+0x10/0x10
[   26.234962]  ret_from_fork_asm+0x1a/0x30
[   26.234994]  </TASK>
[   26.235004] 
[   26.243111] Allocated by task 243:
[   26.243289]  kasan_save_stack+0x45/0x70
[   26.243485]  kasan_save_track+0x18/0x40
[   26.243673]  kasan_save_alloc_info+0x3b/0x50
[   26.243879]  __kasan_kmalloc+0xb7/0xc0
[   26.244071]  __kmalloc_cache_noprof+0x189/0x420
[   26.244447]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.244599]  kunit_try_run_case+0x1a5/0x480
[   26.244744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.245018]  kthread+0x337/0x6f0
[   26.245201]  ret_from_fork+0x116/0x1d0
[   26.245390]  ret_from_fork_asm+0x1a/0x30
[   26.245591] 
[   26.245685] The buggy address belongs to the object at ffff888106253100
[   26.245685]  which belongs to the cache kmalloc-128 of size 128
[   26.246407] The buggy address is located 12 bytes to the right of
[   26.246407]  allocated 115-byte region [ffff888106253100, ffff888106253173)
[   26.246991] 
[   26.247100] The buggy address belongs to the physical page:
[   26.247284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253
[   26.247623] flags: 0x200000000000000(node=0|zone=2)
[   26.247902] page_type: f5(slab)
[   26.248078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.248362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.248696] page dumped because: kasan: bad access detected
[   26.248991] 
[   26.249080] Memory state around the buggy address:
[   26.249268]  ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.249563]  ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.250039] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.250336]                                                                 ^
[   26.250618]  ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.250996]  ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.251290] ==================================================================
[   26.213717] ==================================================================
[   26.213961] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   26.214518] Read of size 1 at addr ffff888106253178 by task kunit_try_catch/243
[   26.214867] 
[   26.214985] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   26.215031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.215042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.215061] Call Trace:
[   26.215075]  <TASK>
[   26.215089]  dump_stack_lvl+0x73/0xb0
[   26.215127]  print_report+0xd1/0x640
[   26.215150]  ? __virt_addr_valid+0x1db/0x2d0
[   26.215173]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.215196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.215222]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.215246]  kasan_report+0x141/0x180
[   26.215269]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   26.215297]  __asan_report_load1_noabort+0x18/0x20
[   26.215322]  ksize_unpoisons_memory+0x7e9/0x9b0
[   26.215346]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   26.215369]  ? finish_task_switch.isra.0+0x153/0x700
[   26.215391]  ? __switch_to+0x47/0xf80
[   26.215417]  ? __schedule+0x10da/0x2b60
[   26.215438]  ? __pfx_read_tsc+0x10/0x10
[   26.215460]  ? ktime_get_ts64+0x86/0x230
[   26.215484]  kunit_try_run_case+0x1a5/0x480
[   26.215509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.215532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.215554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.215580]  ? __kthread_parkme+0x82/0x180
[   26.215600]  ? preempt_count_sub+0x50/0x80
[   26.215624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.215648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.215673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.215698]  kthread+0x337/0x6f0
[   26.215719]  ? trace_preempt_on+0x20/0xc0
[   26.215742]  ? __pfx_kthread+0x10/0x10
[   26.215763]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.215788]  ? calculate_sigpending+0x7b/0xa0
[   26.215812]  ? __pfx_kthread+0x10/0x10
[   26.215834]  ret_from_fork+0x116/0x1d0
[   26.215854]  ? __pfx_kthread+0x10/0x10
[   26.215875]  ret_from_fork_asm+0x1a/0x30
[   26.215906]  </TASK>
[   26.215917] 
[   26.224241] Allocated by task 243:
[   26.224373]  kasan_save_stack+0x45/0x70
[   26.224517]  kasan_save_track+0x18/0x40
[   26.224652]  kasan_save_alloc_info+0x3b/0x50
[   26.224817]  __kasan_kmalloc+0xb7/0xc0
[   26.225017]  __kmalloc_cache_noprof+0x189/0x420
[   26.225378]  ksize_unpoisons_memory+0xc7/0x9b0
[   26.225593]  kunit_try_run_case+0x1a5/0x480
[   26.225806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.226218]  kthread+0x337/0x6f0
[   26.226394]  ret_from_fork+0x116/0x1d0
[   26.226560]  ret_from_fork_asm+0x1a/0x30
[   26.226755] 
[   26.226928] The buggy address belongs to the object at ffff888106253100
[   26.226928]  which belongs to the cache kmalloc-128 of size 128
[   26.227454] The buggy address is located 5 bytes to the right of
[   26.227454]  allocated 115-byte region [ffff888106253100, ffff888106253173)
[   26.228166] 
[   26.228257] The buggy address belongs to the physical page:
[   26.228489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253
[   26.228808] flags: 0x200000000000000(node=0|zone=2)
[   26.229043] page_type: f5(slab)
[   26.229216] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.229615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.230052] page dumped because: kasan: bad access detected
[   26.230315] 
[   26.230388] Memory state around the buggy address:
[   26.230567]  ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.230788]  ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.231123] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.231541]                                                                 ^
[   26.231982]  ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.232328]  ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.232601] ==================================================================