Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.349541] ==================================================================
[   23.350564] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   23.351951] Read of size 1 at addr fff00000c6414278 by task kunit_try_catch/183
[   23.352664] 
[   23.353367] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.353706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.353790] Hardware name: linux,dummy-virt (DT)
[   23.353873] Call trace:
[   23.353943]  show_stack+0x20/0x38 (C)
[   23.354009]  dump_stack_lvl+0x8c/0xd0
[   23.354094]  print_report+0x118/0x608
[   23.354196]  kasan_report+0xdc/0x128
[   23.354261]  __asan_report_load1_noabort+0x20/0x30
[   23.354320]  ksize_unpoisons_memory+0x628/0x750
[   23.354378]  kunit_try_run_case+0x170/0x3f0
[   23.354438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.354502]  kthread+0x318/0x620
[   23.354558]  ret_from_fork+0x10/0x20
[   23.354615] 
[   23.361417] Allocated by task 183:
[   23.362235]  kasan_save_stack+0x3c/0x68
[   23.362779]  kasan_save_track+0x20/0x40
[   23.363456]  kasan_save_alloc_info+0x40/0x58
[   23.364000]  __kasan_kmalloc+0xd4/0xd8
[   23.364596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.365281]  ksize_unpoisons_memory+0xc0/0x750
[   23.366253]  kunit_try_run_case+0x170/0x3f0
[   23.366807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.367474]  kthread+0x318/0x620
[   23.368038]  ret_from_fork+0x10/0x20
[   23.368582] 
[   23.368944] The buggy address belongs to the object at fff00000c6414200
[   23.368944]  which belongs to the cache kmalloc-128 of size 128
[   23.370085] The buggy address is located 5 bytes to the right of
[   23.370085]  allocated 115-byte region [fff00000c6414200, fff00000c6414273)
[   23.372319] 
[   23.372751] The buggy address belongs to the physical page:
[   23.373667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414
[   23.374518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.375220] page_type: f5(slab)
[   23.375585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.376435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.377245] page dumped because: kasan: bad access detected
[   23.377934] 
[   23.378239] Memory state around the buggy address:
[   23.378736]  fff00000c6414100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.379706]  fff00000c6414180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.380584] >fff00000c6414200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.381624]                                                                 ^
[   23.382308]  fff00000c6414280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.382924]  fff00000c6414300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.383633] ==================================================================
[   23.312585] ==================================================================
[   23.314283] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   23.314994] Read of size 1 at addr fff00000c6414273 by task kunit_try_catch/183
[   23.316399] 
[   23.316729] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.316994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.317093] Hardware name: linux,dummy-virt (DT)
[   23.317184] Call trace:
[   23.317395]  show_stack+0x20/0x38 (C)
[   23.317500]  dump_stack_lvl+0x8c/0xd0
[   23.317564]  print_report+0x118/0x608
[   23.317623]  kasan_report+0xdc/0x128
[   23.317679]  __asan_report_load1_noabort+0x20/0x30
[   23.317740]  ksize_unpoisons_memory+0x638/0x750
[   23.317800]  kunit_try_run_case+0x170/0x3f0
[   23.317861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.317960]  kthread+0x318/0x620
[   23.318020]  ret_from_fork+0x10/0x20
[   23.318082] 
[   23.324196] Allocated by task 183:
[   23.324748]  kasan_save_stack+0x3c/0x68
[   23.325537]  kasan_save_track+0x20/0x40
[   23.326124]  kasan_save_alloc_info+0x40/0x58
[   23.326975]  __kasan_kmalloc+0xd4/0xd8
[   23.327997]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.328635]  ksize_unpoisons_memory+0xc0/0x750
[   23.329275]  kunit_try_run_case+0x170/0x3f0
[   23.329873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.330778]  kthread+0x318/0x620
[   23.331304]  ret_from_fork+0x10/0x20
[   23.331841] 
[   23.332234] The buggy address belongs to the object at fff00000c6414200
[   23.332234]  which belongs to the cache kmalloc-128 of size 128
[   23.333566] The buggy address is located 0 bytes to the right of
[   23.333566]  allocated 115-byte region [fff00000c6414200, fff00000c6414273)
[   23.334853] 
[   23.335283] The buggy address belongs to the physical page:
[   23.336311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414
[   23.337231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.337868] page_type: f5(slab)
[   23.338879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.339673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.340488] page dumped because: kasan: bad access detected
[   23.341245] 
[   23.341924] Memory state around the buggy address:
[   23.342553]  fff00000c6414100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.343585]  fff00000c6414180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.344398] >fff00000c6414200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.345357]                                                              ^
[   23.346080]  fff00000c6414280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.346867]  fff00000c6414300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.347624] ==================================================================
[   23.385185] ==================================================================
[   23.386277] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   23.387071] Read of size 1 at addr fff00000c641427f by task kunit_try_catch/183
[   23.387825] 
[   23.389237] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.389756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.389815] Hardware name: linux,dummy-virt (DT)
[   23.389859] Call trace:
[   23.389911]  show_stack+0x20/0x38 (C)
[   23.389981]  dump_stack_lvl+0x8c/0xd0
[   23.390041]  print_report+0x118/0x608
[   23.390100]  kasan_report+0xdc/0x128
[   23.390159]  __asan_report_load1_noabort+0x20/0x30
[   23.390234]  ksize_unpoisons_memory+0x6a0/0x750
[   23.390294]  kunit_try_run_case+0x170/0x3f0
[   23.390353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.390420]  kthread+0x318/0x620
[   23.390477]  ret_from_fork+0x10/0x20
[   23.390537] 
[   23.396482] Allocated by task 183:
[   23.397228]  kasan_save_stack+0x3c/0x68
[   23.397807]  kasan_save_track+0x20/0x40
[   23.399149]  kasan_save_alloc_info+0x40/0x58
[   23.399661]  __kasan_kmalloc+0xd4/0xd8
[   23.400194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.400763]  ksize_unpoisons_memory+0xc0/0x750
[   23.401596]  kunit_try_run_case+0x170/0x3f0
[   23.402168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402837]  kthread+0x318/0x620
[   23.403316]  ret_from_fork+0x10/0x20
[   23.403843] 
[   23.404168] The buggy address belongs to the object at fff00000c6414200
[   23.404168]  which belongs to the cache kmalloc-128 of size 128
[   23.405258] The buggy address is located 12 bytes to the right of
[   23.405258]  allocated 115-byte region [fff00000c6414200, fff00000c6414273)
[   23.407082] 
[   23.407415] The buggy address belongs to the physical page:
[   23.408000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414
[   23.408706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.409595] page_type: f5(slab)
[   23.410312] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.411052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.411766] page dumped because: kasan: bad access detected
[   23.412354] 
[   23.412632] Memory state around the buggy address:
[   23.413558]  fff00000c6414100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.414322]  fff00000c6414180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.415216] >fff00000c6414200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.415806]                                                                 ^
[   23.416577]  fff00000c6414280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.417312]  fff00000c6414300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.418019] ==================================================================

[   18.243104] ==================================================================
[   18.243907] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   18.244470] Read of size 1 at addr ffff888102971e7f by task kunit_try_catch/202
[   18.244794] 
[   18.244999] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   18.245133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.245163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.245226] Call Trace:
[   18.245270]  <TASK>
[   18.245313]  dump_stack_lvl+0x73/0xb0
[   18.245395]  print_report+0xd1/0x650
[   18.245451]  ? __virt_addr_valid+0x1db/0x2d0
[   18.245510]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   18.245567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.245629]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   18.245681]  kasan_report+0x140/0x180
[   18.245736]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   18.245811]  __asan_report_load1_noabort+0x18/0x20
[   18.245898]  ksize_unpoisons_memory+0x7b8/0x9b0
[   18.245957]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.246004]  ? finish_task_switch.isra.0+0x153/0x700
[   18.246063]  ? __switch_to+0x5d9/0xf60
[   18.246105]  ? __schedule+0xce8/0x2840
[   18.246136]  ? __pfx_read_tsc+0x10/0x10
[   18.246164]  ? ktime_get_ts64+0x86/0x230
[   18.246195]  kunit_try_run_case+0x1a6/0x480
[   18.246226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.246252]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.246280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.246315]  ? __kthread_parkme+0x82/0x160
[   18.246353]  ? preempt_count_sub+0x50/0x80
[   18.246382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.246410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.246442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.246473]  kthread+0x324/0x6e0
[   18.246499]  ? trace_preempt_on+0x20/0xc0
[   18.246529]  ? __pfx_kthread+0x10/0x10
[   18.246556]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.246583]  ? calculate_sigpending+0x7b/0xa0
[   18.246609]  ? __pfx_kthread+0x10/0x10
[   18.246637]  ret_from_fork+0x41/0x80
[   18.246660]  ? __pfx_kthread+0x10/0x10
[   18.246687]  ret_from_fork_asm+0x1a/0x30
[   18.246725]  </TASK>
[   18.246739] 
[   18.261674] Allocated by task 202:
[   18.262117]  kasan_save_stack+0x45/0x70
[   18.262621]  kasan_save_track+0x18/0x40
[   18.263069]  kasan_save_alloc_info+0x3b/0x50
[   18.263374]  __kasan_kmalloc+0xb7/0xc0
[   18.263645]  __kmalloc_cache_noprof+0x18a/0x420
[   18.264171]  ksize_unpoisons_memory+0xc8/0x9b0
[   18.264724]  kunit_try_run_case+0x1a6/0x480
[   18.265160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.265807]  kthread+0x324/0x6e0
[   18.266085]  ret_from_fork+0x41/0x80
[   18.266607]  ret_from_fork_asm+0x1a/0x30
[   18.267038] 
[   18.267188] The buggy address belongs to the object at ffff888102971e00
[   18.267188]  which belongs to the cache kmalloc-128 of size 128
[   18.267952] The buggy address is located 12 bytes to the right of
[   18.267952]  allocated 115-byte region [ffff888102971e00, ffff888102971e73)
[   18.268962] 
[   18.269178] The buggy address belongs to the physical page:
[   18.269658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971
[   18.270192] flags: 0x200000000000000(node=0|zone=2)
[   18.270692] page_type: f5(slab)
[   18.270984] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.271379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.271724] page dumped because: kasan: bad access detected
[   18.272128] 
[   18.272365] Memory state around the buggy address:
[   18.272815]  ffff888102971d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.273552]  ffff888102971d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.274180] >ffff888102971e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.274900]                                                                 ^
[   18.275461]  ffff888102971e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.275814]  ffff888102971f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.276513] ==================================================================
[   18.167550] ==================================================================
[   18.168211] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   18.169030] Read of size 1 at addr ffff888102971e73 by task kunit_try_catch/202
[   18.170225] 
[   18.170923] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   18.171034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.171085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.171404] Call Trace:
[   18.171435]  <TASK>
[   18.171461]  dump_stack_lvl+0x73/0xb0
[   18.171512]  print_report+0xd1/0x650
[   18.171542]  ? __virt_addr_valid+0x1db/0x2d0
[   18.171571]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   18.171598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.171629]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   18.171657]  kasan_report+0x140/0x180
[   18.171684]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   18.171732]  __asan_report_load1_noabort+0x18/0x20
[   18.171761]  ksize_unpoisons_memory+0x81e/0x9b0
[   18.171789]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.171815]  ? finish_task_switch.isra.0+0x153/0x700
[   18.171845]  ? __switch_to+0x5d9/0xf60
[   18.171900]  ? __schedule+0xce8/0x2840
[   18.171931]  ? __pfx_read_tsc+0x10/0x10
[   18.171958]  ? ktime_get_ts64+0x86/0x230
[   18.171989]  kunit_try_run_case+0x1a6/0x480
[   18.172021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.172047]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.172077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.172105]  ? __kthread_parkme+0x82/0x160
[   18.172134]  ? preempt_count_sub+0x50/0x80
[   18.172163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.172190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.172221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.172252]  kthread+0x324/0x6e0
[   18.172279]  ? trace_preempt_on+0x20/0xc0
[   18.172316]  ? __pfx_kthread+0x10/0x10
[   18.172352]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.172380]  ? calculate_sigpending+0x7b/0xa0
[   18.172408]  ? __pfx_kthread+0x10/0x10
[   18.172436]  ret_from_fork+0x41/0x80
[   18.172460]  ? __pfx_kthread+0x10/0x10
[   18.172487]  ret_from_fork_asm+0x1a/0x30
[   18.172526]  </TASK>
[   18.172540] 
[   18.188353] Allocated by task 202:
[   18.189134]  kasan_save_stack+0x45/0x70
[   18.189531]  kasan_save_track+0x18/0x40
[   18.189894]  kasan_save_alloc_info+0x3b/0x50
[   18.190207]  __kasan_kmalloc+0xb7/0xc0
[   18.190572]  __kmalloc_cache_noprof+0x18a/0x420
[   18.190936]  ksize_unpoisons_memory+0xc8/0x9b0
[   18.191249]  kunit_try_run_case+0x1a6/0x480
[   18.192180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.192704]  kthread+0x324/0x6e0
[   18.193043]  ret_from_fork+0x41/0x80
[   18.193286]  ret_from_fork_asm+0x1a/0x30
[   18.193847] 
[   18.194243] The buggy address belongs to the object at ffff888102971e00
[   18.194243]  which belongs to the cache kmalloc-128 of size 128
[   18.195303] The buggy address is located 0 bytes to the right of
[   18.195303]  allocated 115-byte region [ffff888102971e00, ffff888102971e73)
[   18.196099] 
[   18.196269] The buggy address belongs to the physical page:
[   18.196511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971
[   18.197818] flags: 0x200000000000000(node=0|zone=2)
[   18.198385] page_type: f5(slab)
[   18.198749] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.199247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.199781] page dumped because: kasan: bad access detected
[   18.200339] 
[   18.200525] Memory state around the buggy address:
[   18.200940]  ffff888102971d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.201511]  ffff888102971d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.202072] >ffff888102971e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.202612]                                                              ^
[   18.203156]  ffff888102971e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203766]  ffff888102971f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.204283] ==================================================================
[   18.206679] ==================================================================
[   18.207355] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   18.208263] Read of size 1 at addr ffff888102971e78 by task kunit_try_catch/202
[   18.208982] 
[   18.209141] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   18.209198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.209213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.209238] Call Trace:
[   18.209260]  <TASK>
[   18.209283]  dump_stack_lvl+0x73/0xb0
[   18.209341]  print_report+0xd1/0x650
[   18.209372]  ? __virt_addr_valid+0x1db/0x2d0
[   18.209401]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   18.209429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.209460]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   18.209487]  kasan_report+0x140/0x180
[   18.209514]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   18.209547]  __asan_report_load1_noabort+0x18/0x20
[   18.209575]  ksize_unpoisons_memory+0x7eb/0x9b0
[   18.209604]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.209630]  ? finish_task_switch.isra.0+0x153/0x700
[   18.209658]  ? __switch_to+0x5d9/0xf60
[   18.209690]  ? __schedule+0xce8/0x2840
[   18.209718]  ? __pfx_read_tsc+0x10/0x10
[   18.209746]  ? ktime_get_ts64+0x86/0x230
[   18.209777]  kunit_try_run_case+0x1a6/0x480
[   18.209806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.209832]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   18.209877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.209908]  ? __kthread_parkme+0x82/0x160
[   18.209937]  ? preempt_count_sub+0x50/0x80
[   18.209967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.209994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.210025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.210056]  kthread+0x324/0x6e0
[   18.210082]  ? trace_preempt_on+0x20/0xc0
[   18.210111]  ? __pfx_kthread+0x10/0x10
[   18.210138]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.210165]  ? calculate_sigpending+0x7b/0xa0
[   18.210192]  ? __pfx_kthread+0x10/0x10
[   18.210220]  ret_from_fork+0x41/0x80
[   18.210243]  ? __pfx_kthread+0x10/0x10
[   18.210270]  ret_from_fork_asm+0x1a/0x30
[   18.210318]  </TASK>
[   18.210344] 
[   18.223720] Allocated by task 202:
[   18.224142]  kasan_save_stack+0x45/0x70
[   18.224736]  kasan_save_track+0x18/0x40
[   18.225216]  kasan_save_alloc_info+0x3b/0x50
[   18.225698]  __kasan_kmalloc+0xb7/0xc0
[   18.226007]  __kmalloc_cache_noprof+0x18a/0x420
[   18.226617]  ksize_unpoisons_memory+0xc8/0x9b0
[   18.227171]  kunit_try_run_case+0x1a6/0x480
[   18.227653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.228132]  kthread+0x324/0x6e0
[   18.228542]  ret_from_fork+0x41/0x80
[   18.228764]  ret_from_fork_asm+0x1a/0x30
[   18.229124] 
[   18.229407] The buggy address belongs to the object at ffff888102971e00
[   18.229407]  which belongs to the cache kmalloc-128 of size 128
[   18.230409] The buggy address is located 5 bytes to the right of
[   18.230409]  allocated 115-byte region [ffff888102971e00, ffff888102971e73)
[   18.231419] 
[   18.231722] The buggy address belongs to the physical page:
[   18.232107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971
[   18.232591] flags: 0x200000000000000(node=0|zone=2)
[   18.233116] page_type: f5(slab)
[   18.233532] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.234214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.234903] page dumped because: kasan: bad access detected
[   18.235491] 
[   18.235638] Memory state around the buggy address:
[   18.236006]  ffff888102971d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.236731]  ffff888102971d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.237427] >ffff888102971e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.237791]                                                                 ^
[   18.238547]  ffff888102971e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239243]  ffff888102971f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239841] ==================================================================