Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.159577] ==================================================================
[   19.160115] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   19.160681] Read of size 1 at addr fff00000c5a05378 by task kunit_try_catch/183
[   19.162331] 
[   19.162694] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.163032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.163106] Hardware name: linux,dummy-virt (DT)
[   19.163163] Call trace:
[   19.163192]  show_stack+0x20/0x38 (C)
[   19.163264]  dump_stack_lvl+0x8c/0xd0
[   19.163320]  print_report+0x118/0x608
[   19.163375]  kasan_report+0xdc/0x128
[   19.163428]  __asan_report_load1_noabort+0x20/0x30
[   19.163481]  ksize_unpoisons_memory+0x628/0x750
[   19.163535]  kunit_try_run_case+0x170/0x3f0
[   19.163590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.163647]  kthread+0x318/0x620
[   19.163698]  ret_from_fork+0x10/0x20
[   19.163782] 
[   19.169137] Allocated by task 183:
[   19.169658]  kasan_save_stack+0x3c/0x68
[   19.170264]  kasan_save_track+0x20/0x40
[   19.171017]  kasan_save_alloc_info+0x40/0x58
[   19.171553]  __kasan_kmalloc+0xd4/0xd8
[   19.172076]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.172586]  ksize_unpoisons_memory+0xc0/0x750
[   19.173084]  kunit_try_run_case+0x170/0x3f0
[   19.173615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.174209]  kthread+0x318/0x620
[   19.174946]  ret_from_fork+0x10/0x20
[   19.175497] 
[   19.175812] The buggy address belongs to the object at fff00000c5a05300
[   19.175812]  which belongs to the cache kmalloc-128 of size 128
[   19.176805] The buggy address is located 5 bytes to the right of
[   19.176805]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.177889] 
[   19.178242] The buggy address belongs to the physical page:
[   19.178913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.179579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.180242] page_type: f5(slab)
[   19.180642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.182190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.182938] page dumped because: kasan: bad access detected
[   19.183181] 
[   19.183284] Memory state around the buggy address:
[   19.183452]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.183673]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.183910] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.184123]                                                                 ^
[   19.184341]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184563]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.185051] ==================================================================
[   19.186081] ==================================================================
[   19.188626] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   19.189228] Read of size 1 at addr fff00000c5a0537f by task kunit_try_catch/183
[   19.189960] 
[   19.190238] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.190400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.190436] Hardware name: linux,dummy-virt (DT)
[   19.190913] Call trace:
[   19.190971]  show_stack+0x20/0x38 (C)
[   19.191044]  dump_stack_lvl+0x8c/0xd0
[   19.191101]  print_report+0x118/0x608
[   19.191155]  kasan_report+0xdc/0x128
[   19.191207]  __asan_report_load1_noabort+0x20/0x30
[   19.191262]  ksize_unpoisons_memory+0x6a0/0x750
[   19.191316]  kunit_try_run_case+0x170/0x3f0
[   19.191372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.191430]  kthread+0x318/0x620
[   19.191481]  ret_from_fork+0x10/0x20
[   19.191537] 
[   19.196968] Allocated by task 183:
[   19.197277]  kasan_save_stack+0x3c/0x68
[   19.197681]  kasan_save_track+0x20/0x40
[   19.198403]  kasan_save_alloc_info+0x40/0x58
[   19.199187]  __kasan_kmalloc+0xd4/0xd8
[   19.199571]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.199948]  ksize_unpoisons_memory+0xc0/0x750
[   19.200318]  kunit_try_run_case+0x170/0x3f0
[   19.200680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.201519]  kthread+0x318/0x620
[   19.201877]  ret_from_fork+0x10/0x20
[   19.202245] 
[   19.202476] The buggy address belongs to the object at fff00000c5a05300
[   19.202476]  which belongs to the cache kmalloc-128 of size 128
[   19.203769] The buggy address is located 12 bytes to the right of
[   19.203769]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.204863] 
[   19.205268] The buggy address belongs to the physical page:
[   19.205560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.206432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.207205] page_type: f5(slab)
[   19.207456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.207854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.208176] page dumped because: kasan: bad access detected
[   19.208357] 
[   19.208455] Memory state around the buggy address:
[   19.208621]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.210228]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.210924] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.211162]                                                                 ^
[   19.211385]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211605]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211893] ==================================================================
[   19.130358] ==================================================================
[   19.131604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   19.132256] Read of size 1 at addr fff00000c5a05373 by task kunit_try_catch/183
[   19.132922] 
[   19.133725] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.133868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.133903] Hardware name: linux,dummy-virt (DT)
[   19.133941] Call trace:
[   19.133970]  show_stack+0x20/0x38 (C)
[   19.134037]  dump_stack_lvl+0x8c/0xd0
[   19.134107]  print_report+0x118/0x608
[   19.134164]  kasan_report+0xdc/0x128
[   19.134218]  __asan_report_load1_noabort+0x20/0x30
[   19.134273]  ksize_unpoisons_memory+0x638/0x750
[   19.134327]  kunit_try_run_case+0x170/0x3f0
[   19.134382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.134440]  kthread+0x318/0x620
[   19.134560]  ret_from_fork+0x10/0x20
[   19.134669] 
[   19.139732] Allocated by task 183:
[   19.139918]  kasan_save_stack+0x3c/0x68
[   19.140103]  kasan_save_track+0x20/0x40
[   19.140265]  kasan_save_alloc_info+0x40/0x58
[   19.140430]  __kasan_kmalloc+0xd4/0xd8
[   19.140588]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.140821]  ksize_unpoisons_memory+0xc0/0x750
[   19.142066]  kunit_try_run_case+0x170/0x3f0
[   19.142570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.143826]  kthread+0x318/0x620
[   19.144170]  ret_from_fork+0x10/0x20
[   19.144516] 
[   19.144768] The buggy address belongs to the object at fff00000c5a05300
[   19.144768]  which belongs to the cache kmalloc-128 of size 128
[   19.145583] The buggy address is located 0 bytes to the right of
[   19.145583]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.146406] 
[   19.146687] The buggy address belongs to the physical page:
[   19.147713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.149331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.149880] page_type: f5(slab)
[   19.150228] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.150861] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.151689] page dumped because: kasan: bad access detected
[   19.152314] 
[   19.152565] Memory state around the buggy address:
[   19.153089]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.153862]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154831] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.155414]                                                              ^
[   19.156038]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.156758]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.157391] ==================================================================

[   12.855058] ==================================================================
[   12.855788] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   12.856379] Read of size 1 at addr ffff888102add078 by task kunit_try_catch/202
[   12.856695] 
[   12.856809] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.856863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.856875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.856897] Call Trace:
[   12.856918]  <TASK>
[   12.856938]  dump_stack_lvl+0x73/0xb0
[   12.856967]  print_report+0xd1/0x650
[   12.856988]  ? __virt_addr_valid+0x1db/0x2d0
[   12.857010]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   12.857032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.857057]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   12.857078]  kasan_report+0x140/0x180
[   12.857099]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   12.857125]  __asan_report_load1_noabort+0x18/0x20
[   12.857148]  ksize_unpoisons_memory+0x7eb/0x9b0
[   12.857171]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.857192]  ? finish_task_switch.isra.0+0x153/0x700
[   12.857215]  ? __switch_to+0x5d9/0xf60
[   12.857241]  ? __schedule+0xce8/0x2840
[   12.857266]  ? __pfx_read_tsc+0x10/0x10
[   12.857287]  ? ktime_get_ts64+0x86/0x230
[   12.857312]  kunit_try_run_case+0x1a6/0x480
[   12.857334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.857354]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.857374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.857397]  ? __kthread_parkme+0x82/0x160
[   12.857419]  ? preempt_count_sub+0x50/0x80
[   12.857442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.857475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.857524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.857548]  kthread+0x324/0x6e0
[   12.857569]  ? trace_preempt_on+0x20/0xc0
[   12.857592]  ? __pfx_kthread+0x10/0x10
[   12.857613]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.857636]  ? calculate_sigpending+0x7b/0xa0
[   12.857657]  ? __pfx_kthread+0x10/0x10
[   12.857679]  ret_from_fork+0x41/0x80
[   12.857696]  ? __pfx_kthread+0x10/0x10
[   12.858036]  ret_from_fork_asm+0x1a/0x30
[   12.858112]  </TASK>
[   12.858123] 
[   12.866420] Allocated by task 202:
[   12.866793]  kasan_save_stack+0x45/0x70
[   12.867135]  kasan_save_track+0x18/0x40
[   12.867278]  kasan_save_alloc_info+0x3b/0x50
[   12.867513]  __kasan_kmalloc+0xb7/0xc0
[   12.867855]  __kmalloc_cache_noprof+0x18a/0x420
[   12.868080]  ksize_unpoisons_memory+0xc8/0x9b0
[   12.868526]  kunit_try_run_case+0x1a6/0x480
[   12.868762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.868986]  kthread+0x324/0x6e0
[   12.869237]  ret_from_fork+0x41/0x80
[   12.869373]  ret_from_fork_asm+0x1a/0x30
[   12.869515] 
[   12.869587] The buggy address belongs to the object at ffff888102add000
[   12.869587]  which belongs to the cache kmalloc-128 of size 128
[   12.870263] The buggy address is located 5 bytes to the right of
[   12.870263]  allocated 115-byte region [ffff888102add000, ffff888102add073)
[   12.870850] 
[   12.870954] The buggy address belongs to the physical page:
[   12.871434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   12.871744] flags: 0x200000000000000(node=0|zone=2)
[   12.871923] page_type: f5(slab)
[   12.872063] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.872413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.872764] page dumped because: kasan: bad access detected
[   12.872942] 
[   12.873014] Memory state around the buggy address:
[   12.873208]  ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.873536]  ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.873864] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.874158]                                                                 ^
[   12.874468]  ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.874686]  ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.874987] ==================================================================
[   12.834927] ==================================================================
[   12.835537] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   12.835797] Read of size 1 at addr ffff888102add073 by task kunit_try_catch/202
[   12.836061] 
[   12.836663] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.836715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.836728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.836776] Call Trace:
[   12.836802]  <TASK>
[   12.836825]  dump_stack_lvl+0x73/0xb0
[   12.836876]  print_report+0xd1/0x650
[   12.836898]  ? __virt_addr_valid+0x1db/0x2d0
[   12.836923]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   12.836945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.836970]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   12.836993]  kasan_report+0x140/0x180
[   12.837060]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   12.837087]  __asan_report_load1_noabort+0x18/0x20
[   12.837110]  ksize_unpoisons_memory+0x81e/0x9b0
[   12.837132]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.837153]  ? finish_task_switch.isra.0+0x153/0x700
[   12.837178]  ? __switch_to+0x5d9/0xf60
[   12.837205]  ? __schedule+0xce8/0x2840
[   12.837234]  ? __pfx_read_tsc+0x10/0x10
[   12.837256]  ? ktime_get_ts64+0x86/0x230
[   12.837285]  kunit_try_run_case+0x1a6/0x480
[   12.837310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.837331]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.837352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.837376]  ? __kthread_parkme+0x82/0x160
[   12.837399]  ? preempt_count_sub+0x50/0x80
[   12.837423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.837446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.837471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.837497]  kthread+0x324/0x6e0
[   12.837519]  ? trace_preempt_on+0x20/0xc0
[   12.837548]  ? __pfx_kthread+0x10/0x10
[   12.837572]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.837595]  ? calculate_sigpending+0x7b/0xa0
[   12.837617]  ? __pfx_kthread+0x10/0x10
[   12.837639]  ret_from_fork+0x41/0x80
[   12.837659]  ? __pfx_kthread+0x10/0x10
[   12.837681]  ret_from_fork_asm+0x1a/0x30
[   12.837713]  </TASK>
[   12.837724] 
[   12.845833] Allocated by task 202:
[   12.846068]  kasan_save_stack+0x45/0x70
[   12.846283]  kasan_save_track+0x18/0x40
[   12.846419]  kasan_save_alloc_info+0x3b/0x50
[   12.846567]  __kasan_kmalloc+0xb7/0xc0
[   12.846734]  __kmalloc_cache_noprof+0x18a/0x420
[   12.846964]  ksize_unpoisons_memory+0xc8/0x9b0
[   12.847177]  kunit_try_run_case+0x1a6/0x480
[   12.847532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.847725]  kthread+0x324/0x6e0
[   12.847861]  ret_from_fork+0x41/0x80
[   12.847991]  ret_from_fork_asm+0x1a/0x30
[   12.848265] 
[   12.848358] The buggy address belongs to the object at ffff888102add000
[   12.848358]  which belongs to the cache kmalloc-128 of size 128
[   12.848832] The buggy address is located 0 bytes to the right of
[   12.848832]  allocated 115-byte region [ffff888102add000, ffff888102add073)
[   12.849567] 
[   12.849691] The buggy address belongs to the physical page:
[   12.849943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   12.850382] flags: 0x200000000000000(node=0|zone=2)
[   12.850610] page_type: f5(slab)
[   12.850738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.851120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.851630] page dumped because: kasan: bad access detected
[   12.851798] 
[   12.851877] Memory state around the buggy address:
[   12.852310]  ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.852626]  ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.852858] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.853070]                                                              ^
[   12.853668]  ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.854012]  ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.854461] ==================================================================
[   12.876206] ==================================================================
[   12.876518] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   12.876874] Read of size 1 at addr ffff888102add07f by task kunit_try_catch/202
[   12.877196] 
[   12.877298] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.877344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.877356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.877377] Call Trace:
[   12.877398]  <TASK>
[   12.877420]  dump_stack_lvl+0x73/0xb0
[   12.877448]  print_report+0xd1/0x650
[   12.877470]  ? __virt_addr_valid+0x1db/0x2d0
[   12.877494]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   12.877516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.877540]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   12.877562]  kasan_report+0x140/0x180
[   12.877583]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   12.877609]  __asan_report_load1_noabort+0x18/0x20
[   12.877631]  ksize_unpoisons_memory+0x7b8/0x9b0
[   12.877653]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.877674]  ? finish_task_switch.isra.0+0x153/0x700
[   12.877697]  ? __switch_to+0x5d9/0xf60
[   12.877723]  ? __schedule+0xce8/0x2840
[   12.877753]  ? __pfx_read_tsc+0x10/0x10
[   12.877774]  ? ktime_get_ts64+0x86/0x230
[   12.877800]  kunit_try_run_case+0x1a6/0x480
[   12.877823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.877855]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.877876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.877900]  ? __kthread_parkme+0x82/0x160
[   12.877922]  ? preempt_count_sub+0x50/0x80
[   12.877945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.877967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.877992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.878017]  kthread+0x324/0x6e0
[   12.878038]  ? trace_preempt_on+0x20/0xc0
[   12.878061]  ? __pfx_kthread+0x10/0x10
[   12.878083]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.878105]  ? calculate_sigpending+0x7b/0xa0
[   12.878126]  ? __pfx_kthread+0x10/0x10
[   12.878148]  ret_from_fork+0x41/0x80
[   12.878166]  ? __pfx_kthread+0x10/0x10
[   12.878202]  ret_from_fork_asm+0x1a/0x30
[   12.878234]  </TASK>
[   12.878244] 
[   12.886387] Allocated by task 202:
[   12.886568]  kasan_save_stack+0x45/0x70
[   12.886781]  kasan_save_track+0x18/0x40
[   12.886985]  kasan_save_alloc_info+0x3b/0x50
[   12.887290]  __kasan_kmalloc+0xb7/0xc0
[   12.887424]  __kmalloc_cache_noprof+0x18a/0x420
[   12.887580]  ksize_unpoisons_memory+0xc8/0x9b0
[   12.887784]  kunit_try_run_case+0x1a6/0x480
[   12.888013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.888269]  kthread+0x324/0x6e0
[   12.888444]  ret_from_fork+0x41/0x80
[   12.888632]  ret_from_fork_asm+0x1a/0x30
[   12.888829] 
[   12.888924] The buggy address belongs to the object at ffff888102add000
[   12.888924]  which belongs to the cache kmalloc-128 of size 128
[   12.889325] The buggy address is located 12 bytes to the right of
[   12.889325]  allocated 115-byte region [ffff888102add000, ffff888102add073)
[   12.890565] 
[   12.890674] The buggy address belongs to the physical page:
[   12.890915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   12.891331] flags: 0x200000000000000(node=0|zone=2)
[   12.891503] page_type: f5(slab)
[   12.891631] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.891914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.892627] page dumped because: kasan: bad access detected
[   12.892902] 
[   12.892998] Memory state around the buggy address:
[   12.893257]  ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.893866]  ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.894233] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.894451]                                                                 ^
[   12.894763]  ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.895096]  ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.895517] ==================================================================