Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.224042] ==================================================================
[   19.224899] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   19.225975] Read of size 1 at addr fff00000c5a72c73 by task kunit_try_catch/184
[   19.226822] 
[   19.227216] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   19.227459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.227530] Hardware name: linux,dummy-virt (DT)
[   19.227612] Call trace:
[   19.227646]  show_stack+0x20/0x38 (C)
[   19.227721]  dump_stack_lvl+0x8c/0xd0
[   19.227777]  print_report+0x118/0x608
[   19.227832]  kasan_report+0xdc/0x128
[   19.227886]  __asan_report_load1_noabort+0x20/0x30
[   19.227940]  ksize_unpoisons_memory+0x638/0x750
[   19.227994]  kunit_try_run_case+0x170/0x3f0
[   19.228048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.228105]  kthread+0x318/0x620
[   19.228182]  ret_from_fork+0x10/0x20
[   19.228242] 
[   19.232740] Allocated by task 184:
[   19.233226]  kasan_save_stack+0x3c/0x68
[   19.233789]  kasan_save_track+0x20/0x40
[   19.234243]  kasan_save_alloc_info+0x40/0x58
[   19.234665]  __kasan_kmalloc+0xd4/0xd8
[   19.235213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.235776]  ksize_unpoisons_memory+0xc0/0x750
[   19.236349]  kunit_try_run_case+0x170/0x3f0
[   19.236838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237375]  kthread+0x318/0x620
[   19.237865]  ret_from_fork+0x10/0x20
[   19.238368] 
[   19.238646] The buggy address belongs to the object at fff00000c5a72c00
[   19.238646]  which belongs to the cache kmalloc-128 of size 128
[   19.239671] The buggy address is located 0 bytes to the right of
[   19.239671]  allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73)
[   19.240638] 
[   19.240935] The buggy address belongs to the physical page:
[   19.241477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72
[   19.242176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.242784] page_type: f5(slab)
[   19.243135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.243856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.244516] page dumped because: kasan: bad access detected
[   19.245092] 
[   19.245361] Memory state around the buggy address:
[   19.245820]  fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.246460]  fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.247098] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.247688]                                                              ^
[   19.248290]  fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.248804]  fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.249356] ==================================================================
[   19.280929] ==================================================================
[   19.281393] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   19.281817] Read of size 1 at addr fff00000c5a72c7f by task kunit_try_catch/184
[   19.282200] 
[   19.282494] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   19.282777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.282839] Hardware name: linux,dummy-virt (DT)
[   19.282918] Call trace:
[   19.282962]  show_stack+0x20/0x38 (C)
[   19.283105]  dump_stack_lvl+0x8c/0xd0
[   19.283240]  print_report+0x118/0x608
[   19.283354]  kasan_report+0xdc/0x128
[   19.283497]  __asan_report_load1_noabort+0x20/0x30
[   19.283640]  ksize_unpoisons_memory+0x6a0/0x750
[   19.283782]  kunit_try_run_case+0x170/0x3f0
[   19.283912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.284048]  kthread+0x318/0x620
[   19.284181]  ret_from_fork+0x10/0x20
[   19.284253] 
[   19.289599] Allocated by task 184:
[   19.289881]  kasan_save_stack+0x3c/0x68
[   19.290171]  kasan_save_track+0x20/0x40
[   19.291673]  kasan_save_alloc_info+0x40/0x58
[   19.292203]  __kasan_kmalloc+0xd4/0xd8
[   19.292620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.293123]  ksize_unpoisons_memory+0xc0/0x750
[   19.293625]  kunit_try_run_case+0x170/0x3f0
[   19.293994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.294573]  kthread+0x318/0x620
[   19.294992]  ret_from_fork+0x10/0x20
[   19.295393] 
[   19.295667] The buggy address belongs to the object at fff00000c5a72c00
[   19.295667]  which belongs to the cache kmalloc-128 of size 128
[   19.296510] The buggy address is located 12 bytes to the right of
[   19.296510]  allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73)
[   19.297578] 
[   19.297904] The buggy address belongs to the physical page:
[   19.298331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72
[   19.299118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.299704] page_type: f5(slab)
[   19.300035] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.300708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.301341] page dumped because: kasan: bad access detected
[   19.301833] 
[   19.302118] Memory state around the buggy address:
[   19.302565]  fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.303190]  fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.303794] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.304409]                                                                 ^
[   19.305015]  fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305657]  fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.306306] ==================================================================
[   19.252240] ==================================================================
[   19.252748] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   19.253314] Read of size 1 at addr fff00000c5a72c78 by task kunit_try_catch/184
[   19.254001] 
[   19.254582] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   19.254763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.254795] Hardware name: linux,dummy-virt (DT)
[   19.254833] Call trace:
[   19.254861]  show_stack+0x20/0x38 (C)
[   19.254929]  dump_stack_lvl+0x8c/0xd0
[   19.254984]  print_report+0x118/0x608
[   19.255039]  kasan_report+0xdc/0x128
[   19.255089]  __asan_report_load1_noabort+0x20/0x30
[   19.255144]  ksize_unpoisons_memory+0x628/0x750
[   19.255261]  kunit_try_run_case+0x170/0x3f0
[   19.255355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.255466]  kthread+0x318/0x620
[   19.255550]  ret_from_fork+0x10/0x20
[   19.255650] 
[   19.261884] Allocated by task 184:
[   19.262269]  kasan_save_stack+0x3c/0x68
[   19.262614]  kasan_save_track+0x20/0x40
[   19.262932]  kasan_save_alloc_info+0x40/0x58
[   19.263282]  __kasan_kmalloc+0xd4/0xd8
[   19.263645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.264015]  ksize_unpoisons_memory+0xc0/0x750
[   19.264999]  kunit_try_run_case+0x170/0x3f0
[   19.265646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.266306]  kthread+0x318/0x620
[   19.266831]  ret_from_fork+0x10/0x20
[   19.267415] 
[   19.267806] The buggy address belongs to the object at fff00000c5a72c00
[   19.267806]  which belongs to the cache kmalloc-128 of size 128
[   19.268766] The buggy address is located 5 bytes to the right of
[   19.268766]  allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73)
[   19.269787] 
[   19.270127] The buggy address belongs to the physical page:
[   19.270647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72
[   19.271372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.272023] page_type: f5(slab)
[   19.272424] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.273096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.273766] page dumped because: kasan: bad access detected
[   19.274351] 
[   19.274649] Memory state around the buggy address:
[   19.275120]  fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.275693]  fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.276407] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.276969]                                                                 ^
[   19.277597]  fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278256]  fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278863] ==================================================================

[   13.091873] ==================================================================
[   13.092272] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   13.092520] Read of size 1 at addr ffff888102a2c273 by task kunit_try_catch/202
[   13.093670] 
[   13.093887] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   13.093928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.093940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.093961] Call Trace:
[   13.093973]  <TASK>
[   13.093989]  dump_stack_lvl+0x73/0xb0
[   13.094030]  print_report+0xd1/0x650
[   13.094054]  ? __virt_addr_valid+0x1db/0x2d0
[   13.094080]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   13.094104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.094131]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   13.094156]  kasan_report+0x140/0x180
[   13.094180]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   13.094209]  __asan_report_load1_noabort+0x18/0x20
[   13.094235]  ksize_unpoisons_memory+0x81e/0x9b0
[   13.094260]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.094284]  ? finish_task_switch.isra.0+0x153/0x700
[   13.094310]  ? __switch_to+0x5d9/0xf60
[   13.094339]  ? __schedule+0xce8/0x2840
[   13.094365]  ? __pfx_read_tsc+0x10/0x10
[   13.094389]  ? ktime_get_ts64+0x86/0x230
[   13.094417]  kunit_try_run_case+0x1a6/0x480
[   13.094443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.094466]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.094492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.094518]  ? __kthread_parkme+0x82/0x160
[   13.094542]  ? preempt_count_sub+0x50/0x80
[   13.094569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.094594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.094623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.094651]  kthread+0x324/0x6e0
[   13.094674]  ? trace_preempt_on+0x20/0xc0
[   13.094700]  ? __pfx_kthread+0x10/0x10
[   13.094724]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.094760]  ? calculate_sigpending+0x7b/0xa0
[   13.094784]  ? __pfx_kthread+0x10/0x10
[   13.094809]  ret_from_fork+0x41/0x80
[   13.094841]  ? __pfx_kthread+0x10/0x10
[   13.094865]  ret_from_fork_asm+0x1a/0x30
[   13.094899]  </TASK>
[   13.094910] 
[   13.106658] Allocated by task 202:
[   13.107001]  kasan_save_stack+0x45/0x70
[   13.107374]  kasan_save_track+0x18/0x40
[   13.107888]  kasan_save_alloc_info+0x3b/0x50
[   13.108318]  __kasan_kmalloc+0xb7/0xc0
[   13.108743]  __kmalloc_cache_noprof+0x18a/0x420
[   13.109188]  ksize_unpoisons_memory+0xc8/0x9b0
[   13.109618]  kunit_try_run_case+0x1a6/0x480
[   13.110087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.110359]  kthread+0x324/0x6e0
[   13.110590]  ret_from_fork+0x41/0x80
[   13.111035]  ret_from_fork_asm+0x1a/0x30
[   13.111426] 
[   13.111646] The buggy address belongs to the object at ffff888102a2c200
[   13.111646]  which belongs to the cache kmalloc-128 of size 128
[   13.112235] The buggy address is located 0 bytes to the right of
[   13.112235]  allocated 115-byte region [ffff888102a2c200, ffff888102a2c273)
[   13.112822] 
[   13.113090] The buggy address belongs to the physical page:
[   13.113658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   13.114377] flags: 0x200000000000000(node=0|zone=2)
[   13.114915] page_type: f5(slab)
[   13.115243] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.115921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.116160] page dumped because: kasan: bad access detected
[   13.116330] 
[   13.116400] Memory state around the buggy address:
[   13.116555]  ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.116830]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.117103] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.117410]                                                              ^
[   13.117636]  ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.118131]  ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.118432] ==================================================================
[   13.138368] ==================================================================
[   13.140640] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   13.141089] Read of size 1 at addr ffff888102a2c27f by task kunit_try_catch/202
[   13.141308] 
[   13.141388] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   13.141426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.141437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.141456] Call Trace:
[   13.141469]  <TASK>
[   13.141484]  dump_stack_lvl+0x73/0xb0
[   13.141511]  print_report+0xd1/0x650
[   13.141535]  ? __virt_addr_valid+0x1db/0x2d0
[   13.141559]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   13.141583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.141610]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   13.141635]  kasan_report+0x140/0x180
[   13.141659]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   13.141688]  __asan_report_load1_noabort+0x18/0x20
[   13.141786]  ksize_unpoisons_memory+0x7b8/0x9b0
[   13.141817]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.141843]  ? finish_task_switch.isra.0+0x153/0x700
[   13.141881]  ? __switch_to+0x5d9/0xf60
[   13.141908]  ? __schedule+0xce8/0x2840
[   13.141945]  ? __pfx_read_tsc+0x10/0x10
[   13.141969]  ? ktime_get_ts64+0x86/0x230
[   13.141996]  kunit_try_run_case+0x1a6/0x480
[   13.142044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.142077]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.142103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.142128]  ? __kthread_parkme+0x82/0x160
[   13.142164]  ? preempt_count_sub+0x50/0x80
[   13.142190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.142215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.142252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.142280]  kthread+0x324/0x6e0
[   13.142304]  ? trace_preempt_on+0x20/0xc0
[   13.142339]  ? __pfx_kthread+0x10/0x10
[   13.142363]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.142388]  ? calculate_sigpending+0x7b/0xa0
[   13.142420]  ? __pfx_kthread+0x10/0x10
[   13.142445]  ret_from_fork+0x41/0x80
[   13.142508]  ? __pfx_kthread+0x10/0x10
[   13.142534]  ret_from_fork_asm+0x1a/0x30
[   13.142568]  </TASK>
[   13.142578] 
[   13.150033] Allocated by task 202:
[   13.150167]  kasan_save_stack+0x45/0x70
[   13.150315]  kasan_save_track+0x18/0x40
[   13.150453]  kasan_save_alloc_info+0x3b/0x50
[   13.150609]  __kasan_kmalloc+0xb7/0xc0
[   13.150744]  __kmalloc_cache_noprof+0x18a/0x420
[   13.150901]  ksize_unpoisons_memory+0xc8/0x9b0
[   13.151100]  kunit_try_run_case+0x1a6/0x480
[   13.151365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.151625]  kthread+0x324/0x6e0
[   13.151793]  ret_from_fork+0x41/0x80
[   13.151990]  ret_from_fork_asm+0x1a/0x30
[   13.152203] 
[   13.152372] The buggy address belongs to the object at ffff888102a2c200
[   13.152372]  which belongs to the cache kmalloc-128 of size 128
[   13.152939] The buggy address is located 12 bytes to the right of
[   13.152939]  allocated 115-byte region [ffff888102a2c200, ffff888102a2c273)
[   13.153773] 
[   13.153873] The buggy address belongs to the physical page:
[   13.154148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   13.154387] flags: 0x200000000000000(node=0|zone=2)
[   13.154543] page_type: f5(slab)
[   13.155067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.155486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.155919] page dumped because: kasan: bad access detected
[   13.156200] 
[   13.156295] Memory state around the buggy address:
[   13.156449]  ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.156663]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.156875] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.157275]                                                                 ^
[   13.157599]  ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.157975]  ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.158411] ==================================================================
[   13.118979] ==================================================================
[   13.119494] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   13.119887] Read of size 1 at addr ffff888102a2c278 by task kunit_try_catch/202
[   13.120268] 
[   13.120393] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   13.120444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.120456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.120474] Call Trace:
[   13.120489]  <TASK>
[   13.120503]  dump_stack_lvl+0x73/0xb0
[   13.120540]  print_report+0xd1/0x650
[   13.120564]  ? __virt_addr_valid+0x1db/0x2d0
[   13.120587]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   13.120622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.120650]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   13.120675]  kasan_report+0x140/0x180
[   13.120699]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   13.120772]  __asan_report_load1_noabort+0x18/0x20
[   13.120813]  ksize_unpoisons_memory+0x7eb/0x9b0
[   13.120839]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.120863]  ? finish_task_switch.isra.0+0x153/0x700
[   13.120888]  ? __switch_to+0x5d9/0xf60
[   13.120916]  ? __schedule+0xce8/0x2840
[   13.120940]  ? __pfx_read_tsc+0x10/0x10
[   13.120964]  ? ktime_get_ts64+0x86/0x230
[   13.120991]  kunit_try_run_case+0x1a6/0x480
[   13.121025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.121049]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.121083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.121109]  ? __kthread_parkme+0x82/0x160
[   13.121144]  ? preempt_count_sub+0x50/0x80
[   13.121170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.121195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.121223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.121260]  kthread+0x324/0x6e0
[   13.121283]  ? trace_preempt_on+0x20/0xc0
[   13.121320]  ? __pfx_kthread+0x10/0x10
[   13.121345]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.121369]  ? calculate_sigpending+0x7b/0xa0
[   13.121393]  ? __pfx_kthread+0x10/0x10
[   13.121418]  ret_from_fork+0x41/0x80
[   13.121439]  ? __pfx_kthread+0x10/0x10
[   13.121463]  ret_from_fork_asm+0x1a/0x30
[   13.121497]  </TASK>
[   13.121506] 
[   13.129423] Allocated by task 202:
[   13.129667]  kasan_save_stack+0x45/0x70
[   13.129911]  kasan_save_track+0x18/0x40
[   13.130117]  kasan_save_alloc_info+0x3b/0x50
[   13.130329]  __kasan_kmalloc+0xb7/0xc0
[   13.130526]  __kmalloc_cache_noprof+0x18a/0x420
[   13.130822]  ksize_unpoisons_memory+0xc8/0x9b0
[   13.131072]  kunit_try_run_case+0x1a6/0x480
[   13.131279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.131503]  kthread+0x324/0x6e0
[   13.131822]  ret_from_fork+0x41/0x80
[   13.131992]  ret_from_fork_asm+0x1a/0x30
[   13.132200] 
[   13.132310] The buggy address belongs to the object at ffff888102a2c200
[   13.132310]  which belongs to the cache kmalloc-128 of size 128
[   13.132790] The buggy address is located 5 bytes to the right of
[   13.132790]  allocated 115-byte region [ffff888102a2c200, ffff888102a2c273)
[   13.133428] 
[   13.133529] The buggy address belongs to the physical page:
[   13.133882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   13.134389] flags: 0x200000000000000(node=0|zone=2)
[   13.134619] page_type: f5(slab)
[   13.134863] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.135189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.135506] page dumped because: kasan: bad access detected
[   13.135756] 
[   13.135824] Memory state around the buggy address:
[   13.135973]  ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.136195]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.136722] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.137092]                                                                 ^
[   13.137327]  ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137539]  ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137902] ==================================================================