Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.139567] ==================================================================
[   22.139896] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   22.140095] Read of size 1 at addr fff00000c794b473 by task kunit_try_catch/196
[   22.140640] 
[   22.140743] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.141356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.141553] Hardware name: linux,dummy-virt (DT)
[   22.141643] Call trace:
[   22.141987]  show_stack+0x20/0x38 (C)
[   22.142121]  dump_stack_lvl+0x8c/0xd0
[   22.142186]  print_report+0x118/0x608
[   22.142239]  kasan_report+0xdc/0x128
[   22.142289]  __asan_report_load1_noabort+0x20/0x30
[   22.142345]  ksize_unpoisons_memory+0x628/0x740
[   22.142401]  kunit_try_run_case+0x170/0x3f0
[   22.142457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.142517]  kthread+0x328/0x630
[   22.142569]  ret_from_fork+0x10/0x20
[   22.142625] 
[   22.142647] Allocated by task 196:
[   22.142681]  kasan_save_stack+0x3c/0x68
[   22.142744]  kasan_save_track+0x20/0x40
[   22.142791]  kasan_save_alloc_info+0x40/0x58
[   22.142835]  __kasan_kmalloc+0xd4/0xd8
[   22.142874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.142921]  ksize_unpoisons_memory+0xc0/0x740
[   22.142967]  kunit_try_run_case+0x170/0x3f0
[   22.143007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.143056]  kthread+0x328/0x630
[   22.143094]  ret_from_fork+0x10/0x20
[   22.143133] 
[   22.143157] The buggy address belongs to the object at fff00000c794b400
[   22.143157]  which belongs to the cache kmalloc-128 of size 128
[   22.143224] The buggy address is located 0 bytes to the right of
[   22.143224]  allocated 115-byte region [fff00000c794b400, fff00000c794b473)
[   22.143295] 
[   22.143318] The buggy address belongs to the physical page:
[   22.143356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.143417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.143475] page_type: f5(slab)
[   22.143525] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.143583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.143629] page dumped because: kasan: bad access detected
[   22.143664] 
[   22.143683] Memory state around the buggy address:
[   22.143720]  fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.143973]  fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.144079] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.144190]                                                              ^
[   22.144387]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.144686]  fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.145003] ==================================================================
[   22.146702] ==================================================================
[   22.146845] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   22.146975] Read of size 1 at addr fff00000c794b478 by task kunit_try_catch/196
[   22.147098] 
[   22.147185] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.147398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.147470] Hardware name: linux,dummy-virt (DT)
[   22.147555] Call trace:
[   22.147613]  show_stack+0x20/0x38 (C)
[   22.147960]  dump_stack_lvl+0x8c/0xd0
[   22.148118]  print_report+0x118/0x608
[   22.148240]  kasan_report+0xdc/0x128
[   22.148345]  __asan_report_load1_noabort+0x20/0x30
[   22.148471]  ksize_unpoisons_memory+0x618/0x740
[   22.148624]  kunit_try_run_case+0x170/0x3f0
[   22.148753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.149370]  kthread+0x328/0x630
[   22.149501]  ret_from_fork+0x10/0x20
[   22.149617] 
[   22.149693] Allocated by task 196:
[   22.149775]  kasan_save_stack+0x3c/0x68
[   22.149866]  kasan_save_track+0x20/0x40
[   22.149947]  kasan_save_alloc_info+0x40/0x58
[   22.150039]  __kasan_kmalloc+0xd4/0xd8
[   22.150132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.150241]  ksize_unpoisons_memory+0xc0/0x740
[   22.150531]  kunit_try_run_case+0x170/0x3f0
[   22.150645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.150809]  kthread+0x328/0x630
[   22.150914]  ret_from_fork+0x10/0x20
[   22.151051] 
[   22.151223] The buggy address belongs to the object at fff00000c794b400
[   22.151223]  which belongs to the cache kmalloc-128 of size 128
[   22.151379] The buggy address is located 5 bytes to the right of
[   22.151379]  allocated 115-byte region [fff00000c794b400, fff00000c794b473)
[   22.151547] 
[   22.152052] The buggy address belongs to the physical page:
[   22.152160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.152839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.153008] page_type: f5(slab)
[   22.153341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.153788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.154101] page dumped because: kasan: bad access detected
[   22.154220] 
[   22.154283] Memory state around the buggy address:
[   22.154874]  fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.155271]  fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.155422] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.155517]                                                                 ^
[   22.155625]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.155751]  fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.156347] ==================================================================
[   22.159658] ==================================================================
[   22.159795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   22.159940] Read of size 1 at addr fff00000c794b47f by task kunit_try_catch/196
[   22.160071] 
[   22.160538] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.161523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.161760] Hardware name: linux,dummy-virt (DT)
[   22.161857] Call trace:
[   22.161998]  show_stack+0x20/0x38 (C)
[   22.162134]  dump_stack_lvl+0x8c/0xd0
[   22.162492]  print_report+0x118/0x608
[   22.162857]  kasan_report+0xdc/0x128
[   22.163079]  __asan_report_load1_noabort+0x20/0x30
[   22.163233]  ksize_unpoisons_memory+0x690/0x740
[   22.163442]  kunit_try_run_case+0x170/0x3f0
[   22.163800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.163970]  kthread+0x328/0x630
[   22.164400]  ret_from_fork+0x10/0x20
[   22.164545] 
[   22.164593] Allocated by task 196:
[   22.164912]  kasan_save_stack+0x3c/0x68
[   22.165310]  kasan_save_track+0x20/0x40
[   22.165444]  kasan_save_alloc_info+0x40/0x58
[   22.165693]  __kasan_kmalloc+0xd4/0xd8
[   22.165807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.166143]  ksize_unpoisons_memory+0xc0/0x740
[   22.166253]  kunit_try_run_case+0x170/0x3f0
[   22.166650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.166994]  kthread+0x328/0x630
[   22.167197]  ret_from_fork+0x10/0x20
[   22.167327] 
[   22.167387] The buggy address belongs to the object at fff00000c794b400
[   22.167387]  which belongs to the cache kmalloc-128 of size 128
[   22.168013] The buggy address is located 12 bytes to the right of
[   22.168013]  allocated 115-byte region [fff00000c794b400, fff00000c794b473)
[   22.168328] 
[   22.168389] The buggy address belongs to the physical page:
[   22.168480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.169055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.169340] page_type: f5(slab)
[   22.169779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.169911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.170257] page dumped because: kasan: bad access detected
[   22.170367] 
[   22.170610] Memory state around the buggy address:
[   22.170875]  fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.171000]  fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.171119] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.171218]                                                                 ^
[   22.171324]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.171435]  fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.171543] ==================================================================

[   19.971396] ==================================================================
[   19.972212] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   19.973686] Read of size 1 at addr ffff888103096778 by task kunit_try_catch/214
[   19.974378] 
[   19.974687] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   19.974855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.974892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.974944] Call Trace:
[   19.974994]  <TASK>
[   19.975042]  dump_stack_lvl+0x73/0xb0
[   19.975128]  print_report+0xd1/0x650
[   19.975270]  ? __virt_addr_valid+0x1db/0x2d0
[   19.975373]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.975447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.975521]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.975583]  kasan_report+0x141/0x180
[   19.975618]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.975663]  __asan_report_load1_noabort+0x18/0x20
[   19.975694]  ksize_unpoisons_memory+0x7e9/0x9b0
[   19.975732]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   19.975765]  ? finish_task_switch.isra.0+0x153/0x700
[   19.975799]  ? __switch_to+0x5d9/0xf60
[   19.975827]  ? dequeue_task_fair+0x166/0x4e0
[   19.975860]  ? __schedule+0x10cc/0x2b60
[   19.975922]  ? __pfx_read_tsc+0x10/0x10
[   19.975954]  ? ktime_get_ts64+0x86/0x230
[   19.975991]  kunit_try_run_case+0x1a5/0x480
[   19.976026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.976087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.976125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.976159]  ? __kthread_parkme+0x82/0x180
[   19.976190]  ? preempt_count_sub+0x50/0x80
[   19.976224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.976259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.976315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.976351]  kthread+0x337/0x6f0
[   19.976376]  ? trace_preempt_on+0x20/0xc0
[   19.976411]  ? __pfx_kthread+0x10/0x10
[   19.976437]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.976468]  ? calculate_sigpending+0x7b/0xa0
[   19.976499]  ? __pfx_kthread+0x10/0x10
[   19.976526]  ret_from_fork+0x41/0x80
[   19.976557]  ? __pfx_kthread+0x10/0x10
[   19.976582]  ret_from_fork_asm+0x1a/0x30
[   19.976626]  </TASK>
[   19.976642] 
[   19.993972] Allocated by task 214:
[   19.994530]  kasan_save_stack+0x45/0x70
[   19.994999]  kasan_save_track+0x18/0x40
[   19.995593]  kasan_save_alloc_info+0x3b/0x50
[   19.996162]  __kasan_kmalloc+0xb7/0xc0
[   19.996670]  __kmalloc_cache_noprof+0x189/0x420
[   19.997158]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.997744]  kunit_try_run_case+0x1a5/0x480
[   19.998275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.998673]  kthread+0x337/0x6f0
[   19.998951]  ret_from_fork+0x41/0x80
[   19.999440]  ret_from_fork_asm+0x1a/0x30
[   20.000050] 
[   20.000376] The buggy address belongs to the object at ffff888103096700
[   20.000376]  which belongs to the cache kmalloc-128 of size 128
[   20.001661] The buggy address is located 5 bytes to the right of
[   20.001661]  allocated 115-byte region [ffff888103096700, ffff888103096773)
[   20.002889] 
[   20.003102] The buggy address belongs to the physical page:
[   20.003747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096
[   20.004568] flags: 0x200000000000000(node=0|zone=2)
[   20.004926] page_type: f5(slab)
[   20.005265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.006125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.006896] page dumped because: kasan: bad access detected
[   20.007573] 
[   20.007856] Memory state around the buggy address:
[   20.008480]  ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.008917]  ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.009822] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.010604]                                                                 ^
[   20.011349]  ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.011793]  ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.012914] ==================================================================
[   19.926180] ==================================================================
[   19.927130] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   19.927963] Read of size 1 at addr ffff888103096773 by task kunit_try_catch/214
[   19.928586] 
[   19.928836] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   19.929011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.929052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.929128] Call Trace:
[   19.929171]  <TASK>
[   19.929218]  dump_stack_lvl+0x73/0xb0
[   19.929313]  print_report+0xd1/0x650
[   19.929391]  ? __virt_addr_valid+0x1db/0x2d0
[   19.929466]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.929537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.929607]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.929681]  kasan_report+0x141/0x180
[   19.929754]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.929840]  __asan_report_load1_noabort+0x18/0x20
[   19.929960]  ksize_unpoisons_memory+0x81c/0x9b0
[   19.930090]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   19.930168]  ? finish_task_switch.isra.0+0x153/0x700
[   19.930232]  ? __switch_to+0x5d9/0xf60
[   19.930268]  ? dequeue_task_fair+0x166/0x4e0
[   19.930332]  ? __schedule+0x10cc/0x2b60
[   19.930371]  ? __pfx_read_tsc+0x10/0x10
[   19.930403]  ? ktime_get_ts64+0x86/0x230
[   19.930443]  kunit_try_run_case+0x1a5/0x480
[   19.930483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.930518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.930555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.930591]  ? __kthread_parkme+0x82/0x180
[   19.930625]  ? preempt_count_sub+0x50/0x80
[   19.930660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.930695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.930730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.930763]  kthread+0x337/0x6f0
[   19.930788]  ? trace_preempt_on+0x20/0xc0
[   19.930824]  ? __pfx_kthread+0x10/0x10
[   19.930851]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.930882]  ? calculate_sigpending+0x7b/0xa0
[   19.930916]  ? __pfx_kthread+0x10/0x10
[   19.930943]  ret_from_fork+0x41/0x80
[   19.930975]  ? __pfx_kthread+0x10/0x10
[   19.931002]  ret_from_fork_asm+0x1a/0x30
[   19.931085]  </TASK>
[   19.931109] 
[   19.950042] Allocated by task 214:
[   19.951478]  kasan_save_stack+0x45/0x70
[   19.952102]  kasan_save_track+0x18/0x40
[   19.952535]  kasan_save_alloc_info+0x3b/0x50
[   19.953259]  __kasan_kmalloc+0xb7/0xc0
[   19.953864]  __kmalloc_cache_noprof+0x189/0x420
[   19.954447]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.954883]  kunit_try_run_case+0x1a5/0x480
[   19.955498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.956002]  kthread+0x337/0x6f0
[   19.956382]  ret_from_fork+0x41/0x80
[   19.956775]  ret_from_fork_asm+0x1a/0x30
[   19.957212] 
[   19.957570] The buggy address belongs to the object at ffff888103096700
[   19.957570]  which belongs to the cache kmalloc-128 of size 128
[   19.958653] The buggy address is located 0 bytes to the right of
[   19.958653]  allocated 115-byte region [ffff888103096700, ffff888103096773)
[   19.959597] 
[   19.959834] The buggy address belongs to the physical page:
[   19.960530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096
[   19.961068] flags: 0x200000000000000(node=0|zone=2)
[   19.961645] page_type: f5(slab)
[   19.962042] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.962749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.963454] page dumped because: kasan: bad access detected
[   19.963905] 
[   19.964109] Memory state around the buggy address:
[   19.964562]  ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.965178]  ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.965954] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.966535]                                                              ^
[   19.967142]  ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.967990]  ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.968601] ==================================================================
[   20.016856] ==================================================================
[   20.017653] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   20.019001] Read of size 1 at addr ffff88810309677f by task kunit_try_catch/214
[   20.019990] 
[   20.020233] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   20.020698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.020721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.020751] Call Trace:
[   20.020773]  <TASK>
[   20.020799]  dump_stack_lvl+0x73/0xb0
[   20.020847]  print_report+0xd1/0x650
[   20.020885]  ? __virt_addr_valid+0x1db/0x2d0
[   20.020919]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   20.020955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.020989]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   20.021026]  kasan_report+0x141/0x180
[   20.021087]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   20.021132]  __asan_report_load1_noabort+0x18/0x20
[   20.021164]  ksize_unpoisons_memory+0x7b6/0x9b0
[   20.021201]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   20.021236]  ? finish_task_switch.isra.0+0x153/0x700
[   20.021273]  ? __switch_to+0x5d9/0xf60
[   20.021333]  ? dequeue_task_fair+0x166/0x4e0
[   20.021368]  ? __schedule+0x10cc/0x2b60
[   20.021404]  ? __pfx_read_tsc+0x10/0x10
[   20.021436]  ? ktime_get_ts64+0x86/0x230
[   20.021473]  kunit_try_run_case+0x1a5/0x480
[   20.021512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.021546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.021583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.021618]  ? __kthread_parkme+0x82/0x180
[   20.021650]  ? preempt_count_sub+0x50/0x80
[   20.021686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.021721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.021754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.021788]  kthread+0x337/0x6f0
[   20.021813]  ? trace_preempt_on+0x20/0xc0
[   20.021849]  ? __pfx_kthread+0x10/0x10
[   20.021876]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.021909]  ? calculate_sigpending+0x7b/0xa0
[   20.021942]  ? __pfx_kthread+0x10/0x10
[   20.021969]  ret_from_fork+0x41/0x80
[   20.022001]  ? __pfx_kthread+0x10/0x10
[   20.022028]  ret_from_fork_asm+0x1a/0x30
[   20.022101]  </TASK>
[   20.022119] 
[   20.037150] Allocated by task 214:
[   20.037654]  kasan_save_stack+0x45/0x70
[   20.038205]  kasan_save_track+0x18/0x40
[   20.038645]  kasan_save_alloc_info+0x3b/0x50
[   20.039215]  __kasan_kmalloc+0xb7/0xc0
[   20.039651]  __kmalloc_cache_noprof+0x189/0x420
[   20.040249]  ksize_unpoisons_memory+0xc7/0x9b0
[   20.040757]  kunit_try_run_case+0x1a5/0x480
[   20.041135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.041715]  kthread+0x337/0x6f0
[   20.042134]  ret_from_fork+0x41/0x80
[   20.042576]  ret_from_fork_asm+0x1a/0x30
[   20.042957] 
[   20.043269] The buggy address belongs to the object at ffff888103096700
[   20.043269]  which belongs to the cache kmalloc-128 of size 128
[   20.044321] The buggy address is located 12 bytes to the right of
[   20.044321]  allocated 115-byte region [ffff888103096700, ffff888103096773)
[   20.045354] 
[   20.045614] The buggy address belongs to the physical page:
[   20.046154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096
[   20.046821] flags: 0x200000000000000(node=0|zone=2)
[   20.047428] page_type: f5(slab)
[   20.047784] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.048470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.049001] page dumped because: kasan: bad access detected
[   20.049483] 
[   20.049750] Memory state around the buggy address:
[   20.050315]  ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.050958]  ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.051660] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.052231]                                                                 ^
[   20.052854]  ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.053589]  ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.054197] ==================================================================