Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   24.273629] ==================================================================
[   24.273728] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   24.274491] Read of size 1 at addr fff00000c59ef478 by task kunit_try_catch/196
[   24.275224] 
[   24.276087] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   24.276971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.277057] Hardware name: linux,dummy-virt (DT)
[   24.277450] Call trace:
[   24.277688]  show_stack+0x20/0x38 (C)
[   24.278100]  dump_stack_lvl+0x8c/0xd0
[   24.278560]  print_report+0x118/0x608
[   24.278699]  kasan_report+0xdc/0x128
[   24.279233]  __asan_report_load1_noabort+0x20/0x30
[   24.279819]  ksize_unpoisons_memory+0x618/0x740
[   24.280235]  kunit_try_run_case+0x170/0x3f0
[   24.280650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.280936]  kthread+0x328/0x630
[   24.281058]  ret_from_fork+0x10/0x20
[   24.281190] 
[   24.281240] Allocated by task 196:
[   24.281308]  kasan_save_stack+0x3c/0x68
[   24.281863]  kasan_save_track+0x20/0x40
[   24.282707]  kasan_save_alloc_info+0x40/0x58
[   24.283273]  __kasan_kmalloc+0xd4/0xd8
[   24.283919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.284236]  ksize_unpoisons_memory+0xc0/0x740
[   24.284344]  kunit_try_run_case+0x170/0x3f0
[   24.285171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.285572]  kthread+0x328/0x630
[   24.285668]  ret_from_fork+0x10/0x20
[   24.286289] 
[   24.286341] The buggy address belongs to the object at fff00000c59ef400
[   24.286341]  which belongs to the cache kmalloc-128 of size 128
[   24.286581] The buggy address is located 5 bytes to the right of
[   24.286581]  allocated 115-byte region [fff00000c59ef400, fff00000c59ef473)
[   24.287287] 
[   24.287343] The buggy address belongs to the physical page:
[   24.287704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef
[   24.287989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.288164] page_type: f5(slab)
[   24.290181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.291090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.291239] page dumped because: kasan: bad access detected
[   24.291332] 
[   24.291398] Memory state around the buggy address:
[   24.291883]  fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.291999]  fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.292306] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.292443]                                                                 ^
[   24.292621]  fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.292866]  fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.293153] ==================================================================
[   24.258822] ==================================================================
[   24.258893] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   24.258966] Read of size 1 at addr fff00000c59ef473 by task kunit_try_catch/196
[   24.259027] 
[   24.259067] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   24.259166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.259198] Hardware name: linux,dummy-virt (DT)
[   24.259238] Call trace:
[   24.259265]  show_stack+0x20/0x38 (C)
[   24.259327]  dump_stack_lvl+0x8c/0xd0
[   24.259658]  print_report+0x118/0x608
[   24.259960]  kasan_report+0xdc/0x128
[   24.260082]  __asan_report_load1_noabort+0x20/0x30
[   24.260296]  ksize_unpoisons_memory+0x628/0x740
[   24.260768]  kunit_try_run_case+0x170/0x3f0
[   24.260913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.261151]  kthread+0x328/0x630
[   24.261412]  ret_from_fork+0x10/0x20
[   24.261547] 
[   24.262054] Allocated by task 196:
[   24.262136]  kasan_save_stack+0x3c/0x68
[   24.262348]  kasan_save_track+0x20/0x40
[   24.262483]  kasan_save_alloc_info+0x40/0x58
[   24.262849]  __kasan_kmalloc+0xd4/0xd8
[   24.263489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.263763]  ksize_unpoisons_memory+0xc0/0x740
[   24.263932]  kunit_try_run_case+0x170/0x3f0
[   24.264248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.264515]  kthread+0x328/0x630
[   24.265013]  ret_from_fork+0x10/0x20
[   24.265114] 
[   24.265165] The buggy address belongs to the object at fff00000c59ef400
[   24.265165]  which belongs to the cache kmalloc-128 of size 128
[   24.265527] The buggy address is located 0 bytes to the right of
[   24.265527]  allocated 115-byte region [fff00000c59ef400, fff00000c59ef473)
[   24.266859] 
[   24.266927] The buggy address belongs to the physical page:
[   24.267186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef
[   24.267415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.267998] page_type: f5(slab)
[   24.268426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.268873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.269361] page dumped because: kasan: bad access detected
[   24.269487] 
[   24.269553] Memory state around the buggy address:
[   24.269922]  fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.270373]  fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.270725] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.270885]                                                              ^
[   24.271281]  fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.271831]  fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.272239] ==================================================================
[   24.296409] ==================================================================
[   24.296573] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   24.296773] Read of size 1 at addr fff00000c59ef47f by task kunit_try_catch/196
[   24.296910] 
[   24.297012] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   24.297827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.297927] Hardware name: linux,dummy-virt (DT)
[   24.298007] Call trace:
[   24.298064]  show_stack+0x20/0x38 (C)
[   24.298192]  dump_stack_lvl+0x8c/0xd0
[   24.298323]  print_report+0x118/0x608
[   24.298460]  kasan_report+0xdc/0x128
[   24.299189]  __asan_report_load1_noabort+0x20/0x30
[   24.299918]  ksize_unpoisons_memory+0x690/0x740
[   24.300191]  kunit_try_run_case+0x170/0x3f0
[   24.300794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.301049]  kthread+0x328/0x630
[   24.301536]  ret_from_fork+0x10/0x20
[   24.302437] 
[   24.302566] Allocated by task 196:
[   24.302735]  kasan_save_stack+0x3c/0x68
[   24.303325]  kasan_save_track+0x20/0x40
[   24.303616]  kasan_save_alloc_info+0x40/0x58
[   24.304270]  __kasan_kmalloc+0xd4/0xd8
[   24.304530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.304644]  ksize_unpoisons_memory+0xc0/0x740
[   24.304751]  kunit_try_run_case+0x170/0x3f0
[   24.304846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.304955]  kthread+0x328/0x630
[   24.305039]  ret_from_fork+0x10/0x20
[   24.305131] 
[   24.305226] The buggy address belongs to the object at fff00000c59ef400
[   24.305226]  which belongs to the cache kmalloc-128 of size 128
[   24.305608] The buggy address is located 12 bytes to the right of
[   24.305608]  allocated 115-byte region [fff00000c59ef400, fff00000c59ef473)
[   24.305911] 
[   24.306053] The buggy address belongs to the physical page:
[   24.306101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef
[   24.306171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.306312] page_type: f5(slab)
[   24.306441] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.306732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.306860] page dumped because: kasan: bad access detected
[   24.307391] 
[   24.307487] Memory state around the buggy address:
[   24.307843]  fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.308122]  fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.308235] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.308330]                                                                 ^
[   24.308708]  fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.309000]  fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.309673] ==================================================================

[   12.191990] ==================================================================
[   12.192789] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.193313] Read of size 1 at addr ffff888102d97673 by task kunit_try_catch/214
[   12.193973] 
[   12.194141] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   12.194200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.194212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.194236] Call Trace:
[   12.194252]  <TASK>
[   12.194274]  dump_stack_lvl+0x73/0xb0
[   12.194311]  print_report+0xd1/0x650
[   12.194335]  ? __virt_addr_valid+0x1db/0x2d0
[   12.194358]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.194377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.194398]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.194417]  kasan_report+0x141/0x180
[   12.194438]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.194460]  __asan_report_load1_noabort+0x18/0x20
[   12.194479]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.194498]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.194516]  ? finish_task_switch.isra.0+0x153/0x700
[   12.194542]  ? __switch_to+0x5d9/0xf60
[   12.194572]  ? dequeue_task_fair+0x166/0x4e0
[   12.194606]  ? __schedule+0x10cc/0x2b60
[   12.194657]  ? __pfx_read_tsc+0x10/0x10
[   12.194691]  ? ktime_get_ts64+0x86/0x230
[   12.194733]  kunit_try_run_case+0x1a5/0x480
[   12.194776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.194812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.194857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.194900]  ? __kthread_parkme+0x82/0x180
[   12.194942]  ? preempt_count_sub+0x50/0x80
[   12.194989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.195026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.195058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.195088]  kthread+0x337/0x6f0
[   12.195113]  ? trace_preempt_on+0x20/0xc0
[   12.195150]  ? __pfx_kthread+0x10/0x10
[   12.195255]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.195305]  ? calculate_sigpending+0x7b/0xa0
[   12.195346]  ? __pfx_kthread+0x10/0x10
[   12.195382]  ret_from_fork+0x41/0x80
[   12.195422]  ? __pfx_kthread+0x10/0x10
[   12.195457]  ret_from_fork_asm+0x1a/0x30
[   12.195519]  </TASK>
[   12.195543] 
[   12.208688] Allocated by task 214:
[   12.209034]  kasan_save_stack+0x45/0x70
[   12.209765]  kasan_save_track+0x18/0x40
[   12.209966]  kasan_save_alloc_info+0x3b/0x50
[   12.210121]  __kasan_kmalloc+0xb7/0xc0
[   12.210363]  __kmalloc_cache_noprof+0x189/0x420
[   12.210701]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.211655]  kunit_try_run_case+0x1a5/0x480
[   12.211878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.212045]  kthread+0x337/0x6f0
[   12.212281]  ret_from_fork+0x41/0x80
[   12.213105]  ret_from_fork_asm+0x1a/0x30
[   12.213411] 
[   12.213520] The buggy address belongs to the object at ffff888102d97600
[   12.213520]  which belongs to the cache kmalloc-128 of size 128
[   12.214054] The buggy address is located 0 bytes to the right of
[   12.214054]  allocated 115-byte region [ffff888102d97600, ffff888102d97673)
[   12.215375] 
[   12.215492] The buggy address belongs to the physical page:
[   12.215714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97
[   12.216516] flags: 0x200000000000000(node=0|zone=2)
[   12.216734] page_type: f5(slab)
[   12.217185] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.217802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.218271] page dumped because: kasan: bad access detected
[   12.218799] 
[   12.218916] Memory state around the buggy address:
[   12.219348]  ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.219912]  ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.220493] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.220892]                                                              ^
[   12.221578]  ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.221971]  ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.222438] ==================================================================
[   12.223919] ==================================================================
[   12.224308] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.224871] Read of size 1 at addr ffff888102d97678 by task kunit_try_catch/214
[   12.225091] 
[   12.225232] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   12.225353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.225378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.225418] Call Trace:
[   12.225446]  <TASK>
[   12.225476]  dump_stack_lvl+0x73/0xb0
[   12.225521]  print_report+0xd1/0x650
[   12.225580]  ? __virt_addr_valid+0x1db/0x2d0
[   12.225621]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.225669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.225724]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.225753]  kasan_report+0x141/0x180
[   12.225783]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.225815]  __asan_report_load1_noabort+0x18/0x20
[   12.225842]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.225868]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.225893]  ? finish_task_switch.isra.0+0x153/0x700
[   12.225925]  ? __switch_to+0x5d9/0xf60
[   12.225964]  ? dequeue_task_fair+0x166/0x4e0
[   12.226000]  ? __schedule+0x10cc/0x2b60
[   12.226035]  ? __pfx_read_tsc+0x10/0x10
[   12.226064]  ? ktime_get_ts64+0x86/0x230
[   12.226101]  kunit_try_run_case+0x1a5/0x480
[   12.226138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.226169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.226204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.226237]  ? __kthread_parkme+0x82/0x180
[   12.226270]  ? preempt_count_sub+0x50/0x80
[   12.226327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.226370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.226407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.226470]  kthread+0x337/0x6f0
[   12.226516]  ? trace_preempt_on+0x20/0xc0
[   12.226584]  ? __pfx_kthread+0x10/0x10
[   12.226616]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.226684]  ? calculate_sigpending+0x7b/0xa0
[   12.226732]  ? __pfx_kthread+0x10/0x10
[   12.226777]  ret_from_fork+0x41/0x80
[   12.226826]  ? __pfx_kthread+0x10/0x10
[   12.226868]  ret_from_fork_asm+0x1a/0x30
[   12.226918]  </TASK>
[   12.226941] 
[   12.239972] Allocated by task 214:
[   12.240267]  kasan_save_stack+0x45/0x70
[   12.240702]  kasan_save_track+0x18/0x40
[   12.240882]  kasan_save_alloc_info+0x3b/0x50
[   12.241152]  __kasan_kmalloc+0xb7/0xc0
[   12.241835]  __kmalloc_cache_noprof+0x189/0x420
[   12.242176]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.242377]  kunit_try_run_case+0x1a5/0x480
[   12.243059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.243514]  kthread+0x337/0x6f0
[   12.244649]  ret_from_fork+0x41/0x80
[   12.244808]  ret_from_fork_asm+0x1a/0x30
[   12.245043] 
[   12.245192] The buggy address belongs to the object at ffff888102d97600
[   12.245192]  which belongs to the cache kmalloc-128 of size 128
[   12.246155] The buggy address is located 5 bytes to the right of
[   12.246155]  allocated 115-byte region [ffff888102d97600, ffff888102d97673)
[   12.246987] 
[   12.247154] The buggy address belongs to the physical page:
[   12.247585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97
[   12.248012] flags: 0x200000000000000(node=0|zone=2)
[   12.248410] page_type: f5(slab)
[   12.249251] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.249653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.250434] page dumped because: kasan: bad access detected
[   12.250802] 
[   12.250981] Memory state around the buggy address:
[   12.251209]  ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.251886]  ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.252279] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.252803]                                                                 ^
[   12.253139]  ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.254198]  ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.255091] ==================================================================
[   12.256282] ==================================================================
[   12.257074] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.257794] Read of size 1 at addr ffff888102d9767f by task kunit_try_catch/214
[   12.258239] 
[   12.258469] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   12.258563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.258587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.258639] Call Trace:
[   12.258679]  <TASK>
[   12.258710]  dump_stack_lvl+0x73/0xb0
[   12.258754]  print_report+0xd1/0x650
[   12.258780]  ? __virt_addr_valid+0x1db/0x2d0
[   12.258812]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.258836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.258857]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.258876]  kasan_report+0x141/0x180
[   12.258897]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.258919]  __asan_report_load1_noabort+0x18/0x20
[   12.258938]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.258957]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.258975]  ? finish_task_switch.isra.0+0x153/0x700
[   12.258998]  ? __switch_to+0x5d9/0xf60
[   12.259017]  ? dequeue_task_fair+0x166/0x4e0
[   12.259040]  ? __schedule+0x10cc/0x2b60
[   12.259063]  ? __pfx_read_tsc+0x10/0x10
[   12.259082]  ? ktime_get_ts64+0x86/0x230
[   12.259105]  kunit_try_run_case+0x1a5/0x480
[   12.259129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.259149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.259172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.259193]  ? __kthread_parkme+0x82/0x180
[   12.259214]  ? preempt_count_sub+0x50/0x80
[   12.259236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.259258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.259279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.259300]  kthread+0x337/0x6f0
[   12.259316]  ? trace_preempt_on+0x20/0xc0
[   12.259339]  ? __pfx_kthread+0x10/0x10
[   12.259355]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.259375]  ? calculate_sigpending+0x7b/0xa0
[   12.259395]  ? __pfx_kthread+0x10/0x10
[   12.259412]  ret_from_fork+0x41/0x80
[   12.259431]  ? __pfx_kthread+0x10/0x10
[   12.259448]  ret_from_fork_asm+0x1a/0x30
[   12.259477]  </TASK>
[   12.259489] 
[   12.271827] Allocated by task 214:
[   12.272134]  kasan_save_stack+0x45/0x70
[   12.272599]  kasan_save_track+0x18/0x40
[   12.272792]  kasan_save_alloc_info+0x3b/0x50
[   12.273060]  __kasan_kmalloc+0xb7/0xc0
[   12.273875]  __kmalloc_cache_noprof+0x189/0x420
[   12.274168]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.274586]  kunit_try_run_case+0x1a5/0x480
[   12.274934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.275402]  kthread+0x337/0x6f0
[   12.275613]  ret_from_fork+0x41/0x80
[   12.275910]  ret_from_fork_asm+0x1a/0x30
[   12.276141] 
[   12.276289] The buggy address belongs to the object at ffff888102d97600
[   12.276289]  which belongs to the cache kmalloc-128 of size 128
[   12.276970] The buggy address is located 12 bytes to the right of
[   12.276970]  allocated 115-byte region [ffff888102d97600, ffff888102d97673)
[   12.277564] 
[   12.277817] The buggy address belongs to the physical page:
[   12.278394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97
[   12.278699] flags: 0x200000000000000(node=0|zone=2)
[   12.278913] page_type: f5(slab)
[   12.279497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.280534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.280905] page dumped because: kasan: bad access detected
[   12.281182] 
[   12.281370] Memory state around the buggy address:
[   12.281866]  ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.282140]  ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.282666] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.282892]                                                                 ^
[   12.283908]  ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.284225]  ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.284611] ==================================================================