Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.821545] ==================================================================
[   15.821595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.821685] Read of size 1 at addr fff00000c781167f by task kunit_try_catch/197
[   15.821737] 
[   15.821766] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.821848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821913] Hardware name: linux,dummy-virt (DT)
[   15.821943] Call trace:
[   15.821978]  show_stack+0x20/0x38 (C)
[   15.822024]  dump_stack_lvl+0x8c/0xd0
[   15.822075]  print_report+0x118/0x608
[   15.822119]  kasan_report+0xdc/0x128
[   15.822164]  __asan_report_load1_noabort+0x20/0x30
[   15.822212]  ksize_unpoisons_memory+0x690/0x740
[   15.822265]  kunit_try_run_case+0x170/0x3f0
[   15.822322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.822385]  kthread+0x328/0x630
[   15.822441]  ret_from_fork+0x10/0x20
[   15.822486] 
[   15.822512] Allocated by task 197:
[   15.822541]  kasan_save_stack+0x3c/0x68
[   15.822577]  kasan_save_track+0x20/0x40
[   15.822621]  kasan_save_alloc_info+0x40/0x58
[   15.822666]  __kasan_kmalloc+0xd4/0xd8
[   15.822710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.822747]  ksize_unpoisons_memory+0xc0/0x740
[   15.822786]  kunit_try_run_case+0x170/0x3f0
[   15.822824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.822867]  kthread+0x328/0x630
[   15.822900]  ret_from_fork+0x10/0x20
[   15.822933] 
[   15.823387] The buggy address belongs to the object at fff00000c7811600
[   15.823387]  which belongs to the cache kmalloc-128 of size 128
[   15.823763] The buggy address is located 12 bytes to the right of
[   15.823763]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.823879] 
[   15.824037] The buggy address belongs to the physical page:
[   15.824357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.824445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.824700] page_type: f5(slab)
[   15.824808] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.824942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.825057] page dumped because: kasan: bad access detected
[   15.825125] 
[   15.825144] Memory state around the buggy address:
[   15.825428]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.825673]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.825767] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.825920]                                                                 ^
[   15.826006]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826341]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826497] ==================================================================
[   15.803291] ==================================================================
[   15.803354] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.803534] Read of size 1 at addr fff00000c7811673 by task kunit_try_catch/197
[   15.803585] 
[   15.803663] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.803784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.803989] Hardware name: linux,dummy-virt (DT)
[   15.804137] Call trace:
[   15.804250]  show_stack+0x20/0x38 (C)
[   15.804321]  dump_stack_lvl+0x8c/0xd0
[   15.804440]  print_report+0x118/0x608
[   15.804535]  kasan_report+0xdc/0x128
[   15.804582]  __asan_report_load1_noabort+0x20/0x30
[   15.804836]  ksize_unpoisons_memory+0x628/0x740
[   15.804908]  kunit_try_run_case+0x170/0x3f0
[   15.804968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.805022]  kthread+0x328/0x630
[   15.805217]  ret_from_fork+0x10/0x20
[   15.805280] 
[   15.805297] Allocated by task 197:
[   15.805355]  kasan_save_stack+0x3c/0x68
[   15.805732]  kasan_save_track+0x20/0x40
[   15.805896]  kasan_save_alloc_info+0x40/0x58
[   15.805940]  __kasan_kmalloc+0xd4/0xd8
[   15.806006]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.806140]  ksize_unpoisons_memory+0xc0/0x740
[   15.806271]  kunit_try_run_case+0x170/0x3f0
[   15.806482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.806752]  kthread+0x328/0x630
[   15.806814]  ret_from_fork+0x10/0x20
[   15.807549] 
[   15.807620] The buggy address belongs to the object at fff00000c7811600
[   15.807620]  which belongs to the cache kmalloc-128 of size 128
[   15.807726] The buggy address is located 0 bytes to the right of
[   15.807726]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.807866] 
[   15.807887] The buggy address belongs to the physical page:
[   15.808133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.808254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.808514] page_type: f5(slab)
[   15.808564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.808729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.809447] page dumped because: kasan: bad access detected
[   15.809534] 
[   15.809636] Memory state around the buggy address:
[   15.809734]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.810059]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810351] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.810591]                                                              ^
[   15.810667]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810722]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810759] ==================================================================
[   15.812357] ==================================================================
[   15.812657] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.812726] Read of size 1 at addr fff00000c7811678 by task kunit_try_catch/197
[   15.812934] 
[   15.813098] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.813191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.813415] Hardware name: linux,dummy-virt (DT)
[   15.813616] Call trace:
[   15.813652]  show_stack+0x20/0x38 (C)
[   15.813728]  dump_stack_lvl+0x8c/0xd0
[   15.813778]  print_report+0x118/0x608
[   15.813822]  kasan_report+0xdc/0x128
[   15.813864]  __asan_report_load1_noabort+0x20/0x30
[   15.813913]  ksize_unpoisons_memory+0x618/0x740
[   15.813987]  kunit_try_run_case+0x170/0x3f0
[   15.814035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.814088]  kthread+0x328/0x630
[   15.814132]  ret_from_fork+0x10/0x20
[   15.814384] 
[   15.814583] Allocated by task 197:
[   15.815267]  kasan_save_stack+0x3c/0x68
[   15.815448]  kasan_save_track+0x20/0x40
[   15.815487]  kasan_save_alloc_info+0x40/0x58
[   15.815559]  __kasan_kmalloc+0xd4/0xd8
[   15.815983]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.816083]  ksize_unpoisons_memory+0xc0/0x740
[   15.816185]  kunit_try_run_case+0x170/0x3f0
[   15.816471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.816641]  kthread+0x328/0x630
[   15.816970]  ret_from_fork+0x10/0x20
[   15.817108] 
[   15.817198] The buggy address belongs to the object at fff00000c7811600
[   15.817198]  which belongs to the cache kmalloc-128 of size 128
[   15.817328] The buggy address is located 5 bytes to the right of
[   15.817328]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.817682] 
[   15.817821] The buggy address belongs to the physical page:
[   15.818049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.818298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.818677] page_type: f5(slab)
[   15.818879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.819204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.819279] page dumped because: kasan: bad access detected
[   15.819422] 
[   15.819442] Memory state around the buggy address:
[   15.819661]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.819756]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820092] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.820177]                                                                 ^
[   15.820325]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820416]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820573] ==================================================================

[   11.621249] ==================================================================
[   11.621871] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.622198] Read of size 1 at addr ffff888103138f7f by task kunit_try_catch/213
[   11.622632] 
[   11.622744] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   11.622788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.622799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.622818] Call Trace:
[   11.622830]  <TASK>
[   11.622844]  dump_stack_lvl+0x73/0xb0
[   11.622869]  print_report+0xd1/0x650
[   11.622891]  ? __virt_addr_valid+0x1db/0x2d0
[   11.622912]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.622931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.622953]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.622973]  kasan_report+0x141/0x180
[   11.622995]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.623020]  __asan_report_load1_noabort+0x18/0x20
[   11.623040]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.623060]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.623079]  ? finish_task_switch.isra.0+0x153/0x700
[   11.623102]  ? __switch_to+0x5d9/0xf60
[   11.623122]  ? dequeue_task_fair+0x166/0x4e0
[   11.623146]  ? __schedule+0x10cc/0x2b60
[   11.623168]  ? __pfx_read_tsc+0x10/0x10
[   11.623187]  ? ktime_get_ts64+0x86/0x230
[   11.623212]  kunit_try_run_case+0x1a5/0x480
[   11.623249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.623271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.623294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.623317]  ? __kthread_parkme+0x82/0x180
[   11.623338]  ? preempt_count_sub+0x50/0x80
[   11.623362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.623385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.623408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.623431]  kthread+0x337/0x6f0
[   11.623448]  ? trace_preempt_on+0x20/0xc0
[   11.623470]  ? __pfx_kthread+0x10/0x10
[   11.623488]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.623509]  ? calculate_sigpending+0x7b/0xa0
[   11.623530]  ? __pfx_kthread+0x10/0x10
[   11.623548]  ret_from_fork+0x41/0x80
[   11.623568]  ? __pfx_kthread+0x10/0x10
[   11.623586]  ret_from_fork_asm+0x1a/0x30
[   11.623615]  </TASK>
[   11.623624] 
[   11.631705] Allocated by task 213:
[   11.631905]  kasan_save_stack+0x45/0x70
[   11.632057]  kasan_save_track+0x18/0x40
[   11.632190]  kasan_save_alloc_info+0x3b/0x50
[   11.632347]  __kasan_kmalloc+0xb7/0xc0
[   11.632479]  __kmalloc_cache_noprof+0x189/0x420
[   11.632628]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.632909]  kunit_try_run_case+0x1a5/0x480
[   11.633114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.633521]  kthread+0x337/0x6f0
[   11.633742]  ret_from_fork+0x41/0x80
[   11.633927]  ret_from_fork_asm+0x1a/0x30
[   11.634125] 
[   11.634222] The buggy address belongs to the object at ffff888103138f00
[   11.634222]  which belongs to the cache kmalloc-128 of size 128
[   11.634753] The buggy address is located 12 bytes to the right of
[   11.634753]  allocated 115-byte region [ffff888103138f00, ffff888103138f73)
[   11.635392] 
[   11.635488] The buggy address belongs to the physical page:
[   11.635742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103138
[   11.636045] flags: 0x200000000000000(node=0|zone=2)
[   11.636228] page_type: f5(slab)
[   11.636594] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.636927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.637159] page dumped because: kasan: bad access detected
[   11.637345] 
[   11.637416] Memory state around the buggy address:
[   11.637577]  ffff888103138e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.638153]  ffff888103138e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.638486] >ffff888103138f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.638804]                                                                 ^
[   11.639118]  ffff888103138f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.639569]  ffff888103139000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.639920] ==================================================================
[   11.582724] ==================================================================
[   11.583193] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.583608] Read of size 1 at addr ffff888103138f73 by task kunit_try_catch/213
[   11.583917] 
[   11.584039] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   11.584084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.584095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.584117] Call Trace:
[   11.584128]  <TASK>
[   11.584143]  dump_stack_lvl+0x73/0xb0
[   11.584167]  print_report+0xd1/0x650
[   11.584190]  ? __virt_addr_valid+0x1db/0x2d0
[   11.584211]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.584230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.584265]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.584285]  kasan_report+0x141/0x180
[   11.584308]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.584377]  __asan_report_load1_noabort+0x18/0x20
[   11.584402]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.584423]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.584443]  ? finish_task_switch.isra.0+0x153/0x700
[   11.584466]  ? __switch_to+0x5d9/0xf60
[   11.584488]  ? dequeue_task_fair+0x166/0x4e0
[   11.584512]  ? __schedule+0x10cc/0x2b60
[   11.584535]  ? __pfx_read_tsc+0x10/0x10
[   11.584554]  ? ktime_get_ts64+0x86/0x230
[   11.584578]  kunit_try_run_case+0x1a5/0x480
[   11.584601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.584623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.584646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.584682]  ? __kthread_parkme+0x82/0x180
[   11.584704]  ? preempt_count_sub+0x50/0x80
[   11.584728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.584751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.584774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.584796]  kthread+0x337/0x6f0
[   11.584813]  ? trace_preempt_on+0x20/0xc0
[   11.584836]  ? __pfx_kthread+0x10/0x10
[   11.584854]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.584875]  ? calculate_sigpending+0x7b/0xa0
[   11.584897]  ? __pfx_kthread+0x10/0x10
[   11.584915]  ret_from_fork+0x41/0x80
[   11.584935]  ? __pfx_kthread+0x10/0x10
[   11.584952]  ret_from_fork_asm+0x1a/0x30
[   11.584982]  </TASK>
[   11.584992] 
[   11.592645] Allocated by task 213:
[   11.592834]  kasan_save_stack+0x45/0x70
[   11.593032]  kasan_save_track+0x18/0x40
[   11.593196]  kasan_save_alloc_info+0x3b/0x50
[   11.593495]  __kasan_kmalloc+0xb7/0xc0
[   11.593680]  __kmalloc_cache_noprof+0x189/0x420
[   11.593869]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.594079]  kunit_try_run_case+0x1a5/0x480
[   11.594273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.594511]  kthread+0x337/0x6f0
[   11.594678]  ret_from_fork+0x41/0x80
[   11.594831]  ret_from_fork_asm+0x1a/0x30
[   11.595010] 
[   11.595101] The buggy address belongs to the object at ffff888103138f00
[   11.595101]  which belongs to the cache kmalloc-128 of size 128
[   11.595564] The buggy address is located 0 bytes to the right of
[   11.595564]  allocated 115-byte region [ffff888103138f00, ffff888103138f73)
[   11.596250] 
[   11.596457] The buggy address belongs to the physical page:
[   11.596710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103138
[   11.596951] flags: 0x200000000000000(node=0|zone=2)
[   11.597114] page_type: f5(slab)
[   11.597245] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.597635] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.598217] page dumped because: kasan: bad access detected
[   11.598510] 
[   11.598581] Memory state around the buggy address:
[   11.598735]  ffff888103138e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.598946]  ffff888103138e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.599157] >ffff888103138f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.599784]                                                              ^
[   11.600102]  ffff888103138f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.600441]  ffff888103139000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.600809] ==================================================================
[   11.601471] ==================================================================
[   11.601829] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.602164] Read of size 1 at addr ffff888103138f78 by task kunit_try_catch/213
[   11.602548] 
[   11.602659] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   11.602700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.602711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.602730] Call Trace:
[   11.602743]  <TASK>
[   11.602757]  dump_stack_lvl+0x73/0xb0
[   11.602780]  print_report+0xd1/0x650
[   11.602801]  ? __virt_addr_valid+0x1db/0x2d0
[   11.602822]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.602841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.602863]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.602883]  kasan_report+0x141/0x180
[   11.602906]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.602930]  __asan_report_load1_noabort+0x18/0x20
[   11.602951]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.602971]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.602991]  ? finish_task_switch.isra.0+0x153/0x700
[   11.603013]  ? __switch_to+0x5d9/0xf60
[   11.603033]  ? dequeue_task_fair+0x166/0x4e0
[   11.603056]  ? __schedule+0x10cc/0x2b60
[   11.603079]  ? __pfx_read_tsc+0x10/0x10
[   11.603098]  ? ktime_get_ts64+0x86/0x230
[   11.603122]  kunit_try_run_case+0x1a5/0x480
[   11.603146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.603167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.603231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.603265]  ? __kthread_parkme+0x82/0x180
[   11.603286]  ? preempt_count_sub+0x50/0x80
[   11.603311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.603334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.603356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.603379]  kthread+0x337/0x6f0
[   11.603396]  ? trace_preempt_on+0x20/0xc0
[   11.603418]  ? __pfx_kthread+0x10/0x10
[   11.603436]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.603457]  ? calculate_sigpending+0x7b/0xa0
[   11.603479]  ? __pfx_kthread+0x10/0x10
[   11.603720]  ret_from_fork+0x41/0x80
[   11.603752]  ? __pfx_kthread+0x10/0x10
[   11.603770]  ret_from_fork_asm+0x1a/0x30
[   11.603800]  </TASK>
[   11.603810] 
[   11.611922] Allocated by task 213:
[   11.612113]  kasan_save_stack+0x45/0x70
[   11.612508]  kasan_save_track+0x18/0x40
[   11.612769]  kasan_save_alloc_info+0x3b/0x50
[   11.612980]  __kasan_kmalloc+0xb7/0xc0
[   11.613145]  __kmalloc_cache_noprof+0x189/0x420
[   11.613449]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.613614]  kunit_try_run_case+0x1a5/0x480
[   11.613804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.614058]  kthread+0x337/0x6f0
[   11.614218]  ret_from_fork+0x41/0x80
[   11.614438]  ret_from_fork_asm+0x1a/0x30
[   11.614688] 
[   11.614785] The buggy address belongs to the object at ffff888103138f00
[   11.614785]  which belongs to the cache kmalloc-128 of size 128
[   11.615257] The buggy address is located 5 bytes to the right of
[   11.615257]  allocated 115-byte region [ffff888103138f00, ffff888103138f73)
[   11.615748] 
[   11.615847] The buggy address belongs to the physical page:
[   11.616071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103138
[   11.616472] flags: 0x200000000000000(node=0|zone=2)
[   11.616640] page_type: f5(slab)
[   11.616790] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.617155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.617487] page dumped because: kasan: bad access detected
[   11.617742] 
[   11.617812] Memory state around the buggy address:
[   11.617967]  ffff888103138e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.618186]  ffff888103138e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.618901] >ffff888103138f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.619231]                                                                 ^
[   11.619903]  ffff888103138f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.620123]  ffff888103139000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.620687] ==================================================================