Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.244146] ==================================================================
[   17.244405] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.244491] Read of size 1 at addr fff00000c5733b7f by task kunit_try_catch/195
[   17.244544] 
[   17.244652] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.244766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.244879] Hardware name: linux,dummy-virt (DT)
[   17.244926] Call trace:
[   17.244967]  show_stack+0x20/0x38 (C)
[   17.245033]  dump_stack_lvl+0x8c/0xd0
[   17.245089]  print_report+0x118/0x608
[   17.245136]  kasan_report+0xdc/0x128
[   17.245180]  __asan_report_load1_noabort+0x20/0x30
[   17.245614]  ksize_unpoisons_memory+0x690/0x740
[   17.245718]  kunit_try_run_case+0x170/0x3f0
[   17.245790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.245986]  kthread+0x328/0x630
[   17.246203]  ret_from_fork+0x10/0x20
[   17.246415] 
[   17.246463] Allocated by task 195:
[   17.246552]  kasan_save_stack+0x3c/0x68
[   17.246674]  kasan_save_track+0x20/0x40
[   17.246750]  kasan_save_alloc_info+0x40/0x58
[   17.246904]  __kasan_kmalloc+0xd4/0xd8
[   17.247093]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.247169]  ksize_unpoisons_memory+0xc0/0x740
[   17.247209]  kunit_try_run_case+0x170/0x3f0
[   17.247584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.248155]  kthread+0x328/0x630
[   17.248419]  ret_from_fork+0x10/0x20
[   17.248500] 
[   17.248537] The buggy address belongs to the object at fff00000c5733b00
[   17.248537]  which belongs to the cache kmalloc-128 of size 128
[   17.248727] The buggy address is located 12 bytes to the right of
[   17.248727]  allocated 115-byte region [fff00000c5733b00, fff00000c5733b73)
[   17.248811] 
[   17.248839] The buggy address belongs to the physical page:
[   17.248891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.248950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.249002] page_type: f5(slab)
[   17.249040] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.249102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.249153] page dumped because: kasan: bad access detected
[   17.249185] 
[   17.249210] Memory state around the buggy address:
[   17.249251]  fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.249304]  fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.249710] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.249945]                                                                 ^
[   17.250162]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.250218]  fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.250335] ==================================================================
[   17.229912] ==================================================================
[   17.229995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.230082] Read of size 1 at addr fff00000c5733b73 by task kunit_try_catch/195
[   17.230134] 
[   17.230217] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.230304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.230330] Hardware name: linux,dummy-virt (DT)
[   17.230501] Call trace:
[   17.230525]  show_stack+0x20/0x38 (C)
[   17.230676]  dump_stack_lvl+0x8c/0xd0
[   17.230841]  print_report+0x118/0x608
[   17.231000]  kasan_report+0xdc/0x128
[   17.231087]  __asan_report_load1_noabort+0x20/0x30
[   17.231224]  ksize_unpoisons_memory+0x628/0x740
[   17.231300]  kunit_try_run_case+0x170/0x3f0
[   17.231447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.231536]  kthread+0x328/0x630
[   17.231593]  ret_from_fork+0x10/0x20
[   17.231797] 
[   17.231960] Allocated by task 195:
[   17.232025]  kasan_save_stack+0x3c/0x68
[   17.232190]  kasan_save_track+0x20/0x40
[   17.232281]  kasan_save_alloc_info+0x40/0x58
[   17.232431]  __kasan_kmalloc+0xd4/0xd8
[   17.232501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.232550]  ksize_unpoisons_memory+0xc0/0x740
[   17.232926]  kunit_try_run_case+0x170/0x3f0
[   17.233218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.233345]  kthread+0x328/0x630
[   17.233507]  ret_from_fork+0x10/0x20
[   17.233579] 
[   17.233648] The buggy address belongs to the object at fff00000c5733b00
[   17.233648]  which belongs to the cache kmalloc-128 of size 128
[   17.233757] The buggy address is located 0 bytes to the right of
[   17.233757]  allocated 115-byte region [fff00000c5733b00, fff00000c5733b73)
[   17.233911] 
[   17.233970] The buggy address belongs to the physical page:
[   17.234157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.234224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.234277] page_type: f5(slab)
[   17.234447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.234611] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.234699] page dumped because: kasan: bad access detected
[   17.234826] 
[   17.234888] Memory state around the buggy address:
[   17.234947]  fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.235067]  fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235121] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.235184]                                                              ^
[   17.235227]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235548]  fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235673] ==================================================================
[   17.236862] ==================================================================
[   17.236949] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.237004] Read of size 1 at addr fff00000c5733b78 by task kunit_try_catch/195
[   17.237216] 
[   17.237255] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.237694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.237795] Hardware name: linux,dummy-virt (DT)
[   17.237853] Call trace:
[   17.237960]  show_stack+0x20/0x38 (C)
[   17.238088]  dump_stack_lvl+0x8c/0xd0
[   17.238191]  print_report+0x118/0x608
[   17.238242]  kasan_report+0xdc/0x128
[   17.238289]  __asan_report_load1_noabort+0x20/0x30
[   17.238341]  ksize_unpoisons_memory+0x618/0x740
[   17.238389]  kunit_try_run_case+0x170/0x3f0
[   17.238765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.238917]  kthread+0x328/0x630
[   17.239057]  ret_from_fork+0x10/0x20
[   17.239159] 
[   17.239265] Allocated by task 195:
[   17.239363]  kasan_save_stack+0x3c/0x68
[   17.239408]  kasan_save_track+0x20/0x40
[   17.239453]  kasan_save_alloc_info+0x40/0x58
[   17.239671]  __kasan_kmalloc+0xd4/0xd8
[   17.239718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.239760]  ksize_unpoisons_memory+0xc0/0x740
[   17.239852]  kunit_try_run_case+0x170/0x3f0
[   17.239894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.239949]  kthread+0x328/0x630
[   17.239992]  ret_from_fork+0x10/0x20
[   17.240038] 
[   17.240058] The buggy address belongs to the object at fff00000c5733b00
[   17.240058]  which belongs to the cache kmalloc-128 of size 128
[   17.240134] The buggy address is located 5 bytes to the right of
[   17.240134]  allocated 115-byte region [fff00000c5733b00, fff00000c5733b73)
[   17.240210] 
[   17.240244] The buggy address belongs to the physical page:
[   17.240284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.240359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.240409] page_type: f5(slab)
[   17.240471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.240524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.240577] page dumped because: kasan: bad access detected
[   17.241091] 
[   17.241138] Memory state around the buggy address:
[   17.241225]  fff00000c5733a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.241276]  fff00000c5733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.241693] >fff00000c5733b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.241779]                                                                 ^
[   17.241870]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.242031]  fff00000c5733c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.242118] ==================================================================

[   12.066288] ==================================================================
[   12.066846] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.067207] Read of size 1 at addr ffff8881027c2a7f by task kunit_try_catch/211
[   12.067503] 
[   12.067615] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.067656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.067667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.067687] Call Trace:
[   12.067704]  <TASK>
[   12.067720]  dump_stack_lvl+0x73/0xb0
[   12.067746]  print_report+0xd1/0x650
[   12.067767]  ? __virt_addr_valid+0x1db/0x2d0
[   12.067812]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.067833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.067854]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.067876]  kasan_report+0x141/0x180
[   12.067896]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.067923]  __asan_report_load1_noabort+0x18/0x20
[   12.067945]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.067967]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.067988]  ? finish_task_switch.isra.0+0x153/0x700
[   12.068009]  ? __switch_to+0x47/0xf50
[   12.068042]  ? __schedule+0x10cc/0x2b60
[   12.068063]  ? __pfx_read_tsc+0x10/0x10
[   12.068083]  ? ktime_get_ts64+0x86/0x230
[   12.068106]  kunit_try_run_case+0x1a5/0x480
[   12.068128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.068152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.068174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.068195]  ? __kthread_parkme+0x82/0x180
[   12.068215]  ? preempt_count_sub+0x50/0x80
[   12.068236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.068258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.068279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.068300]  kthread+0x337/0x6f0
[   12.068318]  ? trace_preempt_on+0x20/0xc0
[   12.068340]  ? __pfx_kthread+0x10/0x10
[   12.068359]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.068379]  ? calculate_sigpending+0x7b/0xa0
[   12.068401]  ? __pfx_kthread+0x10/0x10
[   12.068421]  ret_from_fork+0x116/0x1d0
[   12.068457]  ? __pfx_kthread+0x10/0x10
[   12.068478]  ret_from_fork_asm+0x1a/0x30
[   12.068508]  </TASK>
[   12.068519] 
[   12.076488] Allocated by task 211:
[   12.076635]  kasan_save_stack+0x45/0x70
[   12.076841]  kasan_save_track+0x18/0x40
[   12.077040]  kasan_save_alloc_info+0x3b/0x50
[   12.077253]  __kasan_kmalloc+0xb7/0xc0
[   12.077422]  __kmalloc_cache_noprof+0x189/0x420
[   12.077579]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.077825]  kunit_try_run_case+0x1a5/0x480
[   12.078013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.078245]  kthread+0x337/0x6f0
[   12.078366]  ret_from_fork+0x116/0x1d0
[   12.078552]  ret_from_fork_asm+0x1a/0x30
[   12.078887] 
[   12.078973] The buggy address belongs to the object at ffff8881027c2a00
[   12.078973]  which belongs to the cache kmalloc-128 of size 128
[   12.079355] The buggy address is located 12 bytes to the right of
[   12.079355]  allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73)
[   12.079898] 
[   12.079970] The buggy address belongs to the physical page:
[   12.080157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2
[   12.080798] flags: 0x200000000000000(node=0|zone=2)
[   12.081051] page_type: f5(slab)
[   12.081196] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.081503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.081737] page dumped because: kasan: bad access detected
[   12.082141] 
[   12.082224] Memory state around the buggy address:
[   12.082422]  ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.082696]  ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.083005] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.083312]                                                                 ^
[   12.083563]  ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.083834]  ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.084159] ==================================================================
[   12.047222] ==================================================================
[   12.047535] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.048122] Read of size 1 at addr ffff8881027c2a78 by task kunit_try_catch/211
[   12.048783] 
[   12.048934] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.048981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.048992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.049013] Call Trace:
[   12.049038]  <TASK>
[   12.049055]  dump_stack_lvl+0x73/0xb0
[   12.049106]  print_report+0xd1/0x650
[   12.049128]  ? __virt_addr_valid+0x1db/0x2d0
[   12.049152]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.049173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.049195]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.049216]  kasan_report+0x141/0x180
[   12.049255]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.049282]  __asan_report_load1_noabort+0x18/0x20
[   12.049305]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.049327]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.049348]  ? finish_task_switch.isra.0+0x153/0x700
[   12.049369]  ? __switch_to+0x47/0xf50
[   12.049393]  ? __schedule+0x10cc/0x2b60
[   12.049414]  ? __pfx_read_tsc+0x10/0x10
[   12.049435]  ? ktime_get_ts64+0x86/0x230
[   12.049460]  kunit_try_run_case+0x1a5/0x480
[   12.049483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.049504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.049526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.049567]  ? __kthread_parkme+0x82/0x180
[   12.049588]  ? preempt_count_sub+0x50/0x80
[   12.049609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.049631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.049652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.049674]  kthread+0x337/0x6f0
[   12.049692]  ? trace_preempt_on+0x20/0xc0
[   12.049715]  ? __pfx_kthread+0x10/0x10
[   12.049735]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.049755]  ? calculate_sigpending+0x7b/0xa0
[   12.049777]  ? __pfx_kthread+0x10/0x10
[   12.049797]  ret_from_fork+0x116/0x1d0
[   12.049814]  ? __pfx_kthread+0x10/0x10
[   12.049833]  ret_from_fork_asm+0x1a/0x30
[   12.049864]  </TASK>
[   12.049875] 
[   12.057213] Allocated by task 211:
[   12.057341]  kasan_save_stack+0x45/0x70
[   12.057750]  kasan_save_track+0x18/0x40
[   12.057942]  kasan_save_alloc_info+0x3b/0x50
[   12.058184]  __kasan_kmalloc+0xb7/0xc0
[   12.058376]  __kmalloc_cache_noprof+0x189/0x420
[   12.058597]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.058890]  kunit_try_run_case+0x1a5/0x480
[   12.059048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.059286]  kthread+0x337/0x6f0
[   12.059407]  ret_from_fork+0x116/0x1d0
[   12.059537]  ret_from_fork_asm+0x1a/0x30
[   12.059676] 
[   12.059790] The buggy address belongs to the object at ffff8881027c2a00
[   12.059790]  which belongs to the cache kmalloc-128 of size 128
[   12.060329] The buggy address is located 5 bytes to the right of
[   12.060329]  allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73)
[   12.060861] 
[   12.060936] The buggy address belongs to the physical page:
[   12.061160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2
[   12.061518] flags: 0x200000000000000(node=0|zone=2)
[   12.061787] page_type: f5(slab)
[   12.061912] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.062232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.062561] page dumped because: kasan: bad access detected
[   12.062872] 
[   12.062948] Memory state around the buggy address:
[   12.063120]  ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.063341]  ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.063553] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.064117]                                                                 ^
[   12.064651]  ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.064991]  ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.065267] ==================================================================
[   12.028608] ==================================================================
[   12.029123] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.029467] Read of size 1 at addr ffff8881027c2a73 by task kunit_try_catch/211
[   12.029753] 
[   12.029882] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.029928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.029939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.029960] Call Trace:
[   12.029972]  <TASK>
[   12.029990]  dump_stack_lvl+0x73/0xb0
[   12.030019]  print_report+0xd1/0x650
[   12.030053]  ? __virt_addr_valid+0x1db/0x2d0
[   12.030098]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.030120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.030141]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.030163]  kasan_report+0x141/0x180
[   12.030183]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.030209]  __asan_report_load1_noabort+0x18/0x20
[   12.030232]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.030254]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.030275]  ? finish_task_switch.isra.0+0x153/0x700
[   12.030296]  ? __switch_to+0x47/0xf50
[   12.030321]  ? __schedule+0x10cc/0x2b60
[   12.030343]  ? __pfx_read_tsc+0x10/0x10
[   12.030363]  ? ktime_get_ts64+0x86/0x230
[   12.030386]  kunit_try_run_case+0x1a5/0x480
[   12.030430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.030450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.030474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.030495]  ? __kthread_parkme+0x82/0x180
[   12.030515]  ? preempt_count_sub+0x50/0x80
[   12.030536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.030558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.030580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.030601]  kthread+0x337/0x6f0
[   12.030619]  ? trace_preempt_on+0x20/0xc0
[   12.030641]  ? __pfx_kthread+0x10/0x10
[   12.030660]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.030680]  ? calculate_sigpending+0x7b/0xa0
[   12.030702]  ? __pfx_kthread+0x10/0x10
[   12.030724]  ret_from_fork+0x116/0x1d0
[   12.030741]  ? __pfx_kthread+0x10/0x10
[   12.030760]  ret_from_fork_asm+0x1a/0x30
[   12.030790]  </TASK>
[   12.030801] 
[   12.038383] Allocated by task 211:
[   12.038566]  kasan_save_stack+0x45/0x70
[   12.038860]  kasan_save_track+0x18/0x40
[   12.038997]  kasan_save_alloc_info+0x3b/0x50
[   12.039155]  __kasan_kmalloc+0xb7/0xc0
[   12.039342]  __kmalloc_cache_noprof+0x189/0x420
[   12.039570]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.039934]  kunit_try_run_case+0x1a5/0x480
[   12.040090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.040267]  kthread+0x337/0x6f0
[   12.040437]  ret_from_fork+0x116/0x1d0
[   12.040623]  ret_from_fork_asm+0x1a/0x30
[   12.040831] 
[   12.040926] The buggy address belongs to the object at ffff8881027c2a00
[   12.040926]  which belongs to the cache kmalloc-128 of size 128
[   12.041408] The buggy address is located 0 bytes to the right of
[   12.041408]  allocated 115-byte region [ffff8881027c2a00, ffff8881027c2a73)
[   12.041813] 
[   12.041914] The buggy address belongs to the physical page:
[   12.042188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c2
[   12.042546] flags: 0x200000000000000(node=0|zone=2)
[   12.042946] page_type: f5(slab)
[   12.043152] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.043453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.043766] page dumped because: kasan: bad access detected
[   12.043931] 
[   12.043999] Memory state around the buggy address:
[   12.044168]  ffff8881027c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.044377]  ffff8881027c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.044584] >ffff8881027c2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.045235]                                                              ^
[   12.045557]  ffff8881027c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.045875]  ffff8881027c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.046222] ==================================================================