Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.473608] ==================================================================
[   18.473711] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.473889] Read of size 1 at addr fff00000c5cbbf78 by task kunit_try_catch/194
[   18.473938] 
[   18.473967] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.474045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.474071] Hardware name: linux,dummy-virt (DT)
[   18.474739] Call trace:
[   18.474955]  show_stack+0x20/0x38 (C)
[   18.475439]  dump_stack_lvl+0x8c/0xd0
[   18.475566]  print_report+0x118/0x608
[   18.475681]  kasan_report+0xdc/0x128
[   18.475728]  __asan_report_load1_noabort+0x20/0x30
[   18.475806]  ksize_unpoisons_memory+0x618/0x740
[   18.476042]  kunit_try_run_case+0x170/0x3f0
[   18.476101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.476187]  kthread+0x328/0x630
[   18.476230]  ret_from_fork+0x10/0x20
[   18.476277] 
[   18.476295] Allocated by task 194:
[   18.476328]  kasan_save_stack+0x3c/0x68
[   18.476399]  kasan_save_track+0x20/0x40
[   18.476436]  kasan_save_alloc_info+0x40/0x58
[   18.476475]  __kasan_kmalloc+0xd4/0xd8
[   18.476822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.476874]  ksize_unpoisons_memory+0xc0/0x740
[   18.476913]  kunit_try_run_case+0x170/0x3f0
[   18.477052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.477195]  kthread+0x328/0x630
[   18.477227]  ret_from_fork+0x10/0x20
[   18.477370] 
[   18.477411] The buggy address belongs to the object at fff00000c5cbbf00
[   18.477411]  which belongs to the cache kmalloc-128 of size 128
[   18.477513] The buggy address is located 5 bytes to the right of
[   18.477513]  allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73)
[   18.477735] 
[   18.477762] The buggy address belongs to the physical page:
[   18.477840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   18.477906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.477952] page_type: f5(slab)
[   18.478313] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.478399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.478452] page dumped because: kasan: bad access detected
[   18.478485] 
[   18.478504] Memory state around the buggy address:
[   18.478639]  fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.478787]  fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.478833] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.478889]                                                                 ^
[   18.478929]  fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.478993]  fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.479033] ==================================================================
[   18.480013] ==================================================================
[   18.480202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.480372] Read of size 1 at addr fff00000c5cbbf7f by task kunit_try_catch/194
[   18.480471] 
[   18.480499] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.480940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.480970] Hardware name: linux,dummy-virt (DT)
[   18.480999] Call trace:
[   18.481021]  show_stack+0x20/0x38 (C)
[   18.481155]  dump_stack_lvl+0x8c/0xd0
[   18.481200]  print_report+0x118/0x608
[   18.481529]  kasan_report+0xdc/0x128
[   18.481588]  __asan_report_load1_noabort+0x20/0x30
[   18.481640]  ksize_unpoisons_memory+0x690/0x740
[   18.481686]  kunit_try_run_case+0x170/0x3f0
[   18.481733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.481785]  kthread+0x328/0x630
[   18.481826]  ret_from_fork+0x10/0x20
[   18.481884] 
[   18.481901] Allocated by task 194:
[   18.481929]  kasan_save_stack+0x3c/0x68
[   18.481978]  kasan_save_track+0x20/0x40
[   18.482017]  kasan_save_alloc_info+0x40/0x58
[   18.482055]  __kasan_kmalloc+0xd4/0xd8
[   18.482199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.482321]  ksize_unpoisons_memory+0xc0/0x740
[   18.482418]  kunit_try_run_case+0x170/0x3f0
[   18.482541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.482584]  kthread+0x328/0x630
[   18.482615]  ret_from_fork+0x10/0x20
[   18.482649] 
[   18.482668] The buggy address belongs to the object at fff00000c5cbbf00
[   18.482668]  which belongs to the cache kmalloc-128 of size 128
[   18.483157] The buggy address is located 12 bytes to the right of
[   18.483157]  allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73)
[   18.483231] 
[   18.483260] The buggy address belongs to the physical page:
[   18.483301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   18.483379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.483429] page_type: f5(slab)
[   18.483466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.483516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.483726] page dumped because: kasan: bad access detected
[   18.483760] 
[   18.483928] Memory state around the buggy address:
[   18.483968]  fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.484139]  fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.484182] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.484246]                                                                 ^
[   18.484288]  fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.484329]  fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.484368] ==================================================================
[   18.465780] ==================================================================
[   18.466095] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.466220] Read of size 1 at addr fff00000c5cbbf73 by task kunit_try_catch/194
[   18.466308] 
[   18.466430] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.466540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.466568] Hardware name: linux,dummy-virt (DT)
[   18.466600] Call trace:
[   18.466621]  show_stack+0x20/0x38 (C)
[   18.467000]  dump_stack_lvl+0x8c/0xd0
[   18.467051]  print_report+0x118/0x608
[   18.467097]  kasan_report+0xdc/0x128
[   18.467459]  __asan_report_load1_noabort+0x20/0x30
[   18.467540]  ksize_unpoisons_memory+0x628/0x740
[   18.467619]  kunit_try_run_case+0x170/0x3f0
[   18.467672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.467725]  kthread+0x328/0x630
[   18.467775]  ret_from_fork+0x10/0x20
[   18.467853] 
[   18.467884] Allocated by task 194:
[   18.467914]  kasan_save_stack+0x3c/0x68
[   18.468000]  kasan_save_track+0x20/0x40
[   18.468059]  kasan_save_alloc_info+0x40/0x58
[   18.468209]  __kasan_kmalloc+0xd4/0xd8
[   18.468252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.468290]  ksize_unpoisons_memory+0xc0/0x740
[   18.468368]  kunit_try_run_case+0x170/0x3f0
[   18.468543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.468595]  kthread+0x328/0x630
[   18.468761]  ret_from_fork+0x10/0x20
[   18.468798] 
[   18.468817] The buggy address belongs to the object at fff00000c5cbbf00
[   18.468817]  which belongs to the cache kmalloc-128 of size 128
[   18.468882] The buggy address is located 0 bytes to the right of
[   18.468882]  allocated 115-byte region [fff00000c5cbbf00, fff00000c5cbbf73)
[   18.468944] 
[   18.468963] The buggy address belongs to the physical page:
[   18.468992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   18.469044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.469432] page_type: f5(slab)
[   18.469740] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.469935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.470216] page dumped because: kasan: bad access detected
[   18.470477] 
[   18.470576] Memory state around the buggy address:
[   18.470651]  fff00000c5cbbe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.470774]  fff00000c5cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.470919] >fff00000c5cbbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.471056]                                                              ^
[   18.471096]  fff00000c5cbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.471318]  fff00000c5cbc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.471607] ==================================================================

[   12.014081] ==================================================================
[   12.014492] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.014876] Read of size 1 at addr ffff8881031d4878 by task kunit_try_catch/212
[   12.015106] 
[   12.015263] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.015310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.015323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.015346] Call Trace:
[   12.015360]  <TASK>
[   12.015376]  dump_stack_lvl+0x73/0xb0
[   12.015406]  print_report+0xd1/0x650
[   12.015430]  ? __virt_addr_valid+0x1db/0x2d0
[   12.015471]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.015496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.015519]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.015543]  kasan_report+0x141/0x180
[   12.015566]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.015595]  __asan_report_load1_noabort+0x18/0x20
[   12.015619]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.015644]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.015667]  ? finish_task_switch.isra.0+0x153/0x700
[   12.015690]  ? __switch_to+0x47/0xf50
[   12.015716]  ? __schedule+0x10cc/0x2b60
[   12.015739]  ? __pfx_read_tsc+0x10/0x10
[   12.015760]  ? ktime_get_ts64+0x86/0x230
[   12.015785]  kunit_try_run_case+0x1a5/0x480
[   12.015810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.015832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.015857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.015880]  ? __kthread_parkme+0x82/0x180
[   12.015903]  ? preempt_count_sub+0x50/0x80
[   12.015927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.015951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.015974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.015998]  kthread+0x337/0x6f0
[   12.016019]  ? trace_preempt_on+0x20/0xc0
[   12.016042]  ? __pfx_kthread+0x10/0x10
[   12.016063]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.016084]  ? calculate_sigpending+0x7b/0xa0
[   12.016118]  ? __pfx_kthread+0x10/0x10
[   12.016140]  ret_from_fork+0x116/0x1d0
[   12.016160]  ? __pfx_kthread+0x10/0x10
[   12.016181]  ret_from_fork_asm+0x1a/0x30
[   12.016213]  </TASK>
[   12.016224] 
[   12.023933] Allocated by task 212:
[   12.024084]  kasan_save_stack+0x45/0x70
[   12.024509]  kasan_save_track+0x18/0x40
[   12.024741]  kasan_save_alloc_info+0x3b/0x50
[   12.024927]  __kasan_kmalloc+0xb7/0xc0
[   12.025093]  __kmalloc_cache_noprof+0x189/0x420
[   12.025253]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.025419]  kunit_try_run_case+0x1a5/0x480
[   12.025590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.025850]  kthread+0x337/0x6f0
[   12.026021]  ret_from_fork+0x116/0x1d0
[   12.026255]  ret_from_fork_asm+0x1a/0x30
[   12.026591] 
[   12.026698] The buggy address belongs to the object at ffff8881031d4800
[   12.026698]  which belongs to the cache kmalloc-128 of size 128
[   12.027100] The buggy address is located 5 bytes to the right of
[   12.027100]  allocated 115-byte region [ffff8881031d4800, ffff8881031d4873)
[   12.027917] 
[   12.028019] The buggy address belongs to the physical page:
[   12.028298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4
[   12.028633] flags: 0x200000000000000(node=0|zone=2)
[   12.028878] page_type: f5(slab)
[   12.029004] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.029240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.029671] page dumped because: kasan: bad access detected
[   12.029921] 
[   12.030018] Memory state around the buggy address:
[   12.030395]  ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.030715]  ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.030936] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.031204]                                                                 ^
[   12.031528]  ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.031840]  ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.032395] ==================================================================
[   12.032812] ==================================================================
[   12.033388] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.033820] Read of size 1 at addr ffff8881031d487f by task kunit_try_catch/212
[   12.034048] 
[   12.034137] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.034181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.034194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.034215] Call Trace:
[   12.034230]  <TASK>
[   12.034247]  dump_stack_lvl+0x73/0xb0
[   12.034278]  print_report+0xd1/0x650
[   12.034301]  ? __virt_addr_valid+0x1db/0x2d0
[   12.034323]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.034347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.034370]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.034394]  kasan_report+0x141/0x180
[   12.034417]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.034446]  __asan_report_load1_noabort+0x18/0x20
[   12.034484]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.034509]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.034533]  ? finish_task_switch.isra.0+0x153/0x700
[   12.034555]  ? __switch_to+0x47/0xf50
[   12.034580]  ? __schedule+0x10cc/0x2b60
[   12.034603]  ? __pfx_read_tsc+0x10/0x10
[   12.034624]  ? ktime_get_ts64+0x86/0x230
[   12.034690]  kunit_try_run_case+0x1a5/0x480
[   12.034717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.034740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.034764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.034788]  ? __kthread_parkme+0x82/0x180
[   12.034809]  ? preempt_count_sub+0x50/0x80
[   12.034833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.034857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.034881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.034905]  kthread+0x337/0x6f0
[   12.034925]  ? trace_preempt_on+0x20/0xc0
[   12.034949]  ? __pfx_kthread+0x10/0x10
[   12.034971]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.034992]  ? calculate_sigpending+0x7b/0xa0
[   12.035017]  ? __pfx_kthread+0x10/0x10
[   12.035039]  ret_from_fork+0x116/0x1d0
[   12.035058]  ? __pfx_kthread+0x10/0x10
[   12.035079]  ret_from_fork_asm+0x1a/0x30
[   12.035111]  </TASK>
[   12.035122] 
[   12.043162] Allocated by task 212:
[   12.043344]  kasan_save_stack+0x45/0x70
[   12.043739]  kasan_save_track+0x18/0x40
[   12.043945]  kasan_save_alloc_info+0x3b/0x50
[   12.044139]  __kasan_kmalloc+0xb7/0xc0
[   12.044314]  __kmalloc_cache_noprof+0x189/0x420
[   12.044556]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.044711]  kunit_try_run_case+0x1a5/0x480
[   12.044860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.045159]  kthread+0x337/0x6f0
[   12.045559]  ret_from_fork+0x116/0x1d0
[   12.045786]  ret_from_fork_asm+0x1a/0x30
[   12.045959] 
[   12.046035] The buggy address belongs to the object at ffff8881031d4800
[   12.046035]  which belongs to the cache kmalloc-128 of size 128
[   12.046721] The buggy address is located 12 bytes to the right of
[   12.046721]  allocated 115-byte region [ffff8881031d4800, ffff8881031d4873)
[   12.047089] 
[   12.047210] The buggy address belongs to the physical page:
[   12.047524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4
[   12.048158] flags: 0x200000000000000(node=0|zone=2)
[   12.048403] page_type: f5(slab)
[   12.048574] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.048809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.049189] page dumped because: kasan: bad access detected
[   12.049540] 
[   12.049624] Memory state around the buggy address:
[   12.049873]  ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.050164]  ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.050497] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.050827]                                                                 ^
[   12.051097]  ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.051347]  ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.051977] ==================================================================
[   11.991718] ==================================================================
[   11.992201] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.992572] Read of size 1 at addr ffff8881031d4873 by task kunit_try_catch/212
[   11.992929] 
[   11.993044] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.993089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.993102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.993124] Call Trace:
[   11.993136]  <TASK>
[   11.993153]  dump_stack_lvl+0x73/0xb0
[   11.993182]  print_report+0xd1/0x650
[   11.993205]  ? __virt_addr_valid+0x1db/0x2d0
[   11.993227]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.993251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.993274]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.993298]  kasan_report+0x141/0x180
[   11.993321]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.993350]  __asan_report_load1_noabort+0x18/0x20
[   11.993375]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.993405]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.993428]  ? finish_task_switch.isra.0+0x153/0x700
[   11.993450]  ? __switch_to+0x47/0xf50
[   11.993489]  ? __schedule+0x10cc/0x2b60
[   11.993511]  ? __pfx_read_tsc+0x10/0x10
[   11.993532]  ? ktime_get_ts64+0x86/0x230
[   11.993556]  kunit_try_run_case+0x1a5/0x480
[   11.993581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.993604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.993628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.993652]  ? __kthread_parkme+0x82/0x180
[   11.993672]  ? preempt_count_sub+0x50/0x80
[   11.993696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.993721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.993744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.993769]  kthread+0x337/0x6f0
[   11.993789]  ? trace_preempt_on+0x20/0xc0
[   11.993813]  ? __pfx_kthread+0x10/0x10
[   11.993862]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.993884]  ? calculate_sigpending+0x7b/0xa0
[   11.993909]  ? __pfx_kthread+0x10/0x10
[   11.993932]  ret_from_fork+0x116/0x1d0
[   11.993952]  ? __pfx_kthread+0x10/0x10
[   11.993974]  ret_from_fork_asm+0x1a/0x30
[   11.994005]  </TASK>
[   11.994016] 
[   12.001706] Allocated by task 212:
[   12.001842]  kasan_save_stack+0x45/0x70
[   12.002051]  kasan_save_track+0x18/0x40
[   12.002252]  kasan_save_alloc_info+0x3b/0x50
[   12.002549]  __kasan_kmalloc+0xb7/0xc0
[   12.002758]  __kmalloc_cache_noprof+0x189/0x420
[   12.002978]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.003135]  kunit_try_run_case+0x1a5/0x480
[   12.003342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.003613]  kthread+0x337/0x6f0
[   12.003897]  ret_from_fork+0x116/0x1d0
[   12.004060]  ret_from_fork_asm+0x1a/0x30
[   12.004327] 
[   12.004432] The buggy address belongs to the object at ffff8881031d4800
[   12.004432]  which belongs to the cache kmalloc-128 of size 128
[   12.004948] The buggy address is located 0 bytes to the right of
[   12.004948]  allocated 115-byte region [ffff8881031d4800, ffff8881031d4873)
[   12.005515] 
[   12.005614] The buggy address belongs to the physical page:
[   12.005827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d4
[   12.006072] flags: 0x200000000000000(node=0|zone=2)
[   12.006239] page_type: f5(slab)
[   12.006362] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.006608] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.006849] page dumped because: kasan: bad access detected
[   12.007101] 
[   12.009007] Memory state around the buggy address:
[   12.009392]  ffff8881031d4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.009751]  ffff8881031d4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.009972] >ffff8881031d4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.010186]                                                              ^
[   12.010662]  ffff8881031d4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.010919]  ffff8881031d4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.011230] ==================================================================