Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.805504] ==================================================================
[   17.805642] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.805691] Read of size 1 at addr fff00000c7767878 by task kunit_try_catch/194
[   17.805742] 
[   17.805770] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.805855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.805884] Hardware name: linux,dummy-virt (DT)
[   17.805913] Call trace:
[   17.805935]  show_stack+0x20/0x38 (C)
[   17.805983]  dump_stack_lvl+0x8c/0xd0
[   17.806049]  print_report+0x118/0x608
[   17.806120]  kasan_report+0xdc/0x128
[   17.806288]  __asan_report_load1_noabort+0x20/0x30
[   17.806393]  ksize_unpoisons_memory+0x618/0x740
[   17.806504]  kunit_try_run_case+0x170/0x3f0
[   17.806571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.806680]  kthread+0x328/0x630
[   17.806722]  ret_from_fork+0x10/0x20
[   17.806771] 
[   17.806788] Allocated by task 194:
[   17.806814]  kasan_save_stack+0x3c/0x68
[   17.806855]  kasan_save_track+0x20/0x40
[   17.806894]  kasan_save_alloc_info+0x40/0x58
[   17.806933]  __kasan_kmalloc+0xd4/0xd8
[   17.807041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.807107]  ksize_unpoisons_memory+0xc0/0x740
[   17.807146]  kunit_try_run_case+0x170/0x3f0
[   17.807186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.807229]  kthread+0x328/0x630
[   17.807265]  ret_from_fork+0x10/0x20
[   17.807300] 
[   17.807318] The buggy address belongs to the object at fff00000c7767800
[   17.807318]  which belongs to the cache kmalloc-128 of size 128
[   17.807375] The buggy address is located 5 bytes to the right of
[   17.807375]  allocated 115-byte region [fff00000c7767800, fff00000c7767873)
[   17.807533] 
[   17.807627] The buggy address belongs to the physical page:
[   17.807735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   17.807787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.807836] page_type: f5(slab)
[   17.807873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.808008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.808121] page dumped because: kasan: bad access detected
[   17.808152] 
[   17.808170] Memory state around the buggy address:
[   17.808201]  fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.808246]  fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.808288] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.808328]                                                                 ^
[   17.808369]  fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.808452]  fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.808493] ==================================================================
[   17.801848] ==================================================================
[   17.801909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.801966] Read of size 1 at addr fff00000c7767873 by task kunit_try_catch/194
[   17.802108] 
[   17.802153] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.802241] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.802272] Hardware name: linux,dummy-virt (DT)
[   17.802313] Call trace:
[   17.802362]  show_stack+0x20/0x38 (C)
[   17.802414]  dump_stack_lvl+0x8c/0xd0
[   17.802485]  print_report+0x118/0x608
[   17.802533]  kasan_report+0xdc/0x128
[   17.802580]  __asan_report_load1_noabort+0x20/0x30
[   17.802633]  ksize_unpoisons_memory+0x628/0x740
[   17.802683]  kunit_try_run_case+0x170/0x3f0
[   17.802733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.802796]  kthread+0x328/0x630
[   17.802941]  ret_from_fork+0x10/0x20
[   17.802992] 
[   17.803012] Allocated by task 194:
[   17.803041]  kasan_save_stack+0x3c/0x68
[   17.803081]  kasan_save_track+0x20/0x40
[   17.803130]  kasan_save_alloc_info+0x40/0x58
[   17.803169]  __kasan_kmalloc+0xd4/0xd8
[   17.803206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.803254]  ksize_unpoisons_memory+0xc0/0x740
[   17.803294]  kunit_try_run_case+0x170/0x3f0
[   17.803333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.803376]  kthread+0x328/0x630
[   17.803408]  ret_from_fork+0x10/0x20
[   17.803445] 
[   17.803463] The buggy address belongs to the object at fff00000c7767800
[   17.803463]  which belongs to the cache kmalloc-128 of size 128
[   17.803673] The buggy address is located 0 bytes to the right of
[   17.803673]  allocated 115-byte region [fff00000c7767800, fff00000c7767873)
[   17.803753] 
[   17.803822] The buggy address belongs to the physical page:
[   17.803854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   17.803911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.803962] page_type: f5(slab)
[   17.804003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.804066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.804265] page dumped because: kasan: bad access detected
[   17.804308] 
[   17.804397] Memory state around the buggy address:
[   17.804431]  fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.804475]  fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804526] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.804718]                                                              ^
[   17.804764]  fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804920]  fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804977] ==================================================================
[   17.809441] ==================================================================
[   17.809508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.809560] Read of size 1 at addr fff00000c776787f by task kunit_try_catch/194
[   17.809639] 
[   17.809670] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.809755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.809841] Hardware name: linux,dummy-virt (DT)
[   17.809878] Call trace:
[   17.809991]  show_stack+0x20/0x38 (C)
[   17.810043]  dump_stack_lvl+0x8c/0xd0
[   17.810175]  print_report+0x118/0x608
[   17.810225]  kasan_report+0xdc/0x128
[   17.810271]  __asan_report_load1_noabort+0x20/0x30
[   17.810332]  ksize_unpoisons_memory+0x690/0x740
[   17.810380]  kunit_try_run_case+0x170/0x3f0
[   17.810476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.810532]  kthread+0x328/0x630
[   17.810576]  ret_from_fork+0x10/0x20
[   17.810624] 
[   17.810671] Allocated by task 194:
[   17.810699]  kasan_save_stack+0x3c/0x68
[   17.810759]  kasan_save_track+0x20/0x40
[   17.810967]  kasan_save_alloc_info+0x40/0x58
[   17.811008]  __kasan_kmalloc+0xd4/0xd8
[   17.811047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.811095]  ksize_unpoisons_memory+0xc0/0x740
[   17.811134]  kunit_try_run_case+0x170/0x3f0
[   17.811171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.811215]  kthread+0x328/0x630
[   17.811246]  ret_from_fork+0x10/0x20
[   17.811283] 
[   17.811300] The buggy address belongs to the object at fff00000c7767800
[   17.811300]  which belongs to the cache kmalloc-128 of size 128
[   17.811360] The buggy address is located 12 bytes to the right of
[   17.811360]  allocated 115-byte region [fff00000c7767800, fff00000c7767873)
[   17.811425] 
[   17.811455] The buggy address belongs to the physical page:
[   17.811484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   17.811536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.811583] page_type: f5(slab)
[   17.811619] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.811672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.811713] page dumped because: kasan: bad access detected
[   17.811758] 
[   17.811819] Memory state around the buggy address:
[   17.811987]  fff00000c7767700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.812040]  fff00000c7767780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.812094] >fff00000c7767800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.812133]                                                                 ^
[   17.812185]  fff00000c7767880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.812423]  fff00000c7767900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.812465] ==================================================================

[   13.169761] ==================================================================
[   13.170625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.171229] Read of size 1 at addr ffff888102c29f73 by task kunit_try_catch/211
[   13.171565] 
[   13.171677] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.171725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.171736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.171757] Call Trace:
[   13.171768]  <TASK>
[   13.171785]  dump_stack_lvl+0x73/0xb0
[   13.171819]  print_report+0xd1/0x650
[   13.171841]  ? __virt_addr_valid+0x1db/0x2d0
[   13.171864]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.171887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.171909]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.171932]  kasan_report+0x141/0x180
[   13.171953]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.171981]  __asan_report_load1_noabort+0x18/0x20
[   13.172005]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.172029]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.172051]  ? finish_task_switch.isra.0+0x153/0x700
[   13.172074]  ? __switch_to+0x47/0xf50
[   13.172100]  ? __schedule+0x10cc/0x2b60
[   13.172122]  ? __pfx_read_tsc+0x10/0x10
[   13.172143]  ? ktime_get_ts64+0x86/0x230
[   13.172167]  kunit_try_run_case+0x1a5/0x480
[   13.172192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.172214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.172238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.172262]  ? __kthread_parkme+0x82/0x180
[   13.172294]  ? preempt_count_sub+0x50/0x80
[   13.172324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.172348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.172372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.172396]  kthread+0x337/0x6f0
[   13.172414]  ? trace_preempt_on+0x20/0xc0
[   13.172437]  ? __pfx_kthread+0x10/0x10
[   13.172457]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.172478]  ? calculate_sigpending+0x7b/0xa0
[   13.172503]  ? __pfx_kthread+0x10/0x10
[   13.172523]  ret_from_fork+0x116/0x1d0
[   13.172541]  ? __pfx_kthread+0x10/0x10
[   13.172561]  ret_from_fork_asm+0x1a/0x30
[   13.172592]  </TASK>
[   13.172614] 
[   13.185036] Allocated by task 211:
[   13.185434]  kasan_save_stack+0x45/0x70
[   13.186117]  kasan_save_track+0x18/0x40
[   13.186343]  kasan_save_alloc_info+0x3b/0x50
[   13.186517]  __kasan_kmalloc+0xb7/0xc0
[   13.186782]  __kmalloc_cache_noprof+0x189/0x420
[   13.187283]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.187538]  kunit_try_run_case+0x1a5/0x480
[   13.187788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.188172]  kthread+0x337/0x6f0
[   13.188348]  ret_from_fork+0x116/0x1d0
[   13.188539]  ret_from_fork_asm+0x1a/0x30
[   13.188745] 
[   13.188880] The buggy address belongs to the object at ffff888102c29f00
[   13.188880]  which belongs to the cache kmalloc-128 of size 128
[   13.189359] The buggy address is located 0 bytes to the right of
[   13.189359]  allocated 115-byte region [ffff888102c29f00, ffff888102c29f73)
[   13.190097] 
[   13.190230] The buggy address belongs to the physical page:
[   13.190497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   13.191146] flags: 0x200000000000000(node=0|zone=2)
[   13.191350] page_type: f5(slab)
[   13.191525] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.191888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.192359] page dumped because: kasan: bad access detected
[   13.192622] 
[   13.192719] Memory state around the buggy address:
[   13.193087]  ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.193407]  ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.193747] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.194219]                                                              ^
[   13.194535]  ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.195124]  ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.195432] ==================================================================
[   13.196093] ==================================================================
[   13.196464] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.196998] Read of size 1 at addr ffff888102c29f78 by task kunit_try_catch/211
[   13.197360] 
[   13.197474] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.197518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.197529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.197576] Call Trace:
[   13.197612]  <TASK>
[   13.197656]  dump_stack_lvl+0x73/0xb0
[   13.197687]  print_report+0xd1/0x650
[   13.197710]  ? __virt_addr_valid+0x1db/0x2d0
[   13.197744]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.197786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.197929]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.197953]  kasan_report+0x141/0x180
[   13.197987]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.198015]  __asan_report_load1_noabort+0x18/0x20
[   13.198039]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.198062]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.198085]  ? finish_task_switch.isra.0+0x153/0x700
[   13.198108]  ? __switch_to+0x47/0xf50
[   13.198161]  ? __schedule+0x10cc/0x2b60
[   13.198183]  ? __pfx_read_tsc+0x10/0x10
[   13.198204]  ? ktime_get_ts64+0x86/0x230
[   13.198239]  kunit_try_run_case+0x1a5/0x480
[   13.198263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.198312]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.198337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.198359]  ? __kthread_parkme+0x82/0x180
[   13.198390]  ? preempt_count_sub+0x50/0x80
[   13.198413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.198436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.198460]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.198484]  kthread+0x337/0x6f0
[   13.198502]  ? trace_preempt_on+0x20/0xc0
[   13.198526]  ? __pfx_kthread+0x10/0x10
[   13.198545]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.198567]  ? calculate_sigpending+0x7b/0xa0
[   13.198591]  ? __pfx_kthread+0x10/0x10
[   13.198620]  ret_from_fork+0x116/0x1d0
[   13.198638]  ? __pfx_kthread+0x10/0x10
[   13.198657]  ret_from_fork_asm+0x1a/0x30
[   13.198688]  </TASK>
[   13.198698] 
[   13.207796] Allocated by task 211:
[   13.208027]  kasan_save_stack+0x45/0x70
[   13.208382]  kasan_save_track+0x18/0x40
[   13.208571]  kasan_save_alloc_info+0x3b/0x50
[   13.208890]  __kasan_kmalloc+0xb7/0xc0
[   13.209132]  __kmalloc_cache_noprof+0x189/0x420
[   13.209355]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.209571]  kunit_try_run_case+0x1a5/0x480
[   13.209930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.210216]  kthread+0x337/0x6f0
[   13.210384]  ret_from_fork+0x116/0x1d0
[   13.210613]  ret_from_fork_asm+0x1a/0x30
[   13.210750] 
[   13.211164] The buggy address belongs to the object at ffff888102c29f00
[   13.211164]  which belongs to the cache kmalloc-128 of size 128
[   13.211643] The buggy address is located 5 bytes to the right of
[   13.211643]  allocated 115-byte region [ffff888102c29f00, ffff888102c29f73)
[   13.212173] 
[   13.212260] The buggy address belongs to the physical page:
[   13.212494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   13.212811] flags: 0x200000000000000(node=0|zone=2)
[   13.212970] page_type: f5(slab)
[   13.213086] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.213484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.213963] page dumped because: kasan: bad access detected
[   13.214387] 
[   13.214474] Memory state around the buggy address:
[   13.214742]  ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.215237]  ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.215566] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.216175]                                                                 ^
[   13.216500]  ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.216933]  ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.217286] ==================================================================
[   13.218095] ==================================================================
[   13.219099] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.219451] Read of size 1 at addr ffff888102c29f7f by task kunit_try_catch/211
[   13.219972] 
[   13.220082] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.220164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.220175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.220196] Call Trace:
[   13.220208]  <TASK>
[   13.220237]  dump_stack_lvl+0x73/0xb0
[   13.220270]  print_report+0xd1/0x650
[   13.220292]  ? __virt_addr_valid+0x1db/0x2d0
[   13.220344]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.220366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.220388]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.220423]  kasan_report+0x141/0x180
[   13.220444]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.220471]  __asan_report_load1_noabort+0x18/0x20
[   13.220523]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.220546]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.220606]  ? finish_task_switch.isra.0+0x153/0x700
[   13.220630]  ? __switch_to+0x47/0xf50
[   13.220654]  ? __schedule+0x10cc/0x2b60
[   13.220677]  ? __pfx_read_tsc+0x10/0x10
[   13.220699]  ? ktime_get_ts64+0x86/0x230
[   13.220722]  kunit_try_run_case+0x1a5/0x480
[   13.220747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.220861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.220887]  ? __kthread_parkme+0x82/0x180
[   13.220908]  ? preempt_count_sub+0x50/0x80
[   13.220931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.220954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.220978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.221002]  kthread+0x337/0x6f0
[   13.221020]  ? trace_preempt_on+0x20/0xc0
[   13.221044]  ? __pfx_kthread+0x10/0x10
[   13.221064]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.221085]  ? calculate_sigpending+0x7b/0xa0
[   13.221109]  ? __pfx_kthread+0x10/0x10
[   13.221129]  ret_from_fork+0x116/0x1d0
[   13.221147]  ? __pfx_kthread+0x10/0x10
[   13.221168]  ret_from_fork_asm+0x1a/0x30
[   13.221198]  </TASK>
[   13.221209] 
[   13.232763] Allocated by task 211:
[   13.233063]  kasan_save_stack+0x45/0x70
[   13.233566]  kasan_save_track+0x18/0x40
[   13.233884]  kasan_save_alloc_info+0x3b/0x50
[   13.234299]  __kasan_kmalloc+0xb7/0xc0
[   13.234665]  __kmalloc_cache_noprof+0x189/0x420
[   13.235224]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.235584]  kunit_try_run_case+0x1a5/0x480
[   13.236036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.236279]  kthread+0x337/0x6f0
[   13.236550]  ret_from_fork+0x116/0x1d0
[   13.236828]  ret_from_fork_asm+0x1a/0x30
[   13.237137] 
[   13.237213] The buggy address belongs to the object at ffff888102c29f00
[   13.237213]  which belongs to the cache kmalloc-128 of size 128
[   13.237743] The buggy address is located 12 bytes to the right of
[   13.237743]  allocated 115-byte region [ffff888102c29f00, ffff888102c29f73)
[   13.238787] 
[   13.239196] The buggy address belongs to the physical page:
[   13.239407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   13.240042] flags: 0x200000000000000(node=0|zone=2)
[   13.240502] page_type: f5(slab)
[   13.240873] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.241248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.241698] page dumped because: kasan: bad access detected
[   13.242231] 
[   13.242316] Memory state around the buggy address:
[   13.242705]  ffff888102c29e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.243329]  ffff888102c29e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.243762] >ffff888102c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.244288]                                                                 ^
[   13.244700]  ffff888102c29f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.245162]  ffff888102c2a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.245574] ==================================================================