Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.493249] ==================================================================
[   19.493325] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.493649] Read of size 1 at addr fff00000c5708378 by task kunit_try_catch/194
[   19.494111] 
[   19.494193] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.494317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.494616] Hardware name: linux,dummy-virt (DT)
[   19.494683] Call trace:
[   19.494707]  show_stack+0x20/0x38 (C)
[   19.494768]  dump_stack_lvl+0x8c/0xd0
[   19.494947]  print_report+0x118/0x608
[   19.495138]  kasan_report+0xdc/0x128
[   19.495247]  __asan_report_load1_noabort+0x20/0x30
[   19.495300]  ksize_unpoisons_memory+0x618/0x740
[   19.495346]  kunit_try_run_case+0x170/0x3f0
[   19.495390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.495676]  kthread+0x328/0x630
[   19.495739]  ret_from_fork+0x10/0x20
[   19.495938] 
[   19.495962] Allocated by task 194:
[   19.495991]  kasan_save_stack+0x3c/0x68
[   19.496181]  kasan_save_track+0x20/0x40
[   19.496287]  kasan_save_alloc_info+0x40/0x58
[   19.496454]  __kasan_kmalloc+0xd4/0xd8
[   19.496524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.496630]  ksize_unpoisons_memory+0xc0/0x740
[   19.497050]  kunit_try_run_case+0x170/0x3f0
[   19.497123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.497242]  kthread+0x328/0x630
[   19.497306]  ret_from_fork+0x10/0x20
[   19.497341] 
[   19.497393] The buggy address belongs to the object at fff00000c5708300
[   19.497393]  which belongs to the cache kmalloc-128 of size 128
[   19.497609] The buggy address is located 5 bytes to the right of
[   19.497609]  allocated 115-byte region [fff00000c5708300, fff00000c5708373)
[   19.497827] 
[   19.497868] The buggy address belongs to the physical page:
[   19.497898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708
[   19.498299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.498370] page_type: f5(slab)
[   19.498490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.498724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.498945] page dumped because: kasan: bad access detected
[   19.499025] 
[   19.499094] Memory state around the buggy address:
[   19.499228]  fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.499522]  fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499718] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.499767]                                                                 ^
[   19.500065]  fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500160]  fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500306] ==================================================================
[   19.486369] ==================================================================
[   19.486440] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.486514] Read of size 1 at addr fff00000c5708373 by task kunit_try_catch/194
[   19.486629] 
[   19.486722] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.486858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.486895] Hardware name: linux,dummy-virt (DT)
[   19.486927] Call trace:
[   19.486949]  show_stack+0x20/0x38 (C)
[   19.487233]  dump_stack_lvl+0x8c/0xd0
[   19.487393]  print_report+0x118/0x608
[   19.487540]  kasan_report+0xdc/0x128
[   19.487722]  __asan_report_load1_noabort+0x20/0x30
[   19.487827]  ksize_unpoisons_memory+0x628/0x740
[   19.487892]  kunit_try_run_case+0x170/0x3f0
[   19.487939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487990]  kthread+0x328/0x630
[   19.488418]  ret_from_fork+0x10/0x20
[   19.488553] 
[   19.488632] Allocated by task 194:
[   19.488787]  kasan_save_stack+0x3c/0x68
[   19.488884]  kasan_save_track+0x20/0x40
[   19.488950]  kasan_save_alloc_info+0x40/0x58
[   19.489560]  __kasan_kmalloc+0xd4/0xd8
[   19.489621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.490047]  ksize_unpoisons_memory+0xc0/0x740
[   19.490243]  kunit_try_run_case+0x170/0x3f0
[   19.490320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490374]  kthread+0x328/0x630
[   19.490413]  ret_from_fork+0x10/0x20
[   19.490458] 
[   19.490502] The buggy address belongs to the object at fff00000c5708300
[   19.490502]  which belongs to the cache kmalloc-128 of size 128
[   19.490586] The buggy address is located 0 bytes to the right of
[   19.490586]  allocated 115-byte region [fff00000c5708300, fff00000c5708373)
[   19.490661] 
[   19.490682] The buggy address belongs to the physical page:
[   19.490723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708
[   19.490786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.490849] page_type: f5(slab)
[   19.490894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.490945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.490994] page dumped because: kasan: bad access detected
[   19.491030] 
[   19.491049] Memory state around the buggy address:
[   19.491080]  fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.491153]  fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.491211] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.491249]                                                              ^
[   19.491297]  fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.491340]  fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.491379] ==================================================================
[   19.501742] ==================================================================
[   19.501832] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.502069] Read of size 1 at addr fff00000c570837f by task kunit_try_catch/194
[   19.502253] 
[   19.502299] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.502381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.502424] Hardware name: linux,dummy-virt (DT)
[   19.502801] Call trace:
[   19.502843]  show_stack+0x20/0x38 (C)
[   19.502925]  dump_stack_lvl+0x8c/0xd0
[   19.502975]  print_report+0x118/0x608
[   19.503021]  kasan_report+0xdc/0x128
[   19.503064]  __asan_report_load1_noabort+0x20/0x30
[   19.503273]  ksize_unpoisons_memory+0x690/0x740
[   19.503466]  kunit_try_run_case+0x170/0x3f0
[   19.503517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503570]  kthread+0x328/0x630
[   19.503642]  ret_from_fork+0x10/0x20
[   19.503821] 
[   19.503981] Allocated by task 194:
[   19.504057]  kasan_save_stack+0x3c/0x68
[   19.504269]  kasan_save_track+0x20/0x40
[   19.504467]  kasan_save_alloc_info+0x40/0x58
[   19.504538]  __kasan_kmalloc+0xd4/0xd8
[   19.504694]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.504797]  ksize_unpoisons_memory+0xc0/0x740
[   19.504842]  kunit_try_run_case+0x170/0x3f0
[   19.504880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.504923]  kthread+0x328/0x630
[   19.504983]  ret_from_fork+0x10/0x20
[   19.505033] 
[   19.505062] The buggy address belongs to the object at fff00000c5708300
[   19.505062]  which belongs to the cache kmalloc-128 of size 128
[   19.505122] The buggy address is located 12 bytes to the right of
[   19.505122]  allocated 115-byte region [fff00000c5708300, fff00000c5708373)
[   19.505188] 
[   19.505208] The buggy address belongs to the physical page:
[   19.505247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708
[   19.505309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.505355] page_type: f5(slab)
[   19.505402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.505461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.505510] page dumped because: kasan: bad access detected
[   19.505548] 
[   19.505573] Memory state around the buggy address:
[   19.505620]  fff00000c5708200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.505662]  fff00000c5708280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505704] >fff00000c5708300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.506585]                                                                 ^
[   19.507142]  fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.507191]  fff00000c5708400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.507582] ==================================================================

[   13.327733] ==================================================================
[   13.329202] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.330304] Read of size 1 at addr ffff888102602a73 by task kunit_try_catch/211
[   13.331112] 
[   13.331438] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.331489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.331501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.331522] Call Trace:
[   13.331537]  <TASK>
[   13.331555]  dump_stack_lvl+0x73/0xb0
[   13.331588]  print_report+0xd1/0x650
[   13.331610]  ? __virt_addr_valid+0x1db/0x2d0
[   13.331632]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.331653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.331678]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.331699]  kasan_report+0x141/0x180
[   13.331720]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.331746]  __asan_report_load1_noabort+0x18/0x20
[   13.331768]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.331790]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.331810]  ? finish_task_switch.isra.0+0x153/0x700
[   13.331832]  ? __switch_to+0x47/0xf50
[   13.331857]  ? __schedule+0x10cc/0x2b60
[   13.331879]  ? __pfx_read_tsc+0x10/0x10
[   13.331899]  ? ktime_get_ts64+0x86/0x230
[   13.331922]  kunit_try_run_case+0x1a5/0x480
[   13.331946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.331966]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.331989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.332010]  ? __kthread_parkme+0x82/0x180
[   13.332029]  ? preempt_count_sub+0x50/0x80
[   13.332164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.332190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.332213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.332234]  kthread+0x337/0x6f0
[   13.332253]  ? trace_preempt_on+0x20/0xc0
[   13.332277]  ? __pfx_kthread+0x10/0x10
[   13.332338]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.332359]  ? calculate_sigpending+0x7b/0xa0
[   13.332384]  ? __pfx_kthread+0x10/0x10
[   13.332416]  ret_from_fork+0x116/0x1d0
[   13.332433]  ? __pfx_kthread+0x10/0x10
[   13.332452]  ret_from_fork_asm+0x1a/0x30
[   13.332482]  </TASK>
[   13.332494] 
[   13.347207] Allocated by task 211:
[   13.347449]  kasan_save_stack+0x45/0x70
[   13.347771]  kasan_save_track+0x18/0x40
[   13.348221]  kasan_save_alloc_info+0x3b/0x50
[   13.348427]  __kasan_kmalloc+0xb7/0xc0
[   13.348796]  __kmalloc_cache_noprof+0x189/0x420
[   13.349307]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.349703]  kunit_try_run_case+0x1a5/0x480
[   13.349990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.350524]  kthread+0x337/0x6f0
[   13.350673]  ret_from_fork+0x116/0x1d0
[   13.350966]  ret_from_fork_asm+0x1a/0x30
[   13.351400] 
[   13.351567] The buggy address belongs to the object at ffff888102602a00
[   13.351567]  which belongs to the cache kmalloc-128 of size 128
[   13.352682] The buggy address is located 0 bytes to the right of
[   13.352682]  allocated 115-byte region [ffff888102602a00, ffff888102602a73)
[   13.353872] 
[   13.354125] The buggy address belongs to the physical page:
[   13.354712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   13.355280] flags: 0x200000000000000(node=0|zone=2)
[   13.355824] page_type: f5(slab)
[   13.356201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.356879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.357281] page dumped because: kasan: bad access detected
[   13.357784] 
[   13.357856] Memory state around the buggy address:
[   13.358058]  ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.358419]  ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.359197] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.359929]                                                              ^
[   13.360385]  ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.360854]  ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.361086] ==================================================================
[   13.362079] ==================================================================
[   13.362750] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.363644] Read of size 1 at addr ffff888102602a78 by task kunit_try_catch/211
[   13.364414] 
[   13.364575] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.364620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.364631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.364651] Call Trace:
[   13.364670]  <TASK>
[   13.364689]  dump_stack_lvl+0x73/0xb0
[   13.364715]  print_report+0xd1/0x650
[   13.364737]  ? __virt_addr_valid+0x1db/0x2d0
[   13.364758]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.364779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.364803]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.364825]  kasan_report+0x141/0x180
[   13.364845]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.364872]  __asan_report_load1_noabort+0x18/0x20
[   13.364895]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.364917]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.364938]  ? finish_task_switch.isra.0+0x153/0x700
[   13.364959]  ? __switch_to+0x47/0xf50
[   13.364984]  ? __schedule+0x10cc/0x2b60
[   13.365016]  ? __pfx_read_tsc+0x10/0x10
[   13.365036]  ? ktime_get_ts64+0x86/0x230
[   13.365078]  kunit_try_run_case+0x1a5/0x480
[   13.365101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.365121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.365144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.365165]  ? __kthread_parkme+0x82/0x180
[   13.365184]  ? preempt_count_sub+0x50/0x80
[   13.365205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.365227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.365249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.365270]  kthread+0x337/0x6f0
[   13.365288]  ? trace_preempt_on+0x20/0xc0
[   13.365309]  ? __pfx_kthread+0x10/0x10
[   13.365329]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.365348]  ? calculate_sigpending+0x7b/0xa0
[   13.365371]  ? __pfx_kthread+0x10/0x10
[   13.365391]  ret_from_fork+0x116/0x1d0
[   13.365407]  ? __pfx_kthread+0x10/0x10
[   13.365427]  ret_from_fork_asm+0x1a/0x30
[   13.365458]  </TASK>
[   13.365468] 
[   13.378831] Allocated by task 211:
[   13.378969]  kasan_save_stack+0x45/0x70
[   13.379198]  kasan_save_track+0x18/0x40
[   13.379590]  kasan_save_alloc_info+0x3b/0x50
[   13.380007]  __kasan_kmalloc+0xb7/0xc0
[   13.380426]  __kmalloc_cache_noprof+0x189/0x420
[   13.380902]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.381497]  kunit_try_run_case+0x1a5/0x480
[   13.381915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.382500]  kthread+0x337/0x6f0
[   13.382907]  ret_from_fork+0x116/0x1d0
[   13.383209]  ret_from_fork_asm+0x1a/0x30
[   13.383592] 
[   13.383750] The buggy address belongs to the object at ffff888102602a00
[   13.383750]  which belongs to the cache kmalloc-128 of size 128
[   13.384413] The buggy address is located 5 bytes to the right of
[   13.384413]  allocated 115-byte region [ffff888102602a00, ffff888102602a73)
[   13.385414] 
[   13.385637] The buggy address belongs to the physical page:
[   13.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   13.387034] flags: 0x200000000000000(node=0|zone=2)
[   13.387587] page_type: f5(slab)
[   13.387831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.388348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.388736] page dumped because: kasan: bad access detected
[   13.389260] 
[   13.389505] Memory state around the buggy address:
[   13.389943]  ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.390253]  ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.390473] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.391122]                                                                 ^
[   13.391948]  ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.392727]  ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.393573] ==================================================================
[   13.393982] ==================================================================
[   13.394679] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.395534] Read of size 1 at addr ffff888102602a7f by task kunit_try_catch/211
[   13.396372] 
[   13.396666] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.396738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.396750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.396792] Call Trace:
[   13.396810]  <TASK>
[   13.396825]  dump_stack_lvl+0x73/0xb0
[   13.396866]  print_report+0xd1/0x650
[   13.396887]  ? __virt_addr_valid+0x1db/0x2d0
[   13.396909]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.396930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.396954]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.396976]  kasan_report+0x141/0x180
[   13.396996]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.397023]  __asan_report_load1_noabort+0x18/0x20
[   13.397056]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.397079]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.397099]  ? finish_task_switch.isra.0+0x153/0x700
[   13.397120]  ? __switch_to+0x47/0xf50
[   13.397144]  ? __schedule+0x10cc/0x2b60
[   13.397166]  ? __pfx_read_tsc+0x10/0x10
[   13.397185]  ? ktime_get_ts64+0x86/0x230
[   13.397208]  kunit_try_run_case+0x1a5/0x480
[   13.397231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.397251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.397274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.397295]  ? __kthread_parkme+0x82/0x180
[   13.397314]  ? preempt_count_sub+0x50/0x80
[   13.397335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.397357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.397379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.397400]  kthread+0x337/0x6f0
[   13.397418]  ? trace_preempt_on+0x20/0xc0
[   13.397440]  ? __pfx_kthread+0x10/0x10
[   13.397460]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.397479]  ? calculate_sigpending+0x7b/0xa0
[   13.397502]  ? __pfx_kthread+0x10/0x10
[   13.397522]  ret_from_fork+0x116/0x1d0
[   13.397540]  ? __pfx_kthread+0x10/0x10
[   13.397568]  ret_from_fork_asm+0x1a/0x30
[   13.397598]  </TASK>
[   13.397608] 
[   13.412038] Allocated by task 211:
[   13.412196]  kasan_save_stack+0x45/0x70
[   13.412345]  kasan_save_track+0x18/0x40
[   13.412480]  kasan_save_alloc_info+0x3b/0x50
[   13.413107]  __kasan_kmalloc+0xb7/0xc0
[   13.413494]  __kmalloc_cache_noprof+0x189/0x420
[   13.413942]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.414618]  kunit_try_run_case+0x1a5/0x480
[   13.415115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.415650]  kthread+0x337/0x6f0
[   13.415982]  ret_from_fork+0x116/0x1d0
[   13.416457]  ret_from_fork_asm+0x1a/0x30
[   13.416884] 
[   13.417148] The buggy address belongs to the object at ffff888102602a00
[   13.417148]  which belongs to the cache kmalloc-128 of size 128
[   13.417956] The buggy address is located 12 bytes to the right of
[   13.417956]  allocated 115-byte region [ffff888102602a00, ffff888102602a73)
[   13.418618] 
[   13.418841] The buggy address belongs to the physical page:
[   13.419419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   13.420342] flags: 0x200000000000000(node=0|zone=2)
[   13.420783] page_type: f5(slab)
[   13.420999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.421559] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.422390] page dumped because: kasan: bad access detected
[   13.422597] 
[   13.422806] Memory state around the buggy address:
[   13.423398]  ffff888102602900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.424161]  ffff888102602980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.424382] >ffff888102602a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.424630]                                                                 ^
[   13.425337]  ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.426255]  ffff888102602b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.426928] ==================================================================