Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.802329] ==================================================================
[   16.802625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.802684] Read of size 1 at addr fff00000c6554f73 by task kunit_try_catch/194
[   16.802770] 
[   16.802802] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.802913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.802974] Hardware name: linux,dummy-virt (DT)
[   16.803011] Call trace:
[   16.803040]  show_stack+0x20/0x38 (C)
[   16.803090]  dump_stack_lvl+0x8c/0xd0
[   16.803139]  print_report+0x118/0x5d0
[   16.803186]  kasan_report+0xdc/0x128
[   16.803231]  __asan_report_load1_noabort+0x20/0x30
[   16.803326]  ksize_unpoisons_memory+0x628/0x740
[   16.803468]  kunit_try_run_case+0x170/0x3f0
[   16.803590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.803684]  kthread+0x328/0x630
[   16.803769]  ret_from_fork+0x10/0x20
[   16.803891] 
[   16.803948] Allocated by task 194:
[   16.803976]  kasan_save_stack+0x3c/0x68
[   16.804019]  kasan_save_track+0x20/0x40
[   16.804057]  kasan_save_alloc_info+0x40/0x58
[   16.804097]  __kasan_kmalloc+0xd4/0xd8
[   16.804134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.804259]  ksize_unpoisons_memory+0xc0/0x740
[   16.804308]  kunit_try_run_case+0x170/0x3f0
[   16.804347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.804447]  kthread+0x328/0x630
[   16.804528]  ret_from_fork+0x10/0x20
[   16.804628] 
[   16.804721] The buggy address belongs to the object at fff00000c6554f00
[   16.804721]  which belongs to the cache kmalloc-128 of size 128
[   16.804784] The buggy address is located 0 bytes to the right of
[   16.804784]  allocated 115-byte region [fff00000c6554f00, fff00000c6554f73)
[   16.805095] 
[   16.805123] The buggy address belongs to the physical page:
[   16.805210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.805272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.805372] page_type: f5(slab)
[   16.805449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.805513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.805554] page dumped because: kasan: bad access detected
[   16.805620] 
[   16.805638] Memory state around the buggy address:
[   16.805667]  fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.805722]  fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805766] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.805936]                                                              ^
[   16.806069]  fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806141]  fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc
[   16.806191] ==================================================================
[   16.811444] ==================================================================
[   16.811487] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.811532] Read of size 1 at addr fff00000c6554f7f by task kunit_try_catch/194
[   16.811581] 
[   16.811609] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.811689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.811729] Hardware name: linux,dummy-virt (DT)
[   16.811760] Call trace:
[   16.811779]  show_stack+0x20/0x38 (C)
[   16.811827]  dump_stack_lvl+0x8c/0xd0
[   16.811874]  print_report+0x118/0x5d0
[   16.811934]  kasan_report+0xdc/0x128
[   16.812169]  __asan_report_load1_noabort+0x20/0x30
[   16.812237]  ksize_unpoisons_memory+0x690/0x740
[   16.812285]  kunit_try_run_case+0x170/0x3f0
[   16.812333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.812384]  kthread+0x328/0x630
[   16.812597]  ret_from_fork+0x10/0x20
[   16.812673] 
[   16.812690] Allocated by task 194:
[   16.812728]  kasan_save_stack+0x3c/0x68
[   16.812768]  kasan_save_track+0x20/0x40
[   16.812804]  kasan_save_alloc_info+0x40/0x58
[   16.812845]  __kasan_kmalloc+0xd4/0xd8
[   16.812971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.813057]  ksize_unpoisons_memory+0xc0/0x740
[   16.813154]  kunit_try_run_case+0x170/0x3f0
[   16.813269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.813377]  kthread+0x328/0x630
[   16.813420]  ret_from_fork+0x10/0x20
[   16.813457] 
[   16.813721] The buggy address belongs to the object at fff00000c6554f00
[   16.813721]  which belongs to the cache kmalloc-128 of size 128
[   16.813818] The buggy address is located 12 bytes to the right of
[   16.813818]  allocated 115-byte region [fff00000c6554f00, fff00000c6554f73)
[   16.813944] 
[   16.814032] The buggy address belongs to the physical page:
[   16.814121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.814175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.814230] page_type: f5(slab)
[   16.814507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.814616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.814719] page dumped because: kasan: bad access detected
[   16.814804] 
[   16.814890] Memory state around the buggy address:
[   16.814922]  fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.815219]  fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.815266] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.815353]                                                                 ^
[   16.815488]  fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.815571]  fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc
[   16.815692] ==================================================================
[   16.808276] ==================================================================
[   16.808370] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.808423] Read of size 1 at addr fff00000c6554f78 by task kunit_try_catch/194
[   16.808489] 
[   16.808542] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.808643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.808696] Hardware name: linux,dummy-virt (DT)
[   16.808741] Call trace:
[   16.808788]  show_stack+0x20/0x38 (C)
[   16.808841]  dump_stack_lvl+0x8c/0xd0
[   16.808906]  print_report+0x118/0x5d0
[   16.809156]  kasan_report+0xdc/0x128
[   16.809237]  __asan_report_load1_noabort+0x20/0x30
[   16.809311]  ksize_unpoisons_memory+0x618/0x740
[   16.809386]  kunit_try_run_case+0x170/0x3f0
[   16.809451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.809506]  kthread+0x328/0x630
[   16.809586]  ret_from_fork+0x10/0x20
[   16.809635] 
[   16.809652] Allocated by task 194:
[   16.809680]  kasan_save_stack+0x3c/0x68
[   16.809740]  kasan_save_track+0x20/0x40
[   16.809846]  kasan_save_alloc_info+0x40/0x58
[   16.809967]  __kasan_kmalloc+0xd4/0xd8
[   16.810028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.810072]  ksize_unpoisons_memory+0xc0/0x740
[   16.810118]  kunit_try_run_case+0x170/0x3f0
[   16.810160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.810212]  kthread+0x328/0x630
[   16.810251]  ret_from_fork+0x10/0x20
[   16.810286] 
[   16.810312] The buggy address belongs to the object at fff00000c6554f00
[   16.810312]  which belongs to the cache kmalloc-128 of size 128
[   16.810373] The buggy address is located 5 bytes to the right of
[   16.810373]  allocated 115-byte region [fff00000c6554f00, fff00000c6554f73)
[   16.810575] 
[   16.810600] The buggy address belongs to the physical page:
[   16.810638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.810750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.810801] page_type: f5(slab)
[   16.810839] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.810891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.810932] page dumped because: kasan: bad access detected
[   16.810975] 
[   16.810993] Memory state around the buggy address:
[   16.811025]  fff00000c6554e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.811084]  fff00000c6554e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.811137] >fff00000c6554f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.811185]                                                                 ^
[   16.811236]  fff00000c6554f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.811280]  fff00000c6555000: 07 fc fc fc 00 fc fc fc 00 fc fc fc 03 fc fc fc
[   16.811319] ==================================================================

[   13.034103] ==================================================================
[   13.034438] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.034784] Read of size 1 at addr ffff88810305be7f by task kunit_try_catch/211
[   13.035251] 
[   13.035368] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.035410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.035421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.035440] Call Trace:
[   13.035455]  <TASK>
[   13.035468]  dump_stack_lvl+0x73/0xb0
[   13.035497]  print_report+0xd1/0x610
[   13.035520]  ? __virt_addr_valid+0x1db/0x2d0
[   13.035543]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.035567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.035592]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.035616]  kasan_report+0x141/0x180
[   13.035638]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.035667]  __asan_report_load1_noabort+0x18/0x20
[   13.035692]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.035717]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.035741]  ? finish_task_switch.isra.0+0x153/0x700
[   13.035781]  ? __switch_to+0x47/0xf50
[   13.035806]  ? __schedule+0x10cc/0x2b60
[   13.035828]  ? __pfx_read_tsc+0x10/0x10
[   13.035849]  ? ktime_get_ts64+0x86/0x230
[   13.035872]  kunit_try_run_case+0x1a5/0x480
[   13.035897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.035920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.035944]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.035968]  ? __kthread_parkme+0x82/0x180
[   13.036048]  ? preempt_count_sub+0x50/0x80
[   13.036072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.036097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.036122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.036148]  kthread+0x337/0x6f0
[   13.036168]  ? trace_preempt_on+0x20/0xc0
[   13.036191]  ? __pfx_kthread+0x10/0x10
[   13.036211]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.036233]  ? calculate_sigpending+0x7b/0xa0
[   13.036257]  ? __pfx_kthread+0x10/0x10
[   13.036279]  ret_from_fork+0x116/0x1d0
[   13.036298]  ? __pfx_kthread+0x10/0x10
[   13.036318]  ret_from_fork_asm+0x1a/0x30
[   13.036349]  </TASK>
[   13.036359] 
[   13.044742] Allocated by task 211:
[   13.044886]  kasan_save_stack+0x45/0x70
[   13.045233]  kasan_save_track+0x18/0x40
[   13.045377]  kasan_save_alloc_info+0x3b/0x50
[   13.045563]  __kasan_kmalloc+0xb7/0xc0
[   13.045770]  __kmalloc_cache_noprof+0x189/0x420
[   13.045998]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.046186]  kunit_try_run_case+0x1a5/0x480
[   13.046334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.046511]  kthread+0x337/0x6f0
[   13.046631]  ret_from_fork+0x116/0x1d0
[   13.046772]  ret_from_fork_asm+0x1a/0x30
[   13.046913] 
[   13.047139] The buggy address belongs to the object at ffff88810305be00
[   13.047139]  which belongs to the cache kmalloc-128 of size 128
[   13.047807] The buggy address is located 12 bytes to the right of
[   13.047807]  allocated 115-byte region [ffff88810305be00, ffff88810305be73)
[   13.048786] 
[   13.048870] The buggy address belongs to the physical page:
[   13.049049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   13.049290] flags: 0x200000000000000(node=0|zone=2)
[   13.049452] page_type: f5(slab)
[   13.049671] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.050113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.050479] page dumped because: kasan: bad access detected
[   13.050735] 
[   13.050844] Memory state around the buggy address:
[   13.051413]  ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.051770]  ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.052046] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.052331]                                                                 ^
[   13.052835]  ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.053323]  ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.053742] ==================================================================
[   12.995592] ==================================================================
[   12.996119] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.996685] Read of size 1 at addr ffff88810305be73 by task kunit_try_catch/211
[   12.997061] 
[   12.997195] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.997242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.997254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.997275] Call Trace:
[   12.997289]  <TASK>
[   12.997306]  dump_stack_lvl+0x73/0xb0
[   12.997339]  print_report+0xd1/0x610
[   12.997366]  ? __virt_addr_valid+0x1db/0x2d0
[   12.997392]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.997417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.997440]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.997464]  kasan_report+0x141/0x180
[   12.997487]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.997516]  __asan_report_load1_noabort+0x18/0x20
[   12.997541]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.997566]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.997590]  ? finish_task_switch.isra.0+0x153/0x700
[   12.997630]  ? __switch_to+0x47/0xf50
[   12.997657]  ? __schedule+0x10cc/0x2b60
[   12.997680]  ? __pfx_read_tsc+0x10/0x10
[   12.997702]  ? ktime_get_ts64+0x86/0x230
[   12.997727]  kunit_try_run_case+0x1a5/0x480
[   12.997765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.997789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.997814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.997838]  ? __kthread_parkme+0x82/0x180
[   12.997860]  ? preempt_count_sub+0x50/0x80
[   12.997883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.997908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.997933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.997959]  kthread+0x337/0x6f0
[   12.997997]  ? trace_preempt_on+0x20/0xc0
[   12.998022]  ? __pfx_kthread+0x10/0x10
[   12.998043]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.998065]  ? calculate_sigpending+0x7b/0xa0
[   12.998091]  ? __pfx_kthread+0x10/0x10
[   12.998112]  ret_from_fork+0x116/0x1d0
[   12.998132]  ? __pfx_kthread+0x10/0x10
[   12.998152]  ret_from_fork_asm+0x1a/0x30
[   12.998183]  </TASK>
[   12.998193] 
[   13.006069] Allocated by task 211:
[   13.006375]  kasan_save_stack+0x45/0x70
[   13.006550]  kasan_save_track+0x18/0x40
[   13.006810]  kasan_save_alloc_info+0x3b/0x50
[   13.007091]  __kasan_kmalloc+0xb7/0xc0
[   13.007269]  __kmalloc_cache_noprof+0x189/0x420
[   13.007492]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.007660]  kunit_try_run_case+0x1a5/0x480
[   13.007876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.008241]  kthread+0x337/0x6f0
[   13.008372]  ret_from_fork+0x116/0x1d0
[   13.008506]  ret_from_fork_asm+0x1a/0x30
[   13.008646] 
[   13.008741] The buggy address belongs to the object at ffff88810305be00
[   13.008741]  which belongs to the cache kmalloc-128 of size 128
[   13.009408] The buggy address is located 0 bytes to the right of
[   13.009408]  allocated 115-byte region [ffff88810305be00, ffff88810305be73)
[   13.009843] 
[   13.009918] The buggy address belongs to the physical page:
[   13.010126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   13.010528] flags: 0x200000000000000(node=0|zone=2)
[   13.010776] page_type: f5(slab)
[   13.010946] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.011292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.011661] page dumped because: kasan: bad access detected
[   13.011881] 
[   13.011951] Memory state around the buggy address:
[   13.012105]  ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.012325]  ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.012642] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.012963]                                                              ^
[   13.013203]  ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.013419]  ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.013896] ==================================================================
[   13.014845] ==================================================================
[   13.015193] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.015469] Read of size 1 at addr ffff88810305be78 by task kunit_try_catch/211
[   13.016049] 
[   13.016166] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.016207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.016218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.016237] Call Trace:
[   13.016248]  <TASK>
[   13.016261]  dump_stack_lvl+0x73/0xb0
[   13.016288]  print_report+0xd1/0x610
[   13.016311]  ? __virt_addr_valid+0x1db/0x2d0
[   13.016333]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.016357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.016380]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.016405]  kasan_report+0x141/0x180
[   13.016427]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.016465]  __asan_report_load1_noabort+0x18/0x20
[   13.016491]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.016515]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.016539]  ? finish_task_switch.isra.0+0x153/0x700
[   13.016562]  ? __switch_to+0x47/0xf50
[   13.016587]  ? __schedule+0x10cc/0x2b60
[   13.016609]  ? __pfx_read_tsc+0x10/0x10
[   13.016630]  ? ktime_get_ts64+0x86/0x230
[   13.016653]  kunit_try_run_case+0x1a5/0x480
[   13.016678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.016701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.016725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.016750]  ? __kthread_parkme+0x82/0x180
[   13.016785]  ? preempt_count_sub+0x50/0x80
[   13.016808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.016833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.016858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.016884]  kthread+0x337/0x6f0
[   13.016903]  ? trace_preempt_on+0x20/0xc0
[   13.016926]  ? __pfx_kthread+0x10/0x10
[   13.016947]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.016969]  ? calculate_sigpending+0x7b/0xa0
[   13.017141]  ? __pfx_kthread+0x10/0x10
[   13.017164]  ret_from_fork+0x116/0x1d0
[   13.017183]  ? __pfx_kthread+0x10/0x10
[   13.017204]  ret_from_fork_asm+0x1a/0x30
[   13.017235]  </TASK>
[   13.017245] 
[   13.024981] Allocated by task 211:
[   13.025353]  kasan_save_stack+0x45/0x70
[   13.025559]  kasan_save_track+0x18/0x40
[   13.025750]  kasan_save_alloc_info+0x3b/0x50
[   13.025973]  __kasan_kmalloc+0xb7/0xc0
[   13.026430]  __kmalloc_cache_noprof+0x189/0x420
[   13.026625]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.026829]  kunit_try_run_case+0x1a5/0x480
[   13.027159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.027414]  kthread+0x337/0x6f0
[   13.027566]  ret_from_fork+0x116/0x1d0
[   13.027743]  ret_from_fork_asm+0x1a/0x30
[   13.027946] 
[   13.028120] The buggy address belongs to the object at ffff88810305be00
[   13.028120]  which belongs to the cache kmalloc-128 of size 128
[   13.028658] The buggy address is located 5 bytes to the right of
[   13.028658]  allocated 115-byte region [ffff88810305be00, ffff88810305be73)
[   13.029250] 
[   13.029350] The buggy address belongs to the physical page:
[   13.029599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   13.029912] flags: 0x200000000000000(node=0|zone=2)
[   13.030357] page_type: f5(slab)
[   13.030567] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.030889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.031221] page dumped because: kasan: bad access detected
[   13.031485] 
[   13.031581] Memory state around the buggy address:
[   13.031780]  ffff88810305bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.032148]  ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.032368] >ffff88810305be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.032581]                                                                 ^
[   13.032827]  ffff88810305be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.033142]  ffff88810305bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.033741] ==================================================================