Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.407262] ==================================================================
[   15.407341] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.407396] Read of size 1 at addr fff00000c6094f7f by task kunit_try_catch/195
[   15.407631] 
[   15.407684] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.407882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.408058] Hardware name: linux,dummy-virt (DT)
[   15.408135] Call trace:
[   15.408161]  show_stack+0x20/0x38 (C)
[   15.408225]  dump_stack_lvl+0x8c/0xd0
[   15.408449]  print_report+0x118/0x5d0
[   15.408691]  kasan_report+0xdc/0x128
[   15.408811]  __asan_report_load1_noabort+0x20/0x30
[   15.408905]  ksize_unpoisons_memory+0x690/0x740
[   15.409055]  kunit_try_run_case+0x170/0x3f0
[   15.409143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.409368]  kthread+0x328/0x630
[   15.409596]  ret_from_fork+0x10/0x20
[   15.409763] 
[   15.409832] Allocated by task 195:
[   15.409988]  kasan_save_stack+0x3c/0x68
[   15.410093]  kasan_save_track+0x20/0x40
[   15.410231]  kasan_save_alloc_info+0x40/0x58
[   15.410659]  __kasan_kmalloc+0xd4/0xd8
[   15.410729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.410812]  ksize_unpoisons_memory+0xc0/0x740
[   15.410861]  kunit_try_run_case+0x170/0x3f0
[   15.410899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.410951]  kthread+0x328/0x630
[   15.410983]  ret_from_fork+0x10/0x20
[   15.411018] 
[   15.411039] The buggy address belongs to the object at fff00000c6094f00
[   15.411039]  which belongs to the cache kmalloc-128 of size 128
[   15.411096] The buggy address is located 12 bytes to the right of
[   15.411096]  allocated 115-byte region [fff00000c6094f00, fff00000c6094f73)
[   15.411161] 
[   15.411180] The buggy address belongs to the physical page:
[   15.411223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   15.411285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.411331] page_type: f5(slab)
[   15.411372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.411424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.411485] page dumped because: kasan: bad access detected
[   15.411516] 
[   15.411536] Memory state around the buggy address:
[   15.411575]  fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.411628]  fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.411680] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.411729]                                                                 ^
[   15.411771]  fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.411813]  fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.411862] ==================================================================
[   15.391029] ==================================================================
[   15.391816] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.391937] Read of size 1 at addr fff00000c6094f73 by task kunit_try_catch/195
[   15.392032] 
[   15.392069] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.392429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.392553] Hardware name: linux,dummy-virt (DT)
[   15.392909] Call trace:
[   15.392950]  show_stack+0x20/0x38 (C)
[   15.393059]  dump_stack_lvl+0x8c/0xd0
[   15.393133]  print_report+0x118/0x5d0
[   15.393322]  kasan_report+0xdc/0x128
[   15.393381]  __asan_report_load1_noabort+0x20/0x30
[   15.393545]  ksize_unpoisons_memory+0x628/0x740
[   15.393782]  kunit_try_run_case+0x170/0x3f0
[   15.393935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.394002]  kthread+0x328/0x630
[   15.394201]  ret_from_fork+0x10/0x20
[   15.394426] 
[   15.394468] Allocated by task 195:
[   15.394542]  kasan_save_stack+0x3c/0x68
[   15.394747]  kasan_save_track+0x20/0x40
[   15.394928]  kasan_save_alloc_info+0x40/0x58
[   15.395020]  __kasan_kmalloc+0xd4/0xd8
[   15.395068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.395109]  ksize_unpoisons_memory+0xc0/0x740
[   15.395148]  kunit_try_run_case+0x170/0x3f0
[   15.395218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.395277]  kthread+0x328/0x630
[   15.395328]  ret_from_fork+0x10/0x20
[   15.395366] 
[   15.395388] The buggy address belongs to the object at fff00000c6094f00
[   15.395388]  which belongs to the cache kmalloc-128 of size 128
[   15.395451] The buggy address is located 0 bytes to the right of
[   15.395451]  allocated 115-byte region [fff00000c6094f00, fff00000c6094f73)
[   15.395515] 
[   15.395536] The buggy address belongs to the physical page:
[   15.395585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   15.395648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.395696] page_type: f5(slab)
[   15.395735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.395786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.395834] page dumped because: kasan: bad access detected
[   15.395879] 
[   15.395897] Memory state around the buggy address:
[   15.395930]  fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.395981]  fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.396022] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.396078]                                                              ^
[   15.396116]  fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.396173]  fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.396221] ==================================================================
[   15.399296] ==================================================================
[   15.399391] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.399515] Read of size 1 at addr fff00000c6094f78 by task kunit_try_catch/195
[   15.399569] 
[   15.399628] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.400051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.400216] Hardware name: linux,dummy-virt (DT)
[   15.400262] Call trace:
[   15.400318]  show_stack+0x20/0x38 (C)
[   15.400391]  dump_stack_lvl+0x8c/0xd0
[   15.400437]  print_report+0x118/0x5d0
[   15.400726]  kasan_report+0xdc/0x128
[   15.400797]  __asan_report_load1_noabort+0x20/0x30
[   15.400851]  ksize_unpoisons_memory+0x618/0x740
[   15.401157]  kunit_try_run_case+0x170/0x3f0
[   15.401276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.401378]  kthread+0x328/0x630
[   15.401477]  ret_from_fork+0x10/0x20
[   15.401629] 
[   15.401649] Allocated by task 195:
[   15.401677]  kasan_save_stack+0x3c/0x68
[   15.401719]  kasan_save_track+0x20/0x40
[   15.401764]  kasan_save_alloc_info+0x40/0x58
[   15.402106]  __kasan_kmalloc+0xd4/0xd8
[   15.402213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.402308]  ksize_unpoisons_memory+0xc0/0x740
[   15.402396]  kunit_try_run_case+0x170/0x3f0
[   15.402482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.402615]  kthread+0x328/0x630
[   15.402690]  ret_from_fork+0x10/0x20
[   15.402735] 
[   15.402894] The buggy address belongs to the object at fff00000c6094f00
[   15.402894]  which belongs to the cache kmalloc-128 of size 128
[   15.403129] The buggy address is located 5 bytes to the right of
[   15.403129]  allocated 115-byte region [fff00000c6094f00, fff00000c6094f73)
[   15.403329] 
[   15.403405] The buggy address belongs to the physical page:
[   15.403551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   15.403649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.403994] page_type: f5(slab)
[   15.404298] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.404573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.404628] page dumped because: kasan: bad access detected
[   15.404764] 
[   15.404854] Memory state around the buggy address:
[   15.405027]  fff00000c6094e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.405112]  fff00000c6094e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405157] >fff00000c6094f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.405398]                                                                 ^
[   15.405645]  fff00000c6094f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405811]  fff00000c6095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.405919] ==================================================================

[   13.364993] ==================================================================
[   13.366390] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.366669] Read of size 1 at addr ffff888103249673 by task kunit_try_catch/212
[   13.367243] 
[   13.367608] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.367661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.367672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.367695] Call Trace:
[   13.367708]  <TASK>
[   13.367726]  dump_stack_lvl+0x73/0xb0
[   13.367759]  print_report+0xd1/0x610
[   13.367782]  ? __virt_addr_valid+0x1db/0x2d0
[   13.367806]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.367829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.367851]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.367874]  kasan_report+0x141/0x180
[   13.367895]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.367923]  __asan_report_load1_noabort+0x18/0x20
[   13.367947]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.367970]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.367992]  ? finish_task_switch.isra.0+0x153/0x700
[   13.368016]  ? __switch_to+0x47/0xf50
[   13.368043]  ? __schedule+0x10c6/0x2b60
[   13.368148]  ? __pfx_read_tsc+0x10/0x10
[   13.368171]  ? ktime_get_ts64+0x86/0x230
[   13.368195]  kunit_try_run_case+0x1a5/0x480
[   13.368221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.368243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.368267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.368290]  ? __kthread_parkme+0x82/0x180
[   13.368311]  ? preempt_count_sub+0x50/0x80
[   13.368333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.368356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.368379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.368402]  kthread+0x337/0x6f0
[   13.368422]  ? trace_preempt_on+0x20/0xc0
[   13.368445]  ? __pfx_kthread+0x10/0x10
[   13.368466]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.368499]  ? calculate_sigpending+0x7b/0xa0
[   13.368524]  ? __pfx_kthread+0x10/0x10
[   13.368546]  ret_from_fork+0x116/0x1d0
[   13.368564]  ? __pfx_kthread+0x10/0x10
[   13.368585]  ret_from_fork_asm+0x1a/0x30
[   13.368615]  </TASK>
[   13.368625] 
[   13.382448] Allocated by task 212:
[   13.382614]  kasan_save_stack+0x45/0x70
[   13.382770]  kasan_save_track+0x18/0x40
[   13.383128]  kasan_save_alloc_info+0x3b/0x50
[   13.383585]  __kasan_kmalloc+0xb7/0xc0
[   13.383991]  __kmalloc_cache_noprof+0x189/0x420
[   13.384450]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.384912]  kunit_try_run_case+0x1a5/0x480
[   13.385341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.386087]  kthread+0x337/0x6f0
[   13.386302]  ret_from_fork+0x116/0x1d0
[   13.386622]  ret_from_fork_asm+0x1a/0x30
[   13.387007] 
[   13.387175] The buggy address belongs to the object at ffff888103249600
[   13.387175]  which belongs to the cache kmalloc-128 of size 128
[   13.387724] The buggy address is located 0 bytes to the right of
[   13.387724]  allocated 115-byte region [ffff888103249600, ffff888103249673)
[   13.388882] 
[   13.389137] The buggy address belongs to the physical page:
[   13.389648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   13.390529] flags: 0x200000000000000(node=0|zone=2)
[   13.390760] page_type: f5(slab)
[   13.391067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.391916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.392483] page dumped because: kasan: bad access detected
[   13.392973] 
[   13.393201] Memory state around the buggy address:
[   13.393381]  ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.393620]  ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.393887] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.394185]                                                              ^
[   13.394478]  ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.394854]  ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.395130] ==================================================================
[   13.395860] ==================================================================
[   13.396401] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.396713] Read of size 1 at addr ffff888103249678 by task kunit_try_catch/212
[   13.397116] 
[   13.397250] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.397297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.397308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.397330] Call Trace:
[   13.397342]  <TASK>
[   13.397357]  dump_stack_lvl+0x73/0xb0
[   13.397386]  print_report+0xd1/0x610
[   13.397409]  ? __virt_addr_valid+0x1db/0x2d0
[   13.397433]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.397457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.397490]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.397514]  kasan_report+0x141/0x180
[   13.397536]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.397563]  __asan_report_load1_noabort+0x18/0x20
[   13.397587]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.397611]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.397634]  ? finish_task_switch.isra.0+0x153/0x700
[   13.397657]  ? __switch_to+0x47/0xf50
[   13.397682]  ? __schedule+0x10c6/0x2b60
[   13.397705]  ? __pfx_read_tsc+0x10/0x10
[   13.397726]  ? ktime_get_ts64+0x86/0x230
[   13.397751]  kunit_try_run_case+0x1a5/0x480
[   13.397775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.397797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.397841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.397865]  ? __kthread_parkme+0x82/0x180
[   13.397886]  ? preempt_count_sub+0x50/0x80
[   13.397908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.397932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.397955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.397979]  kthread+0x337/0x6f0
[   13.397998]  ? trace_preempt_on+0x20/0xc0
[   13.398021]  ? __pfx_kthread+0x10/0x10
[   13.398044]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.398066]  ? calculate_sigpending+0x7b/0xa0
[   13.398091]  ? __pfx_kthread+0x10/0x10
[   13.398118]  ret_from_fork+0x116/0x1d0
[   13.398137]  ? __pfx_kthread+0x10/0x10
[   13.398157]  ret_from_fork_asm+0x1a/0x30
[   13.398187]  </TASK>
[   13.398197] 
[   13.406442] Allocated by task 212:
[   13.406720]  kasan_save_stack+0x45/0x70
[   13.406998]  kasan_save_track+0x18/0x40
[   13.407416]  kasan_save_alloc_info+0x3b/0x50
[   13.407646]  __kasan_kmalloc+0xb7/0xc0
[   13.407836]  __kmalloc_cache_noprof+0x189/0x420
[   13.408024]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.408182]  kunit_try_run_case+0x1a5/0x480
[   13.408429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.408710]  kthread+0x337/0x6f0
[   13.409015]  ret_from_fork+0x116/0x1d0
[   13.409398]  ret_from_fork_asm+0x1a/0x30
[   13.409607] 
[   13.409710] The buggy address belongs to the object at ffff888103249600
[   13.409710]  which belongs to the cache kmalloc-128 of size 128
[   13.410087] The buggy address is located 5 bytes to the right of
[   13.410087]  allocated 115-byte region [ffff888103249600, ffff888103249673)
[   13.410482] 
[   13.410556] The buggy address belongs to the physical page:
[   13.410805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   13.411194] flags: 0x200000000000000(node=0|zone=2)
[   13.411432] page_type: f5(slab)
[   13.411618] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.412019] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.412377] page dumped because: kasan: bad access detected
[   13.412573] 
[   13.412647] Memory state around the buggy address:
[   13.412933]  ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.413614]  ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.413968] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.414363]                                                                 ^
[   13.414660]  ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.414994]  ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.415543] ==================================================================
[   13.416156] ==================================================================
[   13.416508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.417066] Read of size 1 at addr ffff88810324967f by task kunit_try_catch/212
[   13.417505] 
[   13.417625] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.417671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.417682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.417703] Call Trace:
[   13.417715]  <TASK>
[   13.417731]  dump_stack_lvl+0x73/0xb0
[   13.417762]  print_report+0xd1/0x610
[   13.417794]  ? __virt_addr_valid+0x1db/0x2d0
[   13.417816]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.417839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.417862]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.417885]  kasan_report+0x141/0x180
[   13.417907]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.417935]  __asan_report_load1_noabort+0x18/0x20
[   13.417959]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.417982]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.418005]  ? finish_task_switch.isra.0+0x153/0x700
[   13.418027]  ? __switch_to+0x47/0xf50
[   13.418052]  ? __schedule+0x10c6/0x2b60
[   13.418075]  ? __pfx_read_tsc+0x10/0x10
[   13.418096]  ? ktime_get_ts64+0x86/0x230
[   13.418125]  kunit_try_run_case+0x1a5/0x480
[   13.418149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.418172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.418195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.418219]  ? __kthread_parkme+0x82/0x180
[   13.418239]  ? preempt_count_sub+0x50/0x80
[   13.418315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.418339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.418363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.418387]  kthread+0x337/0x6f0
[   13.418409]  ? trace_preempt_on+0x20/0xc0
[   13.418432]  ? __pfx_kthread+0x10/0x10
[   13.418453]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.418487]  ? calculate_sigpending+0x7b/0xa0
[   13.418512]  ? __pfx_kthread+0x10/0x10
[   13.418534]  ret_from_fork+0x116/0x1d0
[   13.418553]  ? __pfx_kthread+0x10/0x10
[   13.418574]  ret_from_fork_asm+0x1a/0x30
[   13.418605]  </TASK>
[   13.418614] 
[   13.427376] Allocated by task 212:
[   13.427571]  kasan_save_stack+0x45/0x70
[   13.427831]  kasan_save_track+0x18/0x40
[   13.428012]  kasan_save_alloc_info+0x3b/0x50
[   13.428414]  __kasan_kmalloc+0xb7/0xc0
[   13.428594]  __kmalloc_cache_noprof+0x189/0x420
[   13.428868]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.429037]  kunit_try_run_case+0x1a5/0x480
[   13.429190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.429373]  kthread+0x337/0x6f0
[   13.429511]  ret_from_fork+0x116/0x1d0
[   13.429652]  ret_from_fork_asm+0x1a/0x30
[   13.429798] 
[   13.429873] The buggy address belongs to the object at ffff888103249600
[   13.429873]  which belongs to the cache kmalloc-128 of size 128
[   13.430280] The buggy address is located 12 bytes to the right of
[   13.430280]  allocated 115-byte region [ffff888103249600, ffff888103249673)
[   13.431133] 
[   13.431234] The buggy address belongs to the physical page:
[   13.431504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   13.432028] flags: 0x200000000000000(node=0|zone=2)
[   13.432206] page_type: f5(slab)
[   13.432334] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.432589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.432828] page dumped because: kasan: bad access detected
[   13.433050] 
[   13.433149] Memory state around the buggy address:
[   13.433385]  ffff888103249500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.433742]  ffff888103249580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.434523] >ffff888103249600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.434858]                                                                 ^
[   13.435214]  ffff888103249680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435460]  ffff888103249700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435727] ==================================================================