Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.633063] ==================================================================
[   15.633419] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.633488] Read of size 1 at addr fff00000c3f39978 by task kunit_try_catch/194
[   15.633544] 
[   15.633576] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.633921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.634157] Hardware name: linux,dummy-virt (DT)
[   15.634359] Call trace:
[   15.634405]  show_stack+0x20/0x38 (C)
[   15.634466]  dump_stack_lvl+0x8c/0xd0
[   15.634669]  print_report+0x118/0x5d0
[   15.634764]  kasan_report+0xdc/0x128
[   15.634812]  __asan_report_load1_noabort+0x20/0x30
[   15.634874]  ksize_unpoisons_memory+0x618/0x740
[   15.635346]  kunit_try_run_case+0x170/0x3f0
[   15.635460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.635872]  kthread+0x328/0x630
[   15.636095]  ret_from_fork+0x10/0x20
[   15.636339] 
[   15.636405] Allocated by task 194:
[   15.636442]  kasan_save_stack+0x3c/0x68
[   15.636810]  kasan_save_track+0x20/0x40
[   15.636930]  kasan_save_alloc_info+0x40/0x58
[   15.636976]  __kasan_kmalloc+0xd4/0xd8
[   15.637324]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.637468]  ksize_unpoisons_memory+0xc0/0x740
[   15.637524]  kunit_try_run_case+0x170/0x3f0
[   15.637873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.638065]  kthread+0x328/0x630
[   15.638103]  ret_from_fork+0x10/0x20
[   15.638380] 
[   15.638506] The buggy address belongs to the object at fff00000c3f39900
[   15.638506]  which belongs to the cache kmalloc-128 of size 128
[   15.638712] The buggy address is located 5 bytes to the right of
[   15.638712]  allocated 115-byte region [fff00000c3f39900, fff00000c3f39973)
[   15.638787] 
[   15.639160] The buggy address belongs to the physical page:
[   15.639204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.639452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.639748] page_type: f5(slab)
[   15.639802] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.639992] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.640067] page dumped because: kasan: bad access detected
[   15.640380] 
[   15.640535] Memory state around the buggy address:
[   15.640589]  fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.640654]  fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640744] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.640786]                                                                 ^
[   15.640848]  fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640914]  fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640968] ==================================================================
[   15.619598] ==================================================================
[   15.619686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.619740] Read of size 1 at addr fff00000c3f39973 by task kunit_try_catch/194
[   15.619802] 
[   15.619835] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.620365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.620769] Hardware name: linux,dummy-virt (DT)
[   15.620859] Call trace:
[   15.620890]  show_stack+0x20/0x38 (C)
[   15.621027]  dump_stack_lvl+0x8c/0xd0
[   15.621157]  print_report+0x118/0x5d0
[   15.621220]  kasan_report+0xdc/0x128
[   15.621593]  __asan_report_load1_noabort+0x20/0x30
[   15.621793]  ksize_unpoisons_memory+0x628/0x740
[   15.621895]  kunit_try_run_case+0x170/0x3f0
[   15.622037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.622098]  kthread+0x328/0x630
[   15.622490]  ret_from_fork+0x10/0x20
[   15.622595] 
[   15.622674] Allocated by task 194:
[   15.623150]  kasan_save_stack+0x3c/0x68
[   15.623566]  kasan_save_track+0x20/0x40
[   15.623742]  kasan_save_alloc_info+0x40/0x58
[   15.623840]  __kasan_kmalloc+0xd4/0xd8
[   15.623924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.623997]  ksize_unpoisons_memory+0xc0/0x740
[   15.624039]  kunit_try_run_case+0x170/0x3f0
[   15.624078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.624520]  kthread+0x328/0x630
[   15.624749]  ret_from_fork+0x10/0x20
[   15.624940] 
[   15.624964] The buggy address belongs to the object at fff00000c3f39900
[   15.624964]  which belongs to the cache kmalloc-128 of size 128
[   15.625328] The buggy address is located 0 bytes to the right of
[   15.625328]  allocated 115-byte region [fff00000c3f39900, fff00000c3f39973)
[   15.625679] 
[   15.625868] The buggy address belongs to the physical page:
[   15.626009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.626181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.626347] page_type: f5(slab)
[   15.626411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.627063] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.627310] page dumped because: kasan: bad access detected
[   15.627377] 
[   15.627456] Memory state around the buggy address:
[   15.627593]  fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.627678]  fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.627873] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.628050]                                                              ^
[   15.628197]  fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.628263]  fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.628806] ==================================================================
[   15.643452] ==================================================================
[   15.643513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.643567] Read of size 1 at addr fff00000c3f3997f by task kunit_try_catch/194
[   15.643844] 
[   15.644288] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.644394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.644422] Hardware name: linux,dummy-virt (DT)
[   15.644846] Call trace:
[   15.644961]  show_stack+0x20/0x38 (C)
[   15.645155]  dump_stack_lvl+0x8c/0xd0
[   15.645379]  print_report+0x118/0x5d0
[   15.645489]  kasan_report+0xdc/0x128
[   15.645576]  __asan_report_load1_noabort+0x20/0x30
[   15.645631]  ksize_unpoisons_memory+0x690/0x740
[   15.645791]  kunit_try_run_case+0x170/0x3f0
[   15.645843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.645958]  kthread+0x328/0x630
[   15.646004]  ret_from_fork+0x10/0x20
[   15.646053] 
[   15.646071] Allocated by task 194:
[   15.646099]  kasan_save_stack+0x3c/0x68
[   15.646142]  kasan_save_track+0x20/0x40
[   15.646179]  kasan_save_alloc_info+0x40/0x58
[   15.646552]  __kasan_kmalloc+0xd4/0xd8
[   15.646683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.646737]  ksize_unpoisons_memory+0xc0/0x740
[   15.646816]  kunit_try_run_case+0x170/0x3f0
[   15.646949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.646997]  kthread+0x328/0x630
[   15.647044]  ret_from_fork+0x10/0x20
[   15.647088] 
[   15.647355] The buggy address belongs to the object at fff00000c3f39900
[   15.647355]  which belongs to the cache kmalloc-128 of size 128
[   15.647534] The buggy address is located 12 bytes to the right of
[   15.647534]  allocated 115-byte region [fff00000c3f39900, fff00000c3f39973)
[   15.647659] 
[   15.647701] The buggy address belongs to the physical page:
[   15.647732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.647788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.647859] page_type: f5(slab)
[   15.647903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.647968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.648010] page dumped because: kasan: bad access detected
[   15.648042] 
[   15.648061] Memory state around the buggy address:
[   15.648101]  fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.648147]  fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.648201] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.648241]                                                                 ^
[   15.648283]  fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.648350]  fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.648405] ==================================================================

[   13.049177] ==================================================================
[   13.049611] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.049962] Read of size 1 at addr ffff8881025cc37f by task kunit_try_catch/211
[   13.050354] 
[   13.050444] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.050485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.050497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.050516] Call Trace:
[   13.050545]  <TASK>
[   13.050560]  dump_stack_lvl+0x73/0xb0
[   13.050587]  print_report+0xd1/0x610
[   13.050620]  ? __virt_addr_valid+0x1db/0x2d0
[   13.050642]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.050664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.050685]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.050707]  kasan_report+0x141/0x180
[   13.050728]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.050754]  __asan_report_load1_noabort+0x18/0x20
[   13.050777]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.050800]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.050830]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.050867]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.050893]  kunit_try_run_case+0x1a5/0x480
[   13.050917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.050957]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.050980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.051002]  ? __kthread_parkme+0x82/0x180
[   13.051031]  ? preempt_count_sub+0x50/0x80
[   13.051053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.051076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.051098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.051122]  kthread+0x337/0x6f0
[   13.051141]  ? trace_preempt_on+0x20/0xc0
[   13.051162]  ? __pfx_kthread+0x10/0x10
[   13.051182]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.051202]  ? calculate_sigpending+0x7b/0xa0
[   13.051235]  ? __pfx_kthread+0x10/0x10
[   13.051255]  ret_from_fork+0x116/0x1d0
[   13.051273]  ? __pfx_kthread+0x10/0x10
[   13.051293]  ret_from_fork_asm+0x1a/0x30
[   13.051322]  </TASK>
[   13.051332] 
[   13.059278] Allocated by task 211:
[   13.059520]  kasan_save_stack+0x45/0x70
[   13.059669]  kasan_save_track+0x18/0x40
[   13.059805]  kasan_save_alloc_info+0x3b/0x50
[   13.060055]  __kasan_kmalloc+0xb7/0xc0
[   13.060244]  __kmalloc_cache_noprof+0x189/0x420
[   13.060450]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.060649]  kunit_try_run_case+0x1a5/0x480
[   13.060906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.061200]  kthread+0x337/0x6f0
[   13.061330]  ret_from_fork+0x116/0x1d0
[   13.061569]  ret_from_fork_asm+0x1a/0x30
[   13.061789] 
[   13.061894] The buggy address belongs to the object at ffff8881025cc300
[   13.061894]  which belongs to the cache kmalloc-128 of size 128
[   13.062496] The buggy address is located 12 bytes to the right of
[   13.062496]  allocated 115-byte region [ffff8881025cc300, ffff8881025cc373)
[   13.063034] 
[   13.063134] The buggy address belongs to the physical page:
[   13.063416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.063764] flags: 0x200000000000000(node=0|zone=2)
[   13.064017] page_type: f5(slab)
[   13.064322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.064668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.064994] page dumped because: kasan: bad access detected
[   13.065259] 
[   13.065331] Memory state around the buggy address:
[   13.065626]  ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.065937]  ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.066291] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.066534]                                                                 ^
[   13.066749]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.066973]  ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.067187] ==================================================================
[   13.029724] ==================================================================
[   13.030032] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.030441] Read of size 1 at addr ffff8881025cc378 by task kunit_try_catch/211
[   13.030663] 
[   13.030763] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.030804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.030824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.030843] Call Trace:
[   13.030857]  <TASK>
[   13.030870]  dump_stack_lvl+0x73/0xb0
[   13.030895]  print_report+0xd1/0x610
[   13.030916]  ? __virt_addr_valid+0x1db/0x2d0
[   13.030937]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.030958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.030980]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.031002]  kasan_report+0x141/0x180
[   13.031023]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.031049]  __asan_report_load1_noabort+0x18/0x20
[   13.031072]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.031095]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.031116]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.031145]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.031171]  kunit_try_run_case+0x1a5/0x480
[   13.031194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.031215]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.031237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.031259]  ? __kthread_parkme+0x82/0x180
[   13.031278]  ? preempt_count_sub+0x50/0x80
[   13.031300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.031323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.031345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.031368]  kthread+0x337/0x6f0
[   13.031386]  ? trace_preempt_on+0x20/0xc0
[   13.031408]  ? __pfx_kthread+0x10/0x10
[   13.031427]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.031448]  ? calculate_sigpending+0x7b/0xa0
[   13.031470]  ? __pfx_kthread+0x10/0x10
[   13.031490]  ret_from_fork+0x116/0x1d0
[   13.031508]  ? __pfx_kthread+0x10/0x10
[   13.031527]  ret_from_fork_asm+0x1a/0x30
[   13.031557]  </TASK>
[   13.031567] 
[   13.039544] Allocated by task 211:
[   13.039735]  kasan_save_stack+0x45/0x70
[   13.039935]  kasan_save_track+0x18/0x40
[   13.040072]  kasan_save_alloc_info+0x3b/0x50
[   13.040300]  __kasan_kmalloc+0xb7/0xc0
[   13.040588]  __kmalloc_cache_noprof+0x189/0x420
[   13.040745]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.041271]  kunit_try_run_case+0x1a5/0x480
[   13.041486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.041684]  kthread+0x337/0x6f0
[   13.041882]  ret_from_fork+0x116/0x1d0
[   13.042070]  ret_from_fork_asm+0x1a/0x30
[   13.042325] 
[   13.042420] The buggy address belongs to the object at ffff8881025cc300
[   13.042420]  which belongs to the cache kmalloc-128 of size 128
[   13.042932] The buggy address is located 5 bytes to the right of
[   13.042932]  allocated 115-byte region [ffff8881025cc300, ffff8881025cc373)
[   13.043664] 
[   13.044021] The buggy address belongs to the physical page:
[   13.044383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.044740] flags: 0x200000000000000(node=0|zone=2)
[   13.044986] page_type: f5(slab)
[   13.045128] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.045362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.045697] page dumped because: kasan: bad access detected
[   13.046034] 
[   13.046179] Memory state around the buggy address:
[   13.046397]  ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.046717]  ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.047040] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.047464]                                                                 ^
[   13.047775]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.048039]  ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.048509] ==================================================================
[   13.006184] ==================================================================
[   13.007335] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.007664] Read of size 1 at addr ffff8881025cc373 by task kunit_try_catch/211
[   13.007966] 
[   13.008077] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.008123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.008135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.008158] Call Trace:
[   13.008171]  <TASK>
[   13.008189]  dump_stack_lvl+0x73/0xb0
[   13.008220]  print_report+0xd1/0x610
[   13.008242]  ? __virt_addr_valid+0x1db/0x2d0
[   13.008265]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.008287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.008308]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.008330]  kasan_report+0x141/0x180
[   13.008351]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.008378]  __asan_report_load1_noabort+0x18/0x20
[   13.008401]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.008423]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.008445]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.008474]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.008500]  kunit_try_run_case+0x1a5/0x480
[   13.008525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.008546]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.008569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.008686]  ? __kthread_parkme+0x82/0x180
[   13.008715]  ? preempt_count_sub+0x50/0x80
[   13.008742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.008765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.008788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.008819]  kthread+0x337/0x6f0
[   13.008839]  ? trace_preempt_on+0x20/0xc0
[   13.008866]  ? __pfx_kthread+0x10/0x10
[   13.008885]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.008906]  ? calculate_sigpending+0x7b/0xa0
[   13.008929]  ? __pfx_kthread+0x10/0x10
[   13.008950]  ret_from_fork+0x116/0x1d0
[   13.008968]  ? __pfx_kthread+0x10/0x10
[   13.008987]  ret_from_fork_asm+0x1a/0x30
[   13.009016]  </TASK>
[   13.009028] 
[   13.019159] Allocated by task 211:
[   13.019708]  kasan_save_stack+0x45/0x70
[   13.019985]  kasan_save_track+0x18/0x40
[   13.020402]  kasan_save_alloc_info+0x3b/0x50
[   13.020607]  __kasan_kmalloc+0xb7/0xc0
[   13.020793]  __kmalloc_cache_noprof+0x189/0x420
[   13.021131]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.021463]  kunit_try_run_case+0x1a5/0x480
[   13.021638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.021905]  kthread+0x337/0x6f0
[   13.022057]  ret_from_fork+0x116/0x1d0
[   13.022536]  ret_from_fork_asm+0x1a/0x30
[   13.022748] 
[   13.022853] The buggy address belongs to the object at ffff8881025cc300
[   13.022853]  which belongs to the cache kmalloc-128 of size 128
[   13.023433] The buggy address is located 0 bytes to the right of
[   13.023433]  allocated 115-byte region [ffff8881025cc300, ffff8881025cc373)
[   13.024292] 
[   13.024408] The buggy address belongs to the physical page:
[   13.024652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.025010] flags: 0x200000000000000(node=0|zone=2)
[   13.025497] page_type: f5(slab)
[   13.025642] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.026153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.026621] page dumped because: kasan: bad access detected
[   13.026865] 
[   13.026948] Memory state around the buggy address:
[   13.027149]  ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.027445]  ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.027736] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.028033]                                                              ^
[   13.028618]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.028882]  ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.029274] ==================================================================