Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.981033] ==================================================================
[   19.981157] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.981270] Read of size 1 at addr fff00000c6345e7f by task kunit_try_catch/194
[   19.981353] 
[   19.981391] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.981482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.981524] Hardware name: linux,dummy-virt (DT)
[   19.981559] Call trace:
[   19.981581]  show_stack+0x20/0x38 (C)
[   19.981635]  dump_stack_lvl+0x8c/0xd0
[   19.982798]  print_report+0x118/0x608
[   19.983142]  kasan_report+0xdc/0x128
[   19.983272]  __asan_report_load1_noabort+0x20/0x30
[   19.983387]  ksize_unpoisons_memory+0x690/0x740
[   19.983490]  kunit_try_run_case+0x170/0x3f0
[   19.983594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.984707]  kthread+0x328/0x630
[   19.985168]  ret_from_fork+0x10/0x20
[   19.985533] 
[   19.985632] Allocated by task 194:
[   19.985717]  kasan_save_stack+0x3c/0x68
[   19.985813]  kasan_save_track+0x20/0x40
[   19.985950]  kasan_save_alloc_info+0x40/0x58
[   19.986063]  __kasan_kmalloc+0xd4/0xd8
[   19.986146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.986225]  ksize_unpoisons_memory+0xc0/0x740
[   19.986290]  kunit_try_run_case+0x170/0x3f0
[   19.986367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.986768]  kthread+0x328/0x630
[   19.986895]  ret_from_fork+0x10/0x20
[   19.987171] 
[   19.987298] The buggy address belongs to the object at fff00000c6345e00
[   19.987298]  which belongs to the cache kmalloc-128 of size 128
[   19.987524] The buggy address is located 12 bytes to the right of
[   19.987524]  allocated 115-byte region [fff00000c6345e00, fff00000c6345e73)
[   19.987936] 
[   19.987996] The buggy address belongs to the physical page:
[   19.988194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.988334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.988454] page_type: f5(slab)
[   19.988560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.988777] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.988973] page dumped because: kasan: bad access detected
[   19.989302] 
[   19.989344] Memory state around the buggy address:
[   19.989420]  fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.989655]  fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.989832] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.989929]                                                                 ^
[   19.990007]  fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.990112]  fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.990530] ==================================================================
[   19.962984] ==================================================================
[   19.963181] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.963361] Read of size 1 at addr fff00000c6345e73 by task kunit_try_catch/194
[   19.963513] 
[   19.963615] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.963828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.963911] Hardware name: linux,dummy-virt (DT)
[   19.963998] Call trace:
[   19.964068]  show_stack+0x20/0x38 (C)
[   19.964172]  dump_stack_lvl+0x8c/0xd0
[   19.964272]  print_report+0x118/0x608
[   19.964381]  kasan_report+0xdc/0x128
[   19.964504]  __asan_report_load1_noabort+0x20/0x30
[   19.964620]  ksize_unpoisons_memory+0x628/0x740
[   19.964980]  kunit_try_run_case+0x170/0x3f0
[   19.965137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.965308]  kthread+0x328/0x630
[   19.965487]  ret_from_fork+0x10/0x20
[   19.965687] 
[   19.965758] Allocated by task 194:
[   19.965821]  kasan_save_stack+0x3c/0x68
[   19.965905]  kasan_save_track+0x20/0x40
[   19.965968]  kasan_save_alloc_info+0x40/0x58
[   19.966063]  __kasan_kmalloc+0xd4/0xd8
[   19.966143]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.966235]  ksize_unpoisons_memory+0xc0/0x740
[   19.966355]  kunit_try_run_case+0x170/0x3f0
[   19.966486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.966624]  kthread+0x328/0x630
[   19.966726]  ret_from_fork+0x10/0x20
[   19.966812] 
[   19.966861] The buggy address belongs to the object at fff00000c6345e00
[   19.966861]  which belongs to the cache kmalloc-128 of size 128
[   19.967049] The buggy address is located 0 bytes to the right of
[   19.967049]  allocated 115-byte region [fff00000c6345e00, fff00000c6345e73)
[   19.967230] 
[   19.967299] The buggy address belongs to the physical page:
[   19.967397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.967568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.967689] page_type: f5(slab)
[   19.967770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.967881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.967975] page dumped because: kasan: bad access detected
[   19.968050] 
[   19.968085] Memory state around the buggy address:
[   19.968153]  fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.968250]  fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.968578] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.968947]                                                              ^
[   19.969146]  fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.969322]  fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.969415] ==================================================================
[   19.970858] ==================================================================
[   19.970966] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.971095] Read of size 1 at addr fff00000c6345e78 by task kunit_try_catch/194
[   19.971199] 
[   19.971268] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.971453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.971515] Hardware name: linux,dummy-virt (DT)
[   19.971586] Call trace:
[   19.971634]  show_stack+0x20/0x38 (C)
[   19.971745]  dump_stack_lvl+0x8c/0xd0
[   19.971857]  print_report+0x118/0x608
[   19.971963]  kasan_report+0xdc/0x128
[   19.972075]  __asan_report_load1_noabort+0x20/0x30
[   19.972181]  ksize_unpoisons_memory+0x618/0x740
[   19.972292]  kunit_try_run_case+0x170/0x3f0
[   19.972392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.972640]  kthread+0x328/0x630
[   19.972815]  ret_from_fork+0x10/0x20
[   19.973237] 
[   19.973284] Allocated by task 194:
[   19.973346]  kasan_save_stack+0x3c/0x68
[   19.973613]  kasan_save_track+0x20/0x40
[   19.973731]  kasan_save_alloc_info+0x40/0x58
[   19.973809]  __kasan_kmalloc+0xd4/0xd8
[   19.973882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.974245]  ksize_unpoisons_memory+0xc0/0x740
[   19.974388]  kunit_try_run_case+0x170/0x3f0
[   19.974477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.974564]  kthread+0x328/0x630
[   19.974645]  ret_from_fork+0x10/0x20
[   19.974736] 
[   19.974775] The buggy address belongs to the object at fff00000c6345e00
[   19.974775]  which belongs to the cache kmalloc-128 of size 128
[   19.974885] The buggy address is located 5 bytes to the right of
[   19.974885]  allocated 115-byte region [fff00000c6345e00, fff00000c6345e73)
[   19.975010] 
[   19.975061] The buggy address belongs to the physical page:
[   19.975161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.975411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.975660] page_type: f5(slab)
[   19.975807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.975968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.976115] page dumped because: kasan: bad access detected
[   19.976222] 
[   19.976277] Memory state around the buggy address:
[   19.976379]  fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.976475]  fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.976612] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.976752]                                                                 ^
[   19.976886]  fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.977221]  fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.977483] ==================================================================

[   11.994629] ==================================================================
[   11.994973] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.995569] Read of size 1 at addr ffff888103173f7f by task kunit_try_catch/211
[   11.995856] 
[   11.995964] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.996003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.996014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.996031] Call Trace:
[   11.996047]  <TASK>
[   11.996061]  dump_stack_lvl+0x73/0xb0
[   11.996087]  print_report+0xd1/0x650
[   11.996108]  ? __virt_addr_valid+0x1db/0x2d0
[   11.996143]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.996164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.996185]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.996207]  kasan_report+0x141/0x180
[   11.996227]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.996253]  __asan_report_load1_noabort+0x18/0x20
[   11.996276]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.996299]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.996397]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.996425]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.996451]  kunit_try_run_case+0x1a5/0x480
[   11.996474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.996495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.996539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.996560]  ? __kthread_parkme+0x82/0x180
[   11.996579]  ? preempt_count_sub+0x50/0x80
[   11.996602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.996624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.996645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.996667]  kthread+0x337/0x6f0
[   11.996685]  ? trace_preempt_on+0x20/0xc0
[   11.996707]  ? __pfx_kthread+0x10/0x10
[   11.996728]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.996749]  ? calculate_sigpending+0x7b/0xa0
[   11.996772]  ? __pfx_kthread+0x10/0x10
[   11.996794]  ret_from_fork+0x116/0x1d0
[   11.996812]  ? __pfx_kthread+0x10/0x10
[   11.996832]  ret_from_fork_asm+0x1a/0x30
[   11.996862]  </TASK>
[   11.996873] 
[   12.004538] Allocated by task 211:
[   12.004731]  kasan_save_stack+0x45/0x70
[   12.004896]  kasan_save_track+0x18/0x40
[   12.005204]  kasan_save_alloc_info+0x3b/0x50
[   12.005417]  __kasan_kmalloc+0xb7/0xc0
[   12.005624]  __kmalloc_cache_noprof+0x189/0x420
[   12.005848]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.006058]  kunit_try_run_case+0x1a5/0x480
[   12.006290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.006614]  kthread+0x337/0x6f0
[   12.006759]  ret_from_fork+0x116/0x1d0
[   12.006894]  ret_from_fork_asm+0x1a/0x30
[   12.007033] 
[   12.007110] The buggy address belongs to the object at ffff888103173f00
[   12.007110]  which belongs to the cache kmalloc-128 of size 128
[   12.007903] The buggy address is located 12 bytes to the right of
[   12.007903]  allocated 115-byte region [ffff888103173f00, ffff888103173f73)
[   12.008592] 
[   12.008711] The buggy address belongs to the physical page:
[   12.008918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   12.009170] flags: 0x200000000000000(node=0|zone=2)
[   12.009381] page_type: f5(slab)
[   12.009620] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.009973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.010468] page dumped because: kasan: bad access detected
[   12.010736] 
[   12.010830] Memory state around the buggy address:
[   12.011034]  ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.011325]  ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.011859] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.012195]                                                                 ^
[   12.012547]  ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.012887]  ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.013148] ==================================================================
[   11.977042] ==================================================================
[   11.977409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.977703] Read of size 1 at addr ffff888103173f78 by task kunit_try_catch/211
[   11.977927] 
[   11.978036] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.978076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.978087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.978107] Call Trace:
[   11.978142]  <TASK>
[   11.978156]  dump_stack_lvl+0x73/0xb0
[   11.978180]  print_report+0xd1/0x650
[   11.978201]  ? __virt_addr_valid+0x1db/0x2d0
[   11.978223]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.978245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.978265]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.978287]  kasan_report+0x141/0x180
[   11.978328]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.978355]  __asan_report_load1_noabort+0x18/0x20
[   11.978378]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.978400]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.978421]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.978448]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.978474]  kunit_try_run_case+0x1a5/0x480
[   11.978496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.978524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.978546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.978567]  ? __kthread_parkme+0x82/0x180
[   11.978586]  ? preempt_count_sub+0x50/0x80
[   11.978608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.978630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.978651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.978673]  kthread+0x337/0x6f0
[   11.978691]  ? trace_preempt_on+0x20/0xc0
[   11.978713]  ? __pfx_kthread+0x10/0x10
[   11.978732]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.978752]  ? calculate_sigpending+0x7b/0xa0
[   11.978775]  ? __pfx_kthread+0x10/0x10
[   11.978795]  ret_from_fork+0x116/0x1d0
[   11.978812]  ? __pfx_kthread+0x10/0x10
[   11.978831]  ret_from_fork_asm+0x1a/0x30
[   11.978860]  </TASK>
[   11.978870] 
[   11.986004] Allocated by task 211:
[   11.986203]  kasan_save_stack+0x45/0x70
[   11.986500]  kasan_save_track+0x18/0x40
[   11.986674]  kasan_save_alloc_info+0x3b/0x50
[   11.986851]  __kasan_kmalloc+0xb7/0xc0
[   11.986983]  __kmalloc_cache_noprof+0x189/0x420
[   11.987188]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.987466]  kunit_try_run_case+0x1a5/0x480
[   11.987673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.987899]  kthread+0x337/0x6f0
[   11.988062]  ret_from_fork+0x116/0x1d0
[   11.988223]  ret_from_fork_asm+0x1a/0x30
[   11.988387] 
[   11.988478] The buggy address belongs to the object at ffff888103173f00
[   11.988478]  which belongs to the cache kmalloc-128 of size 128
[   11.989014] The buggy address is located 5 bytes to the right of
[   11.989014]  allocated 115-byte region [ffff888103173f00, ffff888103173f73)
[   11.989749] 
[   11.989820] The buggy address belongs to the physical page:
[   11.989991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   11.990259] flags: 0x200000000000000(node=0|zone=2)
[   11.990447] page_type: f5(slab)
[   11.990573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.990833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.991523] page dumped because: kasan: bad access detected
[   11.991788] 
[   11.991882] Memory state around the buggy address:
[   11.992110]  ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.992535]  ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.992852] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.993184]                                                                 ^
[   11.993471]  ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.993690]  ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.994006] ==================================================================
[   11.958696] ==================================================================
[   11.959159] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.959489] Read of size 1 at addr ffff888103173f73 by task kunit_try_catch/211
[   11.959797] 
[   11.959923] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.959966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.959977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.959996] Call Trace:
[   11.960007]  <TASK>
[   11.960021]  dump_stack_lvl+0x73/0xb0
[   11.960046]  print_report+0xd1/0x650
[   11.960069]  ? __virt_addr_valid+0x1db/0x2d0
[   11.960090]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.960112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.960168]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.960190]  kasan_report+0x141/0x180
[   11.960211]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.960237]  __asan_report_load1_noabort+0x18/0x20
[   11.960260]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.960282]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.960323]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.960352]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.960378]  kunit_try_run_case+0x1a5/0x480
[   11.960402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.960423]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.960445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.960466]  ? __kthread_parkme+0x82/0x180
[   11.960489]  ? preempt_count_sub+0x50/0x80
[   11.960513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.960535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.960557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.960579]  kthread+0x337/0x6f0
[   11.960597]  ? trace_preempt_on+0x20/0xc0
[   11.960618]  ? __pfx_kthread+0x10/0x10
[   11.960639]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.960659]  ? calculate_sigpending+0x7b/0xa0
[   11.960682]  ? __pfx_kthread+0x10/0x10
[   11.960702]  ret_from_fork+0x116/0x1d0
[   11.960719]  ? __pfx_kthread+0x10/0x10
[   11.960739]  ret_from_fork_asm+0x1a/0x30
[   11.960768]  </TASK>
[   11.960779] 
[   11.967950] Allocated by task 211:
[   11.968113]  kasan_save_stack+0x45/0x70
[   11.968299]  kasan_save_track+0x18/0x40
[   11.968435]  kasan_save_alloc_info+0x3b/0x50
[   11.968582]  __kasan_kmalloc+0xb7/0xc0
[   11.968826]  __kmalloc_cache_noprof+0x189/0x420
[   11.969050]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.969350]  kunit_try_run_case+0x1a5/0x480
[   11.969557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.969798]  kthread+0x337/0x6f0
[   11.969920]  ret_from_fork+0x116/0x1d0
[   11.970051]  ret_from_fork_asm+0x1a/0x30
[   11.970219] 
[   11.970310] The buggy address belongs to the object at ffff888103173f00
[   11.970310]  which belongs to the cache kmalloc-128 of size 128
[   11.971060] The buggy address is located 0 bytes to the right of
[   11.971060]  allocated 115-byte region [ffff888103173f00, ffff888103173f73)
[   11.971588] 
[   11.971662] The buggy address belongs to the physical page:
[   11.971835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   11.972269] flags: 0x200000000000000(node=0|zone=2)
[   11.972763] page_type: f5(slab)
[   11.972930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.973209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.973840] page dumped because: kasan: bad access detected
[   11.974043] 
[   11.974163] Memory state around the buggy address:
[   11.974440]  ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.974686]  ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.974902] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.975182]                                                              ^
[   11.975742]  ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.976243]  ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.976613] ==================================================================