Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.234577] ==================================================================
[   18.234638] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.234689] Read of size 1 at addr fff00000c3ec0673 by task kunit_try_catch/194
[   18.234738] 
[   18.234772] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.234852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.234879] Hardware name: linux,dummy-virt (DT)
[   18.234911] Call trace:
[   18.234933]  show_stack+0x20/0x38 (C)
[   18.234986]  dump_stack_lvl+0x8c/0xd0
[   18.235033]  print_report+0x118/0x608
[   18.235079]  kasan_report+0xdc/0x128
[   18.235189]  __asan_report_load1_noabort+0x20/0x30
[   18.235248]  ksize_unpoisons_memory+0x628/0x740
[   18.235306]  kunit_try_run_case+0x170/0x3f0
[   18.235362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.235415]  kthread+0x328/0x630
[   18.235456]  ret_from_fork+0x10/0x20
[   18.235503] 
[   18.235521] Allocated by task 194:
[   18.235562]  kasan_save_stack+0x3c/0x68
[   18.235604]  kasan_save_track+0x20/0x40
[   18.235641]  kasan_save_alloc_info+0x40/0x58
[   18.235680]  __kasan_kmalloc+0xd4/0xd8
[   18.235718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.235767]  ksize_unpoisons_memory+0xc0/0x740
[   18.235805]  kunit_try_run_case+0x170/0x3f0
[   18.235842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.236706]  kthread+0x328/0x630
[   18.237267]  ret_from_fork+0x10/0x20
[   18.237527] 
[   18.237593] The buggy address belongs to the object at fff00000c3ec0600
[   18.237593]  which belongs to the cache kmalloc-128 of size 128
[   18.237800] The buggy address is located 0 bytes to the right of
[   18.237800]  allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673)
[   18.237986] 
[   18.238083] The buggy address belongs to the physical page:
[   18.238137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0
[   18.238208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.238280] page_type: f5(slab)
[   18.238346] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.238615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.238714] page dumped because: kasan: bad access detected
[   18.238936] 
[   18.239060] Memory state around the buggy address:
[   18.239146]  fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.239287]  fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239411] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.239722]                                                              ^
[   18.239830]  fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239885]  fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239963] ==================================================================
[   18.242578] ==================================================================
[   18.242629] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.242697] Read of size 1 at addr fff00000c3ec0678 by task kunit_try_catch/194
[   18.243030] 
[   18.243077] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.243204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.243272] Hardware name: linux,dummy-virt (DT)
[   18.243350] Call trace:
[   18.243476]  show_stack+0x20/0x38 (C)
[   18.243530]  dump_stack_lvl+0x8c/0xd0
[   18.243576]  print_report+0x118/0x608
[   18.243864]  kasan_report+0xdc/0x128
[   18.243950]  __asan_report_load1_noabort+0x20/0x30
[   18.244189]  ksize_unpoisons_memory+0x618/0x740
[   18.244366]  kunit_try_run_case+0x170/0x3f0
[   18.244679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.245080]  kthread+0x328/0x630
[   18.245317]  ret_from_fork+0x10/0x20
[   18.245723] 
[   18.245878] Allocated by task 194:
[   18.246029]  kasan_save_stack+0x3c/0x68
[   18.246431]  kasan_save_track+0x20/0x40
[   18.246504]  kasan_save_alloc_info+0x40/0x58
[   18.246763]  __kasan_kmalloc+0xd4/0xd8
[   18.246989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.247262]  ksize_unpoisons_memory+0xc0/0x740
[   18.247344]  kunit_try_run_case+0x170/0x3f0
[   18.247610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.248219]  kthread+0x328/0x630
[   18.248289]  ret_from_fork+0x10/0x20
[   18.248470] 
[   18.248663] The buggy address belongs to the object at fff00000c3ec0600
[   18.248663]  which belongs to the cache kmalloc-128 of size 128
[   18.248759] The buggy address is located 5 bytes to the right of
[   18.248759]  allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673)
[   18.248906] 
[   18.248925] The buggy address belongs to the physical page:
[   18.248963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0
[   18.249018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.249455] page_type: f5(slab)
[   18.249517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.249621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.249664] page dumped because: kasan: bad access detected
[   18.250025] 
[   18.250072] Memory state around the buggy address:
[   18.250193]  fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.250287]  fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.250346] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.250531]                                                                 ^
[   18.250603]  fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.250771]  fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.250941] ==================================================================
[   18.252492] ==================================================================
[   18.252903] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.252968] Read of size 1 at addr fff00000c3ec067f by task kunit_try_catch/194
[   18.253179] 
[   18.253335] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.253450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.253489] Hardware name: linux,dummy-virt (DT)
[   18.253635] Call trace:
[   18.253682]  show_stack+0x20/0x38 (C)
[   18.253876]  dump_stack_lvl+0x8c/0xd0
[   18.253937]  print_report+0x118/0x608
[   18.254093]  kasan_report+0xdc/0x128
[   18.254146]  __asan_report_load1_noabort+0x20/0x30
[   18.254209]  ksize_unpoisons_memory+0x690/0x740
[   18.254409]  kunit_try_run_case+0x170/0x3f0
[   18.254579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.254642]  kthread+0x328/0x630
[   18.254684]  ret_from_fork+0x10/0x20
[   18.254733] 
[   18.254751] Allocated by task 194:
[   18.254999]  kasan_save_stack+0x3c/0x68
[   18.255107]  kasan_save_track+0x20/0x40
[   18.255272]  kasan_save_alloc_info+0x40/0x58
[   18.255318]  __kasan_kmalloc+0xd4/0xd8
[   18.255365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.255406]  ksize_unpoisons_memory+0xc0/0x740
[   18.255445]  kunit_try_run_case+0x170/0x3f0
[   18.255491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.255534]  kthread+0x328/0x630
[   18.255567]  ret_from_fork+0x10/0x20
[   18.255613] 
[   18.255643] The buggy address belongs to the object at fff00000c3ec0600
[   18.255643]  which belongs to the cache kmalloc-128 of size 128
[   18.255701] The buggy address is located 12 bytes to the right of
[   18.255701]  allocated 115-byte region [fff00000c3ec0600, fff00000c3ec0673)
[   18.255768] 
[   18.255793] The buggy address belongs to the physical page:
[   18.255823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0
[   18.255873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.256142] page_type: f5(slab)
[   18.256449] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.256530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.256717] page dumped because: kasan: bad access detected
[   18.256874] 
[   18.256897] Memory state around the buggy address:
[   18.256942]  fff00000c3ec0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.257340]  fff00000c3ec0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.257391] >fff00000c3ec0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.257455]                                                                 ^
[   18.257660]  fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.257866]  fff00000c3ec0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.257911] ==================================================================

[   14.029878] ==================================================================
[   14.031341] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   14.031653] Read of size 1 at addr ffff8881021dbb73 by task kunit_try_catch/212
[   14.031941] 
[   14.032186] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.032244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.032259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.032284] Call Trace:
[   14.032301]  <TASK>
[   14.032324]  dump_stack_lvl+0x73/0xb0
[   14.032364]  print_report+0xd1/0x650
[   14.032393]  ? __virt_addr_valid+0x1db/0x2d0
[   14.032422]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.032448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.032473]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.032500]  kasan_report+0x141/0x180
[   14.032524]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.032555]  __asan_report_load1_noabort+0x18/0x20
[   14.032582]  ksize_unpoisons_memory+0x81c/0x9b0
[   14.032609]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.032634]  ? finish_task_switch.isra.0+0x153/0x700
[   14.032660]  ? __switch_to+0x47/0xf50
[   14.032690]  ? __schedule+0x10cc/0x2b60
[   14.032716]  ? __pfx_read_tsc+0x10/0x10
[   14.032740]  ? ktime_get_ts64+0x86/0x230
[   14.032768]  kunit_try_run_case+0x1a5/0x480
[   14.032810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.032863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.032889]  ? __kthread_parkme+0x82/0x180
[   14.032912]  ? preempt_count_sub+0x50/0x80
[   14.032938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.032990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033017]  kthread+0x337/0x6f0
[   14.033040]  ? trace_preempt_on+0x20/0xc0
[   14.033067]  ? __pfx_kthread+0x10/0x10
[   14.033090]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.033114]  ? calculate_sigpending+0x7b/0xa0
[   14.033142]  ? __pfx_kthread+0x10/0x10
[   14.033166]  ret_from_fork+0x116/0x1d0
[   14.033187]  ? __pfx_kthread+0x10/0x10
[   14.033210]  ret_from_fork_asm+0x1a/0x30
[   14.033246]  </TASK>
[   14.033260] 
[   14.050646] Allocated by task 212:
[   14.051333]  kasan_save_stack+0x45/0x70
[   14.051763]  kasan_save_track+0x18/0x40
[   14.051940]  kasan_save_alloc_info+0x3b/0x50
[   14.052121]  __kasan_kmalloc+0xb7/0xc0
[   14.052530]  __kmalloc_cache_noprof+0x189/0x420
[   14.053120]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.053655]  kunit_try_run_case+0x1a5/0x480
[   14.054125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.054592]  kthread+0x337/0x6f0
[   14.054738]  ret_from_fork+0x116/0x1d0
[   14.054906]  ret_from_fork_asm+0x1a/0x30
[   14.055065] 
[   14.055254] The buggy address belongs to the object at ffff8881021dbb00
[   14.055254]  which belongs to the cache kmalloc-128 of size 128
[   14.056748] The buggy address is located 0 bytes to the right of
[   14.056748]  allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73)
[   14.058237] 
[   14.058459] The buggy address belongs to the physical page:
[   14.058923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db
[   14.059536] flags: 0x200000000000000(node=0|zone=2)
[   14.060165] page_type: f5(slab)
[   14.060721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.061029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.061774] page dumped because: kasan: bad access detected
[   14.062452] 
[   14.062637] Memory state around the buggy address:
[   14.063117]  ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.063549]  ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.063818] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.064062]                                                              ^
[   14.065002]  ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.066037]  ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.066836] ==================================================================
[   14.067914] ==================================================================
[   14.068634] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   14.069506] Read of size 1 at addr ffff8881021dbb78 by task kunit_try_catch/212
[   14.069767] 
[   14.069890] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.069941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.069955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.069979] Call Trace:
[   14.070000]  <TASK>
[   14.070022]  dump_stack_lvl+0x73/0xb0
[   14.070061]  print_report+0xd1/0x650
[   14.070087]  ? __virt_addr_valid+0x1db/0x2d0
[   14.070112]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.070138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.070162]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.070188]  kasan_report+0x141/0x180
[   14.070212]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.070243]  __asan_report_load1_noabort+0x18/0x20
[   14.070269]  ksize_unpoisons_memory+0x7e9/0x9b0
[   14.070295]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.070319]  ? finish_task_switch.isra.0+0x153/0x700
[   14.070344]  ? __switch_to+0x47/0xf50
[   14.070372]  ? __schedule+0x10cc/0x2b60
[   14.070397]  ? __pfx_read_tsc+0x10/0x10
[   14.070421]  ? ktime_get_ts64+0x86/0x230
[   14.070447]  kunit_try_run_case+0x1a5/0x480
[   14.070475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.070499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.070525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.070550]  ? __kthread_parkme+0x82/0x180
[   14.070573]  ? preempt_count_sub+0x50/0x80
[   14.070598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.070634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.070659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.070684]  kthread+0x337/0x6f0
[   14.070706]  ? trace_preempt_on+0x20/0xc0
[   14.070732]  ? __pfx_kthread+0x10/0x10
[   14.070755]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.070778]  ? calculate_sigpending+0x7b/0xa0
[   14.070817]  ? __pfx_kthread+0x10/0x10
[   14.070841]  ret_from_fork+0x116/0x1d0
[   14.070862]  ? __pfx_kthread+0x10/0x10
[   14.070884]  ret_from_fork_asm+0x1a/0x30
[   14.070919]  </TASK>
[   14.070933] 
[   14.080044] Allocated by task 212:
[   14.080541]  kasan_save_stack+0x45/0x70
[   14.080809]  kasan_save_track+0x18/0x40
[   14.080999]  kasan_save_alloc_info+0x3b/0x50
[   14.081327]  __kasan_kmalloc+0xb7/0xc0
[   14.081494]  __kmalloc_cache_noprof+0x189/0x420
[   14.081703]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.081966]  kunit_try_run_case+0x1a5/0x480
[   14.082201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.082506]  kthread+0x337/0x6f0
[   14.082650]  ret_from_fork+0x116/0x1d0
[   14.082881]  ret_from_fork_asm+0x1a/0x30
[   14.083085] 
[   14.083167] The buggy address belongs to the object at ffff8881021dbb00
[   14.083167]  which belongs to the cache kmalloc-128 of size 128
[   14.083567] The buggy address is located 5 bytes to the right of
[   14.083567]  allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73)
[   14.084441] 
[   14.084579] The buggy address belongs to the physical page:
[   14.084889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db
[   14.085431] flags: 0x200000000000000(node=0|zone=2)
[   14.085672] page_type: f5(slab)
[   14.085867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.086316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.086663] page dumped because: kasan: bad access detected
[   14.086933] 
[   14.087041] Memory state around the buggy address:
[   14.087322]  ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.087640]  ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.088029] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.088528]                                                                 ^
[   14.088862]  ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089111]  ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089472] ==================================================================
[   14.090052] ==================================================================
[   14.090622] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   14.091001] Read of size 1 at addr ffff8881021dbb7f by task kunit_try_catch/212
[   14.091540] 
[   14.091674] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.091721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.091734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.091758] Call Trace:
[   14.091777]  <TASK>
[   14.091810]  dump_stack_lvl+0x73/0xb0
[   14.091844]  print_report+0xd1/0x650
[   14.091870]  ? __virt_addr_valid+0x1db/0x2d0
[   14.091896]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.091921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.091946]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.091973]  kasan_report+0x141/0x180
[   14.091997]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.092028]  __asan_report_load1_noabort+0x18/0x20
[   14.092054]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.092081]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.092105]  ? finish_task_switch.isra.0+0x153/0x700
[   14.092130]  ? __switch_to+0x47/0xf50
[   14.092157]  ? __schedule+0x10cc/0x2b60
[   14.092182]  ? __pfx_read_tsc+0x10/0x10
[   14.092206]  ? ktime_get_ts64+0x86/0x230
[   14.092232]  kunit_try_run_case+0x1a5/0x480
[   14.092260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.092310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.092335]  ? __kthread_parkme+0x82/0x180
[   14.092358]  ? preempt_count_sub+0x50/0x80
[   14.092383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.092434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.092459]  kthread+0x337/0x6f0
[   14.092480]  ? trace_preempt_on+0x20/0xc0
[   14.092506]  ? __pfx_kthread+0x10/0x10
[   14.092529]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.092552]  ? calculate_sigpending+0x7b/0xa0
[   14.092578]  ? __pfx_kthread+0x10/0x10
[   14.092602]  ret_from_fork+0x116/0x1d0
[   14.092622]  ? __pfx_kthread+0x10/0x10
[   14.092645]  ret_from_fork_asm+0x1a/0x30
[   14.092678]  </TASK>
[   14.092691] 
[   14.101819] Allocated by task 212:
[   14.101983]  kasan_save_stack+0x45/0x70
[   14.102153]  kasan_save_track+0x18/0x40
[   14.102351]  kasan_save_alloc_info+0x3b/0x50
[   14.102597]  __kasan_kmalloc+0xb7/0xc0
[   14.102956]  __kmalloc_cache_noprof+0x189/0x420
[   14.103216]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.103390]  kunit_try_run_case+0x1a5/0x480
[   14.103555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.103919]  kthread+0x337/0x6f0
[   14.104138]  ret_from_fork+0x116/0x1d0
[   14.104365]  ret_from_fork_asm+0x1a/0x30
[   14.104593] 
[   14.104704] The buggy address belongs to the object at ffff8881021dbb00
[   14.104704]  which belongs to the cache kmalloc-128 of size 128
[   14.105502] The buggy address is located 12 bytes to the right of
[   14.105502]  allocated 115-byte region [ffff8881021dbb00, ffff8881021dbb73)
[   14.106230] 
[   14.106347] The buggy address belongs to the physical page:
[   14.106620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db
[   14.107016] flags: 0x200000000000000(node=0|zone=2)
[   14.107932] page_type: f5(slab)
[   14.108121] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.108548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.108904] page dumped because: kasan: bad access detected
[   14.109156] 
[   14.109239] Memory state around the buggy address:
[   14.109425]  ffff8881021dba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.109861]  ffff8881021dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.110476] >ffff8881021dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.110811]                                                                 ^
[   14.111139]  ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.111438]  ffff8881021dbc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.111687] ==================================================================