Hay
Date
July 6, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.273473] ==================================================================
[   18.273536] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.273623] Read of size 1 at addr fff00000c1cf4f78 by task kunit_try_catch/194
[   18.273699] 
[   18.273730] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.274085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274143] Hardware name: linux,dummy-virt (DT)
[   18.274175] Call trace:
[   18.274278]  show_stack+0x20/0x38 (C)
[   18.274460]  dump_stack_lvl+0x8c/0xd0
[   18.274509]  print_report+0x118/0x608
[   18.274555]  kasan_report+0xdc/0x128
[   18.274662]  __asan_report_load1_noabort+0x20/0x30
[   18.274762]  ksize_unpoisons_memory+0x618/0x740
[   18.274885]  kunit_try_run_case+0x170/0x3f0
[   18.275000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.275076]  kthread+0x328/0x630
[   18.275119]  ret_from_fork+0x10/0x20
[   18.275165] 
[   18.275463] Allocated by task 194:
[   18.275584]  kasan_save_stack+0x3c/0x68
[   18.275683]  kasan_save_track+0x20/0x40
[   18.275786]  kasan_save_alloc_info+0x40/0x58
[   18.275863]  __kasan_kmalloc+0xd4/0xd8
[   18.276074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.276152]  ksize_unpoisons_memory+0xc0/0x740
[   18.276291]  kunit_try_run_case+0x170/0x3f0
[   18.276327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276418]  kthread+0x328/0x630
[   18.276627]  ret_from_fork+0x10/0x20
[   18.276783] 
[   18.276813] The buggy address belongs to the object at fff00000c1cf4f00
[   18.276813]  which belongs to the cache kmalloc-128 of size 128
[   18.276871] The buggy address is located 5 bytes to the right of
[   18.276871]  allocated 115-byte region [fff00000c1cf4f00, fff00000c1cf4f73)
[   18.276936] 
[   18.276965] The buggy address belongs to the physical page:
[   18.277003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   18.277054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.277111] page_type: f5(slab)
[   18.277213] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.277567] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.277640] page dumped because: kasan: bad access detected
[   18.277841] 
[   18.278046] Memory state around the buggy address:
[   18.278086]  fff00000c1cf4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.278133]  fff00000c1cf4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278176] >fff00000c1cf4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.278354]                                                                 ^
[   18.278469]  fff00000c1cf4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278644]  fff00000c1cf5000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.278785] ==================================================================
[   18.280476] ==================================================================
[   18.281441] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.281525] Read of size 1 at addr fff00000c1cf4f7f by task kunit_try_catch/194
[   18.281602] 
[   18.281680] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.281772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.282069] Hardware name: linux,dummy-virt (DT)
[   18.282364] Call trace:
[   18.282414]  show_stack+0x20/0x38 (C)
[   18.282578]  dump_stack_lvl+0x8c/0xd0
[   18.282928]  print_report+0x118/0x608
[   18.283064]  kasan_report+0xdc/0x128
[   18.283276]  __asan_report_load1_noabort+0x20/0x30
[   18.283451]  ksize_unpoisons_memory+0x690/0x740
[   18.283583]  kunit_try_run_case+0x170/0x3f0
[   18.283665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.283848]  kthread+0x328/0x630
[   18.283921]  ret_from_fork+0x10/0x20
[   18.283988] 
[   18.284007] Allocated by task 194:
[   18.284043]  kasan_save_stack+0x3c/0x68
[   18.284095]  kasan_save_track+0x20/0x40
[   18.284132]  kasan_save_alloc_info+0x40/0x58
[   18.284174]  __kasan_kmalloc+0xd4/0xd8
[   18.284221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.284264]  ksize_unpoisons_memory+0xc0/0x740
[   18.284317]  kunit_try_run_case+0x170/0x3f0
[   18.284359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284409]  kthread+0x328/0x630
[   18.284440]  ret_from_fork+0x10/0x20
[   18.284475] 
[   18.284493] The buggy address belongs to the object at fff00000c1cf4f00
[   18.284493]  which belongs to the cache kmalloc-128 of size 128
[   18.284550] The buggy address is located 12 bytes to the right of
[   18.284550]  allocated 115-byte region [fff00000c1cf4f00, fff00000c1cf4f73)
[   18.284613] 
[   18.284644] The buggy address belongs to the physical page:
[   18.284676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   18.284728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.284795] page_type: f5(slab)
[   18.284833] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.284891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.284944] page dumped because: kasan: bad access detected
[   18.284984] 
[   18.285002] Memory state around the buggy address:
[   18.285033]  fff00000c1cf4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.285099]  fff00000c1cf4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.285141] >fff00000c1cf4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.285198]                                                                 ^
[   18.285238]  fff00000c1cf4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.285940]  fff00000c1cf5000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.285987] ==================================================================
[   18.268745] ==================================================================
[   18.268829] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.268905] Read of size 1 at addr fff00000c1cf4f73 by task kunit_try_catch/194
[   18.268956] 
[   18.269010] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.269117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.269164] Hardware name: linux,dummy-virt (DT)
[   18.269212] Call trace:
[   18.269234]  show_stack+0x20/0x38 (C)
[   18.269329]  dump_stack_lvl+0x8c/0xd0
[   18.269440]  print_report+0x118/0x608
[   18.269487]  kasan_report+0xdc/0x128
[   18.269531]  __asan_report_load1_noabort+0x20/0x30
[   18.269807]  ksize_unpoisons_memory+0x628/0x740
[   18.269882]  kunit_try_run_case+0x170/0x3f0
[   18.269932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269986]  kthread+0x328/0x630
[   18.270029]  ret_from_fork+0x10/0x20
[   18.270154] 
[   18.270213] Allocated by task 194:
[   18.270243]  kasan_save_stack+0x3c/0x68
[   18.270337]  kasan_save_track+0x20/0x40
[   18.270498]  kasan_save_alloc_info+0x40/0x58
[   18.270608]  __kasan_kmalloc+0xd4/0xd8
[   18.270647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.270710]  ksize_unpoisons_memory+0xc0/0x740
[   18.270767]  kunit_try_run_case+0x170/0x3f0
[   18.270805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.270848]  kthread+0x328/0x630
[   18.270880]  ret_from_fork+0x10/0x20
[   18.270916] 
[   18.270936] The buggy address belongs to the object at fff00000c1cf4f00
[   18.270936]  which belongs to the cache kmalloc-128 of size 128
[   18.270990] The buggy address is located 0 bytes to the right of
[   18.270990]  allocated 115-byte region [fff00000c1cf4f00, fff00000c1cf4f73)
[   18.271170] 
[   18.271247] The buggy address belongs to the physical page:
[   18.271367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   18.271442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.271492] page_type: f5(slab)
[   18.271530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.271580] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.271812] page dumped because: kasan: bad access detected
[   18.271846] 
[   18.271863] Memory state around the buggy address:
[   18.271899]  fff00000c1cf4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.271941]  fff00000c1cf4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272012] >fff00000c1cf4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.272093]                                                              ^
[   18.272132]  fff00000c1cf4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272243]  fff00000c1cf5000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.272280] ==================================================================

[   12.032922] ==================================================================
[   12.033645] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.034001] Read of size 1 at addr ffff888102b0ea7f by task kunit_try_catch/211
[   12.034688] 
[   12.034813] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.035051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.035067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.035089] Call Trace:
[   12.035117]  <TASK>
[   12.035136]  dump_stack_lvl+0x73/0xb0
[   12.035169]  print_report+0xd1/0x650
[   12.035191]  ? __virt_addr_valid+0x1db/0x2d0
[   12.035213]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.035236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.035258]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.035281]  kasan_report+0x141/0x180
[   12.035303]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.035331]  __asan_report_load1_noabort+0x18/0x20
[   12.035354]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.035378]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.035400]  ? finish_task_switch.isra.0+0x153/0x700
[   12.035422]  ? __switch_to+0x47/0xf50
[   12.035447]  ? __schedule+0x10cc/0x2b60
[   12.035509]  ? __pfx_read_tsc+0x10/0x10
[   12.035531]  ? ktime_get_ts64+0x86/0x230
[   12.035555]  kunit_try_run_case+0x1a5/0x480
[   12.035579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.035601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.035624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.035646]  ? __kthread_parkme+0x82/0x180
[   12.035666]  ? preempt_count_sub+0x50/0x80
[   12.035688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.035711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.035733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.035756]  kthread+0x337/0x6f0
[   12.035775]  ? trace_preempt_on+0x20/0xc0
[   12.035798]  ? __pfx_kthread+0x10/0x10
[   12.035818]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.035838]  ? calculate_sigpending+0x7b/0xa0
[   12.035862]  ? __pfx_kthread+0x10/0x10
[   12.035883]  ret_from_fork+0x116/0x1d0
[   12.035901]  ? __pfx_kthread+0x10/0x10
[   12.035921]  ret_from_fork_asm+0x1a/0x30
[   12.035964]  </TASK>
[   12.035976] 
[   12.047966] Allocated by task 211:
[   12.048228]  kasan_save_stack+0x45/0x70
[   12.048574]  kasan_save_track+0x18/0x40
[   12.048748]  kasan_save_alloc_info+0x3b/0x50
[   12.049183]  __kasan_kmalloc+0xb7/0xc0
[   12.049387]  __kmalloc_cache_noprof+0x189/0x420
[   12.049884]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.050124]  kunit_try_run_case+0x1a5/0x480
[   12.050411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.050722]  kthread+0x337/0x6f0
[   12.051032]  ret_from_fork+0x116/0x1d0
[   12.051395]  ret_from_fork_asm+0x1a/0x30
[   12.051757] 
[   12.051856] The buggy address belongs to the object at ffff888102b0ea00
[   12.051856]  which belongs to the cache kmalloc-128 of size 128
[   12.052866] The buggy address is located 12 bytes to the right of
[   12.052866]  allocated 115-byte region [ffff888102b0ea00, ffff888102b0ea73)
[   12.053632] 
[   12.053876] The buggy address belongs to the physical page:
[   12.054209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0e
[   12.054777] flags: 0x200000000000000(node=0|zone=2)
[   12.055125] page_type: f5(slab)
[   12.055322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.055917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.056380] page dumped because: kasan: bad access detected
[   12.056747] 
[   12.056835] Memory state around the buggy address:
[   12.057239]  ffff888102b0e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.057882]  ffff888102b0e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.058214] >ffff888102b0ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.058735]                                                                 ^
[   12.059025]  ffff888102b0ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.059456]  ffff888102b0eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.060152] ==================================================================
[   12.002318] ==================================================================
[   12.003363] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.004829] Read of size 1 at addr ffff888102b0ea78 by task kunit_try_catch/211
[   12.005259] 
[   12.005363] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.005408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.005420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.005441] Call Trace:
[   12.005464]  <TASK>
[   12.005483]  dump_stack_lvl+0x73/0xb0
[   12.005515]  print_report+0xd1/0x650
[   12.005539]  ? __virt_addr_valid+0x1db/0x2d0
[   12.005564]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.005587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.005608]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.005631]  kasan_report+0x141/0x180
[   12.005653]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.005681]  __asan_report_load1_noabort+0x18/0x20
[   12.005705]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.005728]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.005750]  ? finish_task_switch.isra.0+0x153/0x700
[   12.005773]  ? __switch_to+0x47/0xf50
[   12.005799]  ? __schedule+0x10cc/0x2b60
[   12.005821]  ? __pfx_read_tsc+0x10/0x10
[   12.005842]  ? ktime_get_ts64+0x86/0x230
[   12.005866]  kunit_try_run_case+0x1a5/0x480
[   12.005891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.005912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.005949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.005971]  ? __kthread_parkme+0x82/0x180
[   12.005992]  ? preempt_count_sub+0x50/0x80
[   12.006014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.006036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.006058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.006080]  kthread+0x337/0x6f0
[   12.006100]  ? trace_preempt_on+0x20/0xc0
[   12.006123]  ? __pfx_kthread+0x10/0x10
[   12.006143]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.006163]  ? calculate_sigpending+0x7b/0xa0
[   12.006187]  ? __pfx_kthread+0x10/0x10
[   12.006208]  ret_from_fork+0x116/0x1d0
[   12.006226]  ? __pfx_kthread+0x10/0x10
[   12.006246]  ret_from_fork_asm+0x1a/0x30
[   12.006276]  </TASK>
[   12.006287] 
[   12.019444] Allocated by task 211:
[   12.020058]  kasan_save_stack+0x45/0x70
[   12.020282]  kasan_save_track+0x18/0x40
[   12.020490]  kasan_save_alloc_info+0x3b/0x50
[   12.021056]  __kasan_kmalloc+0xb7/0xc0
[   12.021256]  __kmalloc_cache_noprof+0x189/0x420
[   12.021489]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.021893]  kunit_try_run_case+0x1a5/0x480
[   12.022276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.022711]  kthread+0x337/0x6f0
[   12.022852]  ret_from_fork+0x116/0x1d0
[   12.023075]  ret_from_fork_asm+0x1a/0x30
[   12.023280] 
[   12.023368] The buggy address belongs to the object at ffff888102b0ea00
[   12.023368]  which belongs to the cache kmalloc-128 of size 128
[   12.024223] The buggy address is located 5 bytes to the right of
[   12.024223]  allocated 115-byte region [ffff888102b0ea00, ffff888102b0ea73)
[   12.025258] 
[   12.025367] The buggy address belongs to the physical page:
[   12.025621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0e
[   12.025981] flags: 0x200000000000000(node=0|zone=2)
[   12.026643] page_type: f5(slab)
[   12.026922] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.027421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.027921] page dumped because: kasan: bad access detected
[   12.028422] 
[   12.028652] Memory state around the buggy address:
[   12.028965]  ffff888102b0e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.029435]  ffff888102b0e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.029995] >ffff888102b0ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.030475]                                                                 ^
[   12.030981]  ffff888102b0ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.031558]  ffff888102b0eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.031926] ==================================================================
[   11.968379] ==================================================================
[   11.969788] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.970439] Read of size 1 at addr ffff888102b0ea73 by task kunit_try_catch/211
[   11.971676] 
[   11.971816] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.971864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.971877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.971897] Call Trace:
[   11.971910]  <TASK>
[   11.971942]  dump_stack_lvl+0x73/0xb0
[   11.971974]  print_report+0xd1/0x650
[   11.971996]  ? __virt_addr_valid+0x1db/0x2d0
[   11.972020]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.972042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.972255]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.972303]  kasan_report+0x141/0x180
[   11.972327]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.972355]  __asan_report_load1_noabort+0x18/0x20
[   11.972419]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.972443]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.972484]  ? finish_task_switch.isra.0+0x153/0x700
[   11.972506]  ? __switch_to+0x47/0xf50
[   11.972533]  ? __schedule+0x10cc/0x2b60
[   11.972555]  ? __pfx_read_tsc+0x10/0x10
[   11.972576]  ? ktime_get_ts64+0x86/0x230
[   11.972599]  kunit_try_run_case+0x1a5/0x480
[   11.972623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.972644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.972667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.972689]  ? __kthread_parkme+0x82/0x180
[   11.972709]  ? preempt_count_sub+0x50/0x80
[   11.972732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.972755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.972777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.972799]  kthread+0x337/0x6f0
[   11.972818]  ? trace_preempt_on+0x20/0xc0
[   11.972841]  ? __pfx_kthread+0x10/0x10
[   11.972861]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.972882]  ? calculate_sigpending+0x7b/0xa0
[   11.972905]  ? __pfx_kthread+0x10/0x10
[   11.972926]  ret_from_fork+0x116/0x1d0
[   11.972954]  ? __pfx_kthread+0x10/0x10
[   11.972973]  ret_from_fork_asm+0x1a/0x30
[   11.973003]  </TASK>
[   11.973015] 
[   11.987885] Allocated by task 211:
[   11.988311]  kasan_save_stack+0x45/0x70
[   11.988650]  kasan_save_track+0x18/0x40
[   11.988921]  kasan_save_alloc_info+0x3b/0x50
[   11.989305]  __kasan_kmalloc+0xb7/0xc0
[   11.989646]  __kmalloc_cache_noprof+0x189/0x420
[   11.990004]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.990431]  kunit_try_run_case+0x1a5/0x480
[   11.990859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.991156]  kthread+0x337/0x6f0
[   11.991438]  ret_from_fork+0x116/0x1d0
[   11.991864]  ret_from_fork_asm+0x1a/0x30
[   11.992067] 
[   11.992374] The buggy address belongs to the object at ffff888102b0ea00
[   11.992374]  which belongs to the cache kmalloc-128 of size 128
[   11.993082] The buggy address is located 0 bytes to the right of
[   11.993082]  allocated 115-byte region [ffff888102b0ea00, ffff888102b0ea73)
[   11.993660] 
[   11.993769] The buggy address belongs to the physical page:
[   11.994319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0e
[   11.994809] flags: 0x200000000000000(node=0|zone=2)
[   11.995182] page_type: f5(slab)
[   11.995471] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.995974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.996399] page dumped because: kasan: bad access detected
[   11.996813] 
[   11.996899] Memory state around the buggy address:
[   11.997335]  ffff888102b0e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.997941]  ffff888102b0e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.998493] >ffff888102b0ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.998904]                                                              ^
[   11.999316]  ffff888102b0ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.999818]  ffff888102b0eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.000468] ==================================================================