Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.529707] ==================================================================
[   15.529754] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.529805] Read of size 1 at addr fff00000c3fc2f78 by task kunit_try_catch/194
[   15.530145] 
[   15.530274] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.530687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.530852] Hardware name: linux,dummy-virt (DT)
[   15.530953] Call trace:
[   15.530975]  show_stack+0x20/0x38 (C)
[   15.531041]  dump_stack_lvl+0x8c/0xd0
[   15.531088]  print_report+0x118/0x5d0
[   15.531513]  kasan_report+0xdc/0x128
[   15.531623]  __asan_report_load1_noabort+0x20/0x30
[   15.531733]  ksize_unpoisons_memory+0x618/0x740
[   15.531783]  kunit_try_run_case+0x170/0x3f0
[   15.531888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.531999]  kthread+0x328/0x630
[   15.532041]  ret_from_fork+0x10/0x20
[   15.532090] 
[   15.532157] Allocated by task 194:
[   15.532189]  kasan_save_stack+0x3c/0x68
[   15.532427]  kasan_save_track+0x20/0x40
[   15.532484]  kasan_save_alloc_info+0x40/0x58
[   15.532523]  __kasan_kmalloc+0xd4/0xd8
[   15.532560]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.532647]  ksize_unpoisons_memory+0xc0/0x740
[   15.532845]  kunit_try_run_case+0x170/0x3f0
[   15.532881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.532926]  kthread+0x328/0x630
[   15.532958]  ret_from_fork+0x10/0x20
[   15.532994] 
[   15.533014] The buggy address belongs to the object at fff00000c3fc2f00
[   15.533014]  which belongs to the cache kmalloc-128 of size 128
[   15.533109] The buggy address is located 5 bytes to the right of
[   15.533109]  allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73)
[   15.533173] 
[   15.533221] The buggy address belongs to the physical page:
[   15.533303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.533379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.533427] page_type: f5(slab)
[   15.533554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.533961] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.534007] page dumped because: kasan: bad access detected
[   15.534355] 
[   15.534379] Memory state around the buggy address:
[   15.534520]  fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.534680]  fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534744] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.534802]                                                                 ^
[   15.534932]  fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534978]  fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.535036] ==================================================================
[   15.535976] ==================================================================
[   15.536026] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.536075] Read of size 1 at addr fff00000c3fc2f7f by task kunit_try_catch/194
[   15.536124] 
[   15.536153] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.536233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536383] Hardware name: linux,dummy-virt (DT)
[   15.536419] Call trace:
[   15.536598]  show_stack+0x20/0x38 (C)
[   15.536816]  dump_stack_lvl+0x8c/0xd0
[   15.536865]  print_report+0x118/0x5d0
[   15.536911]  kasan_report+0xdc/0x128
[   15.536956]  __asan_report_load1_noabort+0x20/0x30
[   15.537010]  ksize_unpoisons_memory+0x690/0x740
[   15.537057]  kunit_try_run_case+0x170/0x3f0
[   15.537104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.537156]  kthread+0x328/0x630
[   15.537197]  ret_from_fork+0x10/0x20
[   15.537243] 
[   15.537261] Allocated by task 194:
[   15.537290]  kasan_save_stack+0x3c/0x68
[   15.537331]  kasan_save_track+0x20/0x40
[   15.537378]  kasan_save_alloc_info+0x40/0x58
[   15.537419]  __kasan_kmalloc+0xd4/0xd8
[   15.537455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.537549]  ksize_unpoisons_memory+0xc0/0x740
[   15.538055]  kunit_try_run_case+0x170/0x3f0
[   15.538571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.538701]  kthread+0x328/0x630
[   15.538734]  ret_from_fork+0x10/0x20
[   15.538807] 
[   15.538828] The buggy address belongs to the object at fff00000c3fc2f00
[   15.538828]  which belongs to the cache kmalloc-128 of size 128
[   15.538886] The buggy address is located 12 bytes to the right of
[   15.538886]  allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73)
[   15.539454] 
[   15.539480] The buggy address belongs to the physical page:
[   15.539510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.539564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.539840] page_type: f5(slab)
[   15.539902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.540082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.540151] page dumped because: kasan: bad access detected
[   15.540272] 
[   15.540291] Memory state around the buggy address:
[   15.540329]  fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.540409]  fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540496] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.540562]                                                                 ^
[   15.540605]  fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540647]  fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.540695] ==================================================================
[   15.524871] ==================================================================
[   15.524930] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.525037] Read of size 1 at addr fff00000c3fc2f73 by task kunit_try_catch/194
[   15.525096] 
[   15.525165] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.525246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525273] Hardware name: linux,dummy-virt (DT)
[   15.525304] Call trace:
[   15.525326]  show_stack+0x20/0x38 (C)
[   15.525480]  dump_stack_lvl+0x8c/0xd0
[   15.525528]  print_report+0x118/0x5d0
[   15.525583]  kasan_report+0xdc/0x128
[   15.525703]  __asan_report_load1_noabort+0x20/0x30
[   15.525819]  ksize_unpoisons_memory+0x628/0x740
[   15.525934]  kunit_try_run_case+0x170/0x3f0
[   15.525989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.526041]  kthread+0x328/0x630
[   15.526123]  ret_from_fork+0x10/0x20
[   15.526222] 
[   15.526241] Allocated by task 194:
[   15.526406]  kasan_save_stack+0x3c/0x68
[   15.526451]  kasan_save_track+0x20/0x40
[   15.526489]  kasan_save_alloc_info+0x40/0x58
[   15.526555]  __kasan_kmalloc+0xd4/0xd8
[   15.526650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.526752]  ksize_unpoisons_memory+0xc0/0x740
[   15.526906]  kunit_try_run_case+0x170/0x3f0
[   15.526968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.527095]  kthread+0x328/0x630
[   15.527157]  ret_from_fork+0x10/0x20
[   15.527195] 
[   15.527214] The buggy address belongs to the object at fff00000c3fc2f00
[   15.527214]  which belongs to the cache kmalloc-128 of size 128
[   15.527273] The buggy address is located 0 bytes to the right of
[   15.527273]  allocated 115-byte region [fff00000c3fc2f00, fff00000c3fc2f73)
[   15.527338] 
[   15.527357] The buggy address belongs to the physical page:
[   15.527631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.527703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.527752] page_type: f5(slab)
[   15.527801] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.527877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.527918] page dumped because: kasan: bad access detected
[   15.527950] 
[   15.528033] Memory state around the buggy address:
[   15.528069]  fff00000c3fc2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.528176]  fff00000c3fc2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528253] >fff00000c3fc2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.528292]                                                              ^
[   15.528331]  fff00000c3fc2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528386]  fff00000c3fc3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.528480] ==================================================================

[   12.703738] ==================================================================
[   12.704616] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.705832] Read of size 1 at addr ffff88810272b973 by task kunit_try_catch/211
[   12.706319] 
[   12.706420] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.706465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.706476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.706775] Call Trace:
[   12.706794]  <TASK>
[   12.706810]  dump_stack_lvl+0x73/0xb0
[   12.706842]  print_report+0xd1/0x610
[   12.706864]  ? __virt_addr_valid+0x1db/0x2d0
[   12.706887]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.706951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.706973]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.706995]  kasan_report+0x141/0x180
[   12.707016]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.707042]  __asan_report_load1_noabort+0x18/0x20
[   12.707073]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.707095]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.707116]  ? finish_task_switch.isra.0+0x153/0x700
[   12.707138]  ? __switch_to+0x47/0xf50
[   12.707163]  ? __schedule+0x10cc/0x2b60
[   12.707185]  ? __pfx_read_tsc+0x10/0x10
[   12.707204]  ? ktime_get_ts64+0x86/0x230
[   12.707227]  kunit_try_run_case+0x1a5/0x480
[   12.707251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.707271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.707294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.707315]  ? __kthread_parkme+0x82/0x180
[   12.707356]  ? preempt_count_sub+0x50/0x80
[   12.707378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.707400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.707422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.707443]  kthread+0x337/0x6f0
[   12.707462]  ? trace_preempt_on+0x20/0xc0
[   12.707483]  ? __pfx_kthread+0x10/0x10
[   12.707502]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.707522]  ? calculate_sigpending+0x7b/0xa0
[   12.707544]  ? __pfx_kthread+0x10/0x10
[   12.707564]  ret_from_fork+0x116/0x1d0
[   12.707581]  ? __pfx_kthread+0x10/0x10
[   12.707600]  ret_from_fork_asm+0x1a/0x30
[   12.707629]  </TASK>
[   12.707639] 
[   12.718522] Allocated by task 211:
[   12.718918]  kasan_save_stack+0x45/0x70
[   12.719319]  kasan_save_track+0x18/0x40
[   12.719729]  kasan_save_alloc_info+0x3b/0x50
[   12.720225]  __kasan_kmalloc+0xb7/0xc0
[   12.720607]  __kmalloc_cache_noprof+0x189/0x420
[   12.721175]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.721714]  kunit_try_run_case+0x1a5/0x480
[   12.722123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.722300]  kthread+0x337/0x6f0
[   12.722761]  ret_from_fork+0x116/0x1d0
[   12.723174]  ret_from_fork_asm+0x1a/0x30
[   12.723639] 
[   12.723808] The buggy address belongs to the object at ffff88810272b900
[   12.723808]  which belongs to the cache kmalloc-128 of size 128
[   12.724621] The buggy address is located 0 bytes to the right of
[   12.724621]  allocated 115-byte region [ffff88810272b900, ffff88810272b973)
[   12.725995] 
[   12.726158] The buggy address belongs to the physical page:
[   12.726775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b
[   12.727030] flags: 0x200000000000000(node=0|zone=2)
[   12.727571] page_type: f5(slab)
[   12.727989] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.728730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.729541] page dumped because: kasan: bad access detected
[   12.730150] 
[   12.730312] Memory state around the buggy address:
[   12.730940]  ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.731197]  ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.731628] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.732487]                                                              ^
[   12.733220]  ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.733642]  ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.734311] ==================================================================
[   12.735117] ==================================================================
[   12.735359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.735656] Read of size 1 at addr ffff88810272b978 by task kunit_try_catch/211
[   12.736242] 
[   12.736332] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.736373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.736384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.736403] Call Trace:
[   12.736418]  <TASK>
[   12.736431]  dump_stack_lvl+0x73/0xb0
[   12.736459]  print_report+0xd1/0x610
[   12.736479]  ? __virt_addr_valid+0x1db/0x2d0
[   12.736501]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.736522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.736543]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.736564]  kasan_report+0x141/0x180
[   12.736585]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.736611]  __asan_report_load1_noabort+0x18/0x20
[   12.736633]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.736656]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.736677]  ? finish_task_switch.isra.0+0x153/0x700
[   12.736697]  ? __switch_to+0x47/0xf50
[   12.736752]  ? __schedule+0x10cc/0x2b60
[   12.736773]  ? __pfx_read_tsc+0x10/0x10
[   12.736792]  ? ktime_get_ts64+0x86/0x230
[   12.736976]  kunit_try_run_case+0x1a5/0x480
[   12.737005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737028]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.737052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.737073]  ? __kthread_parkme+0x82/0x180
[   12.737092]  ? preempt_count_sub+0x50/0x80
[   12.737113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.737170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.737192]  kthread+0x337/0x6f0
[   12.737210]  ? trace_preempt_on+0x20/0xc0
[   12.737244]  ? __pfx_kthread+0x10/0x10
[   12.737264]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.737283]  ? calculate_sigpending+0x7b/0xa0
[   12.737305]  ? __pfx_kthread+0x10/0x10
[   12.737334]  ret_from_fork+0x116/0x1d0
[   12.737422]  ? __pfx_kthread+0x10/0x10
[   12.737443]  ret_from_fork_asm+0x1a/0x30
[   12.737472]  </TASK>
[   12.737482] 
[   12.746022] Allocated by task 211:
[   12.746235]  kasan_save_stack+0x45/0x70
[   12.746556]  kasan_save_track+0x18/0x40
[   12.746764]  kasan_save_alloc_info+0x3b/0x50
[   12.747002]  __kasan_kmalloc+0xb7/0xc0
[   12.747153]  __kmalloc_cache_noprof+0x189/0x420
[   12.747310]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.747463]  kunit_try_run_case+0x1a5/0x480
[   12.747762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.748028]  kthread+0x337/0x6f0
[   12.748195]  ret_from_fork+0x116/0x1d0
[   12.748379]  ret_from_fork_asm+0x1a/0x30
[   12.748733] 
[   12.748851] The buggy address belongs to the object at ffff88810272b900
[   12.748851]  which belongs to the cache kmalloc-128 of size 128
[   12.749332] The buggy address is located 5 bytes to the right of
[   12.749332]  allocated 115-byte region [ffff88810272b900, ffff88810272b973)
[   12.750064] 
[   12.750178] The buggy address belongs to the physical page:
[   12.750473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b
[   12.750761] flags: 0x200000000000000(node=0|zone=2)
[   12.750938] page_type: f5(slab)
[   12.751059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.751320] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.751822] page dumped because: kasan: bad access detected
[   12.752085] 
[   12.752177] Memory state around the buggy address:
[   12.752579]  ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.753068]  ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.753323] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.753864]                                                                 ^
[   12.754215]  ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.754485]  ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.755041] ==================================================================
[   12.755468] ==================================================================
[   12.755937] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.756494] Read of size 1 at addr ffff88810272b97f by task kunit_try_catch/211
[   12.756833] 
[   12.756973] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.757014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.757024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.757043] Call Trace:
[   12.757056]  <TASK>
[   12.757069]  dump_stack_lvl+0x73/0xb0
[   12.757095]  print_report+0xd1/0x610
[   12.757116]  ? __virt_addr_valid+0x1db/0x2d0
[   12.757136]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.757169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.757190]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.757212]  kasan_report+0x141/0x180
[   12.757232]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.757270]  __asan_report_load1_noabort+0x18/0x20
[   12.757292]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.757314]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.757335]  ? finish_task_switch.isra.0+0x153/0x700
[   12.757431]  ? __switch_to+0x47/0xf50
[   12.757456]  ? __schedule+0x10cc/0x2b60
[   12.757476]  ? __pfx_read_tsc+0x10/0x10
[   12.757495]  ? ktime_get_ts64+0x86/0x230
[   12.757531]  kunit_try_run_case+0x1a5/0x480
[   12.757553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.757574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.757608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.757630]  ? __kthread_parkme+0x82/0x180
[   12.757648]  ? preempt_count_sub+0x50/0x80
[   12.757669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.757699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.757729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.757751]  kthread+0x337/0x6f0
[   12.757769]  ? trace_preempt_on+0x20/0xc0
[   12.757800]  ? __pfx_kthread+0x10/0x10
[   12.757820]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.757839]  ? calculate_sigpending+0x7b/0xa0
[   12.757861]  ? __pfx_kthread+0x10/0x10
[   12.757880]  ret_from_fork+0x116/0x1d0
[   12.757897]  ? __pfx_kthread+0x10/0x10
[   12.757926]  ret_from_fork_asm+0x1a/0x30
[   12.757954]  </TASK>
[   12.757964] 
[   12.766329] Allocated by task 211:
[   12.766464]  kasan_save_stack+0x45/0x70
[   12.766635]  kasan_save_track+0x18/0x40
[   12.766823]  kasan_save_alloc_info+0x3b/0x50
[   12.767041]  __kasan_kmalloc+0xb7/0xc0
[   12.767307]  __kmalloc_cache_noprof+0x189/0x420
[   12.767647]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.767883]  kunit_try_run_case+0x1a5/0x480
[   12.768105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.768885]  kthread+0x337/0x6f0
[   12.769092]  ret_from_fork+0x116/0x1d0
[   12.769274]  ret_from_fork_asm+0x1a/0x30
[   12.770280] 
[   12.770431] The buggy address belongs to the object at ffff88810272b900
[   12.770431]  which belongs to the cache kmalloc-128 of size 128
[   12.771325] The buggy address is located 12 bytes to the right of
[   12.771325]  allocated 115-byte region [ffff88810272b900, ffff88810272b973)
[   12.772098] 
[   12.772196] The buggy address belongs to the physical page:
[   12.773020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b
[   12.773311] flags: 0x200000000000000(node=0|zone=2)
[   12.773987] page_type: f5(slab)
[   12.774328] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.775042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.775277] page dumped because: kasan: bad access detected
[   12.775457] 
[   12.775527] Memory state around the buggy address:
[   12.775685]  ffff88810272b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.775900]  ffff88810272b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.776118] >ffff88810272b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.776604]                                                                 ^
[   12.777577]  ffff88810272b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.778431]  ffff88810272ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.779117] ==================================================================