Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.563531] ==================================================================
[   15.563591] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.563951] Read of size 1 at addr fff00000c786a77f by task kunit_try_catch/195
[   15.564089] 
[   15.564158] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.564403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.564489] Hardware name: linux,dummy-virt (DT)
[   15.564546] Call trace:
[   15.564569]  show_stack+0x20/0x38 (C)
[   15.564621]  dump_stack_lvl+0x8c/0xd0
[   15.564675]  print_report+0x118/0x5d0
[   15.564721]  kasan_report+0xdc/0x128
[   15.564777]  __asan_report_load1_noabort+0x20/0x30
[   15.564827]  ksize_unpoisons_memory+0x690/0x740
[   15.564883]  kunit_try_run_case+0x170/0x3f0
[   15.564930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.564999]  kthread+0x328/0x630
[   15.565049]  ret_from_fork+0x10/0x20
[   15.565096] 
[   15.565128] Allocated by task 195:
[   15.565156]  kasan_save_stack+0x3c/0x68
[   15.565205]  kasan_save_track+0x20/0x40
[   15.565242]  kasan_save_alloc_info+0x40/0x58
[   15.565282]  __kasan_kmalloc+0xd4/0xd8
[   15.565326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.565368]  ksize_unpoisons_memory+0xc0/0x740
[   15.565404]  kunit_try_run_case+0x170/0x3f0
[   15.565442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.565485]  kthread+0x328/0x630
[   15.565516]  ret_from_fork+0x10/0x20
[   15.565551] 
[   15.565569] The buggy address belongs to the object at fff00000c786a700
[   15.565569]  which belongs to the cache kmalloc-128 of size 128
[   15.565639] The buggy address is located 12 bytes to the right of
[   15.565639]  allocated 115-byte region [fff00000c786a700, fff00000c786a773)
[   15.565704] 
[   15.565730] The buggy address belongs to the physical page:
[   15.565761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   15.565814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.565862] page_type: f5(slab)
[   15.565898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.565949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.566000] page dumped because: kasan: bad access detected
[   15.566032] 
[   15.566050] Memory state around the buggy address:
[   15.566723]  fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.566888]  fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566992] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.567173]                                                                 ^
[   15.567354]  fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.567439]  fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.567588] ==================================================================
[   15.550639] ==================================================================
[   15.550874] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.551003] Read of size 1 at addr fff00000c786a773 by task kunit_try_catch/195
[   15.551060] 
[   15.551094] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.551229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.551257] Hardware name: linux,dummy-virt (DT)
[   15.551339] Call trace:
[   15.551377]  show_stack+0x20/0x38 (C)
[   15.551436]  dump_stack_lvl+0x8c/0xd0
[   15.551783]  print_report+0x118/0x5d0
[   15.551865]  kasan_report+0xdc/0x128
[   15.551931]  __asan_report_load1_noabort+0x20/0x30
[   15.552043]  ksize_unpoisons_memory+0x628/0x740
[   15.552096]  kunit_try_run_case+0x170/0x3f0
[   15.552310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.552395]  kthread+0x328/0x630
[   15.552546]  ret_from_fork+0x10/0x20
[   15.552608] 
[   15.552627] Allocated by task 195:
[   15.552803]  kasan_save_stack+0x3c/0x68
[   15.552889]  kasan_save_track+0x20/0x40
[   15.553019]  kasan_save_alloc_info+0x40/0x58
[   15.553064]  __kasan_kmalloc+0xd4/0xd8
[   15.553109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.553349]  ksize_unpoisons_memory+0xc0/0x740
[   15.553477]  kunit_try_run_case+0x170/0x3f0
[   15.553633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.553718]  kthread+0x328/0x630
[   15.553758]  ret_from_fork+0x10/0x20
[   15.553921] 
[   15.554108] The buggy address belongs to the object at fff00000c786a700
[   15.554108]  which belongs to the cache kmalloc-128 of size 128
[   15.554253] The buggy address is located 0 bytes to the right of
[   15.554253]  allocated 115-byte region [fff00000c786a700, fff00000c786a773)
[   15.554332] 
[   15.554487] The buggy address belongs to the physical page:
[   15.554544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   15.554669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.554845] page_type: f5(slab)
[   15.555052] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.555172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.555273] page dumped because: kasan: bad access detected
[   15.555366] 
[   15.555406] Memory state around the buggy address:
[   15.555565]  fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.555609]  fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.555835] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.556042]                                                              ^
[   15.556200]  fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.556275]  fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.556320] ==================================================================
[   15.557654] ==================================================================
[   15.557705] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.557753] Read of size 1 at addr fff00000c786a778 by task kunit_try_catch/195
[   15.557976] 
[   15.558082] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.558220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.558268] Hardware name: linux,dummy-virt (DT)
[   15.558339] Call trace:
[   15.558379]  show_stack+0x20/0x38 (C)
[   15.558433]  dump_stack_lvl+0x8c/0xd0
[   15.558489]  print_report+0x118/0x5d0
[   15.558677]  kasan_report+0xdc/0x128
[   15.558750]  __asan_report_load1_noabort+0x20/0x30
[   15.558860]  ksize_unpoisons_memory+0x618/0x740
[   15.558932]  kunit_try_run_case+0x170/0x3f0
[   15.559107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.559172]  kthread+0x328/0x630
[   15.559215]  ret_from_fork+0x10/0x20
[   15.559345] 
[   15.559403] Allocated by task 195:
[   15.559450]  kasan_save_stack+0x3c/0x68
[   15.559641]  kasan_save_track+0x20/0x40
[   15.559741]  kasan_save_alloc_info+0x40/0x58
[   15.559785]  __kasan_kmalloc+0xd4/0xd8
[   15.559839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.560035]  ksize_unpoisons_memory+0xc0/0x740
[   15.560155]  kunit_try_run_case+0x170/0x3f0
[   15.560226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.560415]  kthread+0x328/0x630
[   15.560550]  ret_from_fork+0x10/0x20
[   15.560619] 
[   15.560714] The buggy address belongs to the object at fff00000c786a700
[   15.560714]  which belongs to the cache kmalloc-128 of size 128
[   15.560778] The buggy address is located 5 bytes to the right of
[   15.560778]  allocated 115-byte region [fff00000c786a700, fff00000c786a773)
[   15.560885] 
[   15.560933] The buggy address belongs to the physical page:
[   15.560966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   15.561230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.561378] page_type: f5(slab)
[   15.561445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.561509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.561639] page dumped because: kasan: bad access detected
[   15.561673] 
[   15.561890] Memory state around the buggy address:
[   15.562133]  fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.562200]  fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.562306] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.562392]                                                                 ^
[   15.562631]  fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.562723]  fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.562841] ==================================================================

[   13.430787] ==================================================================
[   13.431260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.431789] Read of size 1 at addr ffff8881025cc473 by task kunit_try_catch/211
[   13.432096] 
[   13.432205] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.432248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.432259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.432279] Call Trace:
[   13.432290]  <TASK>
[   13.432306]  dump_stack_lvl+0x73/0xb0
[   13.432382]  print_report+0xd1/0x610
[   13.432406]  ? __virt_addr_valid+0x1db/0x2d0
[   13.432455]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.432479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.432502]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.432527]  kasan_report+0x141/0x180
[   13.432567]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.432598]  __asan_report_load1_noabort+0x18/0x20
[   13.432634]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.432659]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.432682]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.432716]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.432747]  kunit_try_run_case+0x1a5/0x480
[   13.432774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.432797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.432821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.432855]  ? __kthread_parkme+0x82/0x180
[   13.432877]  ? preempt_count_sub+0x50/0x80
[   13.432904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.432940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.432967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.432994]  kthread+0x337/0x6f0
[   13.433014]  ? trace_preempt_on+0x20/0xc0
[   13.433047]  ? __pfx_kthread+0x10/0x10
[   13.433068]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.433090]  ? calculate_sigpending+0x7b/0xa0
[   13.433126]  ? __pfx_kthread+0x10/0x10
[   13.433149]  ret_from_fork+0x116/0x1d0
[   13.433168]  ? __pfx_kthread+0x10/0x10
[   13.433189]  ret_from_fork_asm+0x1a/0x30
[   13.433227]  </TASK>
[   13.433239] 
[   13.440842] Allocated by task 211:
[   13.441026]  kasan_save_stack+0x45/0x70
[   13.441202]  kasan_save_track+0x18/0x40
[   13.441343]  kasan_save_alloc_info+0x3b/0x50
[   13.441662]  __kasan_kmalloc+0xb7/0xc0
[   13.441858]  __kmalloc_cache_noprof+0x189/0x420
[   13.442079]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.442350]  kunit_try_run_case+0x1a5/0x480
[   13.442525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.442716]  kthread+0x337/0x6f0
[   13.442882]  ret_from_fork+0x116/0x1d0
[   13.443067]  ret_from_fork_asm+0x1a/0x30
[   13.443355] 
[   13.443481] The buggy address belongs to the object at ffff8881025cc400
[   13.443481]  which belongs to the cache kmalloc-128 of size 128
[   13.444008] The buggy address is located 0 bytes to the right of
[   13.444008]  allocated 115-byte region [ffff8881025cc400, ffff8881025cc473)
[   13.444543] 
[   13.444651] The buggy address belongs to the physical page:
[   13.444910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.445215] flags: 0x200000000000000(node=0|zone=2)
[   13.445447] page_type: f5(slab)
[   13.445731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.446088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.446480] page dumped because: kasan: bad access detected
[   13.446746] 
[   13.446849] Memory state around the buggy address:
[   13.447074]  ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.447475]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.447804] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.448028]                                                              ^
[   13.448363]  ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.448715]  ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.448947] ==================================================================
[   13.451760] ==================================================================
[   13.452513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.454522] Read of size 1 at addr ffff8881025cc478 by task kunit_try_catch/211
[   13.455629] 
[   13.455838] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.455883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.455895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.455915] Call Trace:
[   13.455928]  <TASK>
[   13.455942]  dump_stack_lvl+0x73/0xb0
[   13.455998]  print_report+0xd1/0x610
[   13.456021]  ? __virt_addr_valid+0x1db/0x2d0
[   13.456052]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.456076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.456099]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.456124]  kasan_report+0x141/0x180
[   13.456146]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.456177]  __asan_report_load1_noabort+0x18/0x20
[   13.456203]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.456448]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.456478]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.456514]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.456546]  kunit_try_run_case+0x1a5/0x480
[   13.456586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.456610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.456634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.456660]  ? __kthread_parkme+0x82/0x180
[   13.456681]  ? preempt_count_sub+0x50/0x80
[   13.456708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.456733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.456758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.456784]  kthread+0x337/0x6f0
[   13.456803]  ? trace_preempt_on+0x20/0xc0
[   13.456826]  ? __pfx_kthread+0x10/0x10
[   13.456847]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.456869]  ? calculate_sigpending+0x7b/0xa0
[   13.456893]  ? __pfx_kthread+0x10/0x10
[   13.456915]  ret_from_fork+0x116/0x1d0
[   13.456934]  ? __pfx_kthread+0x10/0x10
[   13.456955]  ret_from_fork_asm+0x1a/0x30
[   13.456990]  </TASK>
[   13.457000] 
[   13.469893] Allocated by task 211:
[   13.470522]  kasan_save_stack+0x45/0x70
[   13.470753]  kasan_save_track+0x18/0x40
[   13.470933]  kasan_save_alloc_info+0x3b/0x50
[   13.471127]  __kasan_kmalloc+0xb7/0xc0
[   13.471831]  __kmalloc_cache_noprof+0x189/0x420
[   13.472350]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.472783]  kunit_try_run_case+0x1a5/0x480
[   13.473176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.473849]  kthread+0x337/0x6f0
[   13.474090]  ret_from_fork+0x116/0x1d0
[   13.474482]  ret_from_fork_asm+0x1a/0x30
[   13.474885] 
[   13.474978] The buggy address belongs to the object at ffff8881025cc400
[   13.474978]  which belongs to the cache kmalloc-128 of size 128
[   13.475866] The buggy address is located 5 bytes to the right of
[   13.475866]  allocated 115-byte region [ffff8881025cc400, ffff8881025cc473)
[   13.477298] 
[   13.477543] The buggy address belongs to the physical page:
[   13.477795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.478102] flags: 0x200000000000000(node=0|zone=2)
[   13.478316] page_type: f5(slab)
[   13.478807] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.479525] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.480014] page dumped because: kasan: bad access detected
[   13.480291] 
[   13.480385] Memory state around the buggy address:
[   13.480999]  ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.481451]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.481757] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.482049]                                                                 ^
[   13.482774]  ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.483082]  ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.483756] ==================================================================
[   13.484701] ==================================================================
[   13.485020] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.485831] Read of size 1 at addr ffff8881025cc47f by task kunit_try_catch/211
[   13.486395] 
[   13.486657] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.486800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.486813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.486834] Call Trace:
[   13.486850]  <TASK>
[   13.486867]  dump_stack_lvl+0x73/0xb0
[   13.486897]  print_report+0xd1/0x610
[   13.486955]  ? __virt_addr_valid+0x1db/0x2d0
[   13.486979]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.487003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.487026]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.487050]  kasan_report+0x141/0x180
[   13.487073]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.487104]  __asan_report_load1_noabort+0x18/0x20
[   13.487129]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.487153]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.487179]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.487211]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.487307]  kunit_try_run_case+0x1a5/0x480
[   13.487335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.487357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.487383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.487428]  ? __kthread_parkme+0x82/0x180
[   13.487449]  ? preempt_count_sub+0x50/0x80
[   13.487474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.487499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.487524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.487559]  kthread+0x337/0x6f0
[   13.487578]  ? trace_preempt_on+0x20/0xc0
[   13.487603]  ? __pfx_kthread+0x10/0x10
[   13.487624]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.487646]  ? calculate_sigpending+0x7b/0xa0
[   13.487670]  ? __pfx_kthread+0x10/0x10
[   13.487693]  ret_from_fork+0x116/0x1d0
[   13.487712]  ? __pfx_kthread+0x10/0x10
[   13.487733]  ret_from_fork_asm+0x1a/0x30
[   13.487769]  </TASK>
[   13.487779] 
[   13.495035] Allocated by task 211:
[   13.495164]  kasan_save_stack+0x45/0x70
[   13.495405]  kasan_save_track+0x18/0x40
[   13.495733]  kasan_save_alloc_info+0x3b/0x50
[   13.495954]  __kasan_kmalloc+0xb7/0xc0
[   13.496090]  __kmalloc_cache_noprof+0x189/0x420
[   13.496475]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.496730]  kunit_try_run_case+0x1a5/0x480
[   13.496941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.497145]  kthread+0x337/0x6f0
[   13.497435]  ret_from_fork+0x116/0x1d0
[   13.497630]  ret_from_fork_asm+0x1a/0x30
[   13.497771] 
[   13.497841] The buggy address belongs to the object at ffff8881025cc400
[   13.497841]  which belongs to the cache kmalloc-128 of size 128
[   13.498272] The buggy address is located 12 bytes to the right of
[   13.498272]  allocated 115-byte region [ffff8881025cc400, ffff8881025cc473)
[   13.498793] 
[   13.499016] The buggy address belongs to the physical page:
[   13.499221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc
[   13.499609] flags: 0x200000000000000(node=0|zone=2)
[   13.499843] page_type: f5(slab)
[   13.499967] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.500203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.500736] page dumped because: kasan: bad access detected
[   13.501106] 
[   13.501182] Memory state around the buggy address:
[   13.501369]  ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.501590]  ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.501869] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.502183]                                                                 ^
[   13.503029]  ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.503412]  ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.503684] ==================================================================