Hay
Date
June 23, 2025, 1:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   25.087382] ==================================================================
[   25.087512] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.087633] Read of size 1 at addr fff00000c76cf37f by task kunit_try_catch/196
[   25.087748] 
[   25.087829] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   25.088024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.088095] Hardware name: linux,dummy-virt (DT)
[   25.088188] Call trace:
[   25.088262]  show_stack+0x20/0x38 (C)
[   25.088865]  dump_stack_lvl+0x8c/0xd0
[   25.089077]  print_report+0x118/0x608
[   25.089384]  kasan_report+0xdc/0x128
[   25.089717]  __asan_report_load1_noabort+0x20/0x30
[   25.089847]  ksize_unpoisons_memory+0x690/0x740
[   25.089975]  kunit_try_run_case+0x170/0x3f0
[   25.090109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.090353]  kthread+0x328/0x630
[   25.090505]  ret_from_fork+0x10/0x20
[   25.090653] 
[   25.090705] Allocated by task 196:
[   25.090810]  kasan_save_stack+0x3c/0x68
[   25.091546]  kasan_save_track+0x20/0x40
[   25.091878]  kasan_save_alloc_info+0x40/0x58
[   25.091985]  __kasan_kmalloc+0xd4/0xd8
[   25.092094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.092199]  ksize_unpoisons_memory+0xc0/0x740
[   25.092652]  kunit_try_run_case+0x170/0x3f0
[   25.092874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.093093]  kthread+0x328/0x630
[   25.093345]  ret_from_fork+0x10/0x20
[   25.093495] 
[   25.093556] The buggy address belongs to the object at fff00000c76cf300
[   25.093556]  which belongs to the cache kmalloc-128 of size 128
[   25.093979] The buggy address is located 12 bytes to the right of
[   25.093979]  allocated 115-byte region [fff00000c76cf300, fff00000c76cf373)
[   25.094168] 
[   25.094273] The buggy address belongs to the physical page:
[   25.094353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf
[   25.094525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.094666] page_type: f5(slab)
[   25.095148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.095532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.095642] page dumped because: kasan: bad access detected
[   25.095731] 
[   25.095783] Memory state around the buggy address:
[   25.096058]  fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.096154]  fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.096251] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.096385]                                                                 ^
[   25.096588]  fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.096729]  fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.096825] ==================================================================
[   25.054271] ==================================================================
[   25.054530] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.054759] Read of size 1 at addr fff00000c76cf373 by task kunit_try_catch/196
[   25.054883] 
[   25.054971] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   25.055189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.055381] Hardware name: linux,dummy-virt (DT)
[   25.055592] Call trace:
[   25.057426]  show_stack+0x20/0x38 (C)
[   25.057589]  dump_stack_lvl+0x8c/0xd0
[   25.058609]  print_report+0x118/0x608
[   25.058752]  kasan_report+0xdc/0x128
[   25.058877]  __asan_report_load1_noabort+0x20/0x30
[   25.059076]  ksize_unpoisons_memory+0x628/0x740
[   25.059476]  kunit_try_run_case+0x170/0x3f0
[   25.059831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.060102]  kthread+0x328/0x630
[   25.060257]  ret_from_fork+0x10/0x20
[   25.060588] 
[   25.060635] Allocated by task 196:
[   25.060706]  kasan_save_stack+0x3c/0x68
[   25.061946]  kasan_save_track+0x20/0x40
[   25.062080]  kasan_save_alloc_info+0x40/0x58
[   25.062245]  __kasan_kmalloc+0xd4/0xd8
[   25.062499]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.062654]  ksize_unpoisons_memory+0xc0/0x740
[   25.062772]  kunit_try_run_case+0x170/0x3f0
[   25.062967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.063118]  kthread+0x328/0x630
[   25.063216]  ret_from_fork+0x10/0x20
[   25.063414] 
[   25.063469] The buggy address belongs to the object at fff00000c76cf300
[   25.063469]  which belongs to the cache kmalloc-128 of size 128
[   25.063748] The buggy address is located 0 bytes to the right of
[   25.063748]  allocated 115-byte region [fff00000c76cf300, fff00000c76cf373)
[   25.064072] 
[   25.064123] The buggy address belongs to the physical page:
[   25.064197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf
[   25.064403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.064561] page_type: f5(slab)
[   25.064687] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.064896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.065134] page dumped because: kasan: bad access detected
[   25.065251] 
[   25.065378] Memory state around the buggy address:
[   25.065764]  fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.065888]  fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.066002] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.066164]                                                              ^
[   25.066373]  fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.066648]  fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.066752] ==================================================================
[   25.068478] ==================================================================
[   25.068580] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.068693] Read of size 1 at addr fff00000c76cf378 by task kunit_try_catch/196
[   25.068810] 
[   25.068888] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   25.069074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.069142] Hardware name: linux,dummy-virt (DT)
[   25.069229] Call trace:
[   25.069285]  show_stack+0x20/0x38 (C)
[   25.069421]  dump_stack_lvl+0x8c/0xd0
[   25.069547]  print_report+0x118/0x608
[   25.070627]  kasan_report+0xdc/0x128
[   25.071553]  __asan_report_load1_noabort+0x20/0x30
[   25.071788]  ksize_unpoisons_memory+0x618/0x740
[   25.071966]  kunit_try_run_case+0x170/0x3f0
[   25.072095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.072361]  kthread+0x328/0x630
[   25.072645]  ret_from_fork+0x10/0x20
[   25.072872] 
[   25.072918] Allocated by task 196:
[   25.073266]  kasan_save_stack+0x3c/0x68
[   25.073404]  kasan_save_track+0x20/0x40
[   25.073532]  kasan_save_alloc_info+0x40/0x58
[   25.073893]  __kasan_kmalloc+0xd4/0xd8
[   25.074093]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.074247]  ksize_unpoisons_memory+0xc0/0x740
[   25.074457]  kunit_try_run_case+0x170/0x3f0
[   25.074597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.074725]  kthread+0x328/0x630
[   25.074821]  ret_from_fork+0x10/0x20
[   25.075174] 
[   25.075552] The buggy address belongs to the object at fff00000c76cf300
[   25.075552]  which belongs to the cache kmalloc-128 of size 128
[   25.075790] The buggy address is located 5 bytes to the right of
[   25.075790]  allocated 115-byte region [fff00000c76cf300, fff00000c76cf373)
[   25.076043] 
[   25.076105] The buggy address belongs to the physical page:
[   25.076226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf
[   25.076797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.077113] page_type: f5(slab)
[   25.077443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.077890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.078144] page dumped because: kasan: bad access detected
[   25.078538] 
[   25.078784] Memory state around the buggy address:
[   25.079113]  fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.079341]  fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.080383] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.080541]                                                                 ^
[   25.081753]  fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.081949]  fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.082835] ==================================================================

[   17.922815] ==================================================================
[   17.923467] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   17.924154] Read of size 1 at addr ffff888102a13378 by task kunit_try_catch/215
[   17.925084] 
[   17.925442] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   17.925563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.925596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.925671] Call Trace:
[   17.925710]  <TASK>
[   17.925765]  dump_stack_lvl+0x73/0xb0
[   17.925839]  print_report+0xd1/0x650
[   17.925908]  ? __virt_addr_valid+0x1db/0x2d0
[   17.925981]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   17.926020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.926057]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   17.926087]  kasan_report+0x141/0x180
[   17.926122]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   17.926157]  __asan_report_load1_noabort+0x18/0x20
[   17.926187]  ksize_unpoisons_memory+0x7e9/0x9b0
[   17.926238]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.926288]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.926335]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.926370]  kunit_try_run_case+0x1a5/0x480
[   17.926408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.926442]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.926478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.926512]  ? __kthread_parkme+0x82/0x180
[   17.926544]  ? preempt_count_sub+0x50/0x80
[   17.926582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.926642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.926681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.926716]  kthread+0x337/0x6f0
[   17.926741]  ? trace_preempt_on+0x20/0xc0
[   17.926776]  ? __pfx_kthread+0x10/0x10
[   17.926802]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.926834]  ? calculate_sigpending+0x7b/0xa0
[   17.926867]  ? __pfx_kthread+0x10/0x10
[   17.926894]  ret_from_fork+0x41/0x80
[   17.926924]  ? __pfx_kthread+0x10/0x10
[   17.926949]  ret_from_fork_asm+0x1a/0x30
[   17.926991]  </TASK>
[   17.927004] 
[   17.944152] Allocated by task 215:
[   17.944476]  kasan_save_stack+0x45/0x70
[   17.944918]  kasan_save_track+0x18/0x40
[   17.945395]  kasan_save_alloc_info+0x3b/0x50
[   17.945789]  __kasan_kmalloc+0xb7/0xc0
[   17.946203]  __kmalloc_cache_noprof+0x189/0x420
[   17.946683]  ksize_unpoisons_memory+0xc7/0x9b0
[   17.947016]  kunit_try_run_case+0x1a5/0x480
[   17.947961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.948741]  kthread+0x337/0x6f0
[   17.949197]  ret_from_fork+0x41/0x80
[   17.949663]  ret_from_fork_asm+0x1a/0x30
[   17.950019] 
[   17.950254] The buggy address belongs to the object at ffff888102a13300
[   17.950254]  which belongs to the cache kmalloc-128 of size 128
[   17.951240] The buggy address is located 5 bytes to the right of
[   17.951240]  allocated 115-byte region [ffff888102a13300, ffff888102a13373)
[   17.952862] 
[   17.953044] The buggy address belongs to the physical page:
[   17.953822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13
[   17.954504] flags: 0x200000000000000(node=0|zone=2)
[   17.955174] page_type: f5(slab)
[   17.955804] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.956644] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.957695] page dumped because: kasan: bad access detected
[   17.957906] 
[   17.957993] Memory state around the buggy address:
[   17.958161]  ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.959283]  ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.960137] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.960886]                                                                 ^
[   17.961644]  ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.962359]  ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.963075] ==================================================================
[   17.881151] ==================================================================
[   17.882219] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   17.882921] Read of size 1 at addr ffff888102a13373 by task kunit_try_catch/215
[   17.883925] 
[   17.884462] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   17.884621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.884660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.884715] Call Trace:
[   17.884752]  <TASK>
[   17.884798]  dump_stack_lvl+0x73/0xb0
[   17.884877]  print_report+0xd1/0x650
[   17.884951]  ? __virt_addr_valid+0x1db/0x2d0
[   17.885022]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   17.885084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.885123]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   17.885153]  kasan_report+0x141/0x180
[   17.885188]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   17.885250]  __asan_report_load1_noabort+0x18/0x20
[   17.885292]  ksize_unpoisons_memory+0x81c/0x9b0
[   17.885323]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.885351]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.885399]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.885433]  kunit_try_run_case+0x1a5/0x480
[   17.885472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.885505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.885541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.885576]  ? __kthread_parkme+0x82/0x180
[   17.885632]  ? preempt_count_sub+0x50/0x80
[   17.885675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.885712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.885746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.885796]  kthread+0x337/0x6f0
[   17.885820]  ? trace_preempt_on+0x20/0xc0
[   17.885857]  ? __pfx_kthread+0x10/0x10
[   17.885883]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.885914]  ? calculate_sigpending+0x7b/0xa0
[   17.885946]  ? __pfx_kthread+0x10/0x10
[   17.885973]  ret_from_fork+0x41/0x80
[   17.886005]  ? __pfx_kthread+0x10/0x10
[   17.886031]  ret_from_fork_asm+0x1a/0x30
[   17.886075]  </TASK>
[   17.886089] 
[   17.903252] Allocated by task 215:
[   17.903690]  kasan_save_stack+0x45/0x70
[   17.904090]  kasan_save_track+0x18/0x40
[   17.904458]  kasan_save_alloc_info+0x3b/0x50
[   17.904908]  __kasan_kmalloc+0xb7/0xc0
[   17.905330]  __kmalloc_cache_noprof+0x189/0x420
[   17.905788]  ksize_unpoisons_memory+0xc7/0x9b0
[   17.906256]  kunit_try_run_case+0x1a5/0x480
[   17.906663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.907137]  kthread+0x337/0x6f0
[   17.907463]  ret_from_fork+0x41/0x80
[   17.907777]  ret_from_fork_asm+0x1a/0x30
[   17.908092] 
[   17.908327] The buggy address belongs to the object at ffff888102a13300
[   17.908327]  which belongs to the cache kmalloc-128 of size 128
[   17.909340] The buggy address is located 0 bytes to the right of
[   17.909340]  allocated 115-byte region [ffff888102a13300, ffff888102a13373)
[   17.910415] 
[   17.910601] The buggy address belongs to the physical page:
[   17.911123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13
[   17.911781] flags: 0x200000000000000(node=0|zone=2)
[   17.912135] page_type: f5(slab)
[   17.912484] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.913145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.913838] page dumped because: kasan: bad access detected
[   17.914391] 
[   17.914633] Memory state around the buggy address:
[   17.915075]  ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.915735]  ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.917085] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.918020]                                                              ^
[   17.918711]  ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.919232]  ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.919829] ==================================================================
[   17.965861] ==================================================================
[   17.966625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   17.967191] Read of size 1 at addr ffff888102a1337f by task kunit_try_catch/215
[   17.967778] 
[   17.968073] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   17.968193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.968228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.968283] Call Trace:
[   17.968319]  <TASK>
[   17.968361]  dump_stack_lvl+0x73/0xb0
[   17.968437]  print_report+0xd1/0x650
[   17.968508]  ? __virt_addr_valid+0x1db/0x2d0
[   17.968584]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   17.968669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.968746]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   17.968814]  kasan_report+0x141/0x180
[   17.968887]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   17.968967]  __asan_report_load1_noabort+0x18/0x20
[   17.969035]  ksize_unpoisons_memory+0x7b6/0x9b0
[   17.969097]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.969129]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   17.969174]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   17.969211]  kunit_try_run_case+0x1a5/0x480
[   17.969276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.969314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.969351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.969388]  ? __kthread_parkme+0x82/0x180
[   17.969420]  ? preempt_count_sub+0x50/0x80
[   17.969458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.969494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.969529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.969563]  kthread+0x337/0x6f0
[   17.969587]  ? trace_preempt_on+0x20/0xc0
[   17.969646]  ? __pfx_kthread+0x10/0x10
[   17.969674]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.969707]  ? calculate_sigpending+0x7b/0xa0
[   17.969740]  ? __pfx_kthread+0x10/0x10
[   17.969776]  ret_from_fork+0x41/0x80
[   17.969808]  ? __pfx_kthread+0x10/0x10
[   17.969834]  ret_from_fork_asm+0x1a/0x30
[   17.969876]  </TASK>
[   17.969890] 
[   17.984180] Allocated by task 215:
[   17.984589]  kasan_save_stack+0x45/0x70
[   17.985074]  kasan_save_track+0x18/0x40
[   17.985504]  kasan_save_alloc_info+0x3b/0x50
[   17.986049]  __kasan_kmalloc+0xb7/0xc0
[   17.986364]  __kmalloc_cache_noprof+0x189/0x420
[   17.987062]  ksize_unpoisons_memory+0xc7/0x9b0
[   17.987572]  kunit_try_run_case+0x1a5/0x480
[   17.987934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.988645]  kthread+0x337/0x6f0
[   17.989025]  ret_from_fork+0x41/0x80
[   17.989472]  ret_from_fork_asm+0x1a/0x30
[   17.990642] 
[   17.990895] The buggy address belongs to the object at ffff888102a13300
[   17.990895]  which belongs to the cache kmalloc-128 of size 128
[   17.992012] The buggy address is located 12 bytes to the right of
[   17.992012]  allocated 115-byte region [ffff888102a13300, ffff888102a13373)
[   17.993018] 
[   17.993290] The buggy address belongs to the physical page:
[   17.993782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13
[   17.994442] flags: 0x200000000000000(node=0|zone=2)
[   17.994915] page_type: f5(slab)
[   17.995278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.995980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.996678] page dumped because: kasan: bad access detected
[   17.997104] 
[   17.997309] Memory state around the buggy address:
[   17.997834]  ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998495]  ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999110] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.999841]                                                                 ^
[   18.000460]  ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.001048]  ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.001961] ==================================================================