Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   57.994628] ==================================================================
[   58.001892] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908
[   58.009338] Read of size 1 at addr cc228e78 by task kunit_try_catch/250
[   58.016021] 
[   58.017517] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.017547] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.017547] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.017578] Call trace: 
[   58.017578]  unwind_backtrace from show_stack+0x18/0x1c
[   58.017608]  show_stack from dump_stack_lvl+0x70/0x90
[   58.017608]  dump_stack_lvl from print_report+0x158/0x528
[   58.017639]  print_report from kasan_report+0xdc/0x118
[   58.017669]  kasan_report from ksize_unpoisons_memory+0x7f0/0x908
[   58.017700]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.017730]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.017730]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.017761]  kthread from ret_from_fork+0x14/0x20
[   58.017791] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   58.017791] bfa0:                                     00000000 00000000 00000000 00000000
[   58.017822] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.017852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.017852] 
[   58.123596] Allocated by task 250:
[   58.127014]  kasan_save_track+0x30/0x5c
[   58.130889]  __kasan_kmalloc+0x8c/0x94
[   58.134674]  ksize_unpoisons_memory+0xe8/0x908
[   58.139160]  kunit_try_run_case+0x22c/0x5a8
[   58.143371]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.148895]  kthread+0x464/0x810
[   58.152160]  ret_from_fork+0x14/0x20
[   58.155761] 
[   58.157257] The buggy address belongs to the object at cc228e00
[   58.157257]  which belongs to the cache kmalloc-128 of size 128
[   58.169158] The buggy address is located 5 bytes to the right of
[   58.169158]  allocated 115-byte region [cc228e00, cc228e73)
[   58.180816] 
[   58.182312] The buggy address belongs to the physical page:
[   58.187927] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   58.195190] flags: 0x0(zone=0)
[   58.198272] page_type: f5(slab)
[   58.201446] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.209594] raw: 00000000
[   58.212219] page dumped because: kasan: bad access detected
[   58.217834] 
[   58.219329] Memory state around the buggy address:
[   58.224151]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.230712]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.237304] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.243865]                                                         ^
[   58.250366]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.256927]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.263488] ==================================================================
[   57.713684] ==================================================================
[   57.725158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908
[   57.732604] Read of size 1 at addr cc228e73 by task kunit_try_catch/250
[   57.739288] 
[   57.740783] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   57.740814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.740814] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.740844] Call trace: 
[   57.740844]  unwind_backtrace from show_stack+0x18/0x1c
[   57.740875]  show_stack from dump_stack_lvl+0x70/0x90
[   57.740905]  dump_stack_lvl from print_report+0x158/0x528
[   57.740905]  print_report from kasan_report+0xdc/0x118
[   57.740936]  kasan_report from ksize_unpoisons_memory+0x7f8/0x908
[   57.740966]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.740997]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.741027]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.741027]  kthread from ret_from_fork+0x14/0x20
[   57.741058] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   57.741088] bfa0:                                     00000000 00000000 00000000 00000000
[   57.741088] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.741119] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.741119] 
[   57.846862] Allocated by task 250:
[   57.850280]  kasan_save_track+0x30/0x5c
[   57.854156]  __kasan_kmalloc+0x8c/0x94
[   57.857940]  ksize_unpoisons_memory+0xe8/0x908
[   57.862426]  kunit_try_run_case+0x22c/0x5a8
[   57.866638]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.872161]  kthread+0x464/0x810
[   57.875427]  ret_from_fork+0x14/0x20
[   57.879028] 
[   57.880523] The buggy address belongs to the object at cc228e00
[   57.880523]  which belongs to the cache kmalloc-128 of size 128
[   57.892425] The buggy address is located 0 bytes to the right of
[   57.892425]  allocated 115-byte region [cc228e00, cc228e73)
[   57.904083] 
[   57.905578] The buggy address belongs to the physical page:
[   57.911193] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   57.918457] flags: 0x0(zone=0)
[   57.921539] page_type: f5(slab)
[   57.924713] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.932861] raw: 00000000
[   57.935485] page dumped because: kasan: bad access detected
[   57.941101] 
[   57.942596] Memory state around the buggy address:
[   57.947418]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.953979]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.960571] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.967132]                                                      ^
[   57.973358]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.979919]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.986511] ==================================================================
[   58.270843] ==================================================================
[   58.278106] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908
[   58.285552] Read of size 1 at addr cc228e7f by task kunit_try_catch/250
[   58.292205] 
[   58.293731] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   58.293762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.293762] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.293762] Call trace: 
[   58.293792]  unwind_backtrace from show_stack+0x18/0x1c
[   58.293792]  show_stack from dump_stack_lvl+0x70/0x90
[   58.293823]  dump_stack_lvl from print_report+0x158/0x528
[   58.293853]  print_report from kasan_report+0xdc/0x118
[   58.293884]  kasan_report from ksize_unpoisons_memory+0x858/0x908
[   58.293884]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.293914]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.293945]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.293975]  kthread from ret_from_fork+0x14/0x20
[   58.294006] Exception stack(0xf24ebfb0 to 0xf24ebff8)
[   58.294006] bfa0:                                     00000000 00000000 00000000 00000000
[   58.294036] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.294036] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.294067] 
[   58.399810] Allocated by task 250:
[   58.403228]  kasan_save_track+0x30/0x5c
[   58.407104]  __kasan_kmalloc+0x8c/0x94
[   58.410888]  ksize_unpoisons_memory+0xe8/0x908
[   58.415374]  kunit_try_run_case+0x22c/0x5a8
[   58.419586]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.425109]  kthread+0x464/0x810
[   58.428375]  ret_from_fork+0x14/0x20
[   58.431976] 
[   58.433471] The buggy address belongs to the object at cc228e00
[   58.433471]  which belongs to the cache kmalloc-128 of size 128
[   58.445373] The buggy address is located 12 bytes to the right of
[   58.445373]  allocated 115-byte region [cc228e00, cc228e73)
[   58.457092] 
[   58.458587] The buggy address belongs to the physical page:
[   58.464202] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   58.471466] flags: 0x0(zone=0)
[   58.474548] page_type: f5(slab)
[   58.477722] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.485870] raw: 00000000
[   58.488494] page dumped because: kasan: bad access detected
[   58.494110] 
[   58.495605] Memory state around the buggy address:
[   58.500427]  cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.507019]  cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.513580] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.520141]                                                         ^
[   58.526641]  cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.533203]  cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.539764] ==================================================================

[   29.515305] ==================================================================
[   29.522536] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   29.529935] Read of size 1 at addr ffff888107f05378 by task kunit_try_catch/237
[   29.537244] 
[   29.538765] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.538773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.538775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.538778] Call Trace:
[   29.538779]  <TASK>
[   29.538781]  dump_stack_lvl+0x73/0xb0
[   29.538785]  print_report+0xd1/0x650
[   29.538789]  ? __virt_addr_valid+0x1db/0x2d0
[   29.538792]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.538801]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538805]  kasan_report+0x141/0x180
[   29.538810]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538815]  __asan_report_load1_noabort+0x18/0x20
[   29.538819]  ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538823]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.538828]  ? finish_task_switch.isra.0+0x153/0x700
[   29.538832]  ? __switch_to+0x5d9/0xf60
[   29.538836]  ? dequeue_task_fair+0x166/0x4e0
[   29.538840]  ? __schedule+0x10cc/0x2b30
[   29.538844]  ? ktime_get_ts64+0x83/0x230
[   29.538849]  kunit_try_run_case+0x1a2/0x480
[   29.538853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.538857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.538862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.538866]  ? __kthread_parkme+0x82/0x180
[   29.538870]  ? preempt_count_sub+0x50/0x80
[   29.538875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.538879]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.538883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.538887]  kthread+0x334/0x6f0
[   29.538891]  ? trace_preempt_on+0x20/0xc0
[   29.538895]  ? __pfx_kthread+0x10/0x10
[   29.538899]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.538903]  ? calculate_sigpending+0x7b/0xa0
[   29.538907]  ? __pfx_kthread+0x10/0x10
[   29.538911]  ret_from_fork+0x3e/0x80
[   29.538915]  ? __pfx_kthread+0x10/0x10
[   29.538920]  ret_from_fork_asm+0x1a/0x30
[   29.538925]  </TASK>
[   29.538927] 
[   29.716876] Allocated by task 237:
[   29.720282]  kasan_save_stack+0x45/0x70
[   29.724122]  kasan_save_track+0x18/0x40
[   29.727961]  kasan_save_alloc_info+0x3b/0x50
[   29.732233]  __kasan_kmalloc+0xb7/0xc0
[   29.735986]  __kmalloc_cache_noprof+0x189/0x420
[   29.740518]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.744971]  kunit_try_run_case+0x1a2/0x480
[   29.749158]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.754558]  kthread+0x334/0x6f0
[   29.757789]  ret_from_fork+0x3e/0x80
[   29.761370]  ret_from_fork_asm+0x1a/0x30
[   29.765296] 
[   29.766794] The buggy address belongs to the object at ffff888107f05300
[   29.766794]  which belongs to the cache kmalloc-128 of size 128
[   29.779309] The buggy address is located 5 bytes to the right of
[   29.779309]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   29.792255] 
[   29.793763] The buggy address belongs to the physical page:
[   29.799336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   29.807336] flags: 0x200000000000000(node=0|zone=2)
[   29.812213] page_type: f5(slab)
[   29.815361] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.823110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.830856] page dumped because: kasan: bad access detected
[   29.836428] 
[   29.837927] Memory state around the buggy address:
[   29.842763]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.849982]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.857201] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.864421]                                                                 ^
[   29.871551]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.878772]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.885990] ==================================================================
[   29.893231] ==================================================================
[   29.900462] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   29.907855] Read of size 1 at addr ffff888107f0537f by task kunit_try_catch/237
[   29.915160] 
[   29.916660] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.916688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916690] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.916693] Call Trace:
[   29.916695]  <TASK>
[   29.916696]  dump_stack_lvl+0x73/0xb0
[   29.916700]  print_report+0xd1/0x650
[   29.916704]  ? __virt_addr_valid+0x1db/0x2d0
[   29.916720]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.916741]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916746]  kasan_report+0x141/0x180
[   29.916750]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916755]  __asan_report_load1_noabort+0x18/0x20
[   29.916759]  ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916763]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.916768]  ? finish_task_switch.isra.0+0x153/0x700
[   29.916772]  ? __switch_to+0x5d9/0xf60
[   29.916775]  ? dequeue_task_fair+0x166/0x4e0
[   29.916780]  ? __schedule+0x10cc/0x2b30
[   29.916784]  ? ktime_get_ts64+0x83/0x230
[   29.916789]  kunit_try_run_case+0x1a2/0x480
[   29.916793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.916797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.916801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.916806]  ? __kthread_parkme+0x82/0x180
[   29.916810]  ? preempt_count_sub+0x50/0x80
[   29.916814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.916818]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.916822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.916826]  kthread+0x334/0x6f0
[   29.916830]  ? trace_preempt_on+0x20/0xc0
[   29.916834]  ? __pfx_kthread+0x10/0x10
[   29.916838]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.916842]  ? calculate_sigpending+0x7b/0xa0
[   29.916846]  ? __pfx_kthread+0x10/0x10
[   29.916850]  ret_from_fork+0x3e/0x80
[   29.916854]  ? __pfx_kthread+0x10/0x10
[   29.916858]  ret_from_fork_asm+0x1a/0x30
[   29.916864]  </TASK>
[   29.916865] 
[   30.094883] Allocated by task 237:
[   30.098287]  kasan_save_stack+0x45/0x70
[   30.102128]  kasan_save_track+0x18/0x40
[   30.105965]  kasan_save_alloc_info+0x3b/0x50
[   30.110239]  __kasan_kmalloc+0xb7/0xc0
[   30.113990]  __kmalloc_cache_noprof+0x189/0x420
[   30.118523]  ksize_unpoisons_memory+0xc7/0x9b0
[   30.122971]  kunit_try_run_case+0x1a2/0x480
[   30.127165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.132570]  kthread+0x334/0x6f0
[   30.135803]  ret_from_fork+0x3e/0x80
[   30.139384]  ret_from_fork_asm+0x1a/0x30
[   30.143307] 
[   30.144798] The buggy address belongs to the object at ffff888107f05300
[   30.144798]  which belongs to the cache kmalloc-128 of size 128
[   30.157304] The buggy address is located 12 bytes to the right of
[   30.157304]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   30.170339] 
[   30.171838] The buggy address belongs to the physical page:
[   30.177412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   30.185418] flags: 0x200000000000000(node=0|zone=2)
[   30.190298] page_type: f5(slab)
[   30.193443] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.201183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.208921] page dumped because: kasan: bad access detected
[   30.214494] 
[   30.215994] Memory state around the buggy address:
[   30.220787]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.228015]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.235240] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.242459]                                                                 ^
[   30.249592]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.256812]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264031] ==================================================================
[   29.133247] ==================================================================
[   29.144662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   29.152131] Read of size 1 at addr ffff888107f05373 by task kunit_try_catch/237
[   29.159437] 
[   29.160937] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.160945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.160947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.160951] Call Trace:
[   29.160952]  <TASK>
[   29.160954]  dump_stack_lvl+0x73/0xb0
[   29.160958]  print_report+0xd1/0x650
[   29.160962]  ? __virt_addr_valid+0x1db/0x2d0
[   29.160966]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.160974]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160979]  kasan_report+0x141/0x180
[   29.160983]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160988]  __asan_report_load1_noabort+0x18/0x20
[   29.160992]  ksize_unpoisons_memory+0x81c/0x9b0
[   29.160996]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.161001]  ? finish_task_switch.isra.0+0x153/0x700
[   29.161005]  ? __switch_to+0x5d9/0xf60
[   29.161009]  ? dequeue_task_fair+0x166/0x4e0
[   29.161013]  ? __schedule+0x10cc/0x2b30
[   29.161018]  ? ktime_get_ts64+0x83/0x230
[   29.161022]  kunit_try_run_case+0x1a2/0x480
[   29.161026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.161031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.161035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.161039]  ? __kthread_parkme+0x82/0x180
[   29.161043]  ? preempt_count_sub+0x50/0x80
[   29.161048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.161052]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.161056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.161060]  kthread+0x334/0x6f0
[   29.161064]  ? trace_preempt_on+0x20/0xc0
[   29.161068]  ? __pfx_kthread+0x10/0x10
[   29.161072]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.161076]  ? calculate_sigpending+0x7b/0xa0
[   29.161080]  ? __pfx_kthread+0x10/0x10
[   29.161084]  ret_from_fork+0x3e/0x80
[   29.161088]  ? __pfx_kthread+0x10/0x10
[   29.161093]  ret_from_fork_asm+0x1a/0x30
[   29.161098]  </TASK>
[   29.161100] 
[   29.339106] Allocated by task 237:
[   29.342511]  kasan_save_stack+0x45/0x70
[   29.346351]  kasan_save_track+0x18/0x40
[   29.350189]  kasan_save_alloc_info+0x3b/0x50
[   29.354461]  __kasan_kmalloc+0xb7/0xc0
[   29.358215]  __kmalloc_cache_noprof+0x189/0x420
[   29.362759]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.367211]  kunit_try_run_case+0x1a2/0x480
[   29.371396]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.376794]  kthread+0x334/0x6f0
[   29.380028]  ret_from_fork+0x3e/0x80
[   29.383608]  ret_from_fork_asm+0x1a/0x30
[   29.387532] 
[   29.389032] The buggy address belongs to the object at ffff888107f05300
[   29.389032]  which belongs to the cache kmalloc-128 of size 128
[   29.401547] The buggy address is located 0 bytes to the right of
[   29.401547]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   29.414501] 
[   29.416000] The buggy address belongs to the physical page:
[   29.421574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   29.429583] flags: 0x200000000000000(node=0|zone=2)
[   29.434469] page_type: f5(slab)
[   29.437616] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.445356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.453102] page dumped because: kasan: bad access detected
[   29.458699] 
[   29.460243] Memory state around the buggy address:
[   29.465035]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.472253]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.479473] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.486699]                                                              ^
[   29.493618]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.500835]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.508056] ==================================================================