Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.501230] ==================================================================
[   29.501486] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   29.501556] Read of size 1 at addr fff00000c5998173 by task kunit_try_catch/226
[   29.501799] 
[   29.502003] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   29.502122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.502150] Hardware name: linux,dummy-virt (DT)
[   29.502464] Call trace:
[   29.502508]  show_stack+0x20/0x38 (C)
[   29.502793]  dump_stack_lvl+0x8c/0xd0
[   29.502933]  print_report+0x118/0x5d0
[   29.502987]  kasan_report+0xdc/0x128
[   29.503032]  __asan_report_load1_noabort+0x20/0x30
[   29.503431]  ksize_unpoisons_memory+0x628/0x740
[   29.503622]  kunit_try_run_case+0x170/0x3f0
[   29.503914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.504210]  kthread+0x328/0x630
[   29.504327]  ret_from_fork+0x10/0x20
[   29.504682] 
[   29.504972] Allocated by task 226:
[   29.505021]  kasan_save_stack+0x3c/0x68
[   29.505496]  kasan_save_track+0x20/0x40
[   29.505580]  kasan_save_alloc_info+0x40/0x58
[   29.506050]  __kasan_kmalloc+0xd4/0xd8
[   29.506232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.506622]  ksize_unpoisons_memory+0xc0/0x740
[   29.507133]  kunit_try_run_case+0x170/0x3f0
[   29.507279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.507698]  kthread+0x328/0x630
[   29.507929]  ret_from_fork+0x10/0x20
[   29.507979] 
[   29.508000] The buggy address belongs to the object at fff00000c5998100
[   29.508000]  which belongs to the cache kmalloc-128 of size 128
[   29.508077] The buggy address is located 0 bytes to the right of
[   29.508077]  allocated 115-byte region [fff00000c5998100, fff00000c5998173)
[   29.508366] 
[   29.508477] The buggy address belongs to the physical page:
[   29.508546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[   29.508717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.508794] page_type: f5(slab)
[   29.509073] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.509264] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.509330] page dumped because: kasan: bad access detected
[   29.509655] 
[   29.509730] Memory state around the buggy address:
[   29.509893]  fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.510208]  fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510261] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.510524]                                                              ^
[   29.510639]  fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510690]  fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510744] ==================================================================
[   29.522889] ==================================================================
[   29.523098] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.523299] Read of size 1 at addr fff00000c599817f by task kunit_try_catch/226
[   29.523363] 
[   29.523397] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   29.523482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.523509] Hardware name: linux,dummy-virt (DT)
[   29.523540] Call trace:
[   29.523561]  show_stack+0x20/0x38 (C)
[   29.523612]  dump_stack_lvl+0x8c/0xd0
[   29.524187]  print_report+0x118/0x5d0
[   29.524240]  kasan_report+0xdc/0x128
[   29.524285]  __asan_report_load1_noabort+0x20/0x30
[   29.524623]  ksize_unpoisons_memory+0x690/0x740
[   29.524808]  kunit_try_run_case+0x170/0x3f0
[   29.524962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.525144]  kthread+0x328/0x630
[   29.525191]  ret_from_fork+0x10/0x20
[   29.525423] 
[   29.525598] Allocated by task 226:
[   29.525714]  kasan_save_stack+0x3c/0x68
[   29.525821]  kasan_save_track+0x20/0x40
[   29.525900]  kasan_save_alloc_info+0x40/0x58
[   29.526168]  __kasan_kmalloc+0xd4/0xd8
[   29.526333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.526439]  ksize_unpoisons_memory+0xc0/0x740
[   29.526568]  kunit_try_run_case+0x170/0x3f0
[   29.526722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.526827]  kthread+0x328/0x630
[   29.526937]  ret_from_fork+0x10/0x20
[   29.527026] 
[   29.527251] The buggy address belongs to the object at fff00000c5998100
[   29.527251]  which belongs to the cache kmalloc-128 of size 128
[   29.527426] The buggy address is located 12 bytes to the right of
[   29.527426]  allocated 115-byte region [fff00000c5998100, fff00000c5998173)
[   29.527544] 
[   29.527586] The buggy address belongs to the physical page:
[   29.527751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[   29.527808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.527856] page_type: f5(slab)
[   29.527904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.527954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.528278] page dumped because: kasan: bad access detected
[   29.528350] 
[   29.528433] Memory state around the buggy address:
[   29.528477]  fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.528543]  fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528587] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.528635]                                                                 ^
[   29.528677]  fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528729]  fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528766] ==================================================================
[   29.513990] ==================================================================
[   29.514214] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   29.514277] Read of size 1 at addr fff00000c5998178 by task kunit_try_catch/226
[   29.514556] 
[   29.514621] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   29.514846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.514879] Hardware name: linux,dummy-virt (DT)
[   29.514917] Call trace:
[   29.514939]  show_stack+0x20/0x38 (C)
[   29.515267]  dump_stack_lvl+0x8c/0xd0
[   29.515437]  print_report+0x118/0x5d0
[   29.515532]  kasan_report+0xdc/0x128
[   29.515642]  __asan_report_load1_noabort+0x20/0x30
[   29.515743]  ksize_unpoisons_memory+0x618/0x740
[   29.515816]  kunit_try_run_case+0x170/0x3f0
[   29.516019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.516273]  kthread+0x328/0x630
[   29.516349]  ret_from_fork+0x10/0x20
[   29.516527] 
[   29.516606] Allocated by task 226:
[   29.516737]  kasan_save_stack+0x3c/0x68
[   29.516826]  kasan_save_track+0x20/0x40
[   29.516900]  kasan_save_alloc_info+0x40/0x58
[   29.516938]  __kasan_kmalloc+0xd4/0xd8
[   29.517121]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.517320]  ksize_unpoisons_memory+0xc0/0x740
[   29.517513]  kunit_try_run_case+0x170/0x3f0
[   29.517756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.517829]  kthread+0x328/0x630
[   29.517987]  ret_from_fork+0x10/0x20
[   29.518109] 
[   29.518200] The buggy address belongs to the object at fff00000c5998100
[   29.518200]  which belongs to the cache kmalloc-128 of size 128
[   29.518279] The buggy address is located 5 bytes to the right of
[   29.518279]  allocated 115-byte region [fff00000c5998100, fff00000c5998173)
[   29.518495] 
[   29.518673] The buggy address belongs to the physical page:
[   29.518849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[   29.518988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.519129] page_type: f5(slab)
[   29.519223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.519518] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.519667] page dumped because: kasan: bad access detected
[   29.519704] 
[   29.519722] Memory state around the buggy address:
[   29.519754]  fff00000c5998000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.519861]  fff00000c5998080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.519916] >fff00000c5998100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.519955]                                                                 ^
[   29.520329]  fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.520462]  fff00000c5998200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.520622] ==================================================================

[   24.518602] ==================================================================
[   24.519199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   24.519497] Read of size 1 at addr ffff8881058c1878 by task kunit_try_catch/244
[   24.520002] 
[   24.520215] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   24.520380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.520395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.520418] Call Trace:
[   24.520433]  <TASK>
[   24.520454]  dump_stack_lvl+0x73/0xb0
[   24.520488]  print_report+0xd1/0x610
[   24.520510]  ? __virt_addr_valid+0x1db/0x2d0
[   24.520536]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   24.520558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.520582]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   24.520605]  kasan_report+0x141/0x180
[   24.520625]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   24.520652]  __asan_report_load1_noabort+0x18/0x20
[   24.520675]  ksize_unpoisons_memory+0x7e9/0x9b0
[   24.520711]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   24.520734]  ? finish_task_switch.isra.0+0x153/0x700
[   24.520757]  ? __switch_to+0x47/0xf80
[   24.520795]  ? __schedule+0x10cc/0x2b60
[   24.520819]  ? __pfx_read_tsc+0x10/0x10
[   24.520841]  ? ktime_get_ts64+0x86/0x230
[   24.520868]  kunit_try_run_case+0x1a5/0x480
[   24.520892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.520912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.520936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.520959]  ? __kthread_parkme+0x82/0x180
[   24.520980]  ? preempt_count_sub+0x50/0x80
[   24.521002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.521022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.521047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.521070]  kthread+0x337/0x6f0
[   24.521090]  ? trace_preempt_on+0x20/0xc0
[   24.521113]  ? __pfx_kthread+0x10/0x10
[   24.521133]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.521154]  ? calculate_sigpending+0x7b/0xa0
[   24.521179]  ? __pfx_kthread+0x10/0x10
[   24.521199]  ret_from_fork+0x116/0x1d0
[   24.521218]  ? __pfx_kthread+0x10/0x10
[   24.521238]  ret_from_fork_asm+0x1a/0x30
[   24.521270]  </TASK>
[   24.521282] 
[   24.530557] Allocated by task 244:
[   24.530741]  kasan_save_stack+0x45/0x70
[   24.531077]  kasan_save_track+0x18/0x40
[   24.531230]  kasan_save_alloc_info+0x3b/0x50
[   24.531435]  __kasan_kmalloc+0xb7/0xc0
[   24.531596]  __kmalloc_cache_noprof+0x189/0x420
[   24.531797]  ksize_unpoisons_memory+0xc7/0x9b0
[   24.532273]  kunit_try_run_case+0x1a5/0x480
[   24.532429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.532782]  kthread+0x337/0x6f0
[   24.532944]  ret_from_fork+0x116/0x1d0
[   24.533266]  ret_from_fork_asm+0x1a/0x30
[   24.533450] 
[   24.533657] The buggy address belongs to the object at ffff8881058c1800
[   24.533657]  which belongs to the cache kmalloc-128 of size 128
[   24.534343] The buggy address is located 5 bytes to the right of
[   24.534343]  allocated 115-byte region [ffff8881058c1800, ffff8881058c1873)
[   24.534927] 
[   24.535031] The buggy address belongs to the physical page:
[   24.535246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   24.535571] flags: 0x200000000000000(node=0|zone=2)
[   24.535791] page_type: f5(slab)
[   24.536318] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.536623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.537033] page dumped because: kasan: bad access detected
[   24.537219] 
[   24.537312] Memory state around the buggy address:
[   24.537690]  ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.538075]  ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.538453] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.538889]                                                                 ^
[   24.539176]  ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.539580]  ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.540018] ==================================================================
[   24.541020] ==================================================================
[   24.541556] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   24.541991] Read of size 1 at addr ffff8881058c187f by task kunit_try_catch/244
[   24.542453] 
[   24.542564] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   24.542617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.542630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.542652] Call Trace:
[   24.542674]  <TASK>
[   24.542708]  dump_stack_lvl+0x73/0xb0
[   24.542740]  print_report+0xd1/0x610
[   24.542762]  ? __virt_addr_valid+0x1db/0x2d0
[   24.542953]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   24.542979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.543004]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   24.543027]  kasan_report+0x141/0x180
[   24.543048]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   24.543075]  __asan_report_load1_noabort+0x18/0x20
[   24.543098]  ksize_unpoisons_memory+0x7b6/0x9b0
[   24.543121]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   24.543142]  ? finish_task_switch.isra.0+0x153/0x700
[   24.543164]  ? __switch_to+0x47/0xf80
[   24.543190]  ? __schedule+0x10cc/0x2b60
[   24.543214]  ? __pfx_read_tsc+0x10/0x10
[   24.543236]  ? ktime_get_ts64+0x86/0x230
[   24.543261]  kunit_try_run_case+0x1a5/0x480
[   24.543283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.543302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.543325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.543349]  ? __kthread_parkme+0x82/0x180
[   24.543369]  ? preempt_count_sub+0x50/0x80
[   24.543391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.543412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.543437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.543461]  kthread+0x337/0x6f0
[   24.543480]  ? trace_preempt_on+0x20/0xc0
[   24.543503]  ? __pfx_kthread+0x10/0x10
[   24.543523]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.543545]  ? calculate_sigpending+0x7b/0xa0
[   24.543568]  ? __pfx_kthread+0x10/0x10
[   24.543589]  ret_from_fork+0x116/0x1d0
[   24.543608]  ? __pfx_kthread+0x10/0x10
[   24.543628]  ret_from_fork_asm+0x1a/0x30
[   24.543658]  </TASK>
[   24.543670] 
[   24.552742] Allocated by task 244:
[   24.553189]  kasan_save_stack+0x45/0x70
[   24.553383]  kasan_save_track+0x18/0x40
[   24.553522]  kasan_save_alloc_info+0x3b/0x50
[   24.553742]  __kasan_kmalloc+0xb7/0xc0
[   24.554070]  __kmalloc_cache_noprof+0x189/0x420
[   24.554266]  ksize_unpoisons_memory+0xc7/0x9b0
[   24.554452]  kunit_try_run_case+0x1a5/0x480
[   24.554629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.555138]  kthread+0x337/0x6f0
[   24.555301]  ret_from_fork+0x116/0x1d0
[   24.555446]  ret_from_fork_asm+0x1a/0x30
[   24.555642] 
[   24.555836] The buggy address belongs to the object at ffff8881058c1800
[   24.555836]  which belongs to the cache kmalloc-128 of size 128
[   24.556415] The buggy address is located 12 bytes to the right of
[   24.556415]  allocated 115-byte region [ffff8881058c1800, ffff8881058c1873)
[   24.557209] 
[   24.557366] The buggy address belongs to the physical page:
[   24.557582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   24.558068] flags: 0x200000000000000(node=0|zone=2)
[   24.558358] page_type: f5(slab)
[   24.558486] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.558920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.559189] page dumped because: kasan: bad access detected
[   24.559434] 
[   24.559513] Memory state around the buggy address:
[   24.560054]  ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.560372]  ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.560743] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.561012]                                                                 ^
[   24.561421]  ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.561780]  ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.562114] ==================================================================
[   24.496369] ==================================================================
[   24.496833] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   24.497107] Read of size 1 at addr ffff8881058c1873 by task kunit_try_catch/244
[   24.497529] 
[   24.497620] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   24.497677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.497690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.497723] Call Trace:
[   24.497738]  <TASK>
[   24.497759]  dump_stack_lvl+0x73/0xb0
[   24.497808]  print_report+0xd1/0x610
[   24.497832]  ? __virt_addr_valid+0x1db/0x2d0
[   24.497857]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   24.497879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.497905]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   24.497928]  kasan_report+0x141/0x180
[   24.497949]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   24.497976]  __asan_report_load1_noabort+0x18/0x20
[   24.497999]  ksize_unpoisons_memory+0x81c/0x9b0
[   24.498023]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   24.498044]  ? finish_task_switch.isra.0+0x153/0x700
[   24.498067]  ? __switch_to+0x47/0xf80
[   24.498093]  ? __schedule+0x10cc/0x2b60
[   24.498117]  ? __pfx_read_tsc+0x10/0x10
[   24.498138]  ? ktime_get_ts64+0x86/0x230
[   24.498163]  kunit_try_run_case+0x1a5/0x480
[   24.498187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.498207]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.498230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.498254]  ? __kthread_parkme+0x82/0x180
[   24.498274]  ? preempt_count_sub+0x50/0x80
[   24.498297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.498318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.498342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.498367]  kthread+0x337/0x6f0
[   24.498386]  ? trace_preempt_on+0x20/0xc0
[   24.498410]  ? __pfx_kthread+0x10/0x10
[   24.498431]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.498452]  ? calculate_sigpending+0x7b/0xa0
[   24.498476]  ? __pfx_kthread+0x10/0x10
[   24.498497]  ret_from_fork+0x116/0x1d0
[   24.498516]  ? __pfx_kthread+0x10/0x10
[   24.498537]  ret_from_fork_asm+0x1a/0x30
[   24.498567]  </TASK>
[   24.498579] 
[   24.507661] Allocated by task 244:
[   24.507970]  kasan_save_stack+0x45/0x70
[   24.508292]  kasan_save_track+0x18/0x40
[   24.508449]  kasan_save_alloc_info+0x3b/0x50
[   24.508785]  __kasan_kmalloc+0xb7/0xc0
[   24.508988]  __kmalloc_cache_noprof+0x189/0x420
[   24.509270]  ksize_unpoisons_memory+0xc7/0x9b0
[   24.509480]  kunit_try_run_case+0x1a5/0x480
[   24.509659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.510161]  kthread+0x337/0x6f0
[   24.510331]  ret_from_fork+0x116/0x1d0
[   24.510463]  ret_from_fork_asm+0x1a/0x30
[   24.510890] 
[   24.510982] The buggy address belongs to the object at ffff8881058c1800
[   24.510982]  which belongs to the cache kmalloc-128 of size 128
[   24.511561] The buggy address is located 0 bytes to the right of
[   24.511561]  allocated 115-byte region [ffff8881058c1800, ffff8881058c1873)
[   24.512409] 
[   24.512509] The buggy address belongs to the physical page:
[   24.512727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   24.513213] flags: 0x200000000000000(node=0|zone=2)
[   24.513510] page_type: f5(slab)
[   24.513718] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.514133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.514439] page dumped because: kasan: bad access detected
[   24.514660] 
[   24.514739] Memory state around the buggy address:
[   24.514937]  ffff8881058c1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.515515]  ffff8881058c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.515927] >ffff8881058c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.516301]                                                              ^
[   24.516571]  ffff8881058c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.517128]  ffff8881058c1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.517499] ==================================================================