Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.732425] ==================================================================
[   31.732501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.732553] Read of size 1 at addr fff00000c3efdd7f by task kunit_try_catch/225
[   31.732622] 
[   31.732971] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.733129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.733178] Hardware name: linux,dummy-virt (DT)
[   31.733226] Call trace:
[   31.733253]  show_stack+0x20/0x38 (C)
[   31.733544]  dump_stack_lvl+0x8c/0xd0
[   31.733644]  print_report+0x118/0x5e8
[   31.733727]  kasan_report+0xdc/0x128
[   31.733794]  __asan_report_load1_noabort+0x20/0x30
[   31.733845]  ksize_unpoisons_memory+0x690/0x740
[   31.734150]  kunit_try_run_case+0x170/0x3f0
[   31.734236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.734290]  kthread+0x328/0x630
[   31.734365]  ret_from_fork+0x10/0x20
[   31.734417] 
[   31.734435] Allocated by task 225:
[   31.734492]  kasan_save_stack+0x3c/0x68
[   31.734537]  kasan_save_track+0x20/0x40
[   31.734572]  kasan_save_alloc_info+0x40/0x58
[   31.734867]  __kasan_kmalloc+0xd4/0xd8
[   31.734943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.735072]  ksize_unpoisons_memory+0xc0/0x740
[   31.735128]  kunit_try_run_case+0x170/0x3f0
[   31.735163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.735210]  kthread+0x328/0x630
[   31.735408]  ret_from_fork+0x10/0x20
[   31.735469] 
[   31.735615] The buggy address belongs to the object at fff00000c3efdd00
[   31.735615]  which belongs to the cache kmalloc-128 of size 128
[   31.735681] The buggy address is located 12 bytes to the right of
[   31.735681]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.736057] 
[   31.736156] The buggy address belongs to the physical page:
[   31.736190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.736246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.736304] page_type: f5(slab)
[   31.736342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.736634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.736813] page dumped because: kasan: bad access detected
[   31.737016] 
[   31.737074] Memory state around the buggy address:
[   31.737346]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.737509]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.737643] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.737683]                                                                 ^
[   31.738005]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.738102]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.738223] ==================================================================
[   31.727015] ==================================================================
[   31.727065] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.727128] Read of size 1 at addr fff00000c3efdd78 by task kunit_try_catch/225
[   31.727384] 
[   31.727426] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.727531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.727567] Hardware name: linux,dummy-virt (DT)
[   31.727598] Call trace:
[   31.727621]  show_stack+0x20/0x38 (C)
[   31.727668]  dump_stack_lvl+0x8c/0xd0
[   31.727717]  print_report+0x118/0x5e8
[   31.727760]  kasan_report+0xdc/0x128
[   31.727803]  __asan_report_load1_noabort+0x20/0x30
[   31.727863]  ksize_unpoisons_memory+0x618/0x740
[   31.727911]  kunit_try_run_case+0x170/0x3f0
[   31.727967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728020]  kthread+0x328/0x630
[   31.728066]  ret_from_fork+0x10/0x20
[   31.728125] 
[   31.728157] Allocated by task 225:
[   31.728185]  kasan_save_stack+0x3c/0x68
[   31.728231]  kasan_save_track+0x20/0x40
[   31.728275]  kasan_save_alloc_info+0x40/0x58
[   31.728313]  __kasan_kmalloc+0xd4/0xd8
[   31.728353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.728394]  ksize_unpoisons_memory+0xc0/0x740
[   31.728434]  kunit_try_run_case+0x170/0x3f0
[   31.728471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728513]  kthread+0x328/0x630
[   31.728559]  ret_from_fork+0x10/0x20
[   31.728597] 
[   31.728624] The buggy address belongs to the object at fff00000c3efdd00
[   31.728624]  which belongs to the cache kmalloc-128 of size 128
[   31.728689] The buggy address is located 5 bytes to the right of
[   31.728689]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.728751] 
[   31.728771] The buggy address belongs to the physical page:
[   31.728800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.728852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.728909] page_type: f5(slab)
[   31.728953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.729003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.729048] page dumped because: kasan: bad access detected
[   31.729089] 
[   31.729435] Memory state around the buggy address:
[   31.729524]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.729834]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.730070] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.730338]                                                                 ^
[   31.730594]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.730647]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.731195] ==================================================================
[   31.720413] ==================================================================
[   31.720500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.720641] Read of size 1 at addr fff00000c3efdd73 by task kunit_try_catch/225
[   31.720697] 
[   31.720728] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.720818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.720845] Hardware name: linux,dummy-virt (DT)
[   31.721177] Call trace:
[   31.721214]  show_stack+0x20/0x38 (C)
[   31.721356]  dump_stack_lvl+0x8c/0xd0
[   31.721410]  print_report+0x118/0x5e8
[   31.721480]  kasan_report+0xdc/0x128
[   31.721602]  __asan_report_load1_noabort+0x20/0x30
[   31.721654]  ksize_unpoisons_memory+0x628/0x740
[   31.721945]  kunit_try_run_case+0x170/0x3f0
[   31.722026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.722309]  kthread+0x328/0x630
[   31.722385]  ret_from_fork+0x10/0x20
[   31.722452] 
[   31.722543] Allocated by task 225:
[   31.722574]  kasan_save_stack+0x3c/0x68
[   31.722614]  kasan_save_track+0x20/0x40
[   31.722649]  kasan_save_alloc_info+0x40/0x58
[   31.722702]  __kasan_kmalloc+0xd4/0xd8
[   31.723002]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.723094]  ksize_unpoisons_memory+0xc0/0x740
[   31.723143]  kunit_try_run_case+0x170/0x3f0
[   31.723192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.723292]  kthread+0x328/0x630
[   31.723327]  ret_from_fork+0x10/0x20
[   31.723384] 
[   31.723425] The buggy address belongs to the object at fff00000c3efdd00
[   31.723425]  which belongs to the cache kmalloc-128 of size 128
[   31.723485] The buggy address is located 0 bytes to the right of
[   31.723485]  allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73)
[   31.723698] 
[   31.723814] The buggy address belongs to the physical page:
[   31.723991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.724143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.724244] page_type: f5(slab)
[   31.724302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.724425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.724470] page dumped because: kasan: bad access detected
[   31.724512] 
[   31.724535] Memory state around the buggy address:
[   31.724575]  fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.724936]  fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.724992] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.725759]                                                              ^
[   31.725836]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.725905]  fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.726010] ==================================================================


[   25.282906] ==================================================================
[   25.283138] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   25.283728] Read of size 1 at addr ffff888102b0647f by task kunit_try_catch/242
[   25.284015] 
[   25.284250] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.284297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.284309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.284329] Call Trace:
[   25.284345]  <TASK>
[   25.284361]  dump_stack_lvl+0x73/0xb0
[   25.284422]  print_report+0xd1/0x640
[   25.284444]  ? __virt_addr_valid+0x1db/0x2d0
[   25.284466]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.284494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.284519]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.284540]  kasan_report+0x141/0x180
[   25.284561]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.284587]  __asan_report_load1_noabort+0x18/0x20
[   25.284610]  ksize_unpoisons_memory+0x7b6/0x9b0
[   25.284633]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.284654]  ? finish_task_switch.isra.0+0x153/0x700
[   25.284675]  ? __switch_to+0x47/0xf80
[   25.284699]  ? __schedule+0x10da/0x2b60
[   25.284722]  ? __pfx_read_tsc+0x10/0x10
[   25.284742]  ? ktime_get_ts64+0x86/0x230
[   25.284766]  kunit_try_run_case+0x1a5/0x480
[   25.284788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.284809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.284842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.284874]  ? __kthread_parkme+0x82/0x180
[   25.284893]  ? preempt_count_sub+0x50/0x80
[   25.284914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.284936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.284958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.285021]  kthread+0x337/0x6f0
[   25.285042]  ? trace_preempt_on+0x20/0xc0
[   25.285066]  ? __pfx_kthread+0x10/0x10
[   25.285085]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.285126]  ? calculate_sigpending+0x7b/0xa0
[   25.285149]  ? __pfx_kthread+0x10/0x10
[   25.285169]  ret_from_fork+0x116/0x1d0
[   25.285188]  ? __pfx_kthread+0x10/0x10
[   25.285207]  ret_from_fork_asm+0x1a/0x30
[   25.285244]  </TASK>
[   25.285255] 
[   25.299124] Allocated by task 242:
[   25.299568]  kasan_save_stack+0x45/0x70
[   25.300019]  kasan_save_track+0x18/0x40
[   25.300375]  kasan_save_alloc_info+0x3b/0x50
[   25.300517]  __kasan_kmalloc+0xb7/0xc0
[   25.300638]  __kmalloc_cache_noprof+0x189/0x420
[   25.300804]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.301256]  kunit_try_run_case+0x1a5/0x480
[   25.301805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.302448]  kthread+0x337/0x6f0
[   25.302857]  ret_from_fork+0x116/0x1d0
[   25.303266]  ret_from_fork_asm+0x1a/0x30
[   25.303649] 
[   25.303862] The buggy address belongs to the object at ffff888102b06400
[   25.303862]  which belongs to the cache kmalloc-128 of size 128
[   25.304309] The buggy address is located 12 bytes to the right of
[   25.304309]  allocated 115-byte region [ffff888102b06400, ffff888102b06473)
[   25.304673] 
[   25.304739] The buggy address belongs to the physical page:
[   25.304910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06
[   25.305145] flags: 0x200000000000000(node=0|zone=2)
[   25.305312] page_type: f5(slab)
[   25.305426] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.305649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.305867] page dumped because: kasan: bad access detected
[   25.306030] 
[   25.306091] Memory state around the buggy address:
[   25.306295]  ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.306882]  ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.307479] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.308128]                                                                 ^
[   25.308815]  ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.309522]  ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.310183] ==================================================================
[   25.257475] ==================================================================
[   25.257728] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   25.258698] Read of size 1 at addr ffff888102b06478 by task kunit_try_catch/242
[   25.259367] 
[   25.259465] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.259689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.259703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.259724] Call Trace:
[   25.259736]  <TASK>
[   25.259750]  dump_stack_lvl+0x73/0xb0
[   25.259782]  print_report+0xd1/0x640
[   25.259882]  ? __virt_addr_valid+0x1db/0x2d0
[   25.259906]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.259928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.259953]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.259975]  kasan_report+0x141/0x180
[   25.259996]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.260022]  __asan_report_load1_noabort+0x18/0x20
[   25.260045]  ksize_unpoisons_memory+0x7e9/0x9b0
[   25.260067]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.260088]  ? finish_task_switch.isra.0+0x153/0x700
[   25.260109]  ? __switch_to+0x47/0xf80
[   25.260133]  ? __schedule+0x10da/0x2b60
[   25.260155]  ? __pfx_read_tsc+0x10/0x10
[   25.260176]  ? ktime_get_ts64+0x86/0x230
[   25.260199]  kunit_try_run_case+0x1a5/0x480
[   25.260235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.260256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.260289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.260321]  ? __kthread_parkme+0x82/0x180
[   25.260340]  ? preempt_count_sub+0x50/0x80
[   25.260361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.260384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.260405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.260427]  kthread+0x337/0x6f0
[   25.260446]  ? trace_preempt_on+0x20/0xc0
[   25.260468]  ? __pfx_kthread+0x10/0x10
[   25.260487]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.260517]  ? calculate_sigpending+0x7b/0xa0
[   25.260540]  ? __pfx_kthread+0x10/0x10
[   25.260560]  ret_from_fork+0x116/0x1d0
[   25.260578]  ? __pfx_kthread+0x10/0x10
[   25.260597]  ret_from_fork_asm+0x1a/0x30
[   25.260627]  </TASK>
[   25.260637] 
[   25.271345] Allocated by task 242:
[   25.271668]  kasan_save_stack+0x45/0x70
[   25.271844]  kasan_save_track+0x18/0x40
[   25.272158]  kasan_save_alloc_info+0x3b/0x50
[   25.272380]  __kasan_kmalloc+0xb7/0xc0
[   25.272551]  __kmalloc_cache_noprof+0x189/0x420
[   25.272753]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.272950]  kunit_try_run_case+0x1a5/0x480
[   25.273145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.273887]  kthread+0x337/0x6f0
[   25.274298]  ret_from_fork+0x116/0x1d0
[   25.274464]  ret_from_fork_asm+0x1a/0x30
[   25.274798] 
[   25.275071] The buggy address belongs to the object at ffff888102b06400
[   25.275071]  which belongs to the cache kmalloc-128 of size 128
[   25.275573] The buggy address is located 5 bytes to the right of
[   25.275573]  allocated 115-byte region [ffff888102b06400, ffff888102b06473)
[   25.276335] 
[   25.276528] The buggy address belongs to the physical page:
[   25.276768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06
[   25.277289] flags: 0x200000000000000(node=0|zone=2)
[   25.277517] page_type: f5(slab)
[   25.277650] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.278205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.278540] page dumped because: kasan: bad access detected
[   25.278772] 
[   25.278947] Memory state around the buggy address:
[   25.279151]  ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.279467]  ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.279762] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.280715]                                                                 ^
[   25.281368]  ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.281677]  ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.282452] ==================================================================
[   25.231648] ==================================================================
[   25.232231] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   25.233043] Read of size 1 at addr ffff888102b06473 by task kunit_try_catch/242
[   25.233560] 
[   25.234066] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.234123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.234135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.234158] Call Trace:
[   25.234170]  <TASK>
[   25.234187]  dump_stack_lvl+0x73/0xb0
[   25.234240]  print_report+0xd1/0x640
[   25.234263]  ? __virt_addr_valid+0x1db/0x2d0
[   25.234288]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.234310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.234334]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.234357]  kasan_report+0x141/0x180
[   25.234377]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.234404]  __asan_report_load1_noabort+0x18/0x20
[   25.234426]  ksize_unpoisons_memory+0x81c/0x9b0
[   25.234449]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.234470]  ? finish_task_switch.isra.0+0x153/0x700
[   25.234492]  ? __switch_to+0x47/0xf80
[   25.234518]  ? __schedule+0x10da/0x2b60
[   25.234541]  ? __pfx_read_tsc+0x10/0x10
[   25.234562]  ? ktime_get_ts64+0x86/0x230
[   25.234587]  kunit_try_run_case+0x1a5/0x480
[   25.234612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.234637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.234670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.234702]  ? __kthread_parkme+0x82/0x180
[   25.234721]  ? preempt_count_sub+0x50/0x80
[   25.234742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.234765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.234786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.234810]  kthread+0x337/0x6f0
[   25.234828]  ? trace_preempt_on+0x20/0xc0
[   25.234852]  ? __pfx_kthread+0x10/0x10
[   25.234871]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.234900]  ? calculate_sigpending+0x7b/0xa0
[   25.234923]  ? __pfx_kthread+0x10/0x10
[   25.234943]  ret_from_fork+0x116/0x1d0
[   25.234962]  ? __pfx_kthread+0x10/0x10
[   25.234982]  ret_from_fork_asm+0x1a/0x30
[   25.235014]  </TASK>
[   25.235025] 
[   25.245679] Allocated by task 242:
[   25.246208]  kasan_save_stack+0x45/0x70
[   25.246425]  kasan_save_track+0x18/0x40
[   25.246604]  kasan_save_alloc_info+0x3b/0x50
[   25.246811]  __kasan_kmalloc+0xb7/0xc0
[   25.247421]  __kmalloc_cache_noprof+0x189/0x420
[   25.247587]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.248015]  kunit_try_run_case+0x1a5/0x480
[   25.248379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.248712]  kthread+0x337/0x6f0
[   25.248849]  ret_from_fork+0x116/0x1d0
[   25.249196]  ret_from_fork_asm+0x1a/0x30
[   25.249395] 
[   25.249471] The buggy address belongs to the object at ffff888102b06400
[   25.249471]  which belongs to the cache kmalloc-128 of size 128
[   25.249970] The buggy address is located 0 bytes to the right of
[   25.249970]  allocated 115-byte region [ffff888102b06400, ffff888102b06473)
[   25.250473] 
[   25.250546] The buggy address belongs to the physical page:
[   25.250799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b06
[   25.251125] flags: 0x200000000000000(node=0|zone=2)
[   25.252017] page_type: f5(slab)
[   25.252304] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.252680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.253313] page dumped because: kasan: bad access detected
[   25.253564] 
[   25.253638] Memory state around the buggy address:
[   25.254054]  ffff888102b06300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.254481]  ffff888102b06380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.254896] >ffff888102b06400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.255332]                                                              ^
[   25.255736]  ffff888102b06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.256420]  ffff888102b06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.256719] ==================================================================