Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.257589] ==================================================================
[   31.257924] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   31.258068] Read of size 1 at addr fff00000c99bce78 by task kunit_try_catch/227
[   31.258123] 
[   31.258157] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.258543] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.258587] Hardware name: linux,dummy-virt (DT)
[   31.258689] Call trace:
[   31.258716]  show_stack+0x20/0x38 (C)
[   31.258888]  dump_stack_lvl+0x8c/0xd0
[   31.258983]  print_report+0x118/0x5e8
[   31.259208]  kasan_report+0xdc/0x128
[   31.259271]  __asan_report_load1_noabort+0x20/0x30
[   31.259479]  ksize_unpoisons_memory+0x618/0x740
[   31.259641]  kunit_try_run_case+0x170/0x3f0
[   31.259696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.259749]  kthread+0x328/0x630
[   31.259798]  ret_from_fork+0x10/0x20
[   31.259847] 
[   31.259865] Allocated by task 227:
[   31.259893]  kasan_save_stack+0x3c/0x68
[   31.259942]  kasan_save_track+0x20/0x40
[   31.259979]  kasan_save_alloc_info+0x40/0x58
[   31.260017]  __kasan_kmalloc+0xd4/0xd8
[   31.260051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.260089]  ksize_unpoisons_memory+0xc0/0x740
[   31.260128]  kunit_try_run_case+0x170/0x3f0
[   31.260163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.260204]  kthread+0x328/0x630
[   31.260282]  ret_from_fork+0x10/0x20
[   31.260321] 
[   31.260339] The buggy address belongs to the object at fff00000c99bce00
[   31.260339]  which belongs to the cache kmalloc-128 of size 128
[   31.260397] The buggy address is located 5 bytes to the right of
[   31.260397]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.260471] 
[   31.260491] The buggy address belongs to the physical page:
[   31.261176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.261436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.261523] page_type: f5(slab)
[   31.261660] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.261739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.262098] page dumped because: kasan: bad access detected
[   31.262153] 
[   31.262214] Memory state around the buggy address:
[   31.262316]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.262488]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.262598] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.262673]                                                                 ^
[   31.263039]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263092]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263183] ==================================================================
[   31.264094] ==================================================================
[   31.264146] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.264199] Read of size 1 at addr fff00000c99bce7f by task kunit_try_catch/227
[   31.265071] 
[   31.265122] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.265476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.265618] Hardware name: linux,dummy-virt (DT)
[   31.265673] Call trace:
[   31.265715]  show_stack+0x20/0x38 (C)
[   31.266343]  dump_stack_lvl+0x8c/0xd0
[   31.266551]  print_report+0x118/0x5e8
[   31.266641]  kasan_report+0xdc/0x128
[   31.266751]  __asan_report_load1_noabort+0x20/0x30
[   31.266879]  ksize_unpoisons_memory+0x690/0x740
[   31.266974]  kunit_try_run_case+0x170/0x3f0
[   31.267367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.267578]  kthread+0x328/0x630
[   31.267770]  ret_from_fork+0x10/0x20
[   31.267888] 
[   31.268003] Allocated by task 227:
[   31.268061]  kasan_save_stack+0x3c/0x68
[   31.268169]  kasan_save_track+0x20/0x40
[   31.268236]  kasan_save_alloc_info+0x40/0x58
[   31.268385]  __kasan_kmalloc+0xd4/0xd8
[   31.268462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.268602]  ksize_unpoisons_memory+0xc0/0x740
[   31.268653]  kunit_try_run_case+0x170/0x3f0
[   31.268691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.268741]  kthread+0x328/0x630
[   31.268773]  ret_from_fork+0x10/0x20
[   31.269150] 
[   31.269227] The buggy address belongs to the object at fff00000c99bce00
[   31.269227]  which belongs to the cache kmalloc-128 of size 128
[   31.269290] The buggy address is located 12 bytes to the right of
[   31.269290]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.269363] 
[   31.269398] The buggy address belongs to the physical page:
[   31.269434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.269509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.269556] page_type: f5(slab)
[   31.269591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.269649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.269700] page dumped because: kasan: bad access detected
[   31.269740] 
[   31.269766] Memory state around the buggy address:
[   31.269807]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.269851]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270129] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.270730]                                                                 ^
[   31.270875]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271230]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271297] ==================================================================
[   31.249693] ==================================================================
[   31.249796] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   31.250019] Read of size 1 at addr fff00000c99bce73 by task kunit_try_catch/227
[   31.250074] 
[   31.250110] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.250201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.250401] Hardware name: linux,dummy-virt (DT)
[   31.250480] Call trace:
[   31.250506]  show_stack+0x20/0x38 (C)
[   31.250858]  dump_stack_lvl+0x8c/0xd0
[   31.251019]  print_report+0x118/0x5e8
[   31.251085]  kasan_report+0xdc/0x128
[   31.251131]  __asan_report_load1_noabort+0x20/0x30
[   31.251207]  ksize_unpoisons_memory+0x628/0x740
[   31.251305]  kunit_try_run_case+0x170/0x3f0
[   31.251354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.251429]  kthread+0x328/0x630
[   31.251627]  ret_from_fork+0x10/0x20
[   31.251697] 
[   31.251996] Allocated by task 227:
[   31.252048]  kasan_save_stack+0x3c/0x68
[   31.252094]  kasan_save_track+0x20/0x40
[   31.252130]  kasan_save_alloc_info+0x40/0x58
[   31.252304]  __kasan_kmalloc+0xd4/0xd8
[   31.252351]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.252420]  ksize_unpoisons_memory+0xc0/0x740
[   31.252836]  kunit_try_run_case+0x170/0x3f0
[   31.252950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.253088]  kthread+0x328/0x630
[   31.253137]  ret_from_fork+0x10/0x20
[   31.253186] 
[   31.253212] The buggy address belongs to the object at fff00000c99bce00
[   31.253212]  which belongs to the cache kmalloc-128 of size 128
[   31.253343] The buggy address is located 0 bytes to the right of
[   31.253343]  allocated 115-byte region [fff00000c99bce00, fff00000c99bce73)
[   31.253548] 
[   31.253765] The buggy address belongs to the physical page:
[   31.253853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.254007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.254096] page_type: f5(slab)
[   31.254223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.254462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.254627] page dumped because: kasan: bad access detected
[   31.254928] 
[   31.255064] Memory state around the buggy address:
[   31.255143]  fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.255281]  fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255348] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.255397]                                                              ^
[   31.255472]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255515]  fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.255590] ==================================================================

[   25.631472] ==================================================================
[   25.631811] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   25.632832] Read of size 1 at addr ffff888104964678 by task kunit_try_catch/243
[   25.633218] 
[   25.633350] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.633399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.633413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.633435] Call Trace:
[   25.633449]  <TASK>
[   25.633468]  dump_stack_lvl+0x73/0xb0
[   25.633497]  print_report+0xd1/0x640
[   25.633519]  ? __virt_addr_valid+0x1db/0x2d0
[   25.633564]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.633586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.633627]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.633650]  kasan_report+0x141/0x180
[   25.633672]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   25.633699]  __asan_report_load1_noabort+0x18/0x20
[   25.633723]  ksize_unpoisons_memory+0x7e9/0x9b0
[   25.633746]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.633768]  ? finish_task_switch.isra.0+0x153/0x700
[   25.634385]  ? __switch_to+0x47/0xf80
[   25.634425]  ? __schedule+0x10da/0x2b60
[   25.634451]  ? __pfx_read_tsc+0x10/0x10
[   25.634472]  ? ktime_get_ts64+0x86/0x230
[   25.634754]  kunit_try_run_case+0x1a5/0x480
[   25.634787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.634810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.634836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.634881]  ? __kthread_parkme+0x82/0x180
[   25.634915]  ? preempt_count_sub+0x50/0x80
[   25.634947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.635248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.635276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.635300]  kthread+0x337/0x6f0
[   25.635320]  ? trace_preempt_on+0x20/0xc0
[   25.635345]  ? __pfx_kthread+0x10/0x10
[   25.635365]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.635408]  ? calculate_sigpending+0x7b/0xa0
[   25.635432]  ? __pfx_kthread+0x10/0x10
[   25.635453]  ret_from_fork+0x116/0x1d0
[   25.635473]  ? __pfx_kthread+0x10/0x10
[   25.635493]  ret_from_fork_asm+0x1a/0x30
[   25.635525]  </TASK>
[   25.635537] 
[   25.646546] Allocated by task 243:
[   25.646684]  kasan_save_stack+0x45/0x70
[   25.646827]  kasan_save_track+0x18/0x40
[   25.646957]  kasan_save_alloc_info+0x3b/0x50
[   25.647102]  __kasan_kmalloc+0xb7/0xc0
[   25.647253]  __kmalloc_cache_noprof+0x189/0x420
[   25.647472]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.647720]  kunit_try_run_case+0x1a5/0x480
[   25.648396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.648627]  kthread+0x337/0x6f0
[   25.648979]  ret_from_fork+0x116/0x1d0
[   25.649660]  ret_from_fork_asm+0x1a/0x30
[   25.649887] 
[   25.650077] The buggy address belongs to the object at ffff888104964600
[   25.650077]  which belongs to the cache kmalloc-128 of size 128
[   25.650837] The buggy address is located 5 bytes to the right of
[   25.650837]  allocated 115-byte region [ffff888104964600, ffff888104964673)
[   25.651589] 
[   25.651733] The buggy address belongs to the physical page:
[   25.651908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964
[   25.652178] flags: 0x200000000000000(node=0|zone=2)
[   25.652407] page_type: f5(slab)
[   25.652544] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.653353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.653845] page dumped because: kasan: bad access detected
[   25.654025] 
[   25.654089] Memory state around the buggy address:
[   25.654249]  ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.654527]  ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.655277] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.655686]                                                                 ^
[   25.656222]  ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.656760]  ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.657098] ==================================================================
[   25.607913] ==================================================================
[   25.608492] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   25.609167] Read of size 1 at addr ffff888104964673 by task kunit_try_catch/243
[   25.609626] 
[   25.609768] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.609823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.610081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.610107] Call Trace:
[   25.610122]  <TASK>
[   25.610252]  dump_stack_lvl+0x73/0xb0
[   25.610302]  print_report+0xd1/0x640
[   25.610327]  ? __virt_addr_valid+0x1db/0x2d0
[   25.610353]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.610376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.610405]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.610428]  kasan_report+0x141/0x180
[   25.610450]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   25.610480]  __asan_report_load1_noabort+0x18/0x20
[   25.610504]  ksize_unpoisons_memory+0x81c/0x9b0
[   25.610527]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.610549]  ? finish_task_switch.isra.0+0x153/0x700
[   25.610575]  ? __switch_to+0x47/0xf80
[   25.610602]  ? __schedule+0x10da/0x2b60
[   25.610628]  ? __pfx_read_tsc+0x10/0x10
[   25.610649]  ? ktime_get_ts64+0x86/0x230
[   25.610676]  kunit_try_run_case+0x1a5/0x480
[   25.610702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.610725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.610750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.610774]  ? __kthread_parkme+0x82/0x180
[   25.610795]  ? preempt_count_sub+0x50/0x80
[   25.610817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.610841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.610864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.610886]  kthread+0x337/0x6f0
[   25.610906]  ? trace_preempt_on+0x20/0xc0
[   25.610932]  ? __pfx_kthread+0x10/0x10
[   25.610954]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.610978]  ? calculate_sigpending+0x7b/0xa0
[   25.611002]  ? __pfx_kthread+0x10/0x10
[   25.611023]  ret_from_fork+0x116/0x1d0
[   25.611042]  ? __pfx_kthread+0x10/0x10
[   25.611062]  ret_from_fork_asm+0x1a/0x30
[   25.611119]  </TASK>
[   25.611131] 
[   25.621014] Allocated by task 243:
[   25.621165]  kasan_save_stack+0x45/0x70
[   25.621310]  kasan_save_track+0x18/0x40
[   25.621435]  kasan_save_alloc_info+0x3b/0x50
[   25.621573]  __kasan_kmalloc+0xb7/0xc0
[   25.621695]  __kmalloc_cache_noprof+0x189/0x420
[   25.622157]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.623098]  kunit_try_run_case+0x1a5/0x480
[   25.623312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.623525]  kthread+0x337/0x6f0
[   25.624034]  ret_from_fork+0x116/0x1d0
[   25.624343]  ret_from_fork_asm+0x1a/0x30
[   25.624525] 
[   25.624618] The buggy address belongs to the object at ffff888104964600
[   25.624618]  which belongs to the cache kmalloc-128 of size 128
[   25.625250] The buggy address is located 0 bytes to the right of
[   25.625250]  allocated 115-byte region [ffff888104964600, ffff888104964673)
[   25.625957] 
[   25.626228] The buggy address belongs to the physical page:
[   25.626679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964
[   25.627236] flags: 0x200000000000000(node=0|zone=2)
[   25.627654] page_type: f5(slab)
[   25.627847] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.628395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.628840] page dumped because: kasan: bad access detected
[   25.629115] 
[   25.629431] Memory state around the buggy address:
[   25.629588]  ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.629790]  ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.629995] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.630209]                                                              ^
[   25.630410]  ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.630613]  ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.630810] ==================================================================
[   25.657974] ==================================================================
[   25.658277] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   25.658511] Read of size 1 at addr ffff88810496467f by task kunit_try_catch/243
[   25.658793] 
[   25.658974] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.659333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.659348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.659381] Call Trace:
[   25.659400]  <TASK>
[   25.659419]  dump_stack_lvl+0x73/0xb0
[   25.659450]  print_report+0xd1/0x640
[   25.659472]  ? __virt_addr_valid+0x1db/0x2d0
[   25.659496]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.659539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.659565]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.659601]  kasan_report+0x141/0x180
[   25.659628]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   25.659784]  __asan_report_load1_noabort+0x18/0x20
[   25.659809]  ksize_unpoisons_memory+0x7b6/0x9b0
[   25.659833]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   25.659855]  ? finish_task_switch.isra.0+0x153/0x700
[   25.659877]  ? __switch_to+0x47/0xf80
[   25.659903]  ? __schedule+0x10da/0x2b60
[   25.659928]  ? __pfx_read_tsc+0x10/0x10
[   25.659957]  ? ktime_get_ts64+0x86/0x230
[   25.659982]  kunit_try_run_case+0x1a5/0x480
[   25.660005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.660027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.660051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.660076]  ? __kthread_parkme+0x82/0x180
[   25.660096]  ? preempt_count_sub+0x50/0x80
[   25.660118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.660141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.660175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.660197]  kthread+0x337/0x6f0
[   25.660217]  ? trace_preempt_on+0x20/0xc0
[   25.660241]  ? __pfx_kthread+0x10/0x10
[   25.660261]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.660284]  ? calculate_sigpending+0x7b/0xa0
[   25.660307]  ? __pfx_kthread+0x10/0x10
[   25.660328]  ret_from_fork+0x116/0x1d0
[   25.660347]  ? __pfx_kthread+0x10/0x10
[   25.660376]  ret_from_fork_asm+0x1a/0x30
[   25.660408]  </TASK>
[   25.660419] 
[   25.671942] Allocated by task 243:
[   25.672729]  kasan_save_stack+0x45/0x70
[   25.672911]  kasan_save_track+0x18/0x40
[   25.673369]  kasan_save_alloc_info+0x3b/0x50
[   25.673708]  __kasan_kmalloc+0xb7/0xc0
[   25.674058]  __kmalloc_cache_noprof+0x189/0x420
[   25.674454]  ksize_unpoisons_memory+0xc7/0x9b0
[   25.674646]  kunit_try_run_case+0x1a5/0x480
[   25.674855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.675390]  kthread+0x337/0x6f0
[   25.675645]  ret_from_fork+0x116/0x1d0
[   25.675825]  ret_from_fork_asm+0x1a/0x30
[   25.676204] 
[   25.676298] The buggy address belongs to the object at ffff888104964600
[   25.676298]  which belongs to the cache kmalloc-128 of size 128
[   25.677047] The buggy address is located 12 bytes to the right of
[   25.677047]  allocated 115-byte region [ffff888104964600, ffff888104964673)
[   25.677881] 
[   25.678128] The buggy address belongs to the physical page:
[   25.678346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964
[   25.678990] flags: 0x200000000000000(node=0|zone=2)
[   25.679183] page_type: f5(slab)
[   25.679439] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.679778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.680330] page dumped because: kasan: bad access detected
[   25.680630] 
[   25.680957] Memory state around the buggy address:
[   25.681169]  ffff888104964500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.681579]  ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.681863] >ffff888104964600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.682416]                                                                 ^
[   25.682798]  ffff888104964680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.683272]  ffff888104964700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.683706] ==================================================================