Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.778058] ==================================================================
[   17.778425] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.779272] Write of size 1 at addr fff00000c5a07e73 by task kunit_try_catch/136
[   17.779391] 
[   17.780539] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   17.780684] Tainted: [N]=TEST
[   17.780716] Hardware name: linux,dummy-virt (DT)
[   17.780932] Call trace:
[   17.781098]  show_stack+0x20/0x38 (C)
[   17.781245]  dump_stack_lvl+0x8c/0xd0
[   17.781306]  print_report+0x118/0x608
[   17.781354]  kasan_report+0xdc/0x128
[   17.781398]  __asan_report_store1_noabort+0x20/0x30
[   17.781672]  kmalloc_oob_right+0x5a4/0x660
[   17.781896]  kunit_try_run_case+0x170/0x3f0
[   17.781960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.782194]  kthread+0x328/0x630
[   17.782304]  ret_from_fork+0x10/0x20
[   17.783144] 
[   17.783405] Allocated by task 136:
[   17.783998]  kasan_save_stack+0x3c/0x68
[   17.785018]  kasan_save_track+0x20/0x40
[   17.785099]  kasan_save_alloc_info+0x40/0x58
[   17.785146]  __kasan_kmalloc+0xd4/0xd8
[   17.785209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.785271]  kmalloc_oob_right+0xb0/0x660
[   17.785337]  kunit_try_run_case+0x170/0x3f0
[   17.785398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.785605]  kthread+0x328/0x630
[   17.786172]  ret_from_fork+0x10/0x20
[   17.786264] 
[   17.786332] The buggy address belongs to the object at fff00000c5a07e00
[   17.786332]  which belongs to the cache kmalloc-128 of size 128
[   17.786430] The buggy address is located 0 bytes to the right of
[   17.786430]  allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73)
[   17.786495] 
[   17.786582] The buggy address belongs to the physical page:
[   17.786796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07
[   17.787091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.788251] page_type: f5(slab)
[   17.788570] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.788630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.789683] page dumped because: kasan: bad access detected
[   17.789859] 
[   17.790003] Memory state around the buggy address:
[   17.790892]  fff00000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.790980]  fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.791036] >fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.791091]                                                              ^
[   17.791810]  fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.791856]  fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.791926] ==================================================================
[   17.792794] ==================================================================
[   17.792831] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.792877] Write of size 1 at addr fff00000c5a07e78 by task kunit_try_catch/136
[   17.792923] 
[   17.792952] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.793028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.793052] Hardware name: linux,dummy-virt (DT)
[   17.793081] Call trace:
[   17.793101]  show_stack+0x20/0x38 (C)
[   17.793147]  dump_stack_lvl+0x8c/0xd0
[   17.793207]  print_report+0x118/0x608
[   17.793251]  kasan_report+0xdc/0x128
[   17.793295]  __asan_report_store1_noabort+0x20/0x30
[   17.793342]  kmalloc_oob_right+0x538/0x660
[   17.793386]  kunit_try_run_case+0x170/0x3f0
[   17.793431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.793481]  kthread+0x328/0x630
[   17.793520]  ret_from_fork+0x10/0x20
[   17.793565] 
[   17.793583] Allocated by task 136:
[   17.793608]  kasan_save_stack+0x3c/0x68
[   17.793646]  kasan_save_track+0x20/0x40
[   17.793681]  kasan_save_alloc_info+0x40/0x58
[   17.793719]  __kasan_kmalloc+0xd4/0xd8
[   17.793753]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.793789]  kmalloc_oob_right+0xb0/0x660
[   17.793824]  kunit_try_run_case+0x170/0x3f0
[   17.793862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.793903]  kthread+0x328/0x630
[   17.793934]  ret_from_fork+0x10/0x20
[   17.793968] 
[   17.793986] The buggy address belongs to the object at fff00000c5a07e00
[   17.793986]  which belongs to the cache kmalloc-128 of size 128
[   17.794038] The buggy address is located 5 bytes to the right of
[   17.794038]  allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73)
[   17.794098] 
[   17.794116] The buggy address belongs to the physical page:
[   17.794144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07
[   17.795014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.795064] page_type: f5(slab)
[   17.795109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.795242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.795297] page dumped because: kasan: bad access detected
[   17.795327] 
[   17.795344] Memory state around the buggy address:
[   17.795374]  fff00000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.795415]  fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.795464] >fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.795503]                                                                 ^
[   17.795543]  fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.795586]  fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.795632] ==================================================================
[   17.795790] ==================================================================
[   17.795839] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.796185] Read of size 1 at addr fff00000c5a07e80 by task kunit_try_catch/136
[   17.796238] 
[   17.796265] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.796850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.796887] Hardware name: linux,dummy-virt (DT)
[   17.797178] Call trace:
[   17.797323]  show_stack+0x20/0x38 (C)
[   17.797506]  dump_stack_lvl+0x8c/0xd0
[   17.797597]  print_report+0x118/0x608
[   17.797786]  kasan_report+0xdc/0x128
[   17.798038]  __asan_report_load1_noabort+0x20/0x30
[   17.798091]  kmalloc_oob_right+0x5d0/0x660
[   17.798431]  kunit_try_run_case+0x170/0x3f0
[   17.798860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.799094]  kthread+0x328/0x630
[   17.799256]  ret_from_fork+0x10/0x20
[   17.799342] 
[   17.799383] Allocated by task 136:
[   17.799410]  kasan_save_stack+0x3c/0x68
[   17.799451]  kasan_save_track+0x20/0x40
[   17.799495]  kasan_save_alloc_info+0x40/0x58
[   17.799534]  __kasan_kmalloc+0xd4/0xd8
[   17.799575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.799622]  kmalloc_oob_right+0xb0/0x660
[   17.799672]  kunit_try_run_case+0x170/0x3f0
[   17.799709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.799751]  kthread+0x328/0x630
[   17.799797]  ret_from_fork+0x10/0x20
[   17.799831] 
[   17.799857] The buggy address belongs to the object at fff00000c5a07e00
[   17.799857]  which belongs to the cache kmalloc-128 of size 128
[   17.800128] The buggy address is located 13 bytes to the right of
[   17.800128]  allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73)
[   17.800476] 
[   17.800846] The buggy address belongs to the physical page:
[   17.801001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07
[   17.801215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.801267] page_type: f5(slab)
[   17.801340] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.801412] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.801460] page dumped because: kasan: bad access detected
[   17.801499] 
[   17.801517] Memory state around the buggy address:
[   17.801557]  fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.801601]  fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.801650] >fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.801689]                    ^
[   17.801717]  fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.801758]  fff00000c5a07f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.801809] ==================================================================

[   12.744092] ==================================================================
[   12.744528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.744892] Read of size 1 at addr ffff8881029e8c80 by task kunit_try_catch/154
[   12.745243] 
[   12.745400] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.745450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.745464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.745490] Call Trace:
[   12.745512]  <TASK>
[   12.745535]  dump_stack_lvl+0x73/0xb0
[   12.745568]  print_report+0xd1/0x650
[   12.745594]  ? __virt_addr_valid+0x1db/0x2d0
[   12.745620]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.745643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.745667]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.745691]  kasan_report+0x141/0x180
[   12.745715]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.745744]  __asan_report_load1_noabort+0x18/0x20
[   12.745771]  kmalloc_oob_right+0x68a/0x7f0
[   12.745807]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.745832]  ? __schedule+0x10cc/0x2b60
[   12.745857]  ? __pfx_read_tsc+0x10/0x10
[   12.745881]  ? ktime_get_ts64+0x86/0x230
[   12.745908]  kunit_try_run_case+0x1a5/0x480
[   12.745935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.745959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.745984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.746009]  ? __kthread_parkme+0x82/0x180
[   12.746031]  ? preempt_count_sub+0x50/0x80
[   12.746058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.746084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.746108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.746336]  kthread+0x337/0x6f0
[   12.746363]  ? trace_preempt_on+0x20/0xc0
[   12.746392]  ? __pfx_kthread+0x10/0x10
[   12.746415]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.746439]  ? calculate_sigpending+0x7b/0xa0
[   12.746466]  ? __pfx_kthread+0x10/0x10
[   12.746490]  ret_from_fork+0x116/0x1d0
[   12.746511]  ? __pfx_kthread+0x10/0x10
[   12.746534]  ret_from_fork_asm+0x1a/0x30
[   12.746569]  </TASK>
[   12.746583] 
[   12.754948] Allocated by task 154:
[   12.755171]  kasan_save_stack+0x45/0x70
[   12.755503]  kasan_save_track+0x18/0x40
[   12.755705]  kasan_save_alloc_info+0x3b/0x50
[   12.755935]  __kasan_kmalloc+0xb7/0xc0
[   12.756246]  __kmalloc_cache_noprof+0x189/0x420
[   12.756486]  kmalloc_oob_right+0xa9/0x7f0
[   12.756672]  kunit_try_run_case+0x1a5/0x480
[   12.756850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.757129]  kthread+0x337/0x6f0
[   12.757419]  ret_from_fork+0x116/0x1d0
[   12.757648]  ret_from_fork_asm+0x1a/0x30
[   12.757896] 
[   12.757982] The buggy address belongs to the object at ffff8881029e8c00
[   12.757982]  which belongs to the cache kmalloc-128 of size 128
[   12.758841] The buggy address is located 13 bytes to the right of
[   12.758841]  allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73)
[   12.759627] 
[   12.759749] The buggy address belongs to the physical page:
[   12.760050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   12.760540] flags: 0x200000000000000(node=0|zone=2)
[   12.760735] page_type: f5(slab)
[   12.760940] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.761452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.761866] page dumped because: kasan: bad access detected
[   12.762347] 
[   12.762477] Memory state around the buggy address:
[   12.762693]  ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.763067]  ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.763507] >ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.763839]                    ^
[   12.764036]  ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.764355]  ffff8881029e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.764663] ==================================================================
[   12.715492] ==================================================================
[   12.715780] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.716073] Write of size 1 at addr ffff8881029e8c78 by task kunit_try_catch/154
[   12.716348] 
[   12.716456] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.716508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.716522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.716549] Call Trace:
[   12.716571]  <TASK>
[   12.716593]  dump_stack_lvl+0x73/0xb0
[   12.717521]  print_report+0xd1/0x650
[   12.717565]  ? __virt_addr_valid+0x1db/0x2d0
[   12.717610]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.717634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.717658]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.717682]  kasan_report+0x141/0x180
[   12.717707]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.717737]  __asan_report_store1_noabort+0x1b/0x30
[   12.717760]  kmalloc_oob_right+0x6bd/0x7f0
[   12.717797]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.717833]  ? __schedule+0x10cc/0x2b60
[   12.717858]  ? __pfx_read_tsc+0x10/0x10
[   12.717882]  ? ktime_get_ts64+0x86/0x230
[   12.717910]  kunit_try_run_case+0x1a5/0x480
[   12.717937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.717961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.717987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.718011]  ? __kthread_parkme+0x82/0x180
[   12.718035]  ? preempt_count_sub+0x50/0x80
[   12.718062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.718087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.718112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.718136]  kthread+0x337/0x6f0
[   12.718157]  ? trace_preempt_on+0x20/0xc0
[   12.718311]  ? __pfx_kthread+0x10/0x10
[   12.718335]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.718359]  ? calculate_sigpending+0x7b/0xa0
[   12.718386]  ? __pfx_kthread+0x10/0x10
[   12.718410]  ret_from_fork+0x116/0x1d0
[   12.718431]  ? __pfx_kthread+0x10/0x10
[   12.718454]  ret_from_fork_asm+0x1a/0x30
[   12.718490]  </TASK>
[   12.718503] 
[   12.732030] Allocated by task 154:
[   12.732542]  kasan_save_stack+0x45/0x70
[   12.733002]  kasan_save_track+0x18/0x40
[   12.733503]  kasan_save_alloc_info+0x3b/0x50
[   12.733686]  __kasan_kmalloc+0xb7/0xc0
[   12.733856]  __kmalloc_cache_noprof+0x189/0x420
[   12.734046]  kmalloc_oob_right+0xa9/0x7f0
[   12.734699]  kunit_try_run_case+0x1a5/0x480
[   12.735212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.735832]  kthread+0x337/0x6f0
[   12.736293]  ret_from_fork+0x116/0x1d0
[   12.736690]  ret_from_fork_asm+0x1a/0x30
[   12.737200] 
[   12.737302] The buggy address belongs to the object at ffff8881029e8c00
[   12.737302]  which belongs to the cache kmalloc-128 of size 128
[   12.737705] The buggy address is located 5 bytes to the right of
[   12.737705]  allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73)
[   12.738452] 
[   12.738554] The buggy address belongs to the physical page:
[   12.738838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   12.739262] flags: 0x200000000000000(node=0|zone=2)
[   12.739487] page_type: f5(slab)
[   12.739644] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.740009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.740311] page dumped because: kasan: bad access detected
[   12.740595] 
[   12.740702] Memory state around the buggy address:
[   12.741026]  ffff8881029e8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.741444]  ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.741821] >ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.742360]                                                                 ^
[   12.742697]  ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.743041]  ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.743439] ==================================================================
[   12.681833] ==================================================================
[   12.682592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.683437] Write of size 1 at addr ffff8881029e8c73 by task kunit_try_catch/154
[   12.683912] 
[   12.685066] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.685545] Tainted: [N]=TEST
[   12.685586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.685835] Call Trace:
[   12.685913]  <TASK>
[   12.686098]  dump_stack_lvl+0x73/0xb0
[   12.686224]  print_report+0xd1/0x650
[   12.686258]  ? __virt_addr_valid+0x1db/0x2d0
[   12.686286]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.686310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.686335]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.686359]  kasan_report+0x141/0x180
[   12.686383]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.686412]  __asan_report_store1_noabort+0x1b/0x30
[   12.686435]  kmalloc_oob_right+0x6f0/0x7f0
[   12.686460]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.686484]  ? __schedule+0x10cc/0x2b60
[   12.686510]  ? __pfx_read_tsc+0x10/0x10
[   12.686534]  ? ktime_get_ts64+0x86/0x230
[   12.686563]  kunit_try_run_case+0x1a5/0x480
[   12.686593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.686617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.686644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.686669]  ? __kthread_parkme+0x82/0x180
[   12.686693]  ? preempt_count_sub+0x50/0x80
[   12.686720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.686745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.686770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.686809]  kthread+0x337/0x6f0
[   12.686831]  ? trace_preempt_on+0x20/0xc0
[   12.686859]  ? __pfx_kthread+0x10/0x10
[   12.686881]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.686904]  ? calculate_sigpending+0x7b/0xa0
[   12.686931]  ? __pfx_kthread+0x10/0x10
[   12.686954]  ret_from_fork+0x116/0x1d0
[   12.686975]  ? __pfx_kthread+0x10/0x10
[   12.686997]  ret_from_fork_asm+0x1a/0x30
[   12.687060]  </TASK>
[   12.687177] 
[   12.696209] Allocated by task 154:
[   12.697274]  kasan_save_stack+0x45/0x70
[   12.697842]  kasan_save_track+0x18/0x40
[   12.698013]  kasan_save_alloc_info+0x3b/0x50
[   12.698625]  __kasan_kmalloc+0xb7/0xc0
[   12.698816]  __kmalloc_cache_noprof+0x189/0x420
[   12.699118]  kmalloc_oob_right+0xa9/0x7f0
[   12.699369]  kunit_try_run_case+0x1a5/0x480
[   12.700037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.700458]  kthread+0x337/0x6f0
[   12.700618]  ret_from_fork+0x116/0x1d0
[   12.701086]  ret_from_fork_asm+0x1a/0x30
[   12.701629] 
[   12.702050] The buggy address belongs to the object at ffff8881029e8c00
[   12.702050]  which belongs to the cache kmalloc-128 of size 128
[   12.703154] The buggy address is located 0 bytes to the right of
[   12.703154]  allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73)
[   12.704002] 
[   12.704584] The buggy address belongs to the physical page:
[   12.705277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   12.706114] flags: 0x200000000000000(node=0|zone=2)
[   12.706857] page_type: f5(slab)
[   12.707434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.707749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.708304] page dumped because: kasan: bad access detected
[   12.708631] 
[   12.708756] Memory state around the buggy address:
[   12.709599]  ffff8881029e8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.710287]  ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.711160] >ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.711932]                                                              ^
[   12.712481]  ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.713291]  ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.714238] ==================================================================