Hay
Date
July 6, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.752427] ==================================================================
[   17.752750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.753830] Write of size 1 at addr fff00000c1cf4773 by task kunit_try_catch/136
[   17.754046] 
[   17.755210] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   17.755891] Tainted: [N]=TEST
[   17.756135] Hardware name: linux,dummy-virt (DT)
[   17.756458] Call trace:
[   17.756660]  show_stack+0x20/0x38 (C)
[   17.756839]  dump_stack_lvl+0x8c/0xd0
[   17.756916]  print_report+0x118/0x608
[   17.756976]  kasan_report+0xdc/0x128
[   17.757021]  __asan_report_store1_noabort+0x20/0x30
[   17.757068]  kmalloc_oob_right+0x5a4/0x660
[   17.757114]  kunit_try_run_case+0x170/0x3f0
[   17.757164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.757225]  kthread+0x328/0x630
[   17.757268]  ret_from_fork+0x10/0x20
[   17.758045] 
[   17.758094] Allocated by task 136:
[   17.758229]  kasan_save_stack+0x3c/0x68
[   17.758594]  kasan_save_track+0x20/0x40
[   17.758684]  kasan_save_alloc_info+0x40/0x58
[   17.758790]  __kasan_kmalloc+0xd4/0xd8
[   17.758889]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.759036]  kmalloc_oob_right+0xb0/0x660
[   17.759201]  kunit_try_run_case+0x170/0x3f0
[   17.759296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.759398]  kthread+0x328/0x630
[   17.759491]  ret_from_fork+0x10/0x20
[   17.759572] 
[   17.760007] The buggy address belongs to the object at fff00000c1cf4700
[   17.760007]  which belongs to the cache kmalloc-128 of size 128
[   17.760609] The buggy address is located 0 bytes to the right of
[   17.760609]  allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773)
[   17.760820] 
[   17.761307] The buggy address belongs to the physical page:
[   17.761744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   17.762506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.763813] page_type: f5(slab)
[   17.765012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.765131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.765670] page dumped because: kasan: bad access detected
[   17.765862] 
[   17.765898] Memory state around the buggy address:
[   17.766579]  fff00000c1cf4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.766756]  fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.767035] >fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.767340]                                                              ^
[   17.767631]  fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.767898]  fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.768116] ==================================================================
[   17.768925] ==================================================================
[   17.768964] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.769010] Write of size 1 at addr fff00000c1cf4778 by task kunit_try_catch/136
[   17.769059] 
[   17.769092] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.769168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.769449] Hardware name: linux,dummy-virt (DT)
[   17.769483] Call trace:
[   17.769864]  show_stack+0x20/0x38 (C)
[   17.769920]  dump_stack_lvl+0x8c/0xd0
[   17.769967]  print_report+0x118/0x608
[   17.770012]  kasan_report+0xdc/0x128
[   17.770163]  __asan_report_store1_noabort+0x20/0x30
[   17.770233]  kmalloc_oob_right+0x538/0x660
[   17.770278]  kunit_try_run_case+0x170/0x3f0
[   17.770324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.770375]  kthread+0x328/0x630
[   17.770415]  ret_from_fork+0x10/0x20
[   17.770468] 
[   17.770485] Allocated by task 136:
[   17.770512]  kasan_save_stack+0x3c/0x68
[   17.770551]  kasan_save_track+0x20/0x40
[   17.770587]  kasan_save_alloc_info+0x40/0x58
[   17.770626]  __kasan_kmalloc+0xd4/0xd8
[   17.770660]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.770698]  kmalloc_oob_right+0xb0/0x660
[   17.770846]  kunit_try_run_case+0x170/0x3f0
[   17.770980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.771021]  kthread+0x328/0x630
[   17.771289]  ret_from_fork+0x10/0x20
[   17.771354] 
[   17.771399] The buggy address belongs to the object at fff00000c1cf4700
[   17.771399]  which belongs to the cache kmalloc-128 of size 128
[   17.771594] The buggy address is located 5 bytes to the right of
[   17.771594]  allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773)
[   17.771678] 
[   17.771697] The buggy address belongs to the physical page:
[   17.771725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   17.771773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.772032] page_type: f5(slab)
[   17.772157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.772389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.772428] page dumped because: kasan: bad access detected
[   17.772726] 
[   17.772825] Memory state around the buggy address:
[   17.772942]  fff00000c1cf4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.773052]  fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773329] >fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.773459]                                                                 ^
[   17.773546]  fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773592]  fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773710] ==================================================================
[   17.774638] ==================================================================
[   17.774716] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.774801] Read of size 1 at addr fff00000c1cf4780 by task kunit_try_catch/136
[   17.774881] 
[   17.774912] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.775072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.775294] Hardware name: linux,dummy-virt (DT)
[   17.775370] Call trace:
[   17.775392]  show_stack+0x20/0x38 (C)
[   17.775457]  dump_stack_lvl+0x8c/0xd0
[   17.775532]  print_report+0x118/0x608
[   17.775597]  kasan_report+0xdc/0x128
[   17.775666]  __asan_report_load1_noabort+0x20/0x30
[   17.775716]  kmalloc_oob_right+0x5d0/0x660
[   17.775760]  kunit_try_run_case+0x170/0x3f0
[   17.775805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.775968]  kthread+0x328/0x630
[   17.776117]  ret_from_fork+0x10/0x20
[   17.776236] 
[   17.776300] Allocated by task 136:
[   17.776358]  kasan_save_stack+0x3c/0x68
[   17.776416]  kasan_save_track+0x20/0x40
[   17.776452]  kasan_save_alloc_info+0x40/0x58
[   17.776589]  __kasan_kmalloc+0xd4/0xd8
[   17.776766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.776850]  kmalloc_oob_right+0xb0/0x660
[   17.776913]  kunit_try_run_case+0x170/0x3f0
[   17.776969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.777016]  kthread+0x328/0x630
[   17.777124]  ret_from_fork+0x10/0x20
[   17.777160] 
[   17.777178] The buggy address belongs to the object at fff00000c1cf4700
[   17.777178]  which belongs to the cache kmalloc-128 of size 128
[   17.777260] The buggy address is located 13 bytes to the right of
[   17.777260]  allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773)
[   17.777413] 
[   17.777432] The buggy address belongs to the physical page:
[   17.777461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4
[   17.777767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.777895] page_type: f5(slab)
[   17.778007] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.778100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.778140] page dumped because: kasan: bad access detected
[   17.778169] 
[   17.778186] Memory state around the buggy address:
[   17.778347]  fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.778389]  fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.778434] >fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.778471]                    ^
[   17.778619]  fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.778700]  fff00000c1cf4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.778750] ==================================================================

[   10.866986] ==================================================================
[   10.867368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.868140] Write of size 1 at addr ffff888102794078 by task kunit_try_catch/153
[   10.868846] 
[   10.869030] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.869073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.869085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.869107] Call Trace:
[   10.869125]  <TASK>
[   10.869142]  dump_stack_lvl+0x73/0xb0
[   10.869169]  print_report+0xd1/0x650
[   10.869203]  ? __virt_addr_valid+0x1db/0x2d0
[   10.869225]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.869246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.869267]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.869289]  kasan_report+0x141/0x180
[   10.869310]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.869335]  __asan_report_store1_noabort+0x1b/0x30
[   10.869355]  kmalloc_oob_right+0x6bd/0x7f0
[   10.869378]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.869399]  ? __schedule+0x10cc/0x2b60
[   10.869420]  ? __pfx_read_tsc+0x10/0x10
[   10.869441]  ? ktime_get_ts64+0x86/0x230
[   10.869464]  kunit_try_run_case+0x1a5/0x480
[   10.869487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.869508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.869530]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.869552]  ? __kthread_parkme+0x82/0x180
[   10.869570]  ? preempt_count_sub+0x50/0x80
[   10.869594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.869616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.869638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.869660]  kthread+0x337/0x6f0
[   10.869679]  ? trace_preempt_on+0x20/0xc0
[   10.869701]  ? __pfx_kthread+0x10/0x10
[   10.869721]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.869741]  ? calculate_sigpending+0x7b/0xa0
[   10.869764]  ? __pfx_kthread+0x10/0x10
[   10.869785]  ret_from_fork+0x116/0x1d0
[   10.869802]  ? __pfx_kthread+0x10/0x10
[   10.869822]  ret_from_fork_asm+0x1a/0x30
[   10.869851]  </TASK>
[   10.869862] 
[   10.879546] Allocated by task 153:
[   10.879687]  kasan_save_stack+0x45/0x70
[   10.879941]  kasan_save_track+0x18/0x40
[   10.880329]  kasan_save_alloc_info+0x3b/0x50
[   10.880716]  __kasan_kmalloc+0xb7/0xc0
[   10.881066]  __kmalloc_cache_noprof+0x189/0x420
[   10.881620]  kmalloc_oob_right+0xa9/0x7f0
[   10.882011]  kunit_try_run_case+0x1a5/0x480
[   10.882500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.882986]  kthread+0x337/0x6f0
[   10.883330]  ret_from_fork+0x116/0x1d0
[   10.883676]  ret_from_fork_asm+0x1a/0x30
[   10.884037] 
[   10.884210] The buggy address belongs to the object at ffff888102794000
[   10.884210]  which belongs to the cache kmalloc-128 of size 128
[   10.885260] The buggy address is located 5 bytes to the right of
[   10.885260]  allocated 115-byte region [ffff888102794000, ffff888102794073)
[   10.886368] 
[   10.886528] The buggy address belongs to the physical page:
[   10.887020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794
[   10.887708] flags: 0x200000000000000(node=0|zone=2)
[   10.888179] page_type: f5(slab)
[   10.888487] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.889140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.889526] page dumped because: kasan: bad access detected
[   10.889698] 
[   10.889768] Memory state around the buggy address:
[   10.889924]  ffff888102793f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.890159]  ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.890782] >ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.891459]                                                                 ^
[   10.891674]  ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.891885]  ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.892133] ==================================================================
[   10.838258] ==================================================================
[   10.839325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.840518] Write of size 1 at addr ffff888102794073 by task kunit_try_catch/153
[   10.840949] 
[   10.842313] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.842667] Tainted: [N]=TEST
[   10.842700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.842911] Call Trace:
[   10.842990]  <TASK>
[   10.843137]  dump_stack_lvl+0x73/0xb0
[   10.843226]  print_report+0xd1/0x650
[   10.843254]  ? __virt_addr_valid+0x1db/0x2d0
[   10.843280]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.843301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.843324]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.843345]  kasan_report+0x141/0x180
[   10.843367]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.843393]  __asan_report_store1_noabort+0x1b/0x30
[   10.843412]  kmalloc_oob_right+0x6f0/0x7f0
[   10.843434]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.843456]  ? __schedule+0x10cc/0x2b60
[   10.843478]  ? __pfx_read_tsc+0x10/0x10
[   10.843500]  ? ktime_get_ts64+0x86/0x230
[   10.843525]  kunit_try_run_case+0x1a5/0x480
[   10.843551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.843573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.843598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.843620]  ? __kthread_parkme+0x82/0x180
[   10.843642]  ? preempt_count_sub+0x50/0x80
[   10.843666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.843689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.843711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.843733]  kthread+0x337/0x6f0
[   10.843752]  ? trace_preempt_on+0x20/0xc0
[   10.843776]  ? __pfx_kthread+0x10/0x10
[   10.843796]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.843816]  ? calculate_sigpending+0x7b/0xa0
[   10.843840]  ? __pfx_kthread+0x10/0x10
[   10.843861]  ret_from_fork+0x116/0x1d0
[   10.843879]  ? __pfx_kthread+0x10/0x10
[   10.843899]  ret_from_fork_asm+0x1a/0x30
[   10.843962]  </TASK>
[   10.844028] 
[   10.856023] Allocated by task 153:
[   10.856486]  kasan_save_stack+0x45/0x70
[   10.856687]  kasan_save_track+0x18/0x40
[   10.856834]  kasan_save_alloc_info+0x3b/0x50
[   10.857003]  __kasan_kmalloc+0xb7/0xc0
[   10.857230]  __kmalloc_cache_noprof+0x189/0x420
[   10.857423]  kmalloc_oob_right+0xa9/0x7f0
[   10.857577]  kunit_try_run_case+0x1a5/0x480
[   10.857916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.858170]  kthread+0x337/0x6f0
[   10.858288]  ret_from_fork+0x116/0x1d0
[   10.858476]  ret_from_fork_asm+0x1a/0x30
[   10.858705] 
[   10.858844] The buggy address belongs to the object at ffff888102794000
[   10.858844]  which belongs to the cache kmalloc-128 of size 128
[   10.859502] The buggy address is located 0 bytes to the right of
[   10.859502]  allocated 115-byte region [ffff888102794000, ffff888102794073)
[   10.860148] 
[   10.860306] The buggy address belongs to the physical page:
[   10.860737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794
[   10.861463] flags: 0x200000000000000(node=0|zone=2)
[   10.862054] page_type: f5(slab)
[   10.862531] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.862869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.863523] page dumped because: kasan: bad access detected
[   10.863711] 
[   10.863791] Memory state around the buggy address:
[   10.864208]  ffff888102793f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.864637]  ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.864874] >ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.865169]                                                              ^
[   10.865460]  ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.865678]  ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.865918] ==================================================================
[   10.892725] ==================================================================
[   10.892992] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.893354] Read of size 1 at addr ffff888102794080 by task kunit_try_catch/153
[   10.893879] 
[   10.894074] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.894118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.894130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.894151] Call Trace:
[   10.894166]  <TASK>
[   10.894183]  dump_stack_lvl+0x73/0xb0
[   10.894209]  print_report+0xd1/0x650
[   10.894242]  ? __virt_addr_valid+0x1db/0x2d0
[   10.894265]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894285]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.894306]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894327]  kasan_report+0x141/0x180
[   10.894349]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894374]  __asan_report_load1_noabort+0x18/0x20
[   10.894398]  kmalloc_oob_right+0x68a/0x7f0
[   10.894419]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.894441]  ? __schedule+0x10cc/0x2b60
[   10.894463]  ? __pfx_read_tsc+0x10/0x10
[   10.894483]  ? ktime_get_ts64+0x86/0x230
[   10.894506]  kunit_try_run_case+0x1a5/0x480
[   10.894529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.894550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.894572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.894594]  ? __kthread_parkme+0x82/0x180
[   10.894613]  ? preempt_count_sub+0x50/0x80
[   10.894635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.894658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.894679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.894701]  kthread+0x337/0x6f0
[   10.894720]  ? trace_preempt_on+0x20/0xc0
[   10.894743]  ? __pfx_kthread+0x10/0x10
[   10.894763]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.894783]  ? calculate_sigpending+0x7b/0xa0
[   10.894806]  ? __pfx_kthread+0x10/0x10
[   10.894827]  ret_from_fork+0x116/0x1d0
[   10.894844]  ? __pfx_kthread+0x10/0x10
[   10.894864]  ret_from_fork_asm+0x1a/0x30
[   10.894894]  </TASK>
[   10.894904] 
[   10.903130] Allocated by task 153:
[   10.903289]  kasan_save_stack+0x45/0x70
[   10.903433]  kasan_save_track+0x18/0x40
[   10.903569]  kasan_save_alloc_info+0x3b/0x50
[   10.903717]  __kasan_kmalloc+0xb7/0xc0
[   10.903850]  __kmalloc_cache_noprof+0x189/0x420
[   10.904033]  kmalloc_oob_right+0xa9/0x7f0
[   10.904264]  kunit_try_run_case+0x1a5/0x480
[   10.904422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.904598]  kthread+0x337/0x6f0
[   10.904718]  ret_from_fork+0x116/0x1d0
[   10.904850]  ret_from_fork_asm+0x1a/0x30
[   10.904999] 
[   10.905094] The buggy address belongs to the object at ffff888102794000
[   10.905094]  which belongs to the cache kmalloc-128 of size 128
[   10.906132] The buggy address is located 13 bytes to the right of
[   10.906132]  allocated 115-byte region [ffff888102794000, ffff888102794073)
[   10.907250] 
[   10.907420] The buggy address belongs to the physical page:
[   10.907972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794
[   10.908758] flags: 0x200000000000000(node=0|zone=2)
[   10.909204] page_type: f5(slab)
[   10.909536] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.909788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.910023] page dumped because: kasan: bad access detected
[   10.910218] 
[   10.910363] Memory state around the buggy address:
[   10.910656]  ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.910869]  ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.911131] >ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.911431]                    ^
[   10.911546]  ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.911759]  ffff888102794180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.911983] ==================================================================