Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.737171] ==================================================================
[   18.737273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.737929] Read of size 1 at addr fff00000c4569980 by task kunit_try_catch/137
[   18.738097] 
[   18.738238] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.738441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.738498] Hardware name: linux,dummy-virt (DT)
[   18.738566] Call trace:
[   18.738607]  show_stack+0x20/0x38 (C)
[   18.738748]  dump_stack_lvl+0x8c/0xd0
[   18.738874]  print_report+0x118/0x608
[   18.738977]  kasan_report+0xdc/0x128
[   18.739083]  __asan_report_load1_noabort+0x20/0x30
[   18.739205]  kmalloc_oob_right+0x5d0/0x660
[   18.739313]  kunit_try_run_case+0x170/0x3f0
[   18.739426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739555]  kthread+0x328/0x630
[   18.739656]  ret_from_fork+0x10/0x20
[   18.739768] 
[   18.739809] Allocated by task 137:
[   18.740372]  kasan_save_stack+0x3c/0x68
[   18.740550]  kasan_save_track+0x20/0x40
[   18.740686]  kasan_save_alloc_info+0x40/0x58
[   18.740896]  __kasan_kmalloc+0xd4/0xd8
[   18.740978]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.741256]  kmalloc_oob_right+0xb0/0x660
[   18.741341]  kunit_try_run_case+0x170/0x3f0
[   18.741522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.741697]  kthread+0x328/0x630
[   18.741790]  ret_from_fork+0x10/0x20
[   18.741875] 
[   18.741910] The buggy address belongs to the object at fff00000c4569900
[   18.741910]  which belongs to the cache kmalloc-128 of size 128
[   18.742035] The buggy address is located 13 bytes to the right of
[   18.742035]  allocated 115-byte region [fff00000c4569900, fff00000c4569973)
[   18.742485] 
[   18.742562] The buggy address belongs to the physical page:
[   18.742732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569
[   18.742873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.742986] page_type: f5(slab)
[   18.743079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.743209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.743303] page dumped because: kasan: bad access detected
[   18.743392] 
[   18.743458] Memory state around the buggy address:
[   18.743548]  fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743692]  fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.743789] >fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743915]                    ^
[   18.743986]  fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.744129]  fff00000c4569a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.744257] ==================================================================
[   18.721008] ==================================================================
[   18.721601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.723087] Write of size 1 at addr fff00000c4569973 by task kunit_try_catch/137
[   18.723222] 
[   18.724216] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   18.724396] Tainted: [N]=TEST
[   18.724437] Hardware name: linux,dummy-virt (DT)
[   18.724714] Call trace:
[   18.724945]  show_stack+0x20/0x38 (C)
[   18.725118]  dump_stack_lvl+0x8c/0xd0
[   18.725227]  print_report+0x118/0x608
[   18.725319]  kasan_report+0xdc/0x128
[   18.725410]  __asan_report_store1_noabort+0x20/0x30
[   18.725511]  kmalloc_oob_right+0x5a4/0x660
[   18.725593]  kunit_try_run_case+0x170/0x3f0
[   18.725648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.725703]  kthread+0x328/0x630
[   18.725750]  ret_from_fork+0x10/0x20
[   18.725967] 
[   18.726013] Allocated by task 137:
[   18.726147]  kasan_save_stack+0x3c/0x68
[   18.726228]  kasan_save_track+0x20/0x40
[   18.726273]  kasan_save_alloc_info+0x40/0x58
[   18.726317]  __kasan_kmalloc+0xd4/0xd8
[   18.726356]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.726399]  kmalloc_oob_right+0xb0/0x660
[   18.726437]  kunit_try_run_case+0x170/0x3f0
[   18.726477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.726521]  kthread+0x328/0x630
[   18.726571]  ret_from_fork+0x10/0x20
[   18.726633] 
[   18.726704] The buggy address belongs to the object at fff00000c4569900
[   18.726704]  which belongs to the cache kmalloc-128 of size 128
[   18.726811] The buggy address is located 0 bytes to the right of
[   18.726811]  allocated 115-byte region [fff00000c4569900, fff00000c4569973)
[   18.726907] 
[   18.727004] The buggy address belongs to the physical page:
[   18.727291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569
[   18.727638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.728019] page_type: f5(slab)
[   18.728399] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.728472] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.728599] page dumped because: kasan: bad access detected
[   18.728643] 
[   18.728671] Memory state around the buggy address:
[   18.728949]  fff00000c4569800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.729027]  fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.729086] >fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.729167]                                                              ^
[   18.729348]  fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.729445]  fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.729572] ==================================================================
[   18.731169] ==================================================================
[   18.731299] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.731456] Write of size 1 at addr fff00000c4569978 by task kunit_try_catch/137
[   18.731579] 
[   18.731654] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.731936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.732023] Hardware name: linux,dummy-virt (DT)
[   18.732120] Call trace:
[   18.732187]  show_stack+0x20/0x38 (C)
[   18.732340]  dump_stack_lvl+0x8c/0xd0
[   18.732491]  print_report+0x118/0x608
[   18.732640]  kasan_report+0xdc/0x128
[   18.732763]  __asan_report_store1_noabort+0x20/0x30
[   18.732890]  kmalloc_oob_right+0x538/0x660
[   18.732986]  kunit_try_run_case+0x170/0x3f0
[   18.733093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.733249]  kthread+0x328/0x630
[   18.733335]  ret_from_fork+0x10/0x20
[   18.733448] 
[   18.733494] Allocated by task 137:
[   18.733558]  kasan_save_stack+0x3c/0x68
[   18.733640]  kasan_save_track+0x20/0x40
[   18.733713]  kasan_save_alloc_info+0x40/0x58
[   18.733791]  __kasan_kmalloc+0xd4/0xd8
[   18.733888]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.733964]  kmalloc_oob_right+0xb0/0x660
[   18.734045]  kunit_try_run_case+0x170/0x3f0
[   18.734123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.734204]  kthread+0x328/0x630
[   18.734267]  ret_from_fork+0x10/0x20
[   18.734337] 
[   18.734377] The buggy address belongs to the object at fff00000c4569900
[   18.734377]  which belongs to the cache kmalloc-128 of size 128
[   18.734513] The buggy address is located 5 bytes to the right of
[   18.734513]  allocated 115-byte region [fff00000c4569900, fff00000c4569973)
[   18.734711] 
[   18.734782] The buggy address belongs to the physical page:
[   18.734901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569
[   18.735037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.735160] page_type: f5(slab)
[   18.735291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.735462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.735608] page dumped because: kasan: bad access detected
[   18.735875] 
[   18.735921] Memory state around the buggy address:
[   18.735994]  fff00000c4569800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.736105]  fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.736192] >fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.736273]                                                                 ^
[   18.736353]  fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.736444]  fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.736533] ==================================================================

[   11.984047] ==================================================================
[   11.984539] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.984953] Read of size 1 at addr ffff888102655080 by task kunit_try_catch/154
[   11.985261] 
[   11.985370] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.985410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.985421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.985441] Call Trace:
[   11.985453]  <TASK>
[   11.985468]  dump_stack_lvl+0x73/0xb0
[   11.985493]  print_report+0xd1/0x650
[   11.985515]  ? __virt_addr_valid+0x1db/0x2d0
[   11.985536]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.985557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.985580]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.985601]  kasan_report+0x141/0x180
[   11.985622]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.985647]  __asan_report_load1_noabort+0x18/0x20
[   11.985719]  kmalloc_oob_right+0x68a/0x7f0
[   11.985741]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.985773]  ? __schedule+0x10cc/0x2b60
[   11.985794]  ? __pfx_read_tsc+0x10/0x10
[   11.985814]  ? ktime_get_ts64+0x86/0x230
[   11.985837]  kunit_try_run_case+0x1a5/0x480
[   11.985861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.985905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.985929]  ? __kthread_parkme+0x82/0x180
[   11.985948]  ? preempt_count_sub+0x50/0x80
[   11.985971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.986018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.986043]  kthread+0x337/0x6f0
[   11.986061]  ? trace_preempt_on+0x20/0xc0
[   11.986083]  ? __pfx_kthread+0x10/0x10
[   11.986104]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.986124]  ? calculate_sigpending+0x7b/0xa0
[   11.986147]  ? __pfx_kthread+0x10/0x10
[   11.986168]  ret_from_fork+0x116/0x1d0
[   11.986186]  ? __pfx_kthread+0x10/0x10
[   11.986206]  ret_from_fork_asm+0x1a/0x30
[   11.986235]  </TASK>
[   11.986245] 
[   11.993427] Allocated by task 154:
[   11.993553]  kasan_save_stack+0x45/0x70
[   11.993700]  kasan_save_track+0x18/0x40
[   11.993926]  kasan_save_alloc_info+0x3b/0x50
[   11.994140]  __kasan_kmalloc+0xb7/0xc0
[   11.994332]  __kmalloc_cache_noprof+0x189/0x420
[   11.994562]  kmalloc_oob_right+0xa9/0x7f0
[   11.994774]  kunit_try_run_case+0x1a5/0x480
[   11.994989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.995333]  kthread+0x337/0x6f0
[   11.995481]  ret_from_fork+0x116/0x1d0
[   11.995612]  ret_from_fork_asm+0x1a/0x30
[   11.995775] 
[   11.995866] The buggy address belongs to the object at ffff888102655000
[   11.995866]  which belongs to the cache kmalloc-128 of size 128
[   11.996875] The buggy address is located 13 bytes to the right of
[   11.996875]  allocated 115-byte region [ffff888102655000, ffff888102655073)
[   11.997259] 
[   11.997330] The buggy address belongs to the physical page:
[   11.997523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   11.997887] flags: 0x200000000000000(node=0|zone=2)
[   11.998122] page_type: f5(slab)
[   11.998288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.998912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.999186] page dumped because: kasan: bad access detected
[   11.999356] 
[   11.999423] Memory state around the buggy address:
[   11.999575]  ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.999802]  ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.000065] >ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.000380]                    ^
[   12.000541]  ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.000876]  ffff888102655180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.001195] ==================================================================
[   11.961589] ==================================================================
[   11.961873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.963159] Write of size 1 at addr ffff888102655078 by task kunit_try_catch/154
[   11.963396] 
[   11.963485] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.963528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.963539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.963560] Call Trace:
[   11.963573]  <TASK>
[   11.963587]  dump_stack_lvl+0x73/0xb0
[   11.963616]  print_report+0xd1/0x650
[   11.963646]  ? __virt_addr_valid+0x1db/0x2d0
[   11.963669]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.963690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.963712]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.963734]  kasan_report+0x141/0x180
[   11.963764]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.963791]  __asan_report_store1_noabort+0x1b/0x30
[   11.963816]  kmalloc_oob_right+0x6bd/0x7f0
[   11.963838]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.963860]  ? __schedule+0x10cc/0x2b60
[   11.963881]  ? __pfx_read_tsc+0x10/0x10
[   11.963901]  ? ktime_get_ts64+0x86/0x230
[   11.963924]  kunit_try_run_case+0x1a5/0x480
[   11.963947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.963969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.963992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.964015]  ? __kthread_parkme+0x82/0x180
[   11.964035]  ? preempt_count_sub+0x50/0x80
[   11.964057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.964081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.964105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.964130]  kthread+0x337/0x6f0
[   11.964148]  ? trace_preempt_on+0x20/0xc0
[   11.964171]  ? __pfx_kthread+0x10/0x10
[   11.964190]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.964211]  ? calculate_sigpending+0x7b/0xa0
[   11.964234]  ? __pfx_kthread+0x10/0x10
[   11.964255]  ret_from_fork+0x116/0x1d0
[   11.964273]  ? __pfx_kthread+0x10/0x10
[   11.964293]  ret_from_fork_asm+0x1a/0x30
[   11.964323]  </TASK>
[   11.964332] 
[   11.975614] Allocated by task 154:
[   11.975968]  kasan_save_stack+0x45/0x70
[   11.976150]  kasan_save_track+0x18/0x40
[   11.976338]  kasan_save_alloc_info+0x3b/0x50
[   11.976510]  __kasan_kmalloc+0xb7/0xc0
[   11.976803]  __kmalloc_cache_noprof+0x189/0x420
[   11.976996]  kmalloc_oob_right+0xa9/0x7f0
[   11.977182]  kunit_try_run_case+0x1a5/0x480
[   11.977329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.977506]  kthread+0x337/0x6f0
[   11.977625]  ret_from_fork+0x116/0x1d0
[   11.977902]  ret_from_fork_asm+0x1a/0x30
[   11.978105] 
[   11.978199] The buggy address belongs to the object at ffff888102655000
[   11.978199]  which belongs to the cache kmalloc-128 of size 128
[   11.978891] The buggy address is located 5 bytes to the right of
[   11.978891]  allocated 115-byte region [ffff888102655000, ffff888102655073)
[   11.979389] 
[   11.979461] The buggy address belongs to the physical page:
[   11.979632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   11.979902] flags: 0x200000000000000(node=0|zone=2)
[   11.980144] page_type: f5(slab)
[   11.980312] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.980669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.981029] page dumped because: kasan: bad access detected
[   11.981359] 
[   11.981457] Memory state around the buggy address:
[   11.981722]  ffff888102654f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.981969]  ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.982183] >ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.982398]                                                                 ^
[   11.982708]  ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.983033]  ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.983352] ==================================================================
[   11.933302] ==================================================================
[   11.933908] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.934758] Write of size 1 at addr ffff888102655073 by task kunit_try_catch/154
[   11.935236] 
[   11.936589] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.936954] Tainted: [N]=TEST
[   11.936986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.937194] Call Trace:
[   11.937257]  <TASK>
[   11.937398]  dump_stack_lvl+0x73/0xb0
[   11.937486]  print_report+0xd1/0x650
[   11.937515]  ? __virt_addr_valid+0x1db/0x2d0
[   11.937541]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.937562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.937585]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.937607]  kasan_report+0x141/0x180
[   11.937628]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.937673]  __asan_report_store1_noabort+0x1b/0x30
[   11.937698]  kmalloc_oob_right+0x6f0/0x7f0
[   11.937720]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.937764]  ? __schedule+0x10cc/0x2b60
[   11.937787]  ? __pfx_read_tsc+0x10/0x10
[   11.937823]  ? ktime_get_ts64+0x86/0x230
[   11.937848]  kunit_try_run_case+0x1a5/0x480
[   11.937876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.937899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.937924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.937947]  ? __kthread_parkme+0x82/0x180
[   11.937969]  ? preempt_count_sub+0x50/0x80
[   11.937994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.938018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.938042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.938067]  kthread+0x337/0x6f0
[   11.938086]  ? trace_preempt_on+0x20/0xc0
[   11.938111]  ? __pfx_kthread+0x10/0x10
[   11.938131]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.938153]  ? calculate_sigpending+0x7b/0xa0
[   11.938178]  ? __pfx_kthread+0x10/0x10
[   11.938199]  ret_from_fork+0x116/0x1d0
[   11.938218]  ? __pfx_kthread+0x10/0x10
[   11.938238]  ret_from_fork_asm+0x1a/0x30
[   11.938295]  </TASK>
[   11.938365] 
[   11.948715] Allocated by task 154:
[   11.949040]  kasan_save_stack+0x45/0x70
[   11.949355]  kasan_save_track+0x18/0x40
[   11.949537]  kasan_save_alloc_info+0x3b/0x50
[   11.949926]  __kasan_kmalloc+0xb7/0xc0
[   11.950069]  __kmalloc_cache_noprof+0x189/0x420
[   11.950460]  kmalloc_oob_right+0xa9/0x7f0
[   11.950812]  kunit_try_run_case+0x1a5/0x480
[   11.951265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.951554]  kthread+0x337/0x6f0
[   11.951972]  ret_from_fork+0x116/0x1d0
[   11.952145]  ret_from_fork_asm+0x1a/0x30
[   11.952358] 
[   11.952505] The buggy address belongs to the object at ffff888102655000
[   11.952505]  which belongs to the cache kmalloc-128 of size 128
[   11.953288] The buggy address is located 0 bytes to the right of
[   11.953288]  allocated 115-byte region [ffff888102655000, ffff888102655073)
[   11.954023] 
[   11.954259] The buggy address belongs to the physical page:
[   11.954876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   11.955414] flags: 0x200000000000000(node=0|zone=2)
[   11.956152] page_type: f5(slab)
[   11.956600] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.957104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.957522] page dumped because: kasan: bad access detected
[   11.957729] 
[   11.957861] Memory state around the buggy address:
[   11.958306]  ffff888102654f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.958601]  ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.958961] >ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.959309]                                                              ^
[   11.959737]  ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.960162]  ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.960447] ==================================================================