Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   14.926334] ==================================================================
[   14.926495] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   14.926735] Read of size 1 at addr fff00000c5f9d880 by task kunit_try_catch/136
[   14.926816] 
[   14.926857] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.927143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927177] Hardware name: linux,dummy-virt (DT)
[   14.927207] Call trace:
[   14.927228]  show_stack+0x20/0x38 (C)
[   14.927277]  dump_stack_lvl+0x8c/0xd0
[   14.927352]  print_report+0x118/0x5d0
[   14.927398]  kasan_report+0xdc/0x128
[   14.927444]  __asan_report_load1_noabort+0x20/0x30
[   14.927567]  kmalloc_oob_right+0x5d0/0x660
[   14.927617]  kunit_try_run_case+0x170/0x3f0
[   14.927675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.927728]  kthread+0x328/0x630
[   14.927769]  ret_from_fork+0x10/0x20
[   14.927815] 
[   14.927832] Allocated by task 136:
[   14.927858]  kasan_save_stack+0x3c/0x68
[   14.927982]  kasan_save_track+0x20/0x40
[   14.928026]  kasan_save_alloc_info+0x40/0x58
[   14.928107]  __kasan_kmalloc+0xd4/0xd8
[   14.928143]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.928179]  kmalloc_oob_right+0xb0/0x660
[   14.928214]  kunit_try_run_case+0x170/0x3f0
[   14.928275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.928374]  kthread+0x328/0x630
[   14.928409]  ret_from_fork+0x10/0x20
[   14.928511] 
[   14.928559] The buggy address belongs to the object at fff00000c5f9d800
[   14.928559]  which belongs to the cache kmalloc-128 of size 128
[   14.928615] The buggy address is located 13 bytes to the right of
[   14.928615]  allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873)
[   14.928721] 
[   14.928781] The buggy address belongs to the physical page:
[   14.928828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d
[   14.928903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.928948] page_type: f5(slab)
[   14.928984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.929052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.929092] page dumped because: kasan: bad access detected
[   14.929121] 
[   14.929138] Memory state around the buggy address:
[   14.929166]  fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929207]  fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.929247] >fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929282]                    ^
[   14.929308]  fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929438]  fff00000c5f9d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929491] ==================================================================
[   14.916276] ==================================================================
[   14.916635] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   14.917449] Write of size 1 at addr fff00000c5f9d873 by task kunit_try_catch/136
[   14.917570] 
[   14.918331] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   14.918490] Tainted: [N]=TEST
[   14.918524] Hardware name: linux,dummy-virt (DT)
[   14.918756] Call trace:
[   14.918923]  show_stack+0x20/0x38 (C)
[   14.919054]  dump_stack_lvl+0x8c/0xd0
[   14.919115]  print_report+0x118/0x5d0
[   14.919163]  kasan_report+0xdc/0x128
[   14.919208]  __asan_report_store1_noabort+0x20/0x30
[   14.919259]  kmalloc_oob_right+0x5a4/0x660
[   14.919305]  kunit_try_run_case+0x170/0x3f0
[   14.919355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.919407]  kthread+0x328/0x630
[   14.919450]  ret_from_fork+0x10/0x20
[   14.919613] 
[   14.919651] Allocated by task 136:
[   14.919788]  kasan_save_stack+0x3c/0x68
[   14.919857]  kasan_save_track+0x20/0x40
[   14.919894]  kasan_save_alloc_info+0x40/0x58
[   14.919933]  __kasan_kmalloc+0xd4/0xd8
[   14.919969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.920008]  kmalloc_oob_right+0xb0/0x660
[   14.920044]  kunit_try_run_case+0x170/0x3f0
[   14.920080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.920121]  kthread+0x328/0x630
[   14.920153]  ret_from_fork+0x10/0x20
[   14.920206] 
[   14.920265] The buggy address belongs to the object at fff00000c5f9d800
[   14.920265]  which belongs to the cache kmalloc-128 of size 128
[   14.920356] The buggy address is located 0 bytes to the right of
[   14.920356]  allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873)
[   14.920421] 
[   14.920500] The buggy address belongs to the physical page:
[   14.920714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d
[   14.920977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.921255] page_type: f5(slab)
[   14.921552] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.921616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.921736] page dumped because: kasan: bad access detected
[   14.921778] 
[   14.921824] Memory state around the buggy address:
[   14.922044]  fff00000c5f9d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.922108]  fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922161] >fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.922214]                                                              ^
[   14.922293]  fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922334]  fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922393] ==================================================================
[   14.922960] ==================================================================
[   14.923029] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   14.923076] Write of size 1 at addr fff00000c5f9d878 by task kunit_try_catch/136
[   14.923174] 
[   14.923255] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.923334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.923360] Hardware name: linux,dummy-virt (DT)
[   14.923389] Call trace:
[   14.923419]  show_stack+0x20/0x38 (C)
[   14.923467]  dump_stack_lvl+0x8c/0xd0
[   14.923511]  print_report+0x118/0x5d0
[   14.923598]  kasan_report+0xdc/0x128
[   14.923652]  __asan_report_store1_noabort+0x20/0x30
[   14.923703]  kmalloc_oob_right+0x538/0x660
[   14.924098]  kunit_try_run_case+0x170/0x3f0
[   14.924176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.924230]  kthread+0x328/0x630
[   14.924271]  ret_from_fork+0x10/0x20
[   14.924317] 
[   14.924334] Allocated by task 136:
[   14.924361]  kasan_save_stack+0x3c/0x68
[   14.924429]  kasan_save_track+0x20/0x40
[   14.924468]  kasan_save_alloc_info+0x40/0x58
[   14.924508]  __kasan_kmalloc+0xd4/0xd8
[   14.924553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.924592]  kmalloc_oob_right+0xb0/0x660
[   14.924627]  kunit_try_run_case+0x170/0x3f0
[   14.924663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.924718]  kthread+0x328/0x630
[   14.924782]  ret_from_fork+0x10/0x20
[   14.924903] 
[   14.924979] The buggy address belongs to the object at fff00000c5f9d800
[   14.924979]  which belongs to the cache kmalloc-128 of size 128
[   14.925106] The buggy address is located 5 bytes to the right of
[   14.925106]  allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873)
[   14.925168] 
[   14.925187] The buggy address belongs to the physical page:
[   14.925217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d
[   14.925276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.925323] page_type: f5(slab)
[   14.925360] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.925416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.925455] page dumped because: kasan: bad access detected
[   14.925484] 
[   14.925512] Memory state around the buggy address:
[   14.925552]  fff00000c5f9d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.925593]  fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.925633] >fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.925669]                                                                 ^
[   14.925706]  fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.925837]  fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.925876] ==================================================================

[   11.366679] ==================================================================
[   11.367551] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.368455] Write of size 1 at addr ffff8881027e4078 by task kunit_try_catch/154
[   11.369161] 
[   11.369360] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.369406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.369418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.369439] Call Trace:
[   11.369459]  <TASK>
[   11.369478]  dump_stack_lvl+0x73/0xb0
[   11.369520]  print_report+0xd1/0x610
[   11.369542]  ? __virt_addr_valid+0x1db/0x2d0
[   11.369564]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.369744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.369771]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.369793]  kasan_report+0x141/0x180
[   11.369814]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.369877]  __asan_report_store1_noabort+0x1b/0x30
[   11.369902]  kmalloc_oob_right+0x6bd/0x7f0
[   11.369923]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.369945]  ? __schedule+0x10cc/0x2b60
[   11.369967]  ? __pfx_read_tsc+0x10/0x10
[   11.369988]  ? ktime_get_ts64+0x86/0x230
[   11.370013]  kunit_try_run_case+0x1a5/0x480
[   11.370037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.370059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.370083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.370105]  ? __kthread_parkme+0x82/0x180
[   11.370125]  ? preempt_count_sub+0x50/0x80
[   11.370148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.370171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.370198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.370221]  kthread+0x337/0x6f0
[   11.370241]  ? trace_preempt_on+0x20/0xc0
[   11.370264]  ? __pfx_kthread+0x10/0x10
[   11.370283]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.370303]  ? calculate_sigpending+0x7b/0xa0
[   11.370327]  ? __pfx_kthread+0x10/0x10
[   11.370346]  ret_from_fork+0x116/0x1d0
[   11.370364]  ? __pfx_kthread+0x10/0x10
[   11.370383]  ret_from_fork_asm+0x1a/0x30
[   11.370413]  </TASK>
[   11.370423] 
[   11.381969] Allocated by task 154:
[   11.382356]  kasan_save_stack+0x45/0x70
[   11.382827]  kasan_save_track+0x18/0x40
[   11.383223]  kasan_save_alloc_info+0x3b/0x50
[   11.383644]  __kasan_kmalloc+0xb7/0xc0
[   11.384000]  __kmalloc_cache_noprof+0x189/0x420
[   11.384461]  kmalloc_oob_right+0xa9/0x7f0
[   11.384902]  kunit_try_run_case+0x1a5/0x480
[   11.385363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.385700]  kthread+0x337/0x6f0
[   11.385824]  ret_from_fork+0x116/0x1d0
[   11.385958]  ret_from_fork_asm+0x1a/0x30
[   11.386101] 
[   11.386175] The buggy address belongs to the object at ffff8881027e4000
[   11.386175]  which belongs to the cache kmalloc-128 of size 128
[   11.387306] The buggy address is located 5 bytes to the right of
[   11.387306]  allocated 115-byte region [ffff8881027e4000, ffff8881027e4073)
[   11.388432] 
[   11.388612] The buggy address belongs to the physical page:
[   11.389090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   11.389593] flags: 0x200000000000000(node=0|zone=2)
[   11.389889] page_type: f5(slab)
[   11.390011] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.390263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.390485] page dumped because: kasan: bad access detected
[   11.390665] 
[   11.390731] Memory state around the buggy address:
[   11.390882]  ffff8881027e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.391090]  ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.391386] >ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.391703]                                                                 ^
[   11.391996]  ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.392208]  ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.392519] ==================================================================
[   11.393330] ==================================================================
[   11.393895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.394282] Read of size 1 at addr ffff8881027e4080 by task kunit_try_catch/154
[   11.394613] 
[   11.394713] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.394756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.394767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.394788] Call Trace:
[   11.394805]  <TASK>
[   11.394821]  dump_stack_lvl+0x73/0xb0
[   11.394848]  print_report+0xd1/0x610
[   11.394870]  ? __virt_addr_valid+0x1db/0x2d0
[   11.394902]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.394923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.394944]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.394976]  kasan_report+0x141/0x180
[   11.394997]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.395022]  __asan_report_load1_noabort+0x18/0x20
[   11.395045]  kmalloc_oob_right+0x68a/0x7f0
[   11.395066]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.395088]  ? __schedule+0x10cc/0x2b60
[   11.395109]  ? __pfx_read_tsc+0x10/0x10
[   11.395129]  ? ktime_get_ts64+0x86/0x230
[   11.395166]  kunit_try_run_case+0x1a5/0x480
[   11.395200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.395222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.395256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.395278]  ? __kthread_parkme+0x82/0x180
[   11.395298]  ? preempt_count_sub+0x50/0x80
[   11.395321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.395343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.395374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.395397]  kthread+0x337/0x6f0
[   11.395416]  ? trace_preempt_on+0x20/0xc0
[   11.395448]  ? __pfx_kthread+0x10/0x10
[   11.395467]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.395487]  ? calculate_sigpending+0x7b/0xa0
[   11.395520]  ? __pfx_kthread+0x10/0x10
[   11.395540]  ret_from_fork+0x116/0x1d0
[   11.395558]  ? __pfx_kthread+0x10/0x10
[   11.395577]  ret_from_fork_asm+0x1a/0x30
[   11.395607]  </TASK>
[   11.395617] 
[   11.402200] Allocated by task 154:
[   11.402321]  kasan_save_stack+0x45/0x70
[   11.402457]  kasan_save_track+0x18/0x40
[   11.402852]  kasan_save_alloc_info+0x3b/0x50
[   11.403064]  __kasan_kmalloc+0xb7/0xc0
[   11.403352]  __kmalloc_cache_noprof+0x189/0x420
[   11.403611]  kmalloc_oob_right+0xa9/0x7f0
[   11.403792]  kunit_try_run_case+0x1a5/0x480
[   11.404019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.404320]  kthread+0x337/0x6f0
[   11.404468]  ret_from_fork+0x116/0x1d0
[   11.404642]  ret_from_fork_asm+0x1a/0x30
[   11.404825] 
[   11.404921] The buggy address belongs to the object at ffff8881027e4000
[   11.404921]  which belongs to the cache kmalloc-128 of size 128
[   11.405436] The buggy address is located 13 bytes to the right of
[   11.405436]  allocated 115-byte region [ffff8881027e4000, ffff8881027e4073)
[   11.405965] 
[   11.406051] The buggy address belongs to the physical page:
[   11.406365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   11.406686] flags: 0x200000000000000(node=0|zone=2)
[   11.406881] page_type: f5(slab)
[   11.407021] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.407370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.407639] page dumped because: kasan: bad access detected
[   11.407803] 
[   11.407868] Memory state around the buggy address:
[   11.408017]  ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.408233]  ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.408449] >ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.408788]                    ^
[   11.408948]  ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.409373]  ffff8881027e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.409687] ==================================================================
[   11.330506] ==================================================================
[   11.331576] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.332380] Write of size 1 at addr ffff8881027e4073 by task kunit_try_catch/154
[   11.332702] 
[   11.333726] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.334165] Tainted: [N]=TEST
[   11.334206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.334415] Call Trace:
[   11.334478]  <TASK>
[   11.334629]  dump_stack_lvl+0x73/0xb0
[   11.334717]  print_report+0xd1/0x610
[   11.334745]  ? __virt_addr_valid+0x1db/0x2d0
[   11.334769]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.334789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.334811]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.334832]  kasan_report+0x141/0x180
[   11.334853]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.334878]  __asan_report_store1_noabort+0x1b/0x30
[   11.334902]  kmalloc_oob_right+0x6f0/0x7f0
[   11.334923]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.334945]  ? __schedule+0x10cc/0x2b60
[   11.334967]  ? __pfx_read_tsc+0x10/0x10
[   11.334987]  ? ktime_get_ts64+0x86/0x230
[   11.335013]  kunit_try_run_case+0x1a5/0x480
[   11.335065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.335088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.335112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.335135]  ? __kthread_parkme+0x82/0x180
[   11.335170]  ? preempt_count_sub+0x50/0x80
[   11.335194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.335216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.335239]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.335262]  kthread+0x337/0x6f0
[   11.335281]  ? trace_preempt_on+0x20/0xc0
[   11.335304]  ? __pfx_kthread+0x10/0x10
[   11.335323]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.335344]  ? calculate_sigpending+0x7b/0xa0
[   11.335368]  ? __pfx_kthread+0x10/0x10
[   11.335388]  ret_from_fork+0x116/0x1d0
[   11.335407]  ? __pfx_kthread+0x10/0x10
[   11.335426]  ret_from_fork_asm+0x1a/0x30
[   11.335483]  </TASK>
[   11.335554] 
[   11.349037] Allocated by task 154:
[   11.349565]  kasan_save_stack+0x45/0x70
[   11.350124]  kasan_save_track+0x18/0x40
[   11.350520]  kasan_save_alloc_info+0x3b/0x50
[   11.350920]  __kasan_kmalloc+0xb7/0xc0
[   11.351316]  __kmalloc_cache_noprof+0x189/0x420
[   11.351619]  kmalloc_oob_right+0xa9/0x7f0
[   11.351984]  kunit_try_run_case+0x1a5/0x480
[   11.352190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.352423]  kthread+0x337/0x6f0
[   11.352768]  ret_from_fork+0x116/0x1d0
[   11.353141]  ret_from_fork_asm+0x1a/0x30
[   11.353465] 
[   11.353600] The buggy address belongs to the object at ffff8881027e4000
[   11.353600]  which belongs to the cache kmalloc-128 of size 128
[   11.354038] The buggy address is located 0 bytes to the right of
[   11.354038]  allocated 115-byte region [ffff8881027e4000, ffff8881027e4073)
[   11.355075] 
[   11.355359] The buggy address belongs to the physical page:
[   11.356385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   11.357386] flags: 0x200000000000000(node=0|zone=2)
[   11.358289] page_type: f5(slab)
[   11.358999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.359769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.360642] page dumped because: kasan: bad access detected
[   11.361220] 
[   11.361395] Memory state around the buggy address:
[   11.361909]  ffff8881027e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362352]  ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362604] >ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.362837]                                                              ^
[   11.363421]  ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.363671]  ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.363930] ==================================================================