Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.119678] ==================================================================
[   15.119726] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   15.119775] Write of size 1 at addr fff00000c3fc2778 by task kunit_try_catch/136
[   15.119865] 
[   15.119897] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.119975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.120001] Hardware name: linux,dummy-virt (DT)
[   15.120030] Call trace:
[   15.120051]  show_stack+0x20/0x38 (C)
[   15.120097]  dump_stack_lvl+0x8c/0xd0
[   15.120142]  print_report+0x118/0x5d0
[   15.120186]  kasan_report+0xdc/0x128
[   15.120230]  __asan_report_store1_noabort+0x20/0x30
[   15.120314]  kmalloc_oob_right+0x538/0x660
[   15.120362]  kunit_try_run_case+0x170/0x3f0
[   15.120427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.120623]  kthread+0x328/0x630
[   15.120807]  ret_from_fork+0x10/0x20
[   15.120886] 
[   15.121065] Allocated by task 136:
[   15.121099]  kasan_save_stack+0x3c/0x68
[   15.121176]  kasan_save_track+0x20/0x40
[   15.121263]  kasan_save_alloc_info+0x40/0x58
[   15.121305]  __kasan_kmalloc+0xd4/0xd8
[   15.121340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.121377]  kmalloc_oob_right+0xb0/0x660
[   15.121643]  kunit_try_run_case+0x170/0x3f0
[   15.121715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.121758]  kthread+0x328/0x630
[   15.121790]  ret_from_fork+0x10/0x20
[   15.121825] 
[   15.121902] The buggy address belongs to the object at fff00000c3fc2700
[   15.121902]  which belongs to the cache kmalloc-128 of size 128
[   15.122000] The buggy address is located 5 bytes to the right of
[   15.122000]  allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773)
[   15.122142] 
[   15.122211] The buggy address belongs to the physical page:
[   15.122304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.122406] page_type: f5(slab)
[   15.122459] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.122508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.122547] page dumped because: kasan: bad access detected
[   15.122576] 
[   15.122593] Memory state around the buggy address:
[   15.122634]  fff00000c3fc2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.122687]  fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122727] >fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.122763]                                                                 ^
[   15.122802]  fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122851]  fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122888] ==================================================================
[   15.112116] ==================================================================
[   15.112455] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   15.113314] Write of size 1 at addr fff00000c3fc2773 by task kunit_try_catch/136
[   15.113426] 
[   15.114306] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   15.114480] Tainted: [N]=TEST
[   15.114515] Hardware name: linux,dummy-virt (DT)
[   15.114757] Call trace:
[   15.114938]  show_stack+0x20/0x38 (C)
[   15.115193]  dump_stack_lvl+0x8c/0xd0
[   15.115267]  print_report+0x118/0x5d0
[   15.115314]  kasan_report+0xdc/0x128
[   15.115359]  __asan_report_store1_noabort+0x20/0x30
[   15.115410]  kmalloc_oob_right+0x5a4/0x660
[   15.115454]  kunit_try_run_case+0x170/0x3f0
[   15.115509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.115563]  kthread+0x328/0x630
[   15.115606]  ret_from_fork+0x10/0x20
[   15.115785] 
[   15.115824] Allocated by task 136:
[   15.115942]  kasan_save_stack+0x3c/0x68
[   15.116009]  kasan_save_track+0x20/0x40
[   15.116046]  kasan_save_alloc_info+0x40/0x58
[   15.116085]  __kasan_kmalloc+0xd4/0xd8
[   15.116120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.116159]  kmalloc_oob_right+0xb0/0x660
[   15.116194]  kunit_try_run_case+0x170/0x3f0
[   15.116229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.116271]  kthread+0x328/0x630
[   15.116302]  ret_from_fork+0x10/0x20
[   15.116353] 
[   15.116418] The buggy address belongs to the object at fff00000c3fc2700
[   15.116418]  which belongs to the cache kmalloc-128 of size 128
[   15.116512] The buggy address is located 0 bytes to the right of
[   15.116512]  allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773)
[   15.116577] 
[   15.116656] The buggy address belongs to the physical page:
[   15.116876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.117150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.117441] page_type: f5(slab)
[   15.117758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.117822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.117929] page dumped because: kasan: bad access detected
[   15.117969] 
[   15.117994] Memory state around the buggy address:
[   15.118211]  fff00000c3fc2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.118275]  fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118329] >fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.118381]                                                              ^
[   15.118462]  fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118503]  fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118562] ==================================================================
[   15.124046] ==================================================================
[   15.124112] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   15.124159] Read of size 1 at addr fff00000c3fc2780 by task kunit_try_catch/136
[   15.124305] 
[   15.124339] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.124454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.124513] Hardware name: linux,dummy-virt (DT)
[   15.124544] Call trace:
[   15.124566]  show_stack+0x20/0x38 (C)
[   15.124620]  dump_stack_lvl+0x8c/0xd0
[   15.124675]  print_report+0x118/0x5d0
[   15.124719]  kasan_report+0xdc/0x128
[   15.124764]  __asan_report_load1_noabort+0x20/0x30
[   15.125077]  kmalloc_oob_right+0x5d0/0x660
[   15.125378]  kunit_try_run_case+0x170/0x3f0
[   15.125451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.125571]  kthread+0x328/0x630
[   15.125634]  ret_from_fork+0x10/0x20
[   15.125846] 
[   15.125987] Allocated by task 136:
[   15.126059]  kasan_save_stack+0x3c/0x68
[   15.126164]  kasan_save_track+0x20/0x40
[   15.126205]  kasan_save_alloc_info+0x40/0x58
[   15.126243]  __kasan_kmalloc+0xd4/0xd8
[   15.126278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.126471]  kmalloc_oob_right+0xb0/0x660
[   15.126525]  kunit_try_run_case+0x170/0x3f0
[   15.126624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.126680]  kthread+0x328/0x630
[   15.126731]  ret_from_fork+0x10/0x20
[   15.126804] 
[   15.126883] The buggy address belongs to the object at fff00000c3fc2700
[   15.126883]  which belongs to the cache kmalloc-128 of size 128
[   15.126945] The buggy address is located 13 bytes to the right of
[   15.126945]  allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773)
[   15.127339] 
[   15.127421] The buggy address belongs to the physical page:
[   15.127544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2
[   15.127597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.127644] page_type: f5(slab)
[   15.127875] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.127972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.128247] page dumped because: kasan: bad access detected
[   15.128318] 
[   15.128337] Memory state around the buggy address:
[   15.128367]  fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128679]  fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.128843] >fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128997]                    ^
[   15.129056]  fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.129240]  fff00000c3fc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.129438] ==================================================================

[   11.517744] ==================================================================
[   11.518768] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.519847] Write of size 1 at addr ffff888102ad4073 by task kunit_try_catch/153
[   11.520269] 
[   11.521243] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.521576] Tainted: [N]=TEST
[   11.521605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.522038] Call Trace:
[   11.522112]  <TASK>
[   11.522257]  dump_stack_lvl+0x73/0xb0
[   11.522415]  print_report+0xd1/0x610
[   11.522455]  ? __virt_addr_valid+0x1db/0x2d0
[   11.522479]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.522499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.522520]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.522540]  kasan_report+0x141/0x180
[   11.522561]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.522586]  __asan_report_store1_noabort+0x1b/0x30
[   11.522608]  kmalloc_oob_right+0x6f0/0x7f0
[   11.522629]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.522650]  ? __schedule+0x10cc/0x2b60
[   11.522673]  ? __pfx_read_tsc+0x10/0x10
[   11.522694]  ? ktime_get_ts64+0x86/0x230
[   11.522719]  kunit_try_run_case+0x1a5/0x480
[   11.522744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.522765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.522788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.522810]  ? __kthread_parkme+0x82/0x180
[   11.522830]  ? preempt_count_sub+0x50/0x80
[   11.522853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.522876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.522897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.522931]  kthread+0x337/0x6f0
[   11.522950]  ? trace_preempt_on+0x20/0xc0
[   11.522973]  ? __pfx_kthread+0x10/0x10
[   11.522992]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.523012]  ? calculate_sigpending+0x7b/0xa0
[   11.523035]  ? __pfx_kthread+0x10/0x10
[   11.523059]  ret_from_fork+0x116/0x1d0
[   11.523077]  ? __pfx_kthread+0x10/0x10
[   11.523096]  ret_from_fork_asm+0x1a/0x30
[   11.523151]  </TASK>
[   11.523216] 
[   11.534165] Allocated by task 153:
[   11.534956]  kasan_save_stack+0x45/0x70
[   11.535197]  kasan_save_track+0x18/0x40
[   11.535656]  kasan_save_alloc_info+0x3b/0x50
[   11.535959]  __kasan_kmalloc+0xb7/0xc0
[   11.536422]  __kmalloc_cache_noprof+0x189/0x420
[   11.536648]  kmalloc_oob_right+0xa9/0x7f0
[   11.537015]  kunit_try_run_case+0x1a5/0x480
[   11.537352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.538138]  kthread+0x337/0x6f0
[   11.538313]  ret_from_fork+0x116/0x1d0
[   11.538679]  ret_from_fork_asm+0x1a/0x30
[   11.538936] 
[   11.539092] The buggy address belongs to the object at ffff888102ad4000
[   11.539092]  which belongs to the cache kmalloc-128 of size 128
[   11.540201] The buggy address is located 0 bytes to the right of
[   11.540201]  allocated 115-byte region [ffff888102ad4000, ffff888102ad4073)
[   11.541441] 
[   11.541804] The buggy address belongs to the physical page:
[   11.542529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   11.543395] flags: 0x200000000000000(node=0|zone=2)
[   11.544195] page_type: f5(slab)
[   11.544902] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.545252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.546167] page dumped because: kasan: bad access detected
[   11.546689] 
[   11.546965] Memory state around the buggy address:
[   11.547606]  ffff888102ad3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.548323]  ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.548895] >ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.549309]                                                              ^
[   11.550308]  ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.551073]  ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.551848] ==================================================================
[   11.552896] ==================================================================
[   11.553242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.553594] Write of size 1 at addr ffff888102ad4078 by task kunit_try_catch/153
[   11.553903] 
[   11.554100] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.554142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.554154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.554173] Call Trace:
[   11.554187]  <TASK>
[   11.554202]  dump_stack_lvl+0x73/0xb0
[   11.554228]  print_report+0xd1/0x610
[   11.554247]  ? __virt_addr_valid+0x1db/0x2d0
[   11.554268]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.554287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.554308]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.554328]  kasan_report+0x141/0x180
[   11.554348]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.554374]  __asan_report_store1_noabort+0x1b/0x30
[   11.554396]  kmalloc_oob_right+0x6bd/0x7f0
[   11.554417]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.554490]  ? __schedule+0x10cc/0x2b60
[   11.554511]  ? __pfx_read_tsc+0x10/0x10
[   11.554530]  ? ktime_get_ts64+0x86/0x230
[   11.554573]  kunit_try_run_case+0x1a5/0x480
[   11.554596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.554617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.554638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.554659]  ? __kthread_parkme+0x82/0x180
[   11.554678]  ? preempt_count_sub+0x50/0x80
[   11.554701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.554723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.554744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.554766]  kthread+0x337/0x6f0
[   11.554784]  ? trace_preempt_on+0x20/0xc0
[   11.554805]  ? __pfx_kthread+0x10/0x10
[   11.554825]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.554891]  ? calculate_sigpending+0x7b/0xa0
[   11.554930]  ? __pfx_kthread+0x10/0x10
[   11.554950]  ret_from_fork+0x116/0x1d0
[   11.554968]  ? __pfx_kthread+0x10/0x10
[   11.554987]  ret_from_fork_asm+0x1a/0x30
[   11.555065]  </TASK>
[   11.555076] 
[   11.565349] Allocated by task 153:
[   11.565677]  kasan_save_stack+0x45/0x70
[   11.565883]  kasan_save_track+0x18/0x40
[   11.566286]  kasan_save_alloc_info+0x3b/0x50
[   11.566737]  __kasan_kmalloc+0xb7/0xc0
[   11.567185]  __kmalloc_cache_noprof+0x189/0x420
[   11.567381]  kmalloc_oob_right+0xa9/0x7f0
[   11.567848]  kunit_try_run_case+0x1a5/0x480
[   11.568335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.568589]  kthread+0x337/0x6f0
[   11.568996]  ret_from_fork+0x116/0x1d0
[   11.569195]  ret_from_fork_asm+0x1a/0x30
[   11.569632] 
[   11.569779] The buggy address belongs to the object at ffff888102ad4000
[   11.569779]  which belongs to the cache kmalloc-128 of size 128
[   11.570649] The buggy address is located 5 bytes to the right of
[   11.570649]  allocated 115-byte region [ffff888102ad4000, ffff888102ad4073)
[   11.571556] 
[   11.571666] The buggy address belongs to the physical page:
[   11.572326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   11.572818] flags: 0x200000000000000(node=0|zone=2)
[   11.573018] page_type: f5(slab)
[   11.573564] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.574201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.574842] page dumped because: kasan: bad access detected
[   11.575102] 
[   11.575198] Memory state around the buggy address:
[   11.575776]  ffff888102ad3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.576066]  ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.576588] >ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.577082]                                                                 ^
[   11.577545]  ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.578103]  ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.578639] ==================================================================
[   11.580523] ==================================================================
[   11.580947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.581257] Read of size 1 at addr ffff888102ad4080 by task kunit_try_catch/153
[   11.581779] 
[   11.581950] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.581994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.582005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.582025] Call Trace:
[   11.582038]  <TASK>
[   11.582052]  dump_stack_lvl+0x73/0xb0
[   11.582079]  print_report+0xd1/0x610
[   11.582099]  ? __virt_addr_valid+0x1db/0x2d0
[   11.582119]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.582138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.582159]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.582179]  kasan_report+0x141/0x180
[   11.582199]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.582224]  __asan_report_load1_noabort+0x18/0x20
[   11.582284]  kmalloc_oob_right+0x68a/0x7f0
[   11.582324]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.582346]  ? __schedule+0x10cc/0x2b60
[   11.582559]  ? __pfx_read_tsc+0x10/0x10
[   11.582580]  ? ktime_get_ts64+0x86/0x230
[   11.582604]  kunit_try_run_case+0x1a5/0x480
[   11.582627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.582648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.582669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.582705]  ? __kthread_parkme+0x82/0x180
[   11.582723]  ? preempt_count_sub+0x50/0x80
[   11.582746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.582768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.582789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.582811]  kthread+0x337/0x6f0
[   11.582829]  ? trace_preempt_on+0x20/0xc0
[   11.582850]  ? __pfx_kthread+0x10/0x10
[   11.582869]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.582889]  ? calculate_sigpending+0x7b/0xa0
[   11.582922]  ? __pfx_kthread+0x10/0x10
[   11.582943]  ret_from_fork+0x116/0x1d0
[   11.582960]  ? __pfx_kthread+0x10/0x10
[   11.582980]  ret_from_fork_asm+0x1a/0x30
[   11.583008]  </TASK>
[   11.583018] 
[   11.591712] Allocated by task 153:
[   11.591883]  kasan_save_stack+0x45/0x70
[   11.592151]  kasan_save_track+0x18/0x40
[   11.592303]  kasan_save_alloc_info+0x3b/0x50
[   11.592475]  __kasan_kmalloc+0xb7/0xc0
[   11.592650]  __kmalloc_cache_noprof+0x189/0x420
[   11.592881]  kmalloc_oob_right+0xa9/0x7f0
[   11.593088]  kunit_try_run_case+0x1a5/0x480
[   11.593297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.593511]  kthread+0x337/0x6f0
[   11.593630]  ret_from_fork+0x116/0x1d0
[   11.593791]  ret_from_fork_asm+0x1a/0x30
[   11.594135] 
[   11.594232] The buggy address belongs to the object at ffff888102ad4000
[   11.594232]  which belongs to the cache kmalloc-128 of size 128
[   11.595095] The buggy address is located 13 bytes to the right of
[   11.595095]  allocated 115-byte region [ffff888102ad4000, ffff888102ad4073)
[   11.595774] 
[   11.595902] The buggy address belongs to the physical page:
[   11.596133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4
[   11.596447] flags: 0x200000000000000(node=0|zone=2)
[   11.596744] page_type: f5(slab)
[   11.596949] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.597429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.597826] page dumped because: kasan: bad access detected
[   11.598107] 
[   11.598177] Memory state around the buggy address:
[   11.598600]  ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.598998]  ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.599418] >ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.599686]                    ^
[   11.599890]  ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.600229]  ffff888102ad4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.600621] ==================================================================