Hay
Date
June 16, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.669627] ==================================================================
[   18.669747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.669892] Read of size 1 at addr fff00000c6399a80 by task kunit_try_catch/145
[   18.670024] 
[   18.670103] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.670322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.670394] Hardware name: linux,dummy-virt (DT)
[   18.670473] Call trace:
[   18.670528]  show_stack+0x20/0x38 (C)
[   18.670647]  dump_stack_lvl+0x8c/0xd0
[   18.670761]  print_report+0x118/0x608
[   18.670895]  kasan_report+0xdc/0x128
[   18.671010]  __asan_report_load1_noabort+0x20/0x30
[   18.671123]  kmalloc_oob_right+0x5d0/0x660
[   18.671231]  kunit_try_run_case+0x170/0x3f0
[   18.671343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.671484]  kthread+0x328/0x630
[   18.671581]  ret_from_fork+0x10/0x20
[   18.671685] 
[   18.671723] Allocated by task 145:
[   18.671781]  kasan_save_stack+0x3c/0x68
[   18.671882]  kasan_save_track+0x20/0x40
[   18.671969]  kasan_save_alloc_info+0x40/0x58
[   18.672052]  __kasan_kmalloc+0xd4/0xd8
[   18.672135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.672230]  kmalloc_oob_right+0xb0/0x660
[   18.672317]  kunit_try_run_case+0x170/0x3f0
[   18.672404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.672505]  kthread+0x328/0x630
[   18.672583]  ret_from_fork+0x10/0x20
[   18.672668] 
[   18.672713] The buggy address belongs to the object at fff00000c6399a00
[   18.672713]  which belongs to the cache kmalloc-128 of size 128
[   18.672858] The buggy address is located 13 bytes to the right of
[   18.672858]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.673066] 
[   18.673128] The buggy address belongs to the physical page:
[   18.673219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.673343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.673474] page_type: f5(slab)
[   18.673593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.673764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.673928] page dumped because: kasan: bad access detected
[   18.674038] 
[   18.674084] Memory state around the buggy address:
[   18.674163]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674311]  fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.674457] >fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674587]                    ^
[   18.674681]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674821]  fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.674959] ==================================================================
[   18.650026] ==================================================================
[   18.650758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.652693] Write of size 1 at addr fff00000c6399a73 by task kunit_try_catch/145
[   18.652990] 
[   18.654493] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.654704] Tainted: [N]=TEST
[   18.654751] Hardware name: linux,dummy-virt (DT)
[   18.655069] Call trace:
[   18.655296]  show_stack+0x20/0x38 (C)
[   18.655478]  dump_stack_lvl+0x8c/0xd0
[   18.655555]  print_report+0x118/0x608
[   18.655616]  kasan_report+0xdc/0x128
[   18.655671]  __asan_report_store1_noabort+0x20/0x30
[   18.655729]  kmalloc_oob_right+0x5a4/0x660
[   18.655783]  kunit_try_run_case+0x170/0x3f0
[   18.655855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.655922]  kthread+0x328/0x630
[   18.655975]  ret_from_fork+0x10/0x20
[   18.656169] 
[   18.656221] Allocated by task 145:
[   18.656365]  kasan_save_stack+0x3c/0x68
[   18.656450]  kasan_save_track+0x20/0x40
[   18.656496]  kasan_save_alloc_info+0x40/0x58
[   18.656537]  __kasan_kmalloc+0xd4/0xd8
[   18.656578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.656623]  kmalloc_oob_right+0xb0/0x660
[   18.656663]  kunit_try_run_case+0x170/0x3f0
[   18.656703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656752]  kthread+0x328/0x630
[   18.656794]  ret_from_fork+0x10/0x20
[   18.656917] 
[   18.657060] The buggy address belongs to the object at fff00000c6399a00
[   18.657060]  which belongs to the cache kmalloc-128 of size 128
[   18.657253] The buggy address is located 0 bytes to the right of
[   18.657253]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.657336] 
[   18.657438] The buggy address belongs to the physical page:
[   18.657720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.658124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.658492] page_type: f5(slab)
[   18.658900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.658979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.659119] page dumped because: kasan: bad access detected
[   18.659172] 
[   18.659207] Memory state around the buggy address:
[   18.659490]  fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.659576]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659643] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.659707]                                                              ^
[   18.659802]  fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659865]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.659942] ==================================================================
[   18.663631] ==================================================================
[   18.663717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.663826] Write of size 1 at addr fff00000c6399a78 by task kunit_try_catch/145
[   18.663944] 
[   18.664027] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   18.664246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.664314] Hardware name: linux,dummy-virt (DT)
[   18.664389] Call trace:
[   18.664442]  show_stack+0x20/0x38 (C)
[   18.664561]  dump_stack_lvl+0x8c/0xd0
[   18.664671]  print_report+0x118/0x608
[   18.664777]  kasan_report+0xdc/0x128
[   18.664916]  __asan_report_store1_noabort+0x20/0x30
[   18.665021]  kmalloc_oob_right+0x538/0x660
[   18.665113]  kunit_try_run_case+0x170/0x3f0
[   18.665220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.665335]  kthread+0x328/0x630
[   18.665434]  ret_from_fork+0x10/0x20
[   18.665545] 
[   18.665588] Allocated by task 145:
[   18.665656]  kasan_save_stack+0x3c/0x68
[   18.665755]  kasan_save_track+0x20/0x40
[   18.665895]  kasan_save_alloc_info+0x40/0x58
[   18.666022]  __kasan_kmalloc+0xd4/0xd8
[   18.666152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.666254]  kmalloc_oob_right+0xb0/0x660
[   18.666344]  kunit_try_run_case+0x170/0x3f0
[   18.666436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.666541]  kthread+0x328/0x630
[   18.666621]  ret_from_fork+0x10/0x20
[   18.666699] 
[   18.666743] The buggy address belongs to the object at fff00000c6399a00
[   18.666743]  which belongs to the cache kmalloc-128 of size 128
[   18.666881] The buggy address is located 5 bytes to the right of
[   18.666881]  allocated 115-byte region [fff00000c6399a00, fff00000c6399a73)
[   18.667027] 
[   18.667075] The buggy address belongs to the physical page:
[   18.667146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399
[   18.667269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.667385] page_type: f5(slab)
[   18.667485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.667628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.667740] page dumped because: kasan: bad access detected
[   18.667816] 
[   18.667868] Memory state around the buggy address:
[   18.667935]  fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.668043]  fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668142] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.668240]                                                                 ^
[   18.668350]  fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668454]  fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.668542] ==================================================================

[   10.718759] ==================================================================
[   10.719063] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.719325] Read of size 1 at addr ffff888102a15a80 by task kunit_try_catch/161
[   10.719642] 
[   10.719996] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   10.720049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.720060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.720083] Call Trace:
[   10.720096]  <TASK>
[   10.720112]  dump_stack_lvl+0x73/0xb0
[   10.720141]  print_report+0xd1/0x650
[   10.720163]  ? __virt_addr_valid+0x1db/0x2d0
[   10.720185]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.720204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.720225]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.720246]  kasan_report+0x141/0x180
[   10.720266]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.720291]  __asan_report_load1_noabort+0x18/0x20
[   10.720314]  kmalloc_oob_right+0x68a/0x7f0
[   10.720336]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.720357]  ? __schedule+0x10cc/0x2b60
[   10.720379]  ? __pfx_read_tsc+0x10/0x10
[   10.720596]  ? ktime_get_ts64+0x86/0x230
[   10.720634]  kunit_try_run_case+0x1a5/0x480
[   10.720659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.720680]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.720702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.720724]  ? __kthread_parkme+0x82/0x180
[   10.720744]  ? preempt_count_sub+0x50/0x80
[   10.720767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.720790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.720812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.720834]  kthread+0x337/0x6f0
[   10.720852]  ? trace_preempt_on+0x20/0xc0
[   10.720876]  ? __pfx_kthread+0x10/0x10
[   10.720895]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.720914]  ? calculate_sigpending+0x7b/0xa0
[   10.720953]  ? __pfx_kthread+0x10/0x10
[   10.720973]  ret_from_fork+0x116/0x1d0
[   10.720991]  ? __pfx_kthread+0x10/0x10
[   10.721010]  ret_from_fork_asm+0x1a/0x30
[   10.721040]  </TASK>
[   10.721051] 
[   10.727681] Allocated by task 161:
[   10.727840]  kasan_save_stack+0x45/0x70
[   10.728050]  kasan_save_track+0x18/0x40
[   10.728210]  kasan_save_alloc_info+0x3b/0x50
[   10.728577]  __kasan_kmalloc+0xb7/0xc0
[   10.728725]  __kmalloc_cache_noprof+0x189/0x420
[   10.728957]  kmalloc_oob_right+0xa9/0x7f0
[   10.729149]  kunit_try_run_case+0x1a5/0x480
[   10.729316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.729690]  kthread+0x337/0x6f0
[   10.729851]  ret_from_fork+0x116/0x1d0
[   10.730038]  ret_from_fork_asm+0x1a/0x30
[   10.730171] 
[   10.730235] The buggy address belongs to the object at ffff888102a15a00
[   10.730235]  which belongs to the cache kmalloc-128 of size 128
[   10.731013] The buggy address is located 13 bytes to the right of
[   10.731013]  allocated 115-byte region [ffff888102a15a00, ffff888102a15a73)
[   10.731445] 
[   10.731533] The buggy address belongs to the physical page:
[   10.731883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15
[   10.732167] flags: 0x200000000000000(node=0|zone=2)
[   10.732391] page_type: f5(slab)
[   10.732566] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.732845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.733145] page dumped because: kasan: bad access detected
[   10.733349] 
[   10.733482] Memory state around the buggy address:
[   10.733686]  ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.733968]  ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.734240] >ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.734719]                    ^
[   10.734861]  ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.735145]  ffff888102a15b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.735423] ==================================================================
[   10.670255] ==================================================================
[   10.670886] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.671763] Write of size 1 at addr ffff888102a15a73 by task kunit_try_catch/161
[   10.672151] 
[   10.673106] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   10.673462] Tainted: [N]=TEST
[   10.673494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.673708] Call Trace:
[   10.673775]  <TASK>
[   10.673919]  dump_stack_lvl+0x73/0xb0
[   10.674042]  print_report+0xd1/0x650
[   10.674071]  ? __virt_addr_valid+0x1db/0x2d0
[   10.674097]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.674117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.674138]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.674159]  kasan_report+0x141/0x180
[   10.674180]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.674205]  __asan_report_store1_noabort+0x1b/0x30
[   10.674228]  kmalloc_oob_right+0x6f0/0x7f0
[   10.674249]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.674271]  ? __schedule+0x10cc/0x2b60
[   10.674292]  ? __pfx_read_tsc+0x10/0x10
[   10.674314]  ? ktime_get_ts64+0x86/0x230
[   10.674339]  kunit_try_run_case+0x1a5/0x480
[   10.674365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.674386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.674407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.674429]  ? __kthread_parkme+0x82/0x180
[   10.674450]  ? preempt_count_sub+0x50/0x80
[   10.674474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.674496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.674518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.674540]  kthread+0x337/0x6f0
[   10.674559]  ? trace_preempt_on+0x20/0xc0
[   10.674583]  ? __pfx_kthread+0x10/0x10
[   10.674602]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.674622]  ? calculate_sigpending+0x7b/0xa0
[   10.674646]  ? __pfx_kthread+0x10/0x10
[   10.674666]  ret_from_fork+0x116/0x1d0
[   10.674683]  ? __pfx_kthread+0x10/0x10
[   10.674703]  ret_from_fork_asm+0x1a/0x30
[   10.674756]  </TASK>
[   10.674823] 
[   10.682024] Allocated by task 161:
[   10.682815]  kasan_save_stack+0x45/0x70
[   10.683082]  kasan_save_track+0x18/0x40
[   10.683276]  kasan_save_alloc_info+0x3b/0x50
[   10.683814]  __kasan_kmalloc+0xb7/0xc0
[   10.684085]  __kmalloc_cache_noprof+0x189/0x420
[   10.684319]  kmalloc_oob_right+0xa9/0x7f0
[   10.684753]  kunit_try_run_case+0x1a5/0x480
[   10.685155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.685542]  kthread+0x337/0x6f0
[   10.685753]  ret_from_fork+0x116/0x1d0
[   10.685919]  ret_from_fork_asm+0x1a/0x30
[   10.686116] 
[   10.686264] The buggy address belongs to the object at ffff888102a15a00
[   10.686264]  which belongs to the cache kmalloc-128 of size 128
[   10.686926] The buggy address is located 0 bytes to the right of
[   10.686926]  allocated 115-byte region [ffff888102a15a00, ffff888102a15a73)
[   10.687464] 
[   10.687894] The buggy address belongs to the physical page:
[   10.688813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15
[   10.689368] flags: 0x200000000000000(node=0|zone=2)
[   10.690051] page_type: f5(slab)
[   10.690612] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.690925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.691352] page dumped because: kasan: bad access detected
[   10.691651] 
[   10.691825] Memory state around the buggy address:
[   10.692344]  ffff888102a15900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.692738]  ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.693188] >ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.693548]                                                              ^
[   10.693965]  ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.694235]  ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.694645] ==================================================================
[   10.695946] ==================================================================
[   10.696367] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.696719] Write of size 1 at addr ffff888102a15a78 by task kunit_try_catch/161
[   10.697235] 
[   10.697343] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   10.697393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.697404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.697426] Call Trace:
[   10.697445]  <TASK>
[   10.697465]  dump_stack_lvl+0x73/0xb0
[   10.697493]  print_report+0xd1/0x650
[   10.697517]  ? __virt_addr_valid+0x1db/0x2d0
[   10.697540]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.697559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.697580]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.697600]  kasan_report+0x141/0x180
[   10.697621]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.697646]  __asan_report_store1_noabort+0x1b/0x30
[   10.697669]  kmalloc_oob_right+0x6bd/0x7f0
[   10.697696]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.697718]  ? __schedule+0x10cc/0x2b60
[   10.697739]  ? __pfx_read_tsc+0x10/0x10
[   10.697759]  ? ktime_get_ts64+0x86/0x230
[   10.697811]  kunit_try_run_case+0x1a5/0x480
[   10.697834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.697855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.697890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.697911]  ? __kthread_parkme+0x82/0x180
[   10.697960]  ? preempt_count_sub+0x50/0x80
[   10.697984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.698006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.698038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.698060]  kthread+0x337/0x6f0
[   10.698079]  ? trace_preempt_on+0x20/0xc0
[   10.698103]  ? __pfx_kthread+0x10/0x10
[   10.698122]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.698142]  ? calculate_sigpending+0x7b/0xa0
[   10.698165]  ? __pfx_kthread+0x10/0x10
[   10.698203]  ret_from_fork+0x116/0x1d0
[   10.698222]  ? __pfx_kthread+0x10/0x10
[   10.698241]  ret_from_fork_asm+0x1a/0x30
[   10.698292]  </TASK>
[   10.698303] 
[   10.705763] Allocated by task 161:
[   10.705887]  kasan_save_stack+0x45/0x70
[   10.706841]  kasan_save_track+0x18/0x40
[   10.707069]  kasan_save_alloc_info+0x3b/0x50
[   10.707284]  __kasan_kmalloc+0xb7/0xc0
[   10.707530]  __kmalloc_cache_noprof+0x189/0x420
[   10.707770]  kmalloc_oob_right+0xa9/0x7f0
[   10.708716]  kunit_try_run_case+0x1a5/0x480
[   10.708905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.709167]  kthread+0x337/0x6f0
[   10.709376]  ret_from_fork+0x116/0x1d0
[   10.709548]  ret_from_fork_asm+0x1a/0x30
[   10.709786] 
[   10.709904] The buggy address belongs to the object at ffff888102a15a00
[   10.709904]  which belongs to the cache kmalloc-128 of size 128
[   10.710925] The buggy address is located 5 bytes to the right of
[   10.710925]  allocated 115-byte region [ffff888102a15a00, ffff888102a15a73)
[   10.711867] 
[   10.711964] The buggy address belongs to the physical page:
[   10.712461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15
[   10.713141] flags: 0x200000000000000(node=0|zone=2)
[   10.713364] page_type: f5(slab)
[   10.713831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.714368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.714909] page dumped because: kasan: bad access detected
[   10.715281] 
[   10.715380] Memory state around the buggy address:
[   10.715886]  ffff888102a15900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.716222]  ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.716580] >ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.717032]                                                                 ^
[   10.717337]  ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.717636]  ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.718056] ==================================================================