Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   16.563350] ==================================================================
[   16.563420] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.563493] Write of size 1 at addr fff00000c748a378 by task kunit_try_catch/145
[   16.563625] 
[   16.563675] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.563771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.563813] Hardware name: linux,dummy-virt (DT)
[   16.563923] Call trace:
[   16.563958]  show_stack+0x20/0x38 (C)
[   16.564015]  dump_stack_lvl+0x8c/0xd0
[   16.564084]  print_report+0x118/0x608
[   16.564132]  kasan_report+0xdc/0x128
[   16.564507]  __asan_report_store1_noabort+0x20/0x30
[   16.564601]  kmalloc_oob_right+0x538/0x660
[   16.564674]  kunit_try_run_case+0x170/0x3f0
[   16.564786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.564840]  kthread+0x328/0x630
[   16.564889]  ret_from_fork+0x10/0x20
[   16.564967] 
[   16.564986] Allocated by task 145:
[   16.565013]  kasan_save_stack+0x3c/0x68
[   16.565505]  kasan_save_track+0x20/0x40
[   16.565595]  kasan_save_alloc_info+0x40/0x58
[   16.565643]  __kasan_kmalloc+0xd4/0xd8
[   16.565699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.565757]  kmalloc_oob_right+0xb0/0x660
[   16.565794]  kunit_try_run_case+0x170/0x3f0
[   16.565831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.565873]  kthread+0x328/0x630
[   16.565923]  ret_from_fork+0x10/0x20
[   16.565970] 
[   16.566045] The buggy address belongs to the object at fff00000c748a300
[   16.566045]  which belongs to the cache kmalloc-128 of size 128
[   16.566288] The buggy address is located 5 bytes to the right of
[   16.566288]  allocated 115-byte region [fff00000c748a300, fff00000c748a373)
[   16.566830] 
[   16.566864] The buggy address belongs to the physical page:
[   16.566895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   16.566962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.567194] page_type: f5(slab)
[   16.567241] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.567884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.567961] page dumped because: kasan: bad access detected
[   16.568048] 
[   16.568102] Memory state around the buggy address:
[   16.568161]  fff00000c748a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.568271]  fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.568343] >fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.568434]                                                                 ^
[   16.568545]  fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.568592]  fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.568639] ==================================================================
[   16.556216] ==================================================================
[   16.556561] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.557433] Write of size 1 at addr fff00000c748a373 by task kunit_try_catch/145
[   16.557546] 
[   16.558457] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.558614] Tainted: [N]=TEST
[   16.558650] Hardware name: linux,dummy-virt (DT)
[   16.558881] Call trace:
[   16.559075]  show_stack+0x20/0x38 (C)
[   16.559220]  dump_stack_lvl+0x8c/0xd0
[   16.559286]  print_report+0x118/0x608
[   16.559337]  kasan_report+0xdc/0x128
[   16.559384]  __asan_report_store1_noabort+0x20/0x30
[   16.559432]  kmalloc_oob_right+0x5a4/0x660
[   16.559478]  kunit_try_run_case+0x170/0x3f0
[   16.559530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.559583]  kthread+0x328/0x630
[   16.559627]  ret_from_fork+0x10/0x20
[   16.559785] 
[   16.559828] Allocated by task 145:
[   16.559954]  kasan_save_stack+0x3c/0x68
[   16.560025]  kasan_save_track+0x20/0x40
[   16.560064]  kasan_save_alloc_info+0x40/0x58
[   16.560100]  __kasan_kmalloc+0xd4/0xd8
[   16.560138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.560179]  kmalloc_oob_right+0xb0/0x660
[   16.560215]  kunit_try_run_case+0x170/0x3f0
[   16.560253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.560296]  kthread+0x328/0x630
[   16.560328]  ret_from_fork+0x10/0x20
[   16.560381] 
[   16.560442] The buggy address belongs to the object at fff00000c748a300
[   16.560442]  which belongs to the cache kmalloc-128 of size 128
[   16.560538] The buggy address is located 0 bytes to the right of
[   16.560538]  allocated 115-byte region [fff00000c748a300, fff00000c748a373)
[   16.560606] 
[   16.560690] The buggy address belongs to the physical page:
[   16.560862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   16.561156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.561454] page_type: f5(slab)
[   16.561767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.561831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.561953] page dumped because: kasan: bad access detected
[   16.561995] 
[   16.562020] Memory state around the buggy address:
[   16.562311]  fff00000c748a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.562382]  fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.562438] >fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.562492]                                                              ^
[   16.562576]  fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.562619]  fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.562681] ==================================================================
[   16.569156] ==================================================================
[   16.569317] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.569375] Read of size 1 at addr fff00000c748a380 by task kunit_try_catch/145
[   16.569424] 
[   16.569453] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   16.569537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.569563] Hardware name: linux,dummy-virt (DT)
[   16.569600] Call trace:
[   16.569623]  show_stack+0x20/0x38 (C)
[   16.569672]  dump_stack_lvl+0x8c/0xd0
[   16.569719]  print_report+0x118/0x608
[   16.569777]  kasan_report+0xdc/0x128
[   16.569824]  __asan_report_load1_noabort+0x20/0x30
[   16.569880]  kmalloc_oob_right+0x5d0/0x660
[   16.569938]  kunit_try_run_case+0x170/0x3f0
[   16.569985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.570149]  kthread+0x328/0x630
[   16.570210]  ret_from_fork+0x10/0x20
[   16.570534] 
[   16.570557] Allocated by task 145:
[   16.570586]  kasan_save_stack+0x3c/0x68
[   16.570696]  kasan_save_track+0x20/0x40
[   16.570774]  kasan_save_alloc_info+0x40/0x58
[   16.570821]  __kasan_kmalloc+0xd4/0xd8
[   16.570896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.570979]  kmalloc_oob_right+0xb0/0x660
[   16.571058]  kunit_try_run_case+0x170/0x3f0
[   16.571122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.571184]  kthread+0x328/0x630
[   16.571216]  ret_from_fork+0x10/0x20
[   16.571278] 
[   16.571296] The buggy address belongs to the object at fff00000c748a300
[   16.571296]  which belongs to the cache kmalloc-128 of size 128
[   16.571354] The buggy address is located 13 bytes to the right of
[   16.571354]  allocated 115-byte region [fff00000c748a300, fff00000c748a373)
[   16.571573] 
[   16.571625] The buggy address belongs to the physical page:
[   16.571673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   16.571781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.571848] page_type: f5(slab)
[   16.571886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.571947] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.571987] page dumped because: kasan: bad access detected
[   16.572218] 
[   16.572279] Memory state around the buggy address:
[   16.572340]  fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572430]  fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.572503] >fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572542]                    ^
[   16.572767]  fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572833]  fff00000c748a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572968] ==================================================================

[   16.579532] ==================================================================
[   16.580615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   16.581668] Write of size 1 at addr ffff888100ab8273 by task kunit_try_catch/163
[   16.583106] 
[   16.584737] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   16.585201] Tainted: [N]=TEST
[   16.585283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.585550] Call Trace:
[   16.585634]  <TASK>
[   16.585811]  dump_stack_lvl+0x73/0xb0
[   16.585968]  print_report+0xd1/0x650
[   16.586012]  ? __virt_addr_valid+0x1db/0x2d0
[   16.586050]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.586080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.586111]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.586143]  kasan_report+0x141/0x180
[   16.586173]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.586209]  __asan_report_store1_noabort+0x1b/0x30
[   16.586270]  kmalloc_oob_right+0x6f0/0x7f0
[   16.586305]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.586336]  ? __schedule+0x10cc/0x2b60
[   16.586364]  ? __pfx_read_tsc+0x10/0x10
[   16.586394]  ? ktime_get_ts64+0x86/0x230
[   16.586428]  kunit_try_run_case+0x1a5/0x480
[   16.586465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.586525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.586561]  ? __kthread_parkme+0x82/0x180
[   16.586590]  ? preempt_count_sub+0x50/0x80
[   16.586622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.586686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.586718]  kthread+0x337/0x6f0
[   16.586745]  ? trace_preempt_on+0x20/0xc0
[   16.586778]  ? __pfx_kthread+0x10/0x10
[   16.586806]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.586860]  ? calculate_sigpending+0x7b/0xa0
[   16.586899]  ? __pfx_kthread+0x10/0x10
[   16.586928]  ret_from_fork+0x116/0x1d0
[   16.586955]  ? __pfx_kthread+0x10/0x10
[   16.586984]  ret_from_fork_asm+0x1a/0x30
[   16.587063]  </TASK>
[   16.587146] 
[   16.601808] Allocated by task 163:
[   16.602448]  kasan_save_stack+0x45/0x70
[   16.602926]  kasan_save_track+0x18/0x40
[   16.603324]  kasan_save_alloc_info+0x3b/0x50
[   16.604522]  __kasan_kmalloc+0xb7/0xc0
[   16.605334]  __kmalloc_cache_noprof+0x189/0x420
[   16.605969]  kmalloc_oob_right+0xa9/0x7f0
[   16.606332]  kunit_try_run_case+0x1a5/0x480
[   16.607036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.607514]  kthread+0x337/0x6f0
[   16.607913]  ret_from_fork+0x116/0x1d0
[   16.608201]  ret_from_fork_asm+0x1a/0x30
[   16.608564] 
[   16.608983] The buggy address belongs to the object at ffff888100ab8200
[   16.608983]  which belongs to the cache kmalloc-128 of size 128
[   16.610280] The buggy address is located 0 bytes to the right of
[   16.610280]  allocated 115-byte region [ffff888100ab8200, ffff888100ab8273)
[   16.611639] 
[   16.612283] The buggy address belongs to the physical page:
[   16.613171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   16.614448] flags: 0x200000000000000(node=0|zone=2)
[   16.615567] page_type: f5(slab)
[   16.616599] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.617133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.618040] page dumped because: kasan: bad access detected
[   16.618630] 
[   16.618987] Memory state around the buggy address:
[   16.620160]  ffff888100ab8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.620762]  ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621411] >ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.621893]                                                              ^
[   16.622532]  ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.623115]  ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.623714] ==================================================================
[   16.626670] ==================================================================
[   16.627451] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   16.628340] Write of size 1 at addr ffff888100ab8278 by task kunit_try_catch/163
[   16.628746] 
[   16.629194] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   16.629341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.629376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.629431] Call Trace:
[   16.629476]  <TASK>
[   16.629520]  dump_stack_lvl+0x73/0xb0
[   16.629601]  print_report+0xd1/0x650
[   16.629671]  ? __virt_addr_valid+0x1db/0x2d0
[   16.629747]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.629817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.629901]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.629971]  kasan_report+0x141/0x180
[   16.630169]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.630256]  __asan_report_store1_noabort+0x1b/0x30
[   16.630333]  kmalloc_oob_right+0x6bd/0x7f0
[   16.630404]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.630475]  ? __schedule+0x10cc/0x2b60
[   16.630543]  ? __pfx_read_tsc+0x10/0x10
[   16.630600]  ? ktime_get_ts64+0x86/0x230
[   16.630666]  kunit_try_run_case+0x1a5/0x480
[   16.630732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.630791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.630879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.630961]  ? __kthread_parkme+0x82/0x180
[   16.631007]  ? preempt_count_sub+0x50/0x80
[   16.631042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.631075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.631108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.631141]  kthread+0x337/0x6f0
[   16.631167]  ? trace_preempt_on+0x20/0xc0
[   16.631199]  ? __pfx_kthread+0x10/0x10
[   16.631244]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.631290]  ? calculate_sigpending+0x7b/0xa0
[   16.631324]  ? __pfx_kthread+0x10/0x10
[   16.631353]  ret_from_fork+0x116/0x1d0
[   16.631378]  ? __pfx_kthread+0x10/0x10
[   16.631406]  ret_from_fork_asm+0x1a/0x30
[   16.631447]  </TASK>
[   16.631461] 
[   16.646498] Allocated by task 163:
[   16.646828]  kasan_save_stack+0x45/0x70
[   16.647422]  kasan_save_track+0x18/0x40
[   16.647925]  kasan_save_alloc_info+0x3b/0x50
[   16.648358]  __kasan_kmalloc+0xb7/0xc0
[   16.648715]  __kmalloc_cache_noprof+0x189/0x420
[   16.649348]  kmalloc_oob_right+0xa9/0x7f0
[   16.649819]  kunit_try_run_case+0x1a5/0x480
[   16.650539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.650937]  kthread+0x337/0x6f0
[   16.651682]  ret_from_fork+0x116/0x1d0
[   16.652186]  ret_from_fork_asm+0x1a/0x30
[   16.652812] 
[   16.652988] The buggy address belongs to the object at ffff888100ab8200
[   16.652988]  which belongs to the cache kmalloc-128 of size 128
[   16.654002] The buggy address is located 5 bytes to the right of
[   16.654002]  allocated 115-byte region [ffff888100ab8200, ffff888100ab8273)
[   16.655460] 
[   16.655734] The buggy address belongs to the physical page:
[   16.656266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   16.657122] flags: 0x200000000000000(node=0|zone=2)
[   16.657624] page_type: f5(slab)
[   16.657985] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.658673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.659382] page dumped because: kasan: bad access detected
[   16.660141] 
[   16.660391] Memory state around the buggy address:
[   16.660808]  ffff888100ab8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.661536]  ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662364] >ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.662963]                                                                 ^
[   16.663564]  ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.664417]  ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.664898] ==================================================================
[   16.666197] ==================================================================
[   16.667607] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   16.668140] Read of size 1 at addr ffff888100ab8280 by task kunit_try_catch/163
[   16.668791] 
[   16.669023] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   16.669146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.669183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.669290] Call Trace:
[   16.669695]  <TASK>
[   16.669768]  dump_stack_lvl+0x73/0xb0
[   16.669896]  print_report+0xd1/0x650
[   16.669965]  ? __virt_addr_valid+0x1db/0x2d0
[   16.670025]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.670057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.670089]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.670119]  kasan_report+0x141/0x180
[   16.670150]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.670186]  __asan_report_load1_noabort+0x18/0x20
[   16.670230]  kmalloc_oob_right+0x68a/0x7f0
[   16.670285]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.670317]  ? __schedule+0x10cc/0x2b60
[   16.670345]  ? __pfx_read_tsc+0x10/0x10
[   16.670374]  ? ktime_get_ts64+0x86/0x230
[   16.670408]  kunit_try_run_case+0x1a5/0x480
[   16.670440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.670471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.670498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.670533]  ? __kthread_parkme+0x82/0x180
[   16.670559]  ? preempt_count_sub+0x50/0x80
[   16.670591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.670623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.670655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.670688]  kthread+0x337/0x6f0
[   16.670715]  ? trace_preempt_on+0x20/0xc0
[   16.670745]  ? __pfx_kthread+0x10/0x10
[   16.670773]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.670806]  ? calculate_sigpending+0x7b/0xa0
[   16.670864]  ? __pfx_kthread+0x10/0x10
[   16.670897]  ret_from_fork+0x116/0x1d0
[   16.670922]  ? __pfx_kthread+0x10/0x10
[   16.670950]  ret_from_fork_asm+0x1a/0x30
[   16.670991]  </TASK>
[   16.671005] 
[   16.684760] Allocated by task 163:
[   16.685120]  kasan_save_stack+0x45/0x70
[   16.685560]  kasan_save_track+0x18/0x40
[   16.685999]  kasan_save_alloc_info+0x3b/0x50
[   16.686465]  __kasan_kmalloc+0xb7/0xc0
[   16.686877]  __kmalloc_cache_noprof+0x189/0x420
[   16.687377]  kmalloc_oob_right+0xa9/0x7f0
[   16.687804]  kunit_try_run_case+0x1a5/0x480
[   16.688293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.688658]  kthread+0x337/0x6f0
[   16.688913]  ret_from_fork+0x116/0x1d0
[   16.693641]  ret_from_fork_asm+0x1a/0x30
[   16.694515] 
[   16.695273] The buggy address belongs to the object at ffff888100ab8200
[   16.695273]  which belongs to the cache kmalloc-128 of size 128
[   16.697154] The buggy address is located 13 bytes to the right of
[   16.697154]  allocated 115-byte region [ffff888100ab8200, ffff888100ab8273)
[   16.699986] 
[   16.700125] The buggy address belongs to the physical page:
[   16.700425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   16.700814] flags: 0x200000000000000(node=0|zone=2)
[   16.701977] page_type: f5(slab)
[   16.702224] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.702774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.703585] page dumped because: kasan: bad access detected
[   16.704073] 
[   16.704279] Memory state around the buggy address:
[   16.704747]  ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.705372]  ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.706089] >ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.706685]                    ^
[   16.707131]  ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.708038]  ffff888100ab8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.708765] ==================================================================