Hay
Date
June 19, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.673672] ==================================================================
[   29.674739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.677241] Write of size 1 at addr fff00000c6466573 by task kunit_try_catch/147
[   29.677570] 
[   29.679788] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.680227] Tainted: [N]=TEST
[   29.680308] Hardware name: linux,dummy-virt (DT)
[   29.680924] Call trace:
[   29.681358]  show_stack+0x20/0x38 (C)
[   29.681816]  dump_stack_lvl+0x8c/0xd0
[   29.681987]  print_report+0x118/0x608
[   29.682100]  kasan_report+0xdc/0x128
[   29.682240]  __asan_report_store1_noabort+0x20/0x30
[   29.682366]  kmalloc_oob_right+0x5a4/0x660
[   29.682475]  kunit_try_run_case+0x170/0x3f0
[   29.682589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.682721]  kthread+0x328/0x630
[   29.682840]  ret_from_fork+0x10/0x20
[   29.683406] 
[   29.683517] Allocated by task 147:
[   29.683739]  kasan_save_stack+0x3c/0x68
[   29.683906]  kasan_save_track+0x20/0x40
[   29.684032]  kasan_save_alloc_info+0x40/0x58
[   29.684126]  __kasan_kmalloc+0xd4/0xd8
[   29.684355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.684468]  kmalloc_oob_right+0xb0/0x660
[   29.684588]  kunit_try_run_case+0x170/0x3f0
[   29.684688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.684852]  kthread+0x328/0x630
[   29.684967]  ret_from_fork+0x10/0x20
[   29.685152] 
[   29.685378] The buggy address belongs to the object at fff00000c6466500
[   29.685378]  which belongs to the cache kmalloc-128 of size 128
[   29.685669] The buggy address is located 0 bytes to the right of
[   29.685669]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.685856] 
[   29.686055] The buggy address belongs to the physical page:
[   29.686447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.688272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.689466] page_type: f5(slab)
[   29.692063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.692953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.693338] page dumped because: kasan: bad access detected
[   29.693774] 
[   29.694757] Memory state around the buggy address:
[   29.696254]  fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.696475]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.696665] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.696798]                                                              ^
[   29.697010]  fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.697117]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.697272] ==================================================================
[   29.712160] ==================================================================
[   29.712288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.712407] Read of size 1 at addr fff00000c6466580 by task kunit_try_catch/147
[   29.712529] 
[   29.712614] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.712827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712906] Hardware name: linux,dummy-virt (DT)
[   29.712986] Call trace:
[   29.713778]  show_stack+0x20/0x38 (C)
[   29.713927]  dump_stack_lvl+0x8c/0xd0
[   29.714072]  print_report+0x118/0x608
[   29.714214]  kasan_report+0xdc/0x128
[   29.714356]  __asan_report_load1_noabort+0x20/0x30
[   29.714487]  kmalloc_oob_right+0x5d0/0x660
[   29.714618]  kunit_try_run_case+0x170/0x3f0
[   29.714749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.714980]  kthread+0x328/0x630
[   29.715224]  ret_from_fork+0x10/0x20
[   29.715531] 
[   29.715689] Allocated by task 147:
[   29.716074]  kasan_save_stack+0x3c/0x68
[   29.716428]  kasan_save_track+0x20/0x40
[   29.716577]  kasan_save_alloc_info+0x40/0x58
[   29.716796]  __kasan_kmalloc+0xd4/0xd8
[   29.716950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.717477]  kmalloc_oob_right+0xb0/0x660
[   29.717570]  kunit_try_run_case+0x170/0x3f0
[   29.717650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717743]  kthread+0x328/0x630
[   29.717822]  ret_from_fork+0x10/0x20
[   29.717943] 
[   29.718009] The buggy address belongs to the object at fff00000c6466500
[   29.718009]  which belongs to the cache kmalloc-128 of size 128
[   29.718165] The buggy address is located 13 bytes to the right of
[   29.718165]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.718309] 
[   29.718351] The buggy address belongs to the physical page:
[   29.718445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.718617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.718796] page_type: f5(slab)
[   29.718953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.719137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.719273] page dumped because: kasan: bad access detected
[   29.719360] 
[   29.719425] Memory state around the buggy address:
[   29.719533]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.719689]  fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.719804] >fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.719918]                    ^
[   29.719980]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720082]  fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720744] ==================================================================
[   29.700568] ==================================================================
[   29.700884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.701060] Write of size 1 at addr fff00000c6466578 by task kunit_try_catch/147
[   29.701210] 
[   29.701326] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   29.701889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.701957] Hardware name: linux,dummy-virt (DT)
[   29.702032] Call trace:
[   29.702088]  show_stack+0x20/0x38 (C)
[   29.702205]  dump_stack_lvl+0x8c/0xd0
[   29.702314]  print_report+0x118/0x608
[   29.702424]  kasan_report+0xdc/0x128
[   29.702540]  __asan_report_store1_noabort+0x20/0x30
[   29.702664]  kmalloc_oob_right+0x538/0x660
[   29.702851]  kunit_try_run_case+0x170/0x3f0
[   29.703037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.703175]  kthread+0x328/0x630
[   29.703290]  ret_from_fork+0x10/0x20
[   29.703415] 
[   29.703460] Allocated by task 147:
[   29.703530]  kasan_save_stack+0x3c/0x68
[   29.703631]  kasan_save_track+0x20/0x40
[   29.703728]  kasan_save_alloc_info+0x40/0x58
[   29.703827]  __kasan_kmalloc+0xd4/0xd8
[   29.705553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.705761]  kmalloc_oob_right+0xb0/0x660
[   29.706013]  kunit_try_run_case+0x170/0x3f0
[   29.706452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.706725]  kthread+0x328/0x630
[   29.706923]  ret_from_fork+0x10/0x20
[   29.707152] 
[   29.707211] The buggy address belongs to the object at fff00000c6466500
[   29.707211]  which belongs to the cache kmalloc-128 of size 128
[   29.707783] The buggy address is located 5 bytes to the right of
[   29.707783]  allocated 115-byte region [fff00000c6466500, fff00000c6466573)
[   29.708373] 
[   29.708460] The buggy address belongs to the physical page:
[   29.708689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466
[   29.708883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709003] page_type: f5(slab)
[   29.709107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.709244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.709721] page dumped because: kasan: bad access detected
[   29.709798] 
[   29.709840] Memory state around the buggy address:
[   29.709920]  fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710020]  fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710142] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.710238]                                                                 ^
[   29.710330]  fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710420]  fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710503] ==================================================================

[   25.768736] ==================================================================
[   25.769910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   25.770907] Write of size 1 at addr ffff888102b36e73 by task kunit_try_catch/165
[   25.771658] 
[   25.773558] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   25.774061] Tainted: [N]=TEST
[   25.774129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.774440] Call Trace:
[   25.774530]  <TASK>
[   25.774712]  dump_stack_lvl+0x73/0xb0
[   25.774836]  print_report+0xd1/0x650
[   25.774871]  ? __virt_addr_valid+0x1db/0x2d0
[   25.774901]  ? kmalloc_oob_right+0x6f0/0x7f0
[   25.774958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.775002]  ? kmalloc_oob_right+0x6f0/0x7f0
[   25.775039]  kasan_report+0x141/0x180
[   25.775079]  ? kmalloc_oob_right+0x6f0/0x7f0
[   25.775130]  __asan_report_store1_noabort+0x1b/0x30
[   25.775158]  kmalloc_oob_right+0x6f0/0x7f0
[   25.775181]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   25.775205]  ? __schedule+0x10cc/0x2b60
[   25.775229]  ? __pfx_read_tsc+0x10/0x10
[   25.775254]  ? ktime_get_ts64+0x86/0x230
[   25.775282]  kunit_try_run_case+0x1a5/0x480
[   25.775310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.775333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.775357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.775381]  ? __kthread_parkme+0x82/0x180
[   25.775404]  ? preempt_count_sub+0x50/0x80
[   25.775430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.775454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.775478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.775501]  kthread+0x337/0x6f0
[   25.775522]  ? trace_preempt_on+0x20/0xc0
[   25.775547]  ? __pfx_kthread+0x10/0x10
[   25.775569]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.775591]  ? calculate_sigpending+0x7b/0xa0
[   25.775617]  ? __pfx_kthread+0x10/0x10
[   25.775639]  ret_from_fork+0x116/0x1d0
[   25.775660]  ? __pfx_kthread+0x10/0x10
[   25.775681]  ret_from_fork_asm+0x1a/0x30
[   25.775746]  </TASK>
[   25.775829] 
[   25.787467] Allocated by task 165:
[   25.788335]  kasan_save_stack+0x45/0x70
[   25.788682]  kasan_save_track+0x18/0x40
[   25.788882]  kasan_save_alloc_info+0x3b/0x50
[   25.789270]  __kasan_kmalloc+0xb7/0xc0
[   25.789595]  __kmalloc_cache_noprof+0x189/0x420
[   25.789990]  kmalloc_oob_right+0xa9/0x7f0
[   25.790353]  kunit_try_run_case+0x1a5/0x480
[   25.790727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.791033]  kthread+0x337/0x6f0
[   25.791647]  ret_from_fork+0x116/0x1d0
[   25.792218]  ret_from_fork_asm+0x1a/0x30
[   25.792713] 
[   25.793156] The buggy address belongs to the object at ffff888102b36e00
[   25.793156]  which belongs to the cache kmalloc-128 of size 128
[   25.794236] The buggy address is located 0 bytes to the right of
[   25.794236]  allocated 115-byte region [ffff888102b36e00, ffff888102b36e73)
[   25.795013] 
[   25.795635] The buggy address belongs to the physical page:
[   25.797316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36
[   25.798306] flags: 0x200000000000000(node=0|zone=2)
[   25.798927] page_type: f5(slab)
[   25.799876] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.800795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.801528] page dumped because: kasan: bad access detected
[   25.801829] 
[   25.802172] Memory state around the buggy address:
[   25.802953]  ffff888102b36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.803565]  ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.804151] >ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.804658]                                                              ^
[   25.805565]  ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.806040]  ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.806632] ==================================================================
[   25.809881] ==================================================================
[   25.810418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   25.811027] Write of size 1 at addr ffff888102b36e78 by task kunit_try_catch/165
[   25.811600] 
[   25.811763] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   25.811868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.811891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.811931] Call Trace:
[   25.811970]  <TASK>
[   25.812006]  dump_stack_lvl+0x73/0xb0
[   25.812063]  print_report+0xd1/0x650
[   25.812118]  ? __virt_addr_valid+0x1db/0x2d0
[   25.812156]  ? kmalloc_oob_right+0x6bd/0x7f0
[   25.812186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.812223]  ? kmalloc_oob_right+0x6bd/0x7f0
[   25.812257]  kasan_report+0x141/0x180
[   25.812289]  ? kmalloc_oob_right+0x6bd/0x7f0
[   25.812327]  __asan_report_store1_noabort+0x1b/0x30
[   25.812361]  kmalloc_oob_right+0x6bd/0x7f0
[   25.812392]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   25.812426]  ? __schedule+0x10cc/0x2b60
[   25.812458]  ? __pfx_read_tsc+0x10/0x10
[   25.812491]  ? ktime_get_ts64+0x86/0x230
[   25.812529]  kunit_try_run_case+0x1a5/0x480
[   25.812567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.812599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.812634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.812671]  ? __kthread_parkme+0x82/0x180
[   25.813276]  ? preempt_count_sub+0x50/0x80
[   25.813316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.813343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.813370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.813394]  kthread+0x337/0x6f0
[   25.813414]  ? trace_preempt_on+0x20/0xc0
[   25.813439]  ? __pfx_kthread+0x10/0x10
[   25.813460]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.813484]  ? calculate_sigpending+0x7b/0xa0
[   25.813509]  ? __pfx_kthread+0x10/0x10
[   25.813531]  ret_from_fork+0x116/0x1d0
[   25.813552]  ? __pfx_kthread+0x10/0x10
[   25.813573]  ret_from_fork_asm+0x1a/0x30
[   25.813606]  </TASK>
[   25.813621] 
[   25.825003] Allocated by task 165:
[   25.825252]  kasan_save_stack+0x45/0x70
[   25.825575]  kasan_save_track+0x18/0x40
[   25.825830]  kasan_save_alloc_info+0x3b/0x50
[   25.826242]  __kasan_kmalloc+0xb7/0xc0
[   25.826458]  __kmalloc_cache_noprof+0x189/0x420
[   25.826871]  kmalloc_oob_right+0xa9/0x7f0
[   25.827241]  kunit_try_run_case+0x1a5/0x480
[   25.827449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.827669]  kthread+0x337/0x6f0
[   25.827831]  ret_from_fork+0x116/0x1d0
[   25.827997]  ret_from_fork_asm+0x1a/0x30
[   25.828303] 
[   25.828501] The buggy address belongs to the object at ffff888102b36e00
[   25.828501]  which belongs to the cache kmalloc-128 of size 128
[   25.829595] The buggy address is located 5 bytes to the right of
[   25.829595]  allocated 115-byte region [ffff888102b36e00, ffff888102b36e73)
[   25.831342] 
[   25.831829] The buggy address belongs to the physical page:
[   25.832652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36
[   25.833229] flags: 0x200000000000000(node=0|zone=2)
[   25.833701] page_type: f5(slab)
[   25.833892] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.834165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.834522] page dumped because: kasan: bad access detected
[   25.834796] 
[   25.834898] Memory state around the buggy address:
[   25.835072]  ffff888102b36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.836398]  ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.836705] >ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.837263]                                                                 ^
[   25.837583]  ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.838058]  ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.838657] ==================================================================
[   25.839831] ==================================================================
[   25.840779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   25.841246] Read of size 1 at addr ffff888102b36e80 by task kunit_try_catch/165
[   25.841855] 
[   25.842430] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   25.842558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.842575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.842602] Call Trace:
[   25.842641]  <TASK>
[   25.842675]  dump_stack_lvl+0x73/0xb0
[   25.842719]  print_report+0xd1/0x650
[   25.842745]  ? __virt_addr_valid+0x1db/0x2d0
[   25.842770]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.842792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.842819]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.842841]  kasan_report+0x141/0x180
[   25.842864]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.842890]  __asan_report_load1_noabort+0x18/0x20
[   25.842926]  kmalloc_oob_right+0x68a/0x7f0
[   25.842955]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   25.842978]  ? __schedule+0x10cc/0x2b60
[   25.843002]  ? __pfx_read_tsc+0x10/0x10
[   25.843024]  ? ktime_get_ts64+0x86/0x230
[   25.843050]  kunit_try_run_case+0x1a5/0x480
[   25.843076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.843099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.843268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.843294]  ? __kthread_parkme+0x82/0x180
[   25.843317]  ? preempt_count_sub+0x50/0x80
[   25.843343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.843367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.843391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.843415]  kthread+0x337/0x6f0
[   25.843436]  ? trace_preempt_on+0x20/0xc0
[   25.843460]  ? __pfx_kthread+0x10/0x10
[   25.843482]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.843504]  ? calculate_sigpending+0x7b/0xa0
[   25.843529]  ? __pfx_kthread+0x10/0x10
[   25.843551]  ret_from_fork+0x116/0x1d0
[   25.843572]  ? __pfx_kthread+0x10/0x10
[   25.843594]  ret_from_fork_asm+0x1a/0x30
[   25.843626]  </TASK>
[   25.843640] 
[   25.853436] Allocated by task 165:
[   25.853787]  kasan_save_stack+0x45/0x70
[   25.854195]  kasan_save_track+0x18/0x40
[   25.854547]  kasan_save_alloc_info+0x3b/0x50
[   25.854754]  __kasan_kmalloc+0xb7/0xc0
[   25.855111]  __kmalloc_cache_noprof+0x189/0x420
[   25.855455]  kmalloc_oob_right+0xa9/0x7f0
[   25.855656]  kunit_try_run_case+0x1a5/0x480
[   25.856046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.856467]  kthread+0x337/0x6f0
[   25.856764]  ret_from_fork+0x116/0x1d0
[   25.857004]  ret_from_fork_asm+0x1a/0x30
[   25.857374] 
[   25.857490] The buggy address belongs to the object at ffff888102b36e00
[   25.857490]  which belongs to the cache kmalloc-128 of size 128
[   25.858169] The buggy address is located 13 bytes to the right of
[   25.858169]  allocated 115-byte region [ffff888102b36e00, ffff888102b36e73)
[   25.858635] 
[   25.858744] The buggy address belongs to the physical page:
[   25.858966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36
[   25.859635] flags: 0x200000000000000(node=0|zone=2)
[   25.860126] page_type: f5(slab)
[   25.860447] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.861107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.861707] page dumped because: kasan: bad access detected
[   25.862123] 
[   25.862235] Memory state around the buggy address:
[   25.862566]  ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.863039]  ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.863325] >ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.863594]                    ^
[   25.863756]  ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.864063]  ffff888102b36f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.864642] ==================================================================