Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.128492] ==================================================================
[   32.128625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   32.128736] Write of size 1 at addr fff00000c56e8d78 by task kunit_try_catch/148
[   32.128941] 
[   32.129133] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.129551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.129614] Hardware name: linux,dummy-virt (DT)
[   32.129681] Call trace:
[   32.129730]  show_stack+0x20/0x38 (C)
[   32.129842]  dump_stack_lvl+0x8c/0xd0
[   32.129959]  print_report+0x118/0x608
[   32.130091]  kasan_report+0xdc/0x128
[   32.130203]  __asan_report_store1_noabort+0x20/0x30
[   32.130331]  kmalloc_oob_right+0x538/0x660
[   32.130640]  kunit_try_run_case+0x170/0x3f0
[   32.130792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.130945]  kthread+0x328/0x630
[   32.131090]  ret_from_fork+0x10/0x20
[   32.131276] 
[   32.131329] Allocated by task 148:
[   32.131405]  kasan_save_stack+0x3c/0x68
[   32.131512]  kasan_save_track+0x20/0x40
[   32.131727]  kasan_save_alloc_info+0x40/0x58
[   32.131959]  __kasan_kmalloc+0xd4/0xd8
[   32.132075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.132175]  kmalloc_oob_right+0xb0/0x660
[   32.133140]  kunit_try_run_case+0x170/0x3f0
[   32.133258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.133428]  kthread+0x328/0x630
[   32.133519]  ret_from_fork+0x10/0x20
[   32.133927] 
[   32.133974] The buggy address belongs to the object at fff00000c56e8d00
[   32.133974]  which belongs to the cache kmalloc-128 of size 128
[   32.134457] The buggy address is located 5 bytes to the right of
[   32.134457]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.134810] 
[   32.134861] The buggy address belongs to the physical page:
[   32.135269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.135416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.135815] page_type: f5(slab)
[   32.135912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.136046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.136451] page dumped because: kasan: bad access detected
[   32.136678] 
[   32.137112] Memory state around the buggy address:
[   32.137200]  fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.137331]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137845] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.137936]                                                                 ^
[   32.138050]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138150]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138235] ==================================================================
[   32.141746] ==================================================================
[   32.142189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   32.142530] Read of size 1 at addr fff00000c56e8d80 by task kunit_try_catch/148
[   32.142834] 
[   32.142922] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.143850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.144262] Hardware name: linux,dummy-virt (DT)
[   32.144361] Call trace:
[   32.144417]  show_stack+0x20/0x38 (C)
[   32.144812]  dump_stack_lvl+0x8c/0xd0
[   32.144928]  print_report+0x118/0x608
[   32.145066]  kasan_report+0xdc/0x128
[   32.145200]  __asan_report_load1_noabort+0x20/0x30
[   32.145323]  kmalloc_oob_right+0x5d0/0x660
[   32.145939]  kunit_try_run_case+0x170/0x3f0
[   32.146170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.146711]  kthread+0x328/0x630
[   32.147093]  ret_from_fork+0x10/0x20
[   32.147229] 
[   32.147274] Allocated by task 148:
[   32.147576]  kasan_save_stack+0x3c/0x68
[   32.147706]  kasan_save_track+0x20/0x40
[   32.147806]  kasan_save_alloc_info+0x40/0x58
[   32.148528]  __kasan_kmalloc+0xd4/0xd8
[   32.148839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.148969]  kmalloc_oob_right+0xb0/0x660
[   32.149409]  kunit_try_run_case+0x170/0x3f0
[   32.149507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.150053]  kthread+0x328/0x630
[   32.150174]  ret_from_fork+0x10/0x20
[   32.150499] 
[   32.150545] The buggy address belongs to the object at fff00000c56e8d00
[   32.150545]  which belongs to the cache kmalloc-128 of size 128
[   32.151449] The buggy address is located 13 bytes to the right of
[   32.151449]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.151645] 
[   32.151947] The buggy address belongs to the physical page:
[   32.152163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.152313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.152679] page_type: f5(slab)
[   32.152864] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.153045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.153298] page dumped because: kasan: bad access detected
[   32.153561] 
[   32.153801] Memory state around the buggy address:
[   32.154019]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154298]  fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.154396] >fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154480]                    ^
[   32.154549]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154661]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.154768] ==================================================================
[   32.116990] ==================================================================
[   32.117378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   32.118346] Write of size 1 at addr fff00000c56e8d73 by task kunit_try_catch/148
[   32.118478] 
[   32.119665] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   32.119843] Tainted: [N]=TEST
[   32.119888] Hardware name: linux,dummy-virt (DT)
[   32.120191] Call trace:
[   32.120401]  show_stack+0x20/0x38 (C)
[   32.120569]  dump_stack_lvl+0x8c/0xd0
[   32.120640]  print_report+0x118/0x608
[   32.120700]  kasan_report+0xdc/0x128
[   32.120754]  __asan_report_store1_noabort+0x20/0x30
[   32.120811]  kmalloc_oob_right+0x5a4/0x660
[   32.120866]  kunit_try_run_case+0x170/0x3f0
[   32.120926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120990]  kthread+0x328/0x630
[   32.121061]  ret_from_fork+0x10/0x20
[   32.121247] 
[   32.121296] Allocated by task 148:
[   32.121438]  kasan_save_stack+0x3c/0x68
[   32.121525]  kasan_save_track+0x20/0x40
[   32.121576]  kasan_save_alloc_info+0x40/0x58
[   32.121622]  __kasan_kmalloc+0xd4/0xd8
[   32.121666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.121715]  kmalloc_oob_right+0xb0/0x660
[   32.121759]  kunit_try_run_case+0x170/0x3f0
[   32.121803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.121854]  kthread+0x328/0x630
[   32.121894]  ret_from_fork+0x10/0x20
[   32.121961] 
[   32.122052] The buggy address belongs to the object at fff00000c56e8d00
[   32.122052]  which belongs to the cache kmalloc-128 of size 128
[   32.122168] The buggy address is located 0 bytes to the right of
[   32.122168]  allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73)
[   32.122252] 
[   32.122345] The buggy address belongs to the physical page:
[   32.122554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   32.122880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.123245] page_type: f5(slab)
[   32.123577] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.123652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.123789] page dumped because: kasan: bad access detected
[   32.123843] 
[   32.123877] Memory state around the buggy address:
[   32.124151]  fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.124242]  fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124312] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.124379]                                                              ^
[   32.124486]  fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124539]  fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124614] ==================================================================

[   20.990820] ==================================================================
[   20.991559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   20.992257] Read of size 1 at addr ffff888102b4eb80 by task kunit_try_catch/165
[   20.993166] 
[   20.993320] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   20.993367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.993395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.993427] Call Trace:
[   20.993450]  <TASK>
[   20.993475]  dump_stack_lvl+0x73/0xb0
[   20.993523]  print_report+0xd1/0x650
[   20.993707]  ? __virt_addr_valid+0x1db/0x2d0
[   20.993729]  ? kmalloc_oob_right+0x68a/0x7f0
[   20.993747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.993767]  ? kmalloc_oob_right+0x68a/0x7f0
[   20.993785]  kasan_report+0x141/0x180
[   20.993802]  ? kmalloc_oob_right+0x68a/0x7f0
[   20.993823]  __asan_report_load1_noabort+0x18/0x20
[   20.993852]  kmalloc_oob_right+0x68a/0x7f0
[   20.993872]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   20.993890]  ? __schedule+0x10cc/0x2b60
[   20.993908]  ? __pfx_read_tsc+0x10/0x10
[   20.993925]  ? ktime_get_ts64+0x86/0x230
[   20.993945]  kunit_try_run_case+0x1a5/0x480
[   20.993965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.993983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.994002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.994035]  ? __kthread_parkme+0x82/0x180
[   20.994056]  ? preempt_count_sub+0x50/0x80
[   20.994078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.994099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.994119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.994140]  kthread+0x337/0x6f0
[   20.994158]  ? trace_preempt_on+0x20/0xc0
[   20.994178]  ? __pfx_kthread+0x10/0x10
[   20.994197]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.994215]  ? calculate_sigpending+0x7b/0xa0
[   20.994236]  ? __pfx_kthread+0x10/0x10
[   20.994255]  ret_from_fork+0x116/0x1d0
[   20.994271]  ? __pfx_kthread+0x10/0x10
[   20.994289]  ret_from_fork_asm+0x1a/0x30
[   20.994318]  </TASK>
[   20.994330] 
[   21.004560] Allocated by task 165:
[   21.004704]  kasan_save_stack+0x45/0x70
[   21.004846]  kasan_save_track+0x18/0x40
[   21.004967]  kasan_save_alloc_info+0x3b/0x50
[   21.005121]  __kasan_kmalloc+0xb7/0xc0
[   21.005260]  __kmalloc_cache_noprof+0x189/0x420
[   21.005554]  kmalloc_oob_right+0xa9/0x7f0
[   21.005944]  kunit_try_run_case+0x1a5/0x480
[   21.006290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.006731]  kthread+0x337/0x6f0
[   21.007051]  ret_from_fork+0x116/0x1d0
[   21.007319]  ret_from_fork_asm+0x1a/0x30
[   21.007663] 
[   21.007911] The buggy address belongs to the object at ffff888102b4eb00
[   21.007911]  which belongs to the cache kmalloc-128 of size 128
[   21.008482] The buggy address is located 13 bytes to the right of
[   21.008482]  allocated 115-byte region [ffff888102b4eb00, ffff888102b4eb73)
[   21.009155] 
[   21.009305] The buggy address belongs to the physical page:
[   21.009703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   21.010170] flags: 0x200000000000000(node=0|zone=2)
[   21.010569] page_type: f5(slab)
[   21.010723] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.011332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.011735] page dumped because: kasan: bad access detected
[   21.012100] 
[   21.012257] Memory state around the buggy address:
[   21.012582]  ffff888102b4ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.013013]  ffff888102b4eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.013431] >ffff888102b4eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.013822]                    ^
[   21.014101]  ffff888102b4ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.014448]  ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.014993] ==================================================================
[   20.928472] ==================================================================
[   20.929231] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   20.930390] Write of size 1 at addr ffff888102b4eb73 by task kunit_try_catch/165
[   20.930859] 
[   20.932754] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   20.933193] Tainted: [N]=TEST
[   20.933247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.933561] Call Trace:
[   20.933640]  <TASK>
[   20.933795]  dump_stack_lvl+0x73/0xb0
[   20.933900]  print_report+0xd1/0x650
[   20.933928]  ? __virt_addr_valid+0x1db/0x2d0
[   20.933951]  ? kmalloc_oob_right+0x6f0/0x7f0
[   20.933969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.933990]  ? kmalloc_oob_right+0x6f0/0x7f0
[   20.934009]  kasan_report+0x141/0x180
[   20.934042]  ? kmalloc_oob_right+0x6f0/0x7f0
[   20.934068]  __asan_report_store1_noabort+0x1b/0x30
[   20.934104]  kmalloc_oob_right+0x6f0/0x7f0
[   20.934136]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   20.934165]  ? __schedule+0x10cc/0x2b60
[   20.934194]  ? __pfx_read_tsc+0x10/0x10
[   20.934227]  ? ktime_get_ts64+0x86/0x230
[   20.934255]  kunit_try_run_case+0x1a5/0x480
[   20.934280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.934300]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.934320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.934341]  ? __kthread_parkme+0x82/0x180
[   20.934361]  ? preempt_count_sub+0x50/0x80
[   20.934399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.934423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.934445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.934465]  kthread+0x337/0x6f0
[   20.934483]  ? trace_preempt_on+0x20/0xc0
[   20.934506]  ? __pfx_kthread+0x10/0x10
[   20.934524]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.934543]  ? calculate_sigpending+0x7b/0xa0
[   20.934565]  ? __pfx_kthread+0x10/0x10
[   20.934584]  ret_from_fork+0x116/0x1d0
[   20.934601]  ? __pfx_kthread+0x10/0x10
[   20.934620]  ret_from_fork_asm+0x1a/0x30
[   20.934678]  </TASK>
[   20.934754] 
[   20.946584] Allocated by task 165:
[   20.947085]  kasan_save_stack+0x45/0x70
[   20.947962]  kasan_save_track+0x18/0x40
[   20.948351]  kasan_save_alloc_info+0x3b/0x50
[   20.948546]  __kasan_kmalloc+0xb7/0xc0
[   20.948951]  __kmalloc_cache_noprof+0x189/0x420
[   20.949264]  kmalloc_oob_right+0xa9/0x7f0
[   20.949577]  kunit_try_run_case+0x1a5/0x480
[   20.949757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.950534]  kthread+0x337/0x6f0
[   20.950747]  ret_from_fork+0x116/0x1d0
[   20.951089]  ret_from_fork_asm+0x1a/0x30
[   20.951731] 
[   20.952040] The buggy address belongs to the object at ffff888102b4eb00
[   20.952040]  which belongs to the cache kmalloc-128 of size 128
[   20.952596] The buggy address is located 0 bytes to the right of
[   20.952596]  allocated 115-byte region [ffff888102b4eb00, ffff888102b4eb73)
[   20.953727] 
[   20.954062] The buggy address belongs to the physical page:
[   20.954880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   20.955712] flags: 0x200000000000000(node=0|zone=2)
[   20.956700] page_type: f5(slab)
[   20.957291] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.957581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.958170] page dumped because: kasan: bad access detected
[   20.958427] 
[   20.958582] Memory state around the buggy address:
[   20.959916]  ffff888102b4ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.960255]  ffff888102b4ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.960444] >ffff888102b4eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.960996]                                                              ^
[   20.961317]  ffff888102b4eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.961778]  ffff888102b4ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962263] ==================================================================
[   20.964922] ==================================================================
[   20.965739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   20.966153] Write of size 1 at addr ffff888102b4eb78 by task kunit_try_catch/165
[   20.966514] 
[   20.966640] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   20.966688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.966700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.966721] Call Trace:
[   20.966736]  <TASK>
[   20.966754]  dump_stack_lvl+0x73/0xb0
[   20.966784]  print_report+0xd1/0x650
[   20.966803]  ? __virt_addr_valid+0x1db/0x2d0
[   20.966824]  ? kmalloc_oob_right+0x6bd/0x7f0
[   20.966854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.966877]  ? kmalloc_oob_right+0x6bd/0x7f0
[   20.966896]  kasan_report+0x141/0x180
[   20.966915]  ? kmalloc_oob_right+0x6bd/0x7f0
[   20.966937]  __asan_report_store1_noabort+0x1b/0x30
[   20.966957]  kmalloc_oob_right+0x6bd/0x7f0
[   20.966974]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   20.966992]  ? __schedule+0x10cc/0x2b60
[   20.967010]  ? __pfx_read_tsc+0x10/0x10
[   20.967028]  ? ktime_get_ts64+0x86/0x230
[   20.967049]  kunit_try_run_case+0x1a5/0x480
[   20.967069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.967087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.967105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.967123]  ? __kthread_parkme+0x82/0x180
[   20.967140]  ? preempt_count_sub+0x50/0x80
[   20.967159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.967178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.967197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.967216]  kthread+0x337/0x6f0
[   20.967232]  ? trace_preempt_on+0x20/0xc0
[   20.967251]  ? __pfx_kthread+0x10/0x10
[   20.967268]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.967284]  ? calculate_sigpending+0x7b/0xa0
[   20.967304]  ? __pfx_kthread+0x10/0x10
[   20.967322]  ret_from_fork+0x116/0x1d0
[   20.967337]  ? __pfx_kthread+0x10/0x10
[   20.967353]  ret_from_fork_asm+0x1a/0x30
[   20.967393]  </TASK>
[   20.967412] 
[   20.977040] Allocated by task 165:
[   20.977400]  kasan_save_stack+0x45/0x70
[   20.977739]  kasan_save_track+0x18/0x40
[   20.978224]  kasan_save_alloc_info+0x3b/0x50
[   20.978481]  __kasan_kmalloc+0xb7/0xc0
[   20.978774]  __kmalloc_cache_noprof+0x189/0x420
[   20.978994]  kmalloc_oob_right+0xa9/0x7f0
[   20.979309]  kunit_try_run_case+0x1a5/0x480
[   20.979557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.979865]  kthread+0x337/0x6f0
[   20.980144]  ret_from_fork+0x116/0x1d0
[   20.980446]  ret_from_fork_asm+0x1a/0x30
[   20.980680] 
[   20.980822] The buggy address belongs to the object at ffff888102b4eb00
[   20.980822]  which belongs to the cache kmalloc-128 of size 128
[   20.981417] The buggy address is located 5 bytes to the right of
[   20.981417]  allocated 115-byte region [ffff888102b4eb00, ffff888102b4eb73)
[   20.982409] 
[   20.982503] The buggy address belongs to the physical page:
[   20.982867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   20.983598] flags: 0x200000000000000(node=0|zone=2)
[   20.983802] page_type: f5(slab)
[   20.984331] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.984790] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.985453] page dumped because: kasan: bad access detected
[   20.985678] 
[   20.985764] Memory state around the buggy address:
[   20.986866]  ffff888102b4ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.987226]  ffff888102b4ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.987634] >ffff888102b4eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.988095]                                                                 ^
[   20.988357]  ffff888102b4eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.988792]  ffff888102b4ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989469] ==================================================================