Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.270186] ==================================================================
[   29.270226] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.270274] Write of size 1 at addr fff00000c5a97778 by task kunit_try_catch/169
[   29.270323] 
[   29.270356] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.270437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.270463] Hardware name: linux,dummy-virt (DT)
[   29.270494] Call trace:
[   29.270516]  show_stack+0x20/0x38 (C)
[   29.270564]  dump_stack_lvl+0x8c/0xd0
[   29.270609]  print_report+0x118/0x608
[   29.270656]  kasan_report+0xdc/0x128
[   29.270702]  __asan_report_store1_noabort+0x20/0x30
[   29.270750]  kmalloc_oob_right+0x538/0x660
[   29.270796]  kunit_try_run_case+0x170/0x3f0
[   29.270844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270910]  kthread+0x328/0x630
[   29.270953]  ret_from_fork+0x10/0x20
[   29.271000] 
[   29.271098] Allocated by task 169:
[   29.271131]  kasan_save_stack+0x3c/0x68
[   29.271278]  kasan_save_track+0x20/0x40
[   29.271318]  kasan_save_alloc_info+0x40/0x58
[   29.271355]  __kasan_kmalloc+0xd4/0xd8
[   29.271392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.271430]  kmalloc_oob_right+0xb0/0x660
[   29.271466]  kunit_try_run_case+0x170/0x3f0
[   29.271631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.271701]  kthread+0x328/0x630
[   29.271849]  ret_from_fork+0x10/0x20
[   29.271926] 
[   29.271962] The buggy address belongs to the object at fff00000c5a97700
[   29.271962]  which belongs to the cache kmalloc-128 of size 128
[   29.272029] The buggy address is located 5 bytes to the right of
[   29.272029]  allocated 115-byte region [fff00000c5a97700, fff00000c5a97773)
[   29.272091] 
[   29.272111] The buggy address belongs to the physical page:
[   29.272269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97
[   29.272320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.272401] page_type: f5(slab)
[   29.272441] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.272502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.272541] page dumped because: kasan: bad access detected
[   29.272571] 
[   29.272588] Memory state around the buggy address:
[   29.272635]  fff00000c5a97600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.272837]  fff00000c5a97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.272880] >fff00000c5a97700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.272926]                                                                 ^
[   29.272964]  fff00000c5a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.273004]  fff00000c5a97800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.273040] ==================================================================
[   29.255953] ==================================================================
[   29.256339] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.258152] Write of size 1 at addr fff00000c5a97773 by task kunit_try_catch/169
[   29.258332] 
[   29.259780] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.260193] Tainted: [N]=TEST
[   29.260332] Hardware name: linux,dummy-virt (DT)
[   29.260679] Call trace:
[   29.261149]  show_stack+0x20/0x38 (C)
[   29.261292]  dump_stack_lvl+0x8c/0xd0
[   29.261346]  print_report+0x118/0x608
[   29.261394]  kasan_report+0xdc/0x128
[   29.261441]  __asan_report_store1_noabort+0x20/0x30
[   29.261828]  kmalloc_oob_right+0x5a4/0x660
[   29.261876]  kunit_try_run_case+0x170/0x3f0
[   29.261963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.262074]  kthread+0x328/0x630
[   29.262365]  ret_from_fork+0x10/0x20
[   29.262645] 
[   29.262688] Allocated by task 169:
[   29.262876]  kasan_save_stack+0x3c/0x68
[   29.262976]  kasan_save_track+0x20/0x40
[   29.263017]  kasan_save_alloc_info+0x40/0x58
[   29.263109]  __kasan_kmalloc+0xd4/0xd8
[   29.263193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.263237]  kmalloc_oob_right+0xb0/0x660
[   29.263283]  kunit_try_run_case+0x170/0x3f0
[   29.263364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263655]  kthread+0x328/0x630
[   29.263702]  ret_from_fork+0x10/0x20
[   29.263848] 
[   29.264017] The buggy address belongs to the object at fff00000c5a97700
[   29.264017]  which belongs to the cache kmalloc-128 of size 128
[   29.264154] The buggy address is located 0 bytes to the right of
[   29.264154]  allocated 115-byte region [fff00000c5a97700, fff00000c5a97773)
[   29.264410] 
[   29.264703] The buggy address belongs to the physical page:
[   29.265149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97
[   29.265450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.266046] page_type: f5(slab)
[   29.266797] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.266956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.267310] page dumped because: kasan: bad access detected
[   29.267361] 
[   29.267439] Memory state around the buggy address:
[   29.267780]  fff00000c5a97600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.267864]  fff00000c5a97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.268159] >fff00000c5a97700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.268285]                                                              ^
[   29.268738]  fff00000c5a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.268851]  fff00000c5a97800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.268946] ==================================================================
[   29.273182] ==================================================================
[   29.273222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.273382] Read of size 1 at addr fff00000c5a97780 by task kunit_try_catch/169
[   29.273480] 
[   29.273621] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   29.273803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.273829] Hardware name: linux,dummy-virt (DT)
[   29.273858] Call trace:
[   29.273879]  show_stack+0x20/0x38 (C)
[   29.274009]  dump_stack_lvl+0x8c/0xd0
[   29.274077]  print_report+0x118/0x608
[   29.274123]  kasan_report+0xdc/0x128
[   29.274215]  __asan_report_load1_noabort+0x20/0x30
[   29.274277]  kmalloc_oob_right+0x5d0/0x660
[   29.274325]  kunit_try_run_case+0x170/0x3f0
[   29.274371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.274443]  kthread+0x328/0x630
[   29.274484]  ret_from_fork+0x10/0x20
[   29.274531] 
[   29.274548] Allocated by task 169:
[   29.274575]  kasan_save_stack+0x3c/0x68
[   29.274613]  kasan_save_track+0x20/0x40
[   29.274650]  kasan_save_alloc_info+0x40/0x58
[   29.274685]  __kasan_kmalloc+0xd4/0xd8
[   29.274721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.274759]  kmalloc_oob_right+0xb0/0x660
[   29.274794]  kunit_try_run_case+0x170/0x3f0
[   29.274831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.274875]  kthread+0x328/0x630
[   29.274915]  ret_from_fork+0x10/0x20
[   29.275070] 
[   29.275172] The buggy address belongs to the object at fff00000c5a97700
[   29.275172]  which belongs to the cache kmalloc-128 of size 128
[   29.275337] The buggy address is located 13 bytes to the right of
[   29.275337]  allocated 115-byte region [fff00000c5a97700, fff00000c5a97773)
[   29.275464] 
[   29.275483] The buggy address belongs to the physical page:
[   29.275511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97
[   29.275606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.275676] page_type: f5(slab)
[   29.275868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.276019] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.276058] page dumped because: kasan: bad access detected
[   29.276088] 
[   29.276125] Memory state around the buggy address:
[   29.276268]  fff00000c5a97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276459]  fff00000c5a97700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.276563] >fff00000c5a97780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276601]                    ^
[   29.276628]  fff00000c5a97800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276739]  fff00000c5a97880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276850] ==================================================================

[   24.136245] ==================================================================
[   24.136551] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   24.136885] Read of size 1 at addr ffff888103d62a80 by task kunit_try_catch/185
[   24.137418] 
[   24.137544] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.137598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.137613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.137637] Call Trace:
[   24.137656]  <TASK>
[   24.137675]  dump_stack_lvl+0x73/0xb0
[   24.137706]  print_report+0xd1/0x650
[   24.137732]  ? __virt_addr_valid+0x1db/0x2d0
[   24.137760]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.137783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.137813]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.137838]  kasan_report+0x141/0x180
[   24.137863]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.137892]  __asan_report_load1_noabort+0x18/0x20
[   24.137920]  kmalloc_oob_right+0x68a/0x7f0
[   24.137945]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.137971]  ? __schedule+0x10cc/0x2b60
[   24.137999]  ? __pfx_read_tsc+0x10/0x10
[   24.138024]  ? ktime_get_ts64+0x86/0x230
[   24.138053]  kunit_try_run_case+0x1a5/0x480
[   24.138083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.138110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.138138]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.138166]  ? __kthread_parkme+0x82/0x180
[   24.138190]  ? preempt_count_sub+0x50/0x80
[   24.138218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.138247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.138275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.138303]  kthread+0x337/0x6f0
[   24.138326]  ? trace_preempt_on+0x20/0xc0
[   24.138353]  ? __pfx_kthread+0x10/0x10
[   24.138409]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.138437]  ? calculate_sigpending+0x7b/0xa0
[   24.138466]  ? __pfx_kthread+0x10/0x10
[   24.138491]  ret_from_fork+0x116/0x1d0
[   24.138514]  ? __pfx_kthread+0x10/0x10
[   24.138538]  ret_from_fork_asm+0x1a/0x30
[   24.138576]  </TASK>
[   24.138590] 
[   24.150154] Allocated by task 185:
[   24.150469]  kasan_save_stack+0x45/0x70
[   24.150662]  kasan_save_track+0x18/0x40
[   24.151089]  kasan_save_alloc_info+0x3b/0x50
[   24.151385]  __kasan_kmalloc+0xb7/0xc0
[   24.151537]  __kmalloc_cache_noprof+0x189/0x420
[   24.151699]  kmalloc_oob_right+0xa9/0x7f0
[   24.151844]  kunit_try_run_case+0x1a5/0x480
[   24.152284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.152807]  kthread+0x337/0x6f0
[   24.153153]  ret_from_fork+0x116/0x1d0
[   24.153522]  ret_from_fork_asm+0x1a/0x30
[   24.153918] 
[   24.154112] The buggy address belongs to the object at ffff888103d62a00
[   24.154112]  which belongs to the cache kmalloc-128 of size 128
[   24.155083] The buggy address is located 13 bytes to the right of
[   24.155083]  allocated 115-byte region [ffff888103d62a00, ffff888103d62a73)
[   24.155481] 
[   24.155555] The buggy address belongs to the physical page:
[   24.155733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62
[   24.156260] flags: 0x200000000000000(node=0|zone=2)
[   24.156738] page_type: f5(slab)
[   24.157078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.157749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.158435] page dumped because: kasan: bad access detected
[   24.158959] 
[   24.159140] Memory state around the buggy address:
[   24.159595]  ffff888103d62980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.160248]  ffff888103d62a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.160708] >ffff888103d62a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.161080]                    ^
[   24.161398]  ffff888103d62b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.162037]  ffff888103d62b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.162502] ==================================================================
[   24.117188] ==================================================================
[   24.117461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   24.117845] Write of size 1 at addr ffff888103d62a78 by task kunit_try_catch/185
[   24.118213] 
[   24.118326] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.118382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.118408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.118432] Call Trace:
[   24.118453]  <TASK>
[   24.118473]  dump_stack_lvl+0x73/0xb0
[   24.118505]  print_report+0xd1/0x650
[   24.118533]  ? __virt_addr_valid+0x1db/0x2d0
[   24.118560]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.118584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.118612]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.118636]  kasan_report+0x141/0x180
[   24.118661]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.118690]  __asan_report_store1_noabort+0x1b/0x30
[   24.118717]  kmalloc_oob_right+0x6bd/0x7f0
[   24.118741]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.118766]  ? __schedule+0x10cc/0x2b60
[   24.118793]  ? __pfx_read_tsc+0x10/0x10
[   24.118818]  ? ktime_get_ts64+0x86/0x230
[   24.118846]  kunit_try_run_case+0x1a5/0x480
[   24.118874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.118912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.118938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.118966]  ? __kthread_parkme+0x82/0x180
[   24.118989]  ? preempt_count_sub+0x50/0x80
[   24.119016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.119044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.119071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.119099]  kthread+0x337/0x6f0
[   24.119121]  ? trace_preempt_on+0x20/0xc0
[   24.119148]  ? __pfx_kthread+0x10/0x10
[   24.119171]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.119196]  ? calculate_sigpending+0x7b/0xa0
[   24.119223]  ? __pfx_kthread+0x10/0x10
[   24.119247]  ret_from_fork+0x116/0x1d0
[   24.119269]  ? __pfx_kthread+0x10/0x10
[   24.119293]  ret_from_fork_asm+0x1a/0x30
[   24.119329]  </TASK>
[   24.119342] 
[   24.126842] Allocated by task 185:
[   24.126983]  kasan_save_stack+0x45/0x70
[   24.127136]  kasan_save_track+0x18/0x40
[   24.127335]  kasan_save_alloc_info+0x3b/0x50
[   24.127575]  __kasan_kmalloc+0xb7/0xc0
[   24.127783]  __kmalloc_cache_noprof+0x189/0x420
[   24.128239]  kmalloc_oob_right+0xa9/0x7f0
[   24.128460]  kunit_try_run_case+0x1a5/0x480
[   24.128663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.128980]  kthread+0x337/0x6f0
[   24.129116]  ret_from_fork+0x116/0x1d0
[   24.129262]  ret_from_fork_asm+0x1a/0x30
[   24.129427] 
[   24.129503] The buggy address belongs to the object at ffff888103d62a00
[   24.129503]  which belongs to the cache kmalloc-128 of size 128
[   24.130416] The buggy address is located 5 bytes to the right of
[   24.130416]  allocated 115-byte region [ffff888103d62a00, ffff888103d62a73)
[   24.130885] 
[   24.130961] The buggy address belongs to the physical page:
[   24.131152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62
[   24.131606] flags: 0x200000000000000(node=0|zone=2)
[   24.131866] page_type: f5(slab)
[   24.132050] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.132597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.132858] page dumped because: kasan: bad access detected
[   24.133139] 
[   24.133240] Memory state around the buggy address:
[   24.133496]  ffff888103d62900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.133836]  ffff888103d62980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.134118] >ffff888103d62a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.134357]                                                                 ^
[   24.134723]  ffff888103d62a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.135085]  ffff888103d62b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.135483] ==================================================================
[   24.089011] ==================================================================
[   24.089715] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   24.090523] Write of size 1 at addr ffff888103d62a73 by task kunit_try_catch/185
[   24.090942] 
[   24.092128] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   24.092548] Tainted: [N]=TEST
[   24.092584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.092862] Call Trace:
[   24.092944]  <TASK>
[   24.093120]  dump_stack_lvl+0x73/0xb0
[   24.093220]  print_report+0xd1/0x650
[   24.093254]  ? __virt_addr_valid+0x1db/0x2d0
[   24.093284]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.093308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.093337]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.093362]  kasan_report+0x141/0x180
[   24.093388]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.093430]  __asan_report_store1_noabort+0x1b/0x30
[   24.093458]  kmalloc_oob_right+0x6f0/0x7f0
[   24.093483]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.093508]  ? __schedule+0x10cc/0x2b60
[   24.093537]  ? __pfx_read_tsc+0x10/0x10
[   24.093563]  ? ktime_get_ts64+0x86/0x230
[   24.093593]  kunit_try_run_case+0x1a5/0x480
[   24.093625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.093651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.093678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.093706]  ? __kthread_parkme+0x82/0x180
[   24.093731]  ? preempt_count_sub+0x50/0x80
[   24.093758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.093786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.093814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.093841]  kthread+0x337/0x6f0
[   24.093864]  ? trace_preempt_on+0x20/0xc0
[   24.093893]  ? __pfx_kthread+0x10/0x10
[   24.093917]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.093942]  ? calculate_sigpending+0x7b/0xa0
[   24.093971]  ? __pfx_kthread+0x10/0x10
[   24.093995]  ret_from_fork+0x116/0x1d0
[   24.094017]  ? __pfx_kthread+0x10/0x10
[   24.094041]  ret_from_fork_asm+0x1a/0x30
[   24.094106]  </TASK>
[   24.094182] 
[   24.101991] Allocated by task 185:
[   24.102591]  kasan_save_stack+0x45/0x70
[   24.102908]  kasan_save_track+0x18/0x40
[   24.103148]  kasan_save_alloc_info+0x3b/0x50
[   24.103309]  __kasan_kmalloc+0xb7/0xc0
[   24.103470]  __kmalloc_cache_noprof+0x189/0x420
[   24.103737]  kmalloc_oob_right+0xa9/0x7f0
[   24.103974]  kunit_try_run_case+0x1a5/0x480
[   24.104488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.105505]  kthread+0x337/0x6f0
[   24.105684]  ret_from_fork+0x116/0x1d0
[   24.105913]  ret_from_fork_asm+0x1a/0x30
[   24.106236] 
[   24.106771] The buggy address belongs to the object at ffff888103d62a00
[   24.106771]  which belongs to the cache kmalloc-128 of size 128
[   24.107475] The buggy address is located 0 bytes to the right of
[   24.107475]  allocated 115-byte region [ffff888103d62a00, ffff888103d62a73)
[   24.108490] 
[   24.108826] The buggy address belongs to the physical page:
[   24.109510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62
[   24.110182] flags: 0x200000000000000(node=0|zone=2)
[   24.110879] page_type: f5(slab)
[   24.111509] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.111842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.112352] page dumped because: kasan: bad access detected
[   24.112590] 
[   24.112705] Memory state around the buggy address:
[   24.113320]  ffff888103d62900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.113698]  ffff888103d62980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.114046] >ffff888103d62a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.114533]                                                              ^
[   24.114925]  ffff888103d62a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.115288]  ffff888103d62b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.115647] ==================================================================