Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.841720] ==================================================================
[   30.841899] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.841958] Write of size 1 at addr fff00000c56dcf78 by task kunit_try_catch/167
[   30.842016] 
[   30.842051] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.842147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.842173] Hardware name: linux,dummy-virt (DT)
[   30.842256] Call trace:
[   30.842297]  show_stack+0x20/0x38 (C)
[   30.842349]  dump_stack_lvl+0x8c/0xd0
[   30.842398]  print_report+0x118/0x5d0
[   30.842683]  kasan_report+0xdc/0x128
[   30.842770]  __asan_report_store1_noabort+0x20/0x30
[   30.842839]  kmalloc_oob_right+0x538/0x660
[   30.842892]  kunit_try_run_case+0x170/0x3f0
[   30.842946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.842999]  kthread+0x328/0x630
[   30.843041]  ret_from_fork+0x10/0x20
[   30.843087] 
[   30.843114] Allocated by task 167:
[   30.843142]  kasan_save_stack+0x3c/0x68
[   30.843182]  kasan_save_track+0x20/0x40
[   30.843432]  kasan_save_alloc_info+0x40/0x58
[   30.843478]  __kasan_kmalloc+0xd4/0xd8
[   30.843514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.843553]  kmalloc_oob_right+0xb0/0x660
[   30.843589]  kunit_try_run_case+0x170/0x3f0
[   30.843628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.843670]  kthread+0x328/0x630
[   30.843702]  ret_from_fork+0x10/0x20
[   30.843736] 
[   30.843754] The buggy address belongs to the object at fff00000c56dcf00
[   30.843754]  which belongs to the cache kmalloc-128 of size 128
[   30.843809] The buggy address is located 5 bytes to the right of
[   30.843809]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.843965] 
[   30.843991] The buggy address belongs to the physical page:
[   30.844019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.844078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.844135] page_type: f5(slab)
[   30.844182] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.844242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.844281] page dumped because: kasan: bad access detected
[   30.844310] 
[   30.844327] Memory state around the buggy address:
[   30.844357]  fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.844414]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.844464] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.844500]                                                                 ^
[   30.844566]  fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.844623]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.844682] ==================================================================
[   30.827318] ==================================================================
[   30.827639] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.828732] Write of size 1 at addr fff00000c56dcf73 by task kunit_try_catch/167
[   30.828893] 
[   30.830951] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.831577] Tainted: [N]=TEST
[   30.831638] Hardware name: linux,dummy-virt (DT)
[   30.832766] Call trace:
[   30.832961]  show_stack+0x20/0x38 (C)
[   30.833433]  dump_stack_lvl+0x8c/0xd0
[   30.833548]  print_report+0x118/0x5d0
[   30.833636]  kasan_report+0xdc/0x128
[   30.833704]  __asan_report_store1_noabort+0x20/0x30
[   30.833806]  kmalloc_oob_right+0x5a4/0x660
[   30.833874]  kunit_try_run_case+0x170/0x3f0
[   30.833993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.834060]  kthread+0x328/0x630
[   30.834148]  ret_from_fork+0x10/0x20
[   30.834538] 
[   30.834650] Allocated by task 167:
[   30.835194]  kasan_save_stack+0x3c/0x68
[   30.835327]  kasan_save_track+0x20/0x40
[   30.835430]  kasan_save_alloc_info+0x40/0x58
[   30.835489]  __kasan_kmalloc+0xd4/0xd8
[   30.835551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.835646]  kmalloc_oob_right+0xb0/0x660
[   30.835706]  kunit_try_run_case+0x170/0x3f0
[   30.835786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.835844]  kthread+0x328/0x630
[   30.835905]  ret_from_fork+0x10/0x20
[   30.836018] 
[   30.836103] The buggy address belongs to the object at fff00000c56dcf00
[   30.836103]  which belongs to the cache kmalloc-128 of size 128
[   30.836200] The buggy address is located 0 bytes to the right of
[   30.836200]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.836289] 
[   30.836444] The buggy address belongs to the physical page:
[   30.836675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.837424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.837746] page_type: f5(slab)
[   30.838132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.838283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.838483] page dumped because: kasan: bad access detected
[   30.838548] 
[   30.838893] Memory state around the buggy address:
[   30.839566]  fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.839711]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.839805] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.839876]                                                              ^
[   30.839998]  fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.840317]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.840449] ==================================================================
[   30.845035] ==================================================================
[   30.845080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.845125] Read of size 1 at addr fff00000c56dcf80 by task kunit_try_catch/167
[   30.845171] 
[   30.845232] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   30.845316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.845358] Hardware name: linux,dummy-virt (DT)
[   30.845396] Call trace:
[   30.845424]  show_stack+0x20/0x38 (C)
[   30.845472]  dump_stack_lvl+0x8c/0xd0
[   30.845519]  print_report+0x118/0x5d0
[   30.845565]  kasan_report+0xdc/0x128
[   30.845610]  __asan_report_load1_noabort+0x20/0x30
[   30.845658]  kmalloc_oob_right+0x5d0/0x660
[   30.845703]  kunit_try_run_case+0x170/0x3f0
[   30.845750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.845938]  kthread+0x328/0x630
[   30.845997]  ret_from_fork+0x10/0x20
[   30.846044] 
[   30.846061] Allocated by task 167:
[   30.846103]  kasan_save_stack+0x3c/0x68
[   30.846152]  kasan_save_track+0x20/0x40
[   30.846199]  kasan_save_alloc_info+0x40/0x58
[   30.846254]  __kasan_kmalloc+0xd4/0xd8
[   30.846302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.846341]  kmalloc_oob_right+0xb0/0x660
[   30.846377]  kunit_try_run_case+0x170/0x3f0
[   30.846516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.846686]  kthread+0x328/0x630
[   30.846732]  ret_from_fork+0x10/0x20
[   30.846767] 
[   30.846785] The buggy address belongs to the object at fff00000c56dcf00
[   30.846785]  which belongs to the cache kmalloc-128 of size 128
[   30.846847] The buggy address is located 13 bytes to the right of
[   30.846847]  allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73)
[   30.846909] 
[   30.846927] The buggy address belongs to the physical page:
[   30.846956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc
[   30.847018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.847063] page_type: f5(slab)
[   30.847100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.847182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.847442] page dumped because: kasan: bad access detected
[   30.847486] 
[   30.847503] Memory state around the buggy address:
[   30.847533]  fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847574]  fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.847616] >fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847653]                    ^
[   30.847681]  fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   30.848025]  fff00000c56dd080: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 02 fc fc
[   30.848314] ==================================================================

[   22.692742] ==================================================================
[   22.692969] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   22.693627] Read of size 1 at addr ffff8881059ac380 by task kunit_try_catch/184
[   22.694177] 
[   22.694339] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   22.694415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.694427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.694449] Call Trace:
[   22.694463]  <TASK>
[   22.694497]  dump_stack_lvl+0x73/0xb0
[   22.694528]  print_report+0xd1/0x610
[   22.694550]  ? __virt_addr_valid+0x1db/0x2d0
[   22.694592]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.694626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.694668]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.694703]  kasan_report+0x141/0x180
[   22.694726]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.694753]  __asan_report_load1_noabort+0x18/0x20
[   22.694801]  kmalloc_oob_right+0x68a/0x7f0
[   22.694824]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.694848]  ? __schedule+0x10cc/0x2b60
[   22.694877]  ? __pfx_read_tsc+0x10/0x10
[   22.694901]  ? ktime_get_ts64+0x86/0x230
[   22.694928]  kunit_try_run_case+0x1a5/0x480
[   22.694950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.694971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.694993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.695022]  ? __kthread_parkme+0x82/0x180
[   22.695043]  ? preempt_count_sub+0x50/0x80
[   22.695067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.695088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.695131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.695172]  kthread+0x337/0x6f0
[   22.695206]  ? trace_preempt_on+0x20/0xc0
[   22.695254]  ? __pfx_kthread+0x10/0x10
[   22.695292]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.695332]  ? calculate_sigpending+0x7b/0xa0
[   22.695386]  ? __pfx_kthread+0x10/0x10
[   22.695409]  ret_from_fork+0x116/0x1d0
[   22.695429]  ? __pfx_kthread+0x10/0x10
[   22.695451]  ret_from_fork_asm+0x1a/0x30
[   22.695485]  </TASK>
[   22.695496] 
[   22.703397] Allocated by task 184:
[   22.703706]  kasan_save_stack+0x45/0x70
[   22.704069]  kasan_save_track+0x18/0x40
[   22.704256]  kasan_save_alloc_info+0x3b/0x50
[   22.704398]  __kasan_kmalloc+0xb7/0xc0
[   22.704521]  __kmalloc_cache_noprof+0x189/0x420
[   22.704740]  kmalloc_oob_right+0xa9/0x7f0
[   22.705708]  kunit_try_run_case+0x1a5/0x480
[   22.706288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.706477]  kthread+0x337/0x6f0
[   22.706598]  ret_from_fork+0x116/0x1d0
[   22.706725]  ret_from_fork_asm+0x1a/0x30
[   22.707353] 
[   22.707562] The buggy address belongs to the object at ffff8881059ac300
[   22.707562]  which belongs to the cache kmalloc-128 of size 128
[   22.708855] The buggy address is located 13 bytes to the right of
[   22.708855]  allocated 115-byte region [ffff8881059ac300, ffff8881059ac373)
[   22.709565] 
[   22.709636] The buggy address belongs to the physical page:
[   22.709876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ac
[   22.710138] flags: 0x200000000000000(node=0|zone=2)
[   22.710567] page_type: f5(slab)
[   22.711054] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.711480] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.711861] page dumped because: kasan: bad access detected
[   22.712058] 
[   22.712142] Memory state around the buggy address:
[   22.712302]  ffff8881059ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.712615]  ffff8881059ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.712832] >ffff8881059ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.713220]                    ^
[   22.713575]  ffff8881059ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.713857]  ffff8881059ac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.714457] ==================================================================
[   22.644716] ==================================================================
[   22.645931] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.646777] Write of size 1 at addr ffff8881059ac373 by task kunit_try_catch/184
[   22.647386] 
[   22.648593] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   22.648998] Tainted: [N]=TEST
[   22.649033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.649290] Call Trace:
[   22.649366]  <TASK>
[   22.649527]  dump_stack_lvl+0x73/0xb0
[   22.649628]  print_report+0xd1/0x610
[   22.649658]  ? __virt_addr_valid+0x1db/0x2d0
[   22.649686]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.649708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.649737]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.649775]  kasan_report+0x141/0x180
[   22.649799]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.649825]  __asan_report_store1_noabort+0x1b/0x30
[   22.649852]  kmalloc_oob_right+0x6f0/0x7f0
[   22.649874]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.649897]  ? __schedule+0x10cc/0x2b60
[   22.649927]  ? __pfx_read_tsc+0x10/0x10
[   22.649953]  ? ktime_get_ts64+0x86/0x230
[   22.649982]  kunit_try_run_case+0x1a5/0x480
[   22.650007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.650027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.650049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.650077]  ? __kthread_parkme+0x82/0x180
[   22.650099]  ? preempt_count_sub+0x50/0x80
[   22.650124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.650147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.650174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.650201]  kthread+0x337/0x6f0
[   22.650223]  ? trace_preempt_on+0x20/0xc0
[   22.650262]  ? __pfx_kthread+0x10/0x10
[   22.650286]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.650313]  ? calculate_sigpending+0x7b/0xa0
[   22.650341]  ? __pfx_kthread+0x10/0x10
[   22.650364]  ret_from_fork+0x116/0x1d0
[   22.650384]  ? __pfx_kthread+0x10/0x10
[   22.650406]  ret_from_fork_asm+0x1a/0x30
[   22.650469]  </TASK>
[   22.650537] 
[   22.659936] Allocated by task 184:
[   22.660526]  kasan_save_stack+0x45/0x70
[   22.660925]  kasan_save_track+0x18/0x40
[   22.661110]  kasan_save_alloc_info+0x3b/0x50
[   22.661497]  __kasan_kmalloc+0xb7/0xc0
[   22.661652]  __kmalloc_cache_noprof+0x189/0x420
[   22.662013]  kmalloc_oob_right+0xa9/0x7f0
[   22.662373]  kunit_try_run_case+0x1a5/0x480
[   22.662540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.663035]  kthread+0x337/0x6f0
[   22.663231]  ret_from_fork+0x116/0x1d0
[   22.663638]  ret_from_fork_asm+0x1a/0x30
[   22.663878] 
[   22.664142] The buggy address belongs to the object at ffff8881059ac300
[   22.664142]  which belongs to the cache kmalloc-128 of size 128
[   22.664905] The buggy address is located 0 bytes to the right of
[   22.664905]  allocated 115-byte region [ffff8881059ac300, ffff8881059ac373)
[   22.665501] 
[   22.665676] The buggy address belongs to the physical page:
[   22.666108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ac
[   22.666727] flags: 0x200000000000000(node=0|zone=2)
[   22.667464] page_type: f5(slab)
[   22.668072] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.668409] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.668803] page dumped because: kasan: bad access detected
[   22.669221] 
[   22.669385] Memory state around the buggy address:
[   22.670038]  ffff8881059ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.670389]  ffff8881059ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.670721] >ffff8881059ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.671314]                                                              ^
[   22.671627]  ffff8881059ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671965]  ffff8881059ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.672392] ==================================================================
[   22.673813] ==================================================================
[   22.674503] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   22.674898] Write of size 1 at addr ffff8881059ac378 by task kunit_try_catch/184
[   22.675293] 
[   22.675413] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   22.675484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.675496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.675519] Call Trace:
[   22.675539]  <TASK>
[   22.675559]  dump_stack_lvl+0x73/0xb0
[   22.675589]  print_report+0xd1/0x610
[   22.675612]  ? __virt_addr_valid+0x1db/0x2d0
[   22.675637]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.675659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.675704]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.675740]  kasan_report+0x141/0x180
[   22.675763]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.675790]  __asan_report_store1_noabort+0x1b/0x30
[   22.675836]  kmalloc_oob_right+0x6bd/0x7f0
[   22.675859]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.675882]  ? __schedule+0x10cc/0x2b60
[   22.675911]  ? __pfx_read_tsc+0x10/0x10
[   22.675936]  ? ktime_get_ts64+0x86/0x230
[   22.675963]  kunit_try_run_case+0x1a5/0x480
[   22.675985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.676006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.676027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.676055]  ? __kthread_parkme+0x82/0x180
[   22.676076]  ? preempt_count_sub+0x50/0x80
[   22.676101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.676123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.676150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.676176]  kthread+0x337/0x6f0
[   22.676198]  ? trace_preempt_on+0x20/0xc0
[   22.676224]  ? __pfx_kthread+0x10/0x10
[   22.676257]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.676284]  ? calculate_sigpending+0x7b/0xa0
[   22.676312]  ? __pfx_kthread+0x10/0x10
[   22.676335]  ret_from_fork+0x116/0x1d0
[   22.676354]  ? __pfx_kthread+0x10/0x10
[   22.676377]  ret_from_fork_asm+0x1a/0x30
[   22.676411]  </TASK>
[   22.676422] 
[   22.683580] Allocated by task 184:
[   22.683708]  kasan_save_stack+0x45/0x70
[   22.683844]  kasan_save_track+0x18/0x40
[   22.684038]  kasan_save_alloc_info+0x3b/0x50
[   22.684346]  __kasan_kmalloc+0xb7/0xc0
[   22.684632]  __kmalloc_cache_noprof+0x189/0x420
[   22.684871]  kmalloc_oob_right+0xa9/0x7f0
[   22.685151]  kunit_try_run_case+0x1a5/0x480
[   22.685311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.685478]  kthread+0x337/0x6f0
[   22.685590]  ret_from_fork+0x116/0x1d0
[   22.685711]  ret_from_fork_asm+0x1a/0x30
[   22.685840] 
[   22.685903] The buggy address belongs to the object at ffff8881059ac300
[   22.685903]  which belongs to the cache kmalloc-128 of size 128
[   22.686872] The buggy address is located 5 bytes to the right of
[   22.686872]  allocated 115-byte region [ffff8881059ac300, ffff8881059ac373)
[   22.687440] 
[   22.687537] The buggy address belongs to the physical page:
[   22.687762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ac
[   22.688328] flags: 0x200000000000000(node=0|zone=2)
[   22.688517] page_type: f5(slab)
[   22.688676] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.689020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.689379] page dumped because: kasan: bad access detected
[   22.689628] 
[   22.689733] Memory state around the buggy address:
[   22.690000]  ffff8881059ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.690410]  ffff8881059ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.690985] >ffff8881059ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.691505]                                                                 ^
[   22.691790]  ffff8881059ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.692026]  ffff8881059ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.692223] ==================================================================