Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.004387] ==================================================================
[   29.004431] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.004479] Read of size 1 at addr fff00000c57d4a80 by task kunit_try_catch/168
[   29.004526] 
[   29.004554] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   29.004634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.004660] Hardware name: linux,dummy-virt (DT)
[   29.004688] Call trace:
[   29.004916]  show_stack+0x20/0x38 (C)
[   29.004983]  dump_stack_lvl+0x8c/0xd0
[   29.005030]  print_report+0x118/0x5d0
[   29.005227]  kasan_report+0xdc/0x128
[   29.005272]  __asan_report_load1_noabort+0x20/0x30
[   29.005404]  kmalloc_oob_right+0x5d0/0x660
[   29.005479]  kunit_try_run_case+0x170/0x3f0
[   29.005540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.005594]  kthread+0x328/0x630
[   29.005635]  ret_from_fork+0x10/0x20
[   29.005900] 
[   29.005927] Allocated by task 168:
[   29.005958]  kasan_save_stack+0x3c/0x68
[   29.006091]  kasan_save_track+0x20/0x40
[   29.006189]  kasan_save_alloc_info+0x40/0x58
[   29.006227]  __kasan_kmalloc+0xd4/0xd8
[   29.006263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.006462]  kmalloc_oob_right+0xb0/0x660
[   29.006515]  kunit_try_run_case+0x170/0x3f0
[   29.006631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.006716]  kthread+0x328/0x630
[   29.006775]  ret_from_fork+0x10/0x20
[   29.006844] 
[   29.006864] The buggy address belongs to the object at fff00000c57d4a00
[   29.006864]  which belongs to the cache kmalloc-128 of size 128
[   29.006969] The buggy address is located 13 bytes to the right of
[   29.006969]  allocated 115-byte region [fff00000c57d4a00, fff00000c57d4a73)
[   29.007237] 
[   29.007392] The buggy address belongs to the physical page:
[   29.007429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d4
[   29.007484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.007530] page_type: f5(slab)
[   29.007717] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.007922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.008077] page dumped because: kasan: bad access detected
[   29.008166] 
[   29.008184] Memory state around the buggy address:
[   29.008221]  fff00000c57d4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008262]  fff00000c57d4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.008326] >fff00000c57d4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008363]                    ^
[   29.008390]  fff00000c57d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008473]  fff00000c57d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008624] ==================================================================
[   28.998544] ==================================================================
[   28.998606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   28.998655] Write of size 1 at addr fff00000c57d4a78 by task kunit_try_catch/168
[   28.998894] 
[   28.998930] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   28.999296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.999339] Hardware name: linux,dummy-virt (DT)
[   28.999417] Call trace:
[   28.999441]  show_stack+0x20/0x38 (C)
[   29.000049]  dump_stack_lvl+0x8c/0xd0
[   29.000165]  print_report+0x118/0x5d0
[   29.000211]  kasan_report+0xdc/0x128
[   29.000254]  __asan_report_store1_noabort+0x20/0x30
[   29.000302]  kmalloc_oob_right+0x538/0x660
[   29.000347]  kunit_try_run_case+0x170/0x3f0
[   29.000528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.000922]  kthread+0x328/0x630
[   29.001068]  ret_from_fork+0x10/0x20
[   29.001122] 
[   29.001140] Allocated by task 168:
[   29.001170]  kasan_save_stack+0x3c/0x68
[   29.001338]  kasan_save_track+0x20/0x40
[   29.001376]  kasan_save_alloc_info+0x40/0x58
[   29.001711]  __kasan_kmalloc+0xd4/0xd8
[   29.001758]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.002124]  kmalloc_oob_right+0xb0/0x660
[   29.002259]  kunit_try_run_case+0x170/0x3f0
[   29.002353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.002431]  kthread+0x328/0x630
[   29.002531]  ret_from_fork+0x10/0x20
[   29.002568] 
[   29.002598] The buggy address belongs to the object at fff00000c57d4a00
[   29.002598]  which belongs to the cache kmalloc-128 of size 128
[   29.002655] The buggy address is located 5 bytes to the right of
[   29.002655]  allocated 115-byte region [fff00000c57d4a00, fff00000c57d4a73)
[   29.002721] 
[   29.002741] The buggy address belongs to the physical page:
[   29.002769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d4
[   29.002839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.002885] page_type: f5(slab)
[   29.002924] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.002973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.003035] page dumped because: kasan: bad access detected
[   29.003252] 
[   29.003343] Memory state around the buggy address:
[   29.003396]  fff00000c57d4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.003463]  fff00000c57d4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003658] >fff00000c57d4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.003727]                                                                 ^
[   29.003851]  fff00000c57d4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003957]  fff00000c57d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004101] ==================================================================
[   28.990882] ==================================================================
[   28.991357] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.992264] Write of size 1 at addr fff00000c57d4a73 by task kunit_try_catch/168
[   28.992371] 
[   28.993136] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   28.993283] Tainted: [N]=TEST
[   28.993316] Hardware name: linux,dummy-virt (DT)
[   28.993538] Call trace:
[   28.993715]  show_stack+0x20/0x38 (C)
[   28.993854]  dump_stack_lvl+0x8c/0xd0
[   28.993910]  print_report+0x118/0x5d0
[   28.993955]  kasan_report+0xdc/0x128
[   28.993999]  __asan_report_store1_noabort+0x20/0x30
[   28.994048]  kmalloc_oob_right+0x5a4/0x660
[   28.994108]  kunit_try_run_case+0x170/0x3f0
[   28.994160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.994213]  kthread+0x328/0x630
[   28.994257]  ret_from_fork+0x10/0x20
[   28.994409] 
[   28.994449] Allocated by task 168:
[   28.994567]  kasan_save_stack+0x3c/0x68
[   28.994633]  kasan_save_track+0x20/0x40
[   28.994672]  kasan_save_alloc_info+0x40/0x58
[   28.994709]  __kasan_kmalloc+0xd4/0xd8
[   28.994746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.994788]  kmalloc_oob_right+0xb0/0x660
[   28.994826]  kunit_try_run_case+0x170/0x3f0
[   28.994864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.994908]  kthread+0x328/0x630
[   28.994939]  ret_from_fork+0x10/0x20
[   28.994992] 
[   28.995064] The buggy address belongs to the object at fff00000c57d4a00
[   28.995064]  which belongs to the cache kmalloc-128 of size 128
[   28.995157] The buggy address is located 0 bytes to the right of
[   28.995157]  allocated 115-byte region [fff00000c57d4a00, fff00000c57d4a73)
[   28.995224] 
[   28.995302] The buggy address belongs to the physical page:
[   28.995474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d4
[   28.995820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.996133] page_type: f5(slab)
[   28.996429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.996491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.996597] page dumped because: kasan: bad access detected
[   28.996637] 
[   28.996663] Memory state around the buggy address:
[   28.996880]  fff00000c57d4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.996944]  fff00000c57d4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.996997] >fff00000c57d4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.997049]                                                              ^
[   28.997147]  fff00000c57d4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.997189]  fff00000c57d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.997251] ==================================================================

[   23.364607] ==================================================================
[   23.365220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   23.366109] Write of size 1 at addr ffff88810456ac73 by task kunit_try_catch/186
[   23.366624] 
[   23.367981] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   23.368346] Tainted: [N]=TEST
[   23.368379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.368607] Call Trace:
[   23.368676]  <TASK>
[   23.368851]  dump_stack_lvl+0x73/0xb0
[   23.368948]  print_report+0xd1/0x610
[   23.368977]  ? __virt_addr_valid+0x1db/0x2d0
[   23.369004]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.369025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.369051]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.369072]  kasan_report+0x141/0x180
[   23.369093]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.369119]  __asan_report_store1_noabort+0x1b/0x30
[   23.369143]  kmalloc_oob_right+0x6f0/0x7f0
[   23.369165]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.369188]  ? __schedule+0x10cc/0x2b60
[   23.369212]  ? __pfx_read_tsc+0x10/0x10
[   23.369235]  ? ktime_get_ts64+0x86/0x230
[   23.369261]  kunit_try_run_case+0x1a5/0x480
[   23.369285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.369305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.369328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.369351]  ? __kthread_parkme+0x82/0x180
[   23.369373]  ? preempt_count_sub+0x50/0x80
[   23.369397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.369418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.369443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.369467]  kthread+0x337/0x6f0
[   23.369487]  ? trace_preempt_on+0x20/0xc0
[   23.369512]  ? __pfx_kthread+0x10/0x10
[   23.369533]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.369554]  ? calculate_sigpending+0x7b/0xa0
[   23.369579]  ? __pfx_kthread+0x10/0x10
[   23.369600]  ret_from_fork+0x116/0x1d0
[   23.369619]  ? __pfx_kthread+0x10/0x10
[   23.369639]  ret_from_fork_asm+0x1a/0x30
[   23.369691]  </TASK>
[   23.369793] 
[   23.380352] Allocated by task 186:
[   23.380867]  kasan_save_stack+0x45/0x70
[   23.381067]  kasan_save_track+0x18/0x40
[   23.381261]  kasan_save_alloc_info+0x3b/0x50
[   23.381524]  __kasan_kmalloc+0xb7/0xc0
[   23.381754]  __kmalloc_cache_noprof+0x189/0x420
[   23.382144]  kmalloc_oob_right+0xa9/0x7f0
[   23.382349]  kunit_try_run_case+0x1a5/0x480
[   23.382548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.383027]  kthread+0x337/0x6f0
[   23.383246]  ret_from_fork+0x116/0x1d0
[   23.383595]  ret_from_fork_asm+0x1a/0x30
[   23.383892] 
[   23.384036] The buggy address belongs to the object at ffff88810456ac00
[   23.384036]  which belongs to the cache kmalloc-128 of size 128
[   23.384973] The buggy address is located 0 bytes to the right of
[   23.384973]  allocated 115-byte region [ffff88810456ac00, ffff88810456ac73)
[   23.385610] 
[   23.385968] The buggy address belongs to the physical page:
[   23.386644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a
[   23.387380] flags: 0x200000000000000(node=0|zone=2)
[   23.388142] page_type: f5(slab)
[   23.388682] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.389304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.389794] page dumped because: kasan: bad access detected
[   23.390100] 
[   23.390187] Memory state around the buggy address:
[   23.390716]  ffff88810456ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.391108]  ffff88810456ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.391432] >ffff88810456ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.391791]                                                              ^
[   23.392222]  ffff88810456ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.392495]  ffff88810456ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.392862] ==================================================================
[   23.394403] ==================================================================
[   23.395407] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   23.395658] Write of size 1 at addr ffff88810456ac78 by task kunit_try_catch/186
[   23.395902] 
[   23.395990] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   23.396040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.396052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.396076] Call Trace:
[   23.396092]  <TASK>
[   23.396112]  dump_stack_lvl+0x73/0xb0
[   23.396144]  print_report+0xd1/0x610
[   23.396166]  ? __virt_addr_valid+0x1db/0x2d0
[   23.396191]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.396211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.396237]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.396258]  kasan_report+0x141/0x180
[   23.396279]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.396304]  __asan_report_store1_noabort+0x1b/0x30
[   23.396327]  kmalloc_oob_right+0x6bd/0x7f0
[   23.396348]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.396370]  ? __schedule+0x10cc/0x2b60
[   23.396393]  ? __pfx_read_tsc+0x10/0x10
[   23.396415]  ? ktime_get_ts64+0x86/0x230
[   23.396439]  kunit_try_run_case+0x1a5/0x480
[   23.396462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.396482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.396505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.396528]  ? __kthread_parkme+0x82/0x180
[   23.396549]  ? preempt_count_sub+0x50/0x80
[   23.396573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.396594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.396618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.396642]  kthread+0x337/0x6f0
[   23.396661]  ? trace_preempt_on+0x20/0xc0
[   23.396685]  ? __pfx_kthread+0x10/0x10
[   23.396717]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.396740]  ? calculate_sigpending+0x7b/0xa0
[   23.396763]  ? __pfx_kthread+0x10/0x10
[   23.396784]  ret_from_fork+0x116/0x1d0
[   23.396803]  ? __pfx_kthread+0x10/0x10
[   23.396823]  ret_from_fork_asm+0x1a/0x30
[   23.396854]  </TASK>
[   23.396864] 
[   23.411106] Allocated by task 186:
[   23.411574]  kasan_save_stack+0x45/0x70
[   23.412117]  kasan_save_track+0x18/0x40
[   23.412253]  kasan_save_alloc_info+0x3b/0x50
[   23.412394]  __kasan_kmalloc+0xb7/0xc0
[   23.412518]  __kmalloc_cache_noprof+0x189/0x420
[   23.412666]  kmalloc_oob_right+0xa9/0x7f0
[   23.412933]  kunit_try_run_case+0x1a5/0x480
[   23.413075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.413264]  kthread+0x337/0x6f0
[   23.413433]  ret_from_fork+0x116/0x1d0
[   23.413615]  ret_from_fork_asm+0x1a/0x30
[   23.413874] 
[   23.414166] The buggy address belongs to the object at ffff88810456ac00
[   23.414166]  which belongs to the cache kmalloc-128 of size 128
[   23.414507] The buggy address is located 5 bytes to the right of
[   23.414507]  allocated 115-byte region [ffff88810456ac00, ffff88810456ac73)
[   23.415471] 
[   23.415580] The buggy address belongs to the physical page:
[   23.416224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a
[   23.416766] flags: 0x200000000000000(node=0|zone=2)
[   23.417109] page_type: f5(slab)
[   23.417505] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.418228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.418766] page dumped because: kasan: bad access detected
[   23.418979] 
[   23.419179] Memory state around the buggy address:
[   23.419432]  ffff88810456ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.419876]  ffff88810456ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.420130] >ffff88810456ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.420581]                                                                 ^
[   23.421219]  ffff88810456ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.421548]  ffff88810456ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.422068] ==================================================================
[   23.422676] ==================================================================
[   23.423089] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   23.423356] Read of size 1 at addr ffff88810456ac80 by task kunit_try_catch/186
[   23.423712] 
[   23.423899] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   23.423949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.423961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.423983] Call Trace:
[   23.424004]  <TASK>
[   23.424027]  dump_stack_lvl+0x73/0xb0
[   23.424058]  print_report+0xd1/0x610
[   23.424080]  ? __virt_addr_valid+0x1db/0x2d0
[   23.424103]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.424124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.424149]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.424169]  kasan_report+0x141/0x180
[   23.424191]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.424216]  __asan_report_load1_noabort+0x18/0x20
[   23.424239]  kmalloc_oob_right+0x68a/0x7f0
[   23.424260]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.424322]  ? __schedule+0x10cc/0x2b60
[   23.424407]  ? __pfx_read_tsc+0x10/0x10
[   23.424453]  ? ktime_get_ts64+0x86/0x230
[   23.424489]  kunit_try_run_case+0x1a5/0x480
[   23.424512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.424532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.424555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.424578]  ? __kthread_parkme+0x82/0x180
[   23.424598]  ? preempt_count_sub+0x50/0x80
[   23.424621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.424642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.424666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.424690]  kthread+0x337/0x6f0
[   23.424720]  ? trace_preempt_on+0x20/0xc0
[   23.424744]  ? __pfx_kthread+0x10/0x10
[   23.424764]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.424827]  ? calculate_sigpending+0x7b/0xa0
[   23.424852]  ? __pfx_kthread+0x10/0x10
[   23.424873]  ret_from_fork+0x116/0x1d0
[   23.424903]  ? __pfx_kthread+0x10/0x10
[   23.424923]  ret_from_fork_asm+0x1a/0x30
[   23.424954]  </TASK>
[   23.424966] 
[   23.436254] Allocated by task 186:
[   23.436597]  kasan_save_stack+0x45/0x70
[   23.437025]  kasan_save_track+0x18/0x40
[   23.437239]  kasan_save_alloc_info+0x3b/0x50
[   23.437424]  __kasan_kmalloc+0xb7/0xc0
[   23.437592]  __kmalloc_cache_noprof+0x189/0x420
[   23.438078]  kmalloc_oob_right+0xa9/0x7f0
[   23.438392]  kunit_try_run_case+0x1a5/0x480
[   23.438603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.438980]  kthread+0x337/0x6f0
[   23.439323]  ret_from_fork+0x116/0x1d0
[   23.439488]  ret_from_fork_asm+0x1a/0x30
[   23.439659] 
[   23.439753] The buggy address belongs to the object at ffff88810456ac00
[   23.439753]  which belongs to the cache kmalloc-128 of size 128
[   23.440541] The buggy address is located 13 bytes to the right of
[   23.440541]  allocated 115-byte region [ffff88810456ac00, ffff88810456ac73)
[   23.441495] 
[   23.441734] The buggy address belongs to the physical page:
[   23.442307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a
[   23.442620] flags: 0x200000000000000(node=0|zone=2)
[   23.443047] page_type: f5(slab)
[   23.443316] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.443781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.444409] page dumped because: kasan: bad access detected
[   23.444646] 
[   23.444745] Memory state around the buggy address:
[   23.445454]  ffff88810456ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446096]  ffff88810456ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.446403] >ffff88810456ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446686]                    ^
[   23.447139]  ffff88810456ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.447621]  ffff88810456ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.448364] ==================================================================