Hay
Date
July 10, 2025, 9:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.246113] ==================================================================
[   29.246459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.247327] Write of size 1 at addr fff00000c5a4dc73 by task kunit_try_catch/167
[   29.247433] 
[   29.248465] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.248644] Tainted: [N]=TEST
[   29.248693] Hardware name: linux,dummy-virt (DT)
[   29.248964] Call trace:
[   29.249182]  show_stack+0x20/0x38 (C)
[   29.249547]  dump_stack_lvl+0x8c/0xd0
[   29.249643]  print_report+0x118/0x5d0
[   29.249718]  kasan_report+0xdc/0x128
[   29.249821]  __asan_report_store1_noabort+0x20/0x30
[   29.249883]  kmalloc_oob_right+0x5a4/0x660
[   29.249929]  kunit_try_run_case+0x170/0x3f0
[   29.250228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.250298]  kthread+0x328/0x630
[   29.250376]  ret_from_fork+0x10/0x20
[   29.251478] 
[   29.251609] Allocated by task 167:
[   29.252024]  kasan_save_stack+0x3c/0x68
[   29.252097]  kasan_save_track+0x20/0x40
[   29.252289]  kasan_save_alloc_info+0x40/0x58
[   29.252333]  __kasan_kmalloc+0xd4/0xd8
[   29.252370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.252459]  kmalloc_oob_right+0xb0/0x660
[   29.252518]  kunit_try_run_case+0x170/0x3f0
[   29.252579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.252643]  kthread+0x328/0x630
[   29.252675]  ret_from_fork+0x10/0x20
[   29.252978] 
[   29.253233] The buggy address belongs to the object at fff00000c5a4dc00
[   29.253233]  which belongs to the cache kmalloc-128 of size 128
[   29.253406] The buggy address is located 0 bytes to the right of
[   29.253406]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.253512] 
[   29.253778] The buggy address belongs to the physical page:
[   29.254692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.254993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.255590] page_type: f5(slab)
[   29.256140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.256220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.256356] page dumped because: kasan: bad access detected
[   29.256488] 
[   29.256562] Memory state around the buggy address:
[   29.257288]  fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.257373]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257446] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.257502]                                                              ^
[   29.257637]  fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257688]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257767] ==================================================================
[   29.258269] ==================================================================
[   29.258349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.258430] Write of size 1 at addr fff00000c5a4dc78 by task kunit_try_catch/167
[   29.258500] 
[   29.258570] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.258662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.258688] Hardware name: linux,dummy-virt (DT)
[   29.258930] Call trace:
[   29.258953]  show_stack+0x20/0x38 (C)
[   29.259007]  dump_stack_lvl+0x8c/0xd0
[   29.259051]  print_report+0x118/0x5d0
[   29.259099]  kasan_report+0xdc/0x128
[   29.259153]  __asan_report_store1_noabort+0x20/0x30
[   29.259243]  kmalloc_oob_right+0x538/0x660
[   29.259330]  kunit_try_run_case+0x170/0x3f0
[   29.259435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259544]  kthread+0x328/0x630
[   29.259676]  ret_from_fork+0x10/0x20
[   29.259736] 
[   29.259754] Allocated by task 167:
[   29.259780]  kasan_save_stack+0x3c/0x68
[   29.259819]  kasan_save_track+0x20/0x40
[   29.259857]  kasan_save_alloc_info+0x40/0x58
[   29.259893]  __kasan_kmalloc+0xd4/0xd8
[   29.259929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.259968]  kmalloc_oob_right+0xb0/0x660
[   29.260004]  kunit_try_run_case+0x170/0x3f0
[   29.260042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.260119]  kthread+0x328/0x630
[   29.260225]  ret_from_fork+0x10/0x20
[   29.260348] 
[   29.260428] The buggy address belongs to the object at fff00000c5a4dc00
[   29.260428]  which belongs to the cache kmalloc-128 of size 128
[   29.260557] The buggy address is located 5 bytes to the right of
[   29.260557]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.260671] 
[   29.260745] The buggy address belongs to the physical page:
[   29.260785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.260868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.261181] page_type: f5(slab)
[   29.261238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.261354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.261433] page dumped because: kasan: bad access detected
[   29.261498] 
[   29.261528] Memory state around the buggy address:
[   29.261621]  fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.261675]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261717] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.261993]                                                                 ^
[   29.262057]  fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262145]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262249] ==================================================================
[   29.262711] ==================================================================
[   29.262774] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.262876] Read of size 1 at addr fff00000c5a4dc80 by task kunit_try_catch/167
[   29.262924] 
[   29.262952] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.263034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.263069] Hardware name: linux,dummy-virt (DT)
[   29.263100] Call trace:
[   29.263152]  show_stack+0x20/0x38 (C)
[   29.263201]  dump_stack_lvl+0x8c/0xd0
[   29.263244]  print_report+0x118/0x5d0
[   29.263642]  kasan_report+0xdc/0x128
[   29.263687]  __asan_report_load1_noabort+0x20/0x30
[   29.263735]  kmalloc_oob_right+0x5d0/0x660
[   29.263781]  kunit_try_run_case+0x170/0x3f0
[   29.263830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263883]  kthread+0x328/0x630
[   29.263925]  ret_from_fork+0x10/0x20
[   29.263970] 
[   29.264044] Allocated by task 167:
[   29.264108]  kasan_save_stack+0x3c/0x68
[   29.264244]  kasan_save_track+0x20/0x40
[   29.264344]  kasan_save_alloc_info+0x40/0x58
[   29.264438]  __kasan_kmalloc+0xd4/0xd8
[   29.264500]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.264539]  kmalloc_oob_right+0xb0/0x660
[   29.264849]  kunit_try_run_case+0x170/0x3f0
[   29.264919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264987]  kthread+0x328/0x630
[   29.265066]  ret_from_fork+0x10/0x20
[   29.265841] 
[   29.265863] The buggy address belongs to the object at fff00000c5a4dc00
[   29.265863]  which belongs to the cache kmalloc-128 of size 128
[   29.265930] The buggy address is located 13 bytes to the right of
[   29.265930]  allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73)
[   29.265995] 
[   29.266014] The buggy address belongs to the physical page:
[   29.266043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d
[   29.266094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.266150] page_type: f5(slab)
[   29.266185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.266236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.266276] page dumped because: kasan: bad access detected
[   29.266306] 
[   29.266323] Memory state around the buggy address:
[   29.266353]  fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266395]  fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.266437] >fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266474]                    ^
[   29.266500]  fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266542]  fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266580] ==================================================================

[   24.333554] ==================================================================
[   24.334117] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   24.334368] Write of size 1 at addr ffff888105182878 by task kunit_try_catch/184
[   24.334650] 
[   24.334770] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   24.334817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.334829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.334851] Call Trace:
[   24.334866]  <TASK>
[   24.334884]  dump_stack_lvl+0x73/0xb0
[   24.334911]  print_report+0xd1/0x610
[   24.334933]  ? __virt_addr_valid+0x1db/0x2d0
[   24.335030]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.335053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.335080]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.335101]  kasan_report+0x141/0x180
[   24.335123]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.335149]  __asan_report_store1_noabort+0x1b/0x30
[   24.335173]  kmalloc_oob_right+0x6bd/0x7f0
[   24.335195]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.335217]  ? __schedule+0x10cc/0x2b60
[   24.335238]  ? irqentry_exit+0x2a/0x60
[   24.335260]  ? __pfx_read_tsc+0x10/0x10
[   24.335281]  ? ktime_get_ts64+0x86/0x230
[   24.335306]  kunit_try_run_case+0x1a5/0x480
[   24.335328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.335349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.335371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.335394]  ? __kthread_parkme+0x82/0x180
[   24.335414]  ? preempt_count_sub+0x50/0x80
[   24.335437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.335459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.335483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.335518]  kthread+0x337/0x6f0
[   24.335537]  ? trace_preempt_on+0x20/0xc0
[   24.335561]  ? __pfx_kthread+0x10/0x10
[   24.335582]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.335603]  ? calculate_sigpending+0x7b/0xa0
[   24.335627]  ? __pfx_kthread+0x10/0x10
[   24.335648]  ret_from_fork+0x116/0x1d0
[   24.335667]  ? __pfx_kthread+0x10/0x10
[   24.335688]  ret_from_fork_asm+0x1a/0x30
[   24.335728]  </TASK>
[   24.335739] 
[   24.346187] Allocated by task 184:
[   24.346324]  kasan_save_stack+0x45/0x70
[   24.346473]  kasan_save_track+0x18/0x40
[   24.347540]  kasan_save_alloc_info+0x3b/0x50
[   24.348046]  __kasan_kmalloc+0xb7/0xc0
[   24.348534]  __kmalloc_cache_noprof+0x189/0x420
[   24.348970]  kmalloc_oob_right+0xa9/0x7f0
[   24.349403]  kunit_try_run_case+0x1a5/0x480
[   24.349570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.349769]  kthread+0x337/0x6f0
[   24.350093]  ret_from_fork+0x116/0x1d0
[   24.350512]  ret_from_fork_asm+0x1a/0x30
[   24.350955] 
[   24.351117] The buggy address belongs to the object at ffff888105182800
[   24.351117]  which belongs to the cache kmalloc-128 of size 128
[   24.352214] The buggy address is located 5 bytes to the right of
[   24.352214]  allocated 115-byte region [ffff888105182800, ffff888105182873)
[   24.352892] 
[   24.353063] The buggy address belongs to the physical page:
[   24.353636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   24.354364] flags: 0x200000000000000(node=0|zone=2)
[   24.354637] page_type: f5(slab)
[   24.355032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.355415] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.356194] page dumped because: kasan: bad access detected
[   24.356582] 
[   24.356648] Memory state around the buggy address:
[   24.356810]  ffff888105182700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.357062]  ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.357424] >ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.357862]                                                                 ^
[   24.358512]  ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.359095]  ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.359310] ==================================================================
[   24.359851] ==================================================================
[   24.360208] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   24.360453] Read of size 1 at addr ffff888105182880 by task kunit_try_catch/184
[   24.361132] 
[   24.361239] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   24.361287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.361299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.361320] Call Trace:
[   24.361338]  <TASK>
[   24.361354]  dump_stack_lvl+0x73/0xb0
[   24.361383]  print_report+0xd1/0x610
[   24.361439]  ? __virt_addr_valid+0x1db/0x2d0
[   24.361463]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.361483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.361549]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.361592]  kasan_report+0x141/0x180
[   24.361613]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.361649]  __asan_report_load1_noabort+0x18/0x20
[   24.361672]  kmalloc_oob_right+0x68a/0x7f0
[   24.361693]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.361725]  ? __schedule+0x10cc/0x2b60
[   24.361747]  ? irqentry_exit+0x2a/0x60
[   24.361768]  ? __pfx_read_tsc+0x10/0x10
[   24.361842]  ? ktime_get_ts64+0x86/0x230
[   24.361899]  kunit_try_run_case+0x1a5/0x480
[   24.361921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.361941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.361974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.361997]  ? __kthread_parkme+0x82/0x180
[   24.362017]  ? preempt_count_sub+0x50/0x80
[   24.362066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.362087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.362111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.362146]  kthread+0x337/0x6f0
[   24.362167]  ? trace_preempt_on+0x20/0xc0
[   24.362189]  ? __pfx_kthread+0x10/0x10
[   24.362209]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.362230]  ? calculate_sigpending+0x7b/0xa0
[   24.362253]  ? __pfx_kthread+0x10/0x10
[   24.362274]  ret_from_fork+0x116/0x1d0
[   24.362292]  ? __pfx_kthread+0x10/0x10
[   24.362312]  ret_from_fork_asm+0x1a/0x30
[   24.362343]  </TASK>
[   24.362354] 
[   24.371339] Allocated by task 184:
[   24.371678]  kasan_save_stack+0x45/0x70
[   24.371988]  kasan_save_track+0x18/0x40
[   24.372218]  kasan_save_alloc_info+0x3b/0x50
[   24.372410]  __kasan_kmalloc+0xb7/0xc0
[   24.372623]  __kmalloc_cache_noprof+0x189/0x420
[   24.372922]  kmalloc_oob_right+0xa9/0x7f0
[   24.373161]  kunit_try_run_case+0x1a5/0x480
[   24.373383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.373737]  kthread+0x337/0x6f0
[   24.373991]  ret_from_fork+0x116/0x1d0
[   24.374214]  ret_from_fork_asm+0x1a/0x30
[   24.374433] 
[   24.374559] The buggy address belongs to the object at ffff888105182800
[   24.374559]  which belongs to the cache kmalloc-128 of size 128
[   24.375318] The buggy address is located 13 bytes to the right of
[   24.375318]  allocated 115-byte region [ffff888105182800, ffff888105182873)
[   24.376031] 
[   24.376135] The buggy address belongs to the physical page:
[   24.376385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   24.376719] flags: 0x200000000000000(node=0|zone=2)
[   24.377067] page_type: f5(slab)
[   24.377278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.377656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.378100] page dumped because: kasan: bad access detected
[   24.378378] 
[   24.378463] Memory state around the buggy address:
[   24.378669]  ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379216]  ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.379575] >ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.380005]                    ^
[   24.380160]  ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.380406]  ffff888105182980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.380852] ==================================================================
[   24.301132] ==================================================================
[   24.302072] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   24.302726] Write of size 1 at addr ffff888105182873 by task kunit_try_catch/184
[   24.303224] 
[   24.304213] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   24.304552] Tainted: [N]=TEST
[   24.304585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.304826] Call Trace:
[   24.304899]  <TASK>
[   24.305044]  dump_stack_lvl+0x73/0xb0
[   24.305133]  print_report+0xd1/0x610
[   24.305163]  ? __virt_addr_valid+0x1db/0x2d0
[   24.305190]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.305211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.305236]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.305257]  kasan_report+0x141/0x180
[   24.305279]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.305304]  __asan_report_store1_noabort+0x1b/0x30
[   24.305328]  kmalloc_oob_right+0x6f0/0x7f0
[   24.305350]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.305372]  ? __schedule+0x10cc/0x2b60
[   24.305396]  ? irqentry_exit+0x2a/0x60
[   24.305420]  ? __pfx_read_tsc+0x10/0x10
[   24.305443]  ? ktime_get_ts64+0x86/0x230
[   24.305470]  kunit_try_run_case+0x1a5/0x480
[   24.305502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.305522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.305545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.305568]  ? __kthread_parkme+0x82/0x180
[   24.305590]  ? preempt_count_sub+0x50/0x80
[   24.305613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.305635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.305659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.305684]  kthread+0x337/0x6f0
[   24.305715]  ? trace_preempt_on+0x20/0xc0
[   24.305739]  ? __pfx_kthread+0x10/0x10
[   24.305761]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.305878]  ? calculate_sigpending+0x7b/0xa0
[   24.305907]  ? __pfx_kthread+0x10/0x10
[   24.305929]  ret_from_fork+0x116/0x1d0
[   24.305949]  ? __pfx_kthread+0x10/0x10
[   24.305969]  ret_from_fork_asm+0x1a/0x30
[   24.306035]  </TASK>
[   24.306107] 
[   24.316282] Allocated by task 184:
[   24.316974]  kasan_save_stack+0x45/0x70
[   24.317193]  kasan_save_track+0x18/0x40
[   24.317333]  kasan_save_alloc_info+0x3b/0x50
[   24.317657]  __kasan_kmalloc+0xb7/0xc0
[   24.317966]  __kmalloc_cache_noprof+0x189/0x420
[   24.318241]  kmalloc_oob_right+0xa9/0x7f0
[   24.318515]  kunit_try_run_case+0x1a5/0x480
[   24.318883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.319635]  kthread+0x337/0x6f0
[   24.319776]  ret_from_fork+0x116/0x1d0
[   24.320133]  ret_from_fork_asm+0x1a/0x30
[   24.320723] 
[   24.320993] The buggy address belongs to the object at ffff888105182800
[   24.320993]  which belongs to the cache kmalloc-128 of size 128
[   24.322005] The buggy address is located 0 bytes to the right of
[   24.322005]  allocated 115-byte region [ffff888105182800, ffff888105182873)
[   24.323459] 
[   24.323665] The buggy address belongs to the physical page:
[   24.324400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182
[   24.325568] flags: 0x200000000000000(node=0|zone=2)
[   24.326378] page_type: f5(slab)
[   24.327007] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.327730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.328605] page dumped because: kasan: bad access detected
[   24.328976] 
[   24.329145] Memory state around the buggy address:
[   24.329990]  ffff888105182700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.330370]  ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.330637] >ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.330918]                                                              ^
[   24.331542]  ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.331771]  ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.332086] ==================================================================