Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.287059] ==================================================================
[   30.287097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.287138] Read of size 1 at addr fff00000c6361680 by task kunit_try_catch/167
[   30.287185] 
[   30.287214] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.287294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.287320] Hardware name: linux,dummy-virt (DT)
[   30.287349] Call trace:
[   30.287369]  show_stack+0x20/0x38 (C)
[   30.287414]  dump_stack_lvl+0x8c/0xd0
[   30.287460]  print_report+0x118/0x5d0
[   30.287503]  kasan_report+0xdc/0x128
[   30.287557]  __asan_report_load1_noabort+0x20/0x30
[   30.287605]  kmalloc_oob_right+0x5d0/0x660
[   30.287651]  kunit_try_run_case+0x170/0x3f0
[   30.287757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.287949]  kthread+0x328/0x630
[   30.288020]  ret_from_fork+0x10/0x20
[   30.288066] 
[   30.288084] Allocated by task 167:
[   30.288111]  kasan_save_stack+0x3c/0x68
[   30.288222]  kasan_save_track+0x20/0x40
[   30.288291]  kasan_save_alloc_info+0x40/0x58
[   30.288483]  __kasan_kmalloc+0xd4/0xd8
[   30.288670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.288728]  kmalloc_oob_right+0xb0/0x660
[   30.288765]  kunit_try_run_case+0x170/0x3f0
[   30.288801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.288843]  kthread+0x328/0x630
[   30.288874]  ret_from_fork+0x10/0x20
[   30.288909] 
[   30.288981] The buggy address belongs to the object at fff00000c6361600
[   30.288981]  which belongs to the cache kmalloc-128 of size 128
[   30.289294] The buggy address is located 13 bytes to the right of
[   30.289294]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.289414] 
[   30.289469] The buggy address belongs to the physical page:
[   30.289572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.289622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.290466] page_type: f5(slab)
[   30.290614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.290760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.290863] page dumped because: kasan: bad access detected
[   30.290943] 
[   30.290961] Memory state around the buggy address:
[   30.290993]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291317]  fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.291374] >fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291668]                    ^
[   30.291794]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.291901]  fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.292027] ==================================================================
[   30.277349] ==================================================================
[   30.277699] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.278536] Write of size 1 at addr fff00000c6361673 by task kunit_try_catch/167
[   30.278646] 
[   30.279436] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.279615] Tainted: [N]=TEST
[   30.279648] Hardware name: linux,dummy-virt (DT)
[   30.279933] Call trace:
[   30.280115]  show_stack+0x20/0x38 (C)
[   30.280256]  dump_stack_lvl+0x8c/0xd0
[   30.280310]  print_report+0x118/0x5d0
[   30.280354]  kasan_report+0xdc/0x128
[   30.280397]  __asan_report_store1_noabort+0x20/0x30
[   30.280446]  kmalloc_oob_right+0x5a4/0x660
[   30.280493]  kunit_try_run_case+0x170/0x3f0
[   30.280556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.280608]  kthread+0x328/0x630
[   30.280652]  ret_from_fork+0x10/0x20
[   30.280811] 
[   30.280849] Allocated by task 167:
[   30.280962]  kasan_save_stack+0x3c/0x68
[   30.281025]  kasan_save_track+0x20/0x40
[   30.281061]  kasan_save_alloc_info+0x40/0x58
[   30.281099]  __kasan_kmalloc+0xd4/0xd8
[   30.281137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.281179]  kmalloc_oob_right+0xb0/0x660
[   30.281217]  kunit_try_run_case+0x170/0x3f0
[   30.281252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.281295]  kthread+0x328/0x630
[   30.281326]  ret_from_fork+0x10/0x20
[   30.281378] 
[   30.281435] The buggy address belongs to the object at fff00000c6361600
[   30.281435]  which belongs to the cache kmalloc-128 of size 128
[   30.281538] The buggy address is located 0 bytes to the right of
[   30.281538]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.281608] 
[   30.281690] The buggy address belongs to the physical page:
[   30.281858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.282122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.282410] page_type: f5(slab)
[   30.282714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.282791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.282898] page dumped because: kasan: bad access detected
[   30.282937] 
[   30.282962] Memory state around the buggy address:
[   30.283178]  fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.283242]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283296] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.283350]                                                              ^
[   30.283435]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283478]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283555] ==================================================================
[   30.284638] ==================================================================
[   30.284677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.284725] Write of size 1 at addr fff00000c6361678 by task kunit_try_catch/167
[   30.284773] 
[   30.284802] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   30.284884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.284910] Hardware name: linux,dummy-virt (DT)
[   30.284939] Call trace:
[   30.284959]  show_stack+0x20/0x38 (C)
[   30.285005]  dump_stack_lvl+0x8c/0xd0
[   30.285050]  print_report+0x118/0x5d0
[   30.285093]  kasan_report+0xdc/0x128
[   30.285136]  __asan_report_store1_noabort+0x20/0x30
[   30.285185]  kmalloc_oob_right+0x538/0x660
[   30.285231]  kunit_try_run_case+0x170/0x3f0
[   30.285277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285329]  kthread+0x328/0x630
[   30.285370]  ret_from_fork+0x10/0x20
[   30.285415] 
[   30.285432] Allocated by task 167:
[   30.285458]  kasan_save_stack+0x3c/0x68
[   30.285496]  kasan_save_track+0x20/0x40
[   30.285561]  kasan_save_alloc_info+0x40/0x58
[   30.285600]  __kasan_kmalloc+0xd4/0xd8
[   30.285636]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.285704]  kmalloc_oob_right+0xb0/0x660
[   30.285816]  kunit_try_run_case+0x170/0x3f0
[   30.285852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285895]  kthread+0x328/0x630
[   30.285946]  ret_from_fork+0x10/0x20
[   30.286041] 
[   30.286125] The buggy address belongs to the object at fff00000c6361600
[   30.286125]  which belongs to the cache kmalloc-128 of size 128
[   30.286249] The buggy address is located 5 bytes to the right of
[   30.286249]  allocated 115-byte region [fff00000c6361600, fff00000c6361673)
[   30.286339] 
[   30.286359] The buggy address belongs to the physical page:
[   30.286393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361
[   30.286444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.286489] page_type: f5(slab)
[   30.286535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.286584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.286623] page dumped because: kasan: bad access detected
[   30.286653] 
[   30.286671] Memory state around the buggy address:
[   30.286702]  fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.286744]  fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286786] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.286823]                                                                 ^
[   30.286861]  fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286902]  fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286939] ==================================================================

[   22.563756] ==================================================================
[   22.564133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   22.564379] Read of size 1 at addr ffff88810539f780 by task kunit_try_catch/185
[   22.564868] 
[   22.565014] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   22.565060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.565072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.565092] Call Trace:
[   22.565108]  <TASK>
[   22.565121]  dump_stack_lvl+0x73/0xb0
[   22.565148]  print_report+0xd1/0x610
[   22.565169]  ? __virt_addr_valid+0x1db/0x2d0
[   22.565191]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.565211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.565236]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.565268]  kasan_report+0x141/0x180
[   22.565289]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.565314]  __asan_report_load1_noabort+0x18/0x20
[   22.565337]  kmalloc_oob_right+0x68a/0x7f0
[   22.565358]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.565380]  ? __schedule+0x10c6/0x2b60
[   22.565401]  ? __pfx_read_tsc+0x10/0x10
[   22.565423]  ? ktime_get_ts64+0x86/0x230
[   22.565447]  kunit_try_run_case+0x1a5/0x480
[   22.565470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.565491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.565513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.565535]  ? __kthread_parkme+0x82/0x180
[   22.565570]  ? preempt_count_sub+0x50/0x80
[   22.565594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.565617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.565642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.565668]  kthread+0x337/0x6f0
[   22.565687]  ? trace_preempt_on+0x20/0xc0
[   22.565708]  ? __pfx_kthread+0x10/0x10
[   22.565728]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.565748]  ? calculate_sigpending+0x7b/0xa0
[   22.565770]  ? __pfx_kthread+0x10/0x10
[   22.565791]  ret_from_fork+0x116/0x1d0
[   22.565809]  ? __pfx_kthread+0x10/0x10
[   22.565829]  ret_from_fork_asm+0x1a/0x30
[   22.565859]  </TASK>
[   22.565869] 
[   22.573145] Allocated by task 185:
[   22.573333]  kasan_save_stack+0x45/0x70
[   22.573717]  kasan_save_track+0x18/0x40
[   22.573893]  kasan_save_alloc_info+0x3b/0x50
[   22.574083]  __kasan_kmalloc+0xb7/0xc0
[   22.574208]  __kmalloc_cache_noprof+0x189/0x420
[   22.574382]  kmalloc_oob_right+0xa9/0x7f0
[   22.574579]  kunit_try_run_case+0x1a5/0x480
[   22.574896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.575192]  kthread+0x337/0x6f0
[   22.575330]  ret_from_fork+0x116/0x1d0
[   22.575456]  ret_from_fork_asm+0x1a/0x30
[   22.575617] 
[   22.575704] The buggy address belongs to the object at ffff88810539f700
[   22.575704]  which belongs to the cache kmalloc-128 of size 128
[   22.576198] The buggy address is located 13 bytes to the right of
[   22.576198]  allocated 115-byte region [ffff88810539f700, ffff88810539f773)
[   22.576793] 
[   22.576935] The buggy address belongs to the physical page:
[   22.577142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10539f
[   22.577453] flags: 0x200000000000000(node=0|zone=2)
[   22.577725] page_type: f5(slab)
[   22.577853] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.578130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.578471] page dumped because: kasan: bad access detected
[   22.578834] 
[   22.579015] Memory state around the buggy address:
[   22.579206]  ffff88810539f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.579498]  ffff88810539f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.579778] >ffff88810539f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.579982]                    ^
[   22.580091]  ffff88810539f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.580335]  ffff88810539f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.580731] ==================================================================
[   22.546084] ==================================================================
[   22.546417] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   22.546716] Write of size 1 at addr ffff88810539f778 by task kunit_try_catch/185
[   22.547016] 
[   22.547325] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   22.547377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.547389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.547408] Call Trace:
[   22.547420]  <TASK>
[   22.547435]  dump_stack_lvl+0x73/0xb0
[   22.547464]  print_report+0xd1/0x610
[   22.547486]  ? __virt_addr_valid+0x1db/0x2d0
[   22.547508]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.547528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.547563]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.547584]  kasan_report+0x141/0x180
[   22.547605]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.547630]  __asan_report_store1_noabort+0x1b/0x30
[   22.547654]  kmalloc_oob_right+0x6bd/0x7f0
[   22.547675]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.547697]  ? __schedule+0x10c6/0x2b60
[   22.547718]  ? __pfx_read_tsc+0x10/0x10
[   22.547740]  ? ktime_get_ts64+0x86/0x230
[   22.547764]  kunit_try_run_case+0x1a5/0x480
[   22.547786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.547807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.547829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.547851]  ? __kthread_parkme+0x82/0x180
[   22.547871]  ? preempt_count_sub+0x50/0x80
[   22.547905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.547928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.547954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.547980]  kthread+0x337/0x6f0
[   22.547999]  ? trace_preempt_on+0x20/0xc0
[   22.548023]  ? __pfx_kthread+0x10/0x10
[   22.548044]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.548066]  ? calculate_sigpending+0x7b/0xa0
[   22.548089]  ? __pfx_kthread+0x10/0x10
[   22.548110]  ret_from_fork+0x116/0x1d0
[   22.548129]  ? __pfx_kthread+0x10/0x10
[   22.548149]  ret_from_fork_asm+0x1a/0x30
[   22.548179]  </TASK>
[   22.548189] 
[   22.555379] Allocated by task 185:
[   22.555506]  kasan_save_stack+0x45/0x70
[   22.555642]  kasan_save_track+0x18/0x40
[   22.555774]  kasan_save_alloc_info+0x3b/0x50
[   22.556015]  __kasan_kmalloc+0xb7/0xc0
[   22.556244]  __kmalloc_cache_noprof+0x189/0x420
[   22.556466]  kmalloc_oob_right+0xa9/0x7f0
[   22.556670]  kunit_try_run_case+0x1a5/0x480
[   22.556809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.557055]  kthread+0x337/0x6f0
[   22.557273]  ret_from_fork+0x116/0x1d0
[   22.557453]  ret_from_fork_asm+0x1a/0x30
[   22.557705] 
[   22.557771] The buggy address belongs to the object at ffff88810539f700
[   22.557771]  which belongs to the cache kmalloc-128 of size 128
[   22.558448] The buggy address is located 5 bytes to the right of
[   22.558448]  allocated 115-byte region [ffff88810539f700, ffff88810539f773)
[   22.558822] 
[   22.558887] The buggy address belongs to the physical page:
[   22.559095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10539f
[   22.559456] flags: 0x200000000000000(node=0|zone=2)
[   22.559774] page_type: f5(slab)
[   22.560043] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.560530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.560889] page dumped because: kasan: bad access detected
[   22.561091] 
[   22.561181] Memory state around the buggy address:
[   22.561380]  ffff88810539f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.561702]  ffff88810539f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.562142] >ffff88810539f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.562432]                                                                 ^
[   22.562767]  ffff88810539f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.562977]  ffff88810539f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.563290] ==================================================================
[   22.510538] ==================================================================
[   22.511743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.513175] Write of size 1 at addr ffff88810539f773 by task kunit_try_catch/185
[   22.514347] 
[   22.515975] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   22.516346] Tainted: [N]=TEST
[   22.516379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.516590] Call Trace:
[   22.516657]  <TASK>
[   22.516799]  dump_stack_lvl+0x73/0xb0
[   22.516913]  print_report+0xd1/0x610
[   22.516942]  ? __virt_addr_valid+0x1db/0x2d0
[   22.516968]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.516988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.517013]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.517034]  kasan_report+0x141/0x180
[   22.517055]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.517081]  __asan_report_store1_noabort+0x1b/0x30
[   22.517104]  kmalloc_oob_right+0x6f0/0x7f0
[   22.517125]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.517147]  ? __schedule+0x10c6/0x2b60
[   22.517170]  ? __pfx_read_tsc+0x10/0x10
[   22.517195]  ? ktime_get_ts64+0x86/0x230
[   22.517223]  kunit_try_run_case+0x1a5/0x480
[   22.517249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.517283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.517306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.517328]  ? __kthread_parkme+0x82/0x180
[   22.517349]  ? preempt_count_sub+0x50/0x80
[   22.517374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.517397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.517423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.517449]  kthread+0x337/0x6f0
[   22.517468]  ? trace_preempt_on+0x20/0xc0
[   22.517492]  ? __pfx_kthread+0x10/0x10
[   22.517512]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.517532]  ? calculate_sigpending+0x7b/0xa0
[   22.517564]  ? __pfx_kthread+0x10/0x10
[   22.517584]  ret_from_fork+0x116/0x1d0
[   22.517603]  ? __pfx_kthread+0x10/0x10
[   22.517623]  ret_from_fork_asm+0x1a/0x30
[   22.517677]  </TASK>
[   22.517741] 
[   22.529080] Allocated by task 185:
[   22.529528]  kasan_save_stack+0x45/0x70
[   22.529947]  kasan_save_track+0x18/0x40
[   22.530244]  kasan_save_alloc_info+0x3b/0x50
[   22.530654]  __kasan_kmalloc+0xb7/0xc0
[   22.530788]  __kmalloc_cache_noprof+0x189/0x420
[   22.531082]  kmalloc_oob_right+0xa9/0x7f0
[   22.531458]  kunit_try_run_case+0x1a5/0x480
[   22.531849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.532385]  kthread+0x337/0x6f0
[   22.532511]  ret_from_fork+0x116/0x1d0
[   22.532851]  ret_from_fork_asm+0x1a/0x30
[   22.533304] 
[   22.533583] The buggy address belongs to the object at ffff88810539f700
[   22.533583]  which belongs to the cache kmalloc-128 of size 128
[   22.534460] The buggy address is located 0 bytes to the right of
[   22.534460]  allocated 115-byte region [ffff88810539f700, ffff88810539f773)
[   22.535484] 
[   22.535762] The buggy address belongs to the physical page:
[   22.536507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10539f
[   22.537352] flags: 0x200000000000000(node=0|zone=2)
[   22.538220] page_type: f5(slab)
[   22.538696] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.539436] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.540226] page dumped because: kasan: bad access detected
[   22.540431] 
[   22.540505] Memory state around the buggy address:
[   22.541148]  ffff88810539f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.541891]  ffff88810539f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.542757] >ffff88810539f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.543305]                                                              ^
[   22.543993]  ffff88810539f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.544211]  ffff88810539f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.544488] ==================================================================