Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.252367] ==================================================================
[   29.253022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.255305] Write of size 1 at addr fff00000c59f9773 by task kunit_try_catch/167
[   29.255414] 
[   29.256183] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.256330] Tainted: [N]=TEST
[   29.256362] Hardware name: linux,dummy-virt (DT)
[   29.256621] Call trace:
[   29.256804]  show_stack+0x20/0x38 (C)
[   29.256937]  dump_stack_lvl+0x8c/0xd0
[   29.256992]  print_report+0x118/0x5d0
[   29.257036]  kasan_report+0xdc/0x128
[   29.257093]  __asan_report_store1_noabort+0x20/0x30
[   29.257142]  kmalloc_oob_right+0x5a4/0x660
[   29.257189]  kunit_try_run_case+0x170/0x3f0
[   29.257239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.257291]  kthread+0x328/0x630
[   29.257337]  ret_from_fork+0x10/0x20
[   29.257495] 
[   29.257532] Allocated by task 167:
[   29.257647]  kasan_save_stack+0x3c/0x68
[   29.257710]  kasan_save_track+0x20/0x40
[   29.257746]  kasan_save_alloc_info+0x40/0x58
[   29.257783]  __kasan_kmalloc+0xd4/0xd8
[   29.257818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.257859]  kmalloc_oob_right+0xb0/0x660
[   29.257896]  kunit_try_run_case+0x170/0x3f0
[   29.257932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.257973]  kthread+0x328/0x630
[   29.258004]  ret_from_fork+0x10/0x20
[   29.258072] 
[   29.258133] The buggy address belongs to the object at fff00000c59f9700
[   29.258133]  which belongs to the cache kmalloc-128 of size 128
[   29.258226] The buggy address is located 0 bytes to the right of
[   29.258226]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.258291] 
[   29.258374] The buggy address belongs to the physical page:
[   29.258571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.258847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.259144] page_type: f5(slab)
[   29.259437] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.259497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.259599] page dumped because: kasan: bad access detected
[   29.259637] 
[   29.259663] Memory state around the buggy address:
[   29.259884]  fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.259948]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.260000] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.260052]                                                              ^
[   29.260147]  fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.260187]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.260247] ==================================================================
[   29.261022] ==================================================================
[   29.261076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.261125] Write of size 1 at addr fff00000c59f9778 by task kunit_try_catch/167
[   29.261183] 
[   29.261212] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.261292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.261322] Hardware name: linux,dummy-virt (DT)
[   29.261351] Call trace:
[   29.261372]  show_stack+0x20/0x38 (C)
[   29.261434]  dump_stack_lvl+0x8c/0xd0
[   29.261482]  print_report+0x118/0x5d0
[   29.261525]  kasan_report+0xdc/0x128
[   29.261579]  __asan_report_store1_noabort+0x20/0x30
[   29.261637]  kmalloc_oob_right+0x538/0x660
[   29.261683]  kunit_try_run_case+0x170/0x3f0
[   29.261728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.261778]  kthread+0x328/0x630
[   29.261819]  ret_from_fork+0x10/0x20
[   29.261865] 
[   29.261882] Allocated by task 167:
[   29.261908]  kasan_save_stack+0x3c/0x68
[   29.261954]  kasan_save_track+0x20/0x40
[   29.261989]  kasan_save_alloc_info+0x40/0x58
[   29.262025]  __kasan_kmalloc+0xd4/0xd8
[   29.262071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.262110]  kmalloc_oob_right+0xb0/0x660
[   29.262145]  kunit_try_run_case+0x170/0x3f0
[   29.262180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.262220]  kthread+0x328/0x630
[   29.262251]  ret_from_fork+0x10/0x20
[   29.262285] 
[   29.262303] The buggy address belongs to the object at fff00000c59f9700
[   29.262303]  which belongs to the cache kmalloc-128 of size 128
[   29.262356] The buggy address is located 5 bytes to the right of
[   29.262356]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.262417] 
[   29.262435] The buggy address belongs to the physical page:
[   29.262462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.262510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.262554] page_type: f5(slab)
[   29.262591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.262638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.262676] page dumped because: kasan: bad access detected
[   29.262704] 
[   29.262721] Memory state around the buggy address:
[   29.262749]  fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.262794]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262834] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.262870]                                                                 ^
[   29.262907]  fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262946]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.262982] ==================================================================
[   29.263114] ==================================================================
[   29.263165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.263234] Read of size 1 at addr fff00000c59f9780 by task kunit_try_catch/167
[   29.263342] 
[   29.263369] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   29.263449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.263475] Hardware name: linux,dummy-virt (DT)
[   29.263503] Call trace:
[   29.263539]  show_stack+0x20/0x38 (C)
[   29.263615]  dump_stack_lvl+0x8c/0xd0
[   29.263684]  print_report+0x118/0x5d0
[   29.263728]  kasan_report+0xdc/0x128
[   29.263807]  __asan_report_load1_noabort+0x20/0x30
[   29.263878]  kmalloc_oob_right+0x5d0/0x660
[   29.263944]  kunit_try_run_case+0x170/0x3f0
[   29.263999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264089]  kthread+0x328/0x630
[   29.264132]  ret_from_fork+0x10/0x20
[   29.264436] 
[   29.264467] Allocated by task 167:
[   29.264503]  kasan_save_stack+0x3c/0x68
[   29.264540]  kasan_save_track+0x20/0x40
[   29.264580]  kasan_save_alloc_info+0x40/0x58
[   29.264617]  __kasan_kmalloc+0xd4/0xd8
[   29.264650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.264688]  kmalloc_oob_right+0xb0/0x660
[   29.264725]  kunit_try_run_case+0x170/0x3f0
[   29.264760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.264859]  kthread+0x328/0x630
[   29.264931]  ret_from_fork+0x10/0x20
[   29.264982] 
[   29.265000] The buggy address belongs to the object at fff00000c59f9700
[   29.265000]  which belongs to the cache kmalloc-128 of size 128
[   29.265110] The buggy address is located 13 bytes to the right of
[   29.265110]  allocated 115-byte region [fff00000c59f9700, fff00000c59f9773)
[   29.265212] 
[   29.265258] The buggy address belongs to the physical page:
[   29.265286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9
[   29.265596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.265707] page_type: f5(slab)
[   29.265756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.265826] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.265901] page dumped because: kasan: bad access detected
[   29.265968] 
[   29.266018] Memory state around the buggy address:
[   29.266124]  fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266198]  fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.266239] >fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266542]                    ^
[   29.266596]  fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.266653]  fff00000c59f9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266717] ==================================================================

[   25.014947] ==================================================================
[   25.015633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   25.016254] Read of size 1 at addr ffff88810553d380 by task kunit_try_catch/185
[   25.016888] 
[   25.017056] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   25.017116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.017128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.017148] Call Trace:
[   25.017163]  <TASK>
[   25.017176]  dump_stack_lvl+0x73/0xb0
[   25.017205]  print_report+0xd1/0x610
[   25.017238]  ? __virt_addr_valid+0x1db/0x2d0
[   25.017261]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.017290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.017315]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.017336]  kasan_report+0x141/0x180
[   25.017357]  ? kmalloc_oob_right+0x68a/0x7f0
[   25.017382]  __asan_report_load1_noabort+0x18/0x20
[   25.017405]  kmalloc_oob_right+0x68a/0x7f0
[   25.017426]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   25.017447]  ? __schedule+0x10c6/0x2b60
[   25.017469]  ? __pfx_read_tsc+0x10/0x10
[   25.017489]  ? ktime_get_ts64+0x86/0x230
[   25.017513]  kunit_try_run_case+0x1a5/0x480
[   25.017535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.017556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.017578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.017600]  ? __kthread_parkme+0x82/0x180
[   25.017622]  ? preempt_count_sub+0x50/0x80
[   25.017644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.017666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.017696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.017720]  kthread+0x337/0x6f0
[   25.017745]  ? trace_preempt_on+0x20/0xc0
[   25.017774]  ? __pfx_kthread+0x10/0x10
[   25.017793]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.017814]  ? calculate_sigpending+0x7b/0xa0
[   25.017836]  ? __pfx_kthread+0x10/0x10
[   25.017856]  ret_from_fork+0x116/0x1d0
[   25.017874]  ? __pfx_kthread+0x10/0x10
[   25.017893]  ret_from_fork_asm+0x1a/0x30
[   25.017927]  </TASK>
[   25.017937] 
[   25.028269] Allocated by task 185:
[   25.028474]  kasan_save_stack+0x45/0x70
[   25.028611]  kasan_save_track+0x18/0x40
[   25.029045]  kasan_save_alloc_info+0x3b/0x50
[   25.029535]  __kasan_kmalloc+0xb7/0xc0
[   25.029935]  __kmalloc_cache_noprof+0x189/0x420
[   25.030457]  kmalloc_oob_right+0xa9/0x7f0
[   25.030664]  kunit_try_run_case+0x1a5/0x480
[   25.030798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.030958]  kthread+0x337/0x6f0
[   25.031065]  ret_from_fork+0x116/0x1d0
[   25.031197]  ret_from_fork_asm+0x1a/0x30
[   25.031463] 
[   25.031590] The buggy address belongs to the object at ffff88810553d300
[   25.031590]  which belongs to the cache kmalloc-128 of size 128
[   25.032034] The buggy address is located 13 bytes to the right of
[   25.032034]  allocated 115-byte region [ffff88810553d300, ffff88810553d373)
[   25.032692] 
[   25.032798] The buggy address belongs to the physical page:
[   25.033140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   25.033563] flags: 0x200000000000000(node=0|zone=2)
[   25.033753] page_type: f5(slab)
[   25.033862] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.034238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.034708] page dumped because: kasan: bad access detected
[   25.035014] 
[   25.035132] Memory state around the buggy address:
[   25.035332]  ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.035569]  ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.035998] >ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.036305]                    ^
[   25.036585]  ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.037196]  ffff88810553d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.037461] ==================================================================
[   24.957213] ==================================================================
[   24.958195] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   24.959199] Write of size 1 at addr ffff88810553d373 by task kunit_try_catch/185
[   24.959941] 
[   24.961345] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   24.961690] Tainted: [N]=TEST
[   24.961721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.961948] Call Trace:
[   24.962015]  <TASK>
[   24.962173]  dump_stack_lvl+0x73/0xb0
[   24.962288]  print_report+0xd1/0x610
[   24.962349]  ? __virt_addr_valid+0x1db/0x2d0
[   24.962376]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.962431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.962457]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.962488]  kasan_report+0x141/0x180
[   24.962509]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.962535]  __asan_report_store1_noabort+0x1b/0x30
[   24.962558]  kmalloc_oob_right+0x6f0/0x7f0
[   24.962580]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.962601]  ? __schedule+0x10c6/0x2b60
[   24.962625]  ? __pfx_read_tsc+0x10/0x10
[   24.962646]  ? ktime_get_ts64+0x86/0x230
[   24.962672]  kunit_try_run_case+0x1a5/0x480
[   24.962698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.962719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.962741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.962763]  ? __kthread_parkme+0x82/0x180
[   24.962788]  ? preempt_count_sub+0x50/0x80
[   24.962811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.962833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.962855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.962878]  kthread+0x337/0x6f0
[   24.962896]  ? trace_preempt_on+0x20/0xc0
[   24.962920]  ? __pfx_kthread+0x10/0x10
[   24.962940]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.962960]  ? calculate_sigpending+0x7b/0xa0
[   24.962984]  ? __pfx_kthread+0x10/0x10
[   24.963004]  ret_from_fork+0x116/0x1d0
[   24.963022]  ? __pfx_kthread+0x10/0x10
[   24.963042]  ret_from_fork_asm+0x1a/0x30
[   24.963110]  </TASK>
[   24.963175] 
[   24.972604] Allocated by task 185:
[   24.973067]  kasan_save_stack+0x45/0x70
[   24.973403]  kasan_save_track+0x18/0x40
[   24.973756]  kasan_save_alloc_info+0x3b/0x50
[   24.974103]  __kasan_kmalloc+0xb7/0xc0
[   24.974277]  __kmalloc_cache_noprof+0x189/0x420
[   24.974671]  kmalloc_oob_right+0xa9/0x7f0
[   24.974872]  kunit_try_run_case+0x1a5/0x480
[   24.975054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.975674]  kthread+0x337/0x6f0
[   24.975840]  ret_from_fork+0x116/0x1d0
[   24.976200]  ret_from_fork_asm+0x1a/0x30
[   24.976683] 
[   24.976859] The buggy address belongs to the object at ffff88810553d300
[   24.976859]  which belongs to the cache kmalloc-128 of size 128
[   24.977751] The buggy address is located 0 bytes to the right of
[   24.977751]  allocated 115-byte region [ffff88810553d300, ffff88810553d373)
[   24.978560] 
[   24.978861] The buggy address belongs to the physical page:
[   24.979673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   24.980291] flags: 0x200000000000000(node=0|zone=2)
[   24.980949] page_type: f5(slab)
[   24.981533] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.981841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.983136] page dumped because: kasan: bad access detected
[   24.983348] 
[   24.983422] Memory state around the buggy address:
[   24.983816]  ffff88810553d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.984050]  ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.984404] >ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.984638]                                                              ^
[   24.985432]  ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.985761]  ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.986125] ==================================================================
[   24.988766] ==================================================================
[   24.989150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   24.989378] Write of size 1 at addr ffff88810553d378 by task kunit_try_catch/185
[   24.989597] 
[   24.989673] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   24.989719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.989730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.989750] Call Trace:
[   24.989762]  <TASK>
[   24.989776]  dump_stack_lvl+0x73/0xb0
[   24.989802]  print_report+0xd1/0x610
[   24.989822]  ? __virt_addr_valid+0x1db/0x2d0
[   24.989843]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.989862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.989886]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.989905]  kasan_report+0x141/0x180
[   24.989930]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.989955]  __asan_report_store1_noabort+0x1b/0x30
[   24.989977]  kmalloc_oob_right+0x6bd/0x7f0
[   24.989997]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.990018]  ? __schedule+0x10c6/0x2b60
[   24.990039]  ? __pfx_read_tsc+0x10/0x10
[   24.990059]  ? ktime_get_ts64+0x86/0x230
[   24.990101]  kunit_try_run_case+0x1a5/0x480
[   24.990124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.990144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.990165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.990187]  ? __kthread_parkme+0x82/0x180
[   24.990210]  ? preempt_count_sub+0x50/0x80
[   24.990253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.990276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.990299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.990321]  kthread+0x337/0x6f0
[   24.990339]  ? trace_preempt_on+0x20/0xc0
[   24.990361]  ? __pfx_kthread+0x10/0x10
[   24.990381]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.990401]  ? calculate_sigpending+0x7b/0xa0
[   24.990424]  ? __pfx_kthread+0x10/0x10
[   24.990444]  ret_from_fork+0x116/0x1d0
[   24.990461]  ? __pfx_kthread+0x10/0x10
[   24.990481]  ret_from_fork_asm+0x1a/0x30
[   24.990651]  </TASK>
[   24.990664] 
[   25.000527] Allocated by task 185:
[   25.001130]  kasan_save_stack+0x45/0x70
[   25.001734]  kasan_save_track+0x18/0x40
[   25.002425]  kasan_save_alloc_info+0x3b/0x50
[   25.003146]  __kasan_kmalloc+0xb7/0xc0
[   25.003728]  __kmalloc_cache_noprof+0x189/0x420
[   25.004283]  kmalloc_oob_right+0xa9/0x7f0
[   25.004649]  kunit_try_run_case+0x1a5/0x480
[   25.004800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.004967]  kthread+0x337/0x6f0
[   25.005089]  ret_from_fork+0x116/0x1d0
[   25.005215]  ret_from_fork_asm+0x1a/0x30
[   25.005347] 
[   25.005468] The buggy address belongs to the object at ffff88810553d300
[   25.005468]  which belongs to the cache kmalloc-128 of size 128
[   25.006663] The buggy address is located 5 bytes to the right of
[   25.006663]  allocated 115-byte region [ffff88810553d300, ffff88810553d373)
[   25.008072] 
[   25.008239] The buggy address belongs to the physical page:
[   25.008779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d
[   25.009163] flags: 0x200000000000000(node=0|zone=2)
[   25.009641] page_type: f5(slab)
[   25.009944] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.010247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.010552] page dumped because: kasan: bad access detected
[   25.010769] 
[   25.010845] Memory state around the buggy address:
[   25.011024]  ffff88810553d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.011244]  ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.011922] >ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.012646]                                                                 ^
[   25.013321]  ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.013538]  ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.014022] ==================================================================