Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.238794] ==================================================================
[   31.238829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.238870] Read of size 1 at addr fff00000c3efd580 by task kunit_try_catch/167
[   31.238937] 
[   31.238963] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.239058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.239095] Hardware name: linux,dummy-virt (DT)
[   31.239142] Call trace:
[   31.239181]  show_stack+0x20/0x38 (C)
[   31.239226]  dump_stack_lvl+0x8c/0xd0
[   31.239285]  print_report+0x118/0x5e8
[   31.239344]  kasan_report+0xdc/0x128
[   31.239402]  __asan_report_load1_noabort+0x20/0x30
[   31.239458]  kmalloc_oob_right+0x5d0/0x660
[   31.239503]  kunit_try_run_case+0x170/0x3f0
[   31.239547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.239911]  kthread+0x328/0x630
[   31.239955]  ret_from_fork+0x10/0x20
[   31.239999] 
[   31.240034] Allocated by task 167:
[   31.240190]  kasan_save_stack+0x3c/0x68
[   31.240244]  kasan_save_track+0x20/0x40
[   31.240309]  kasan_save_alloc_info+0x40/0x58
[   31.240378]  __kasan_kmalloc+0xd4/0xd8
[   31.240475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.240544]  kmalloc_oob_right+0xb0/0x660
[   31.240633]  kunit_try_run_case+0x170/0x3f0
[   31.240688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.240728]  kthread+0x328/0x630
[   31.240776]  ret_from_fork+0x10/0x20
[   31.240810] 
[   31.240827] The buggy address belongs to the object at fff00000c3efd500
[   31.240827]  which belongs to the cache kmalloc-128 of size 128
[   31.240881] The buggy address is located 13 bytes to the right of
[   31.240881]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.240944] 
[   31.240962] The buggy address belongs to the physical page:
[   31.240989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.241037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.241091] page_type: f5(slab)
[   31.241126] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.241214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.241306] page dumped because: kasan: bad access detected
[   31.241335] 
[   31.241387] Memory state around the buggy address:
[   31.241465]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241548]  fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.241613] >fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241649]                    ^
[   31.241675]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241713]  fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.241749] ==================================================================
[   31.236686] ==================================================================
[   31.236724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   31.236771] Write of size 1 at addr fff00000c3efd578 by task kunit_try_catch/167
[   31.236846] 
[   31.236876] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.236955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.236980] Hardware name: linux,dummy-virt (DT)
[   31.237009] Call trace:
[   31.237036]  show_stack+0x20/0x38 (C)
[   31.237103]  dump_stack_lvl+0x8c/0xd0
[   31.237150]  print_report+0x118/0x5e8
[   31.237192]  kasan_report+0xdc/0x128
[   31.237235]  __asan_report_store1_noabort+0x20/0x30
[   31.237282]  kmalloc_oob_right+0x538/0x660
[   31.237336]  kunit_try_run_case+0x170/0x3f0
[   31.237389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.237448]  kthread+0x328/0x630
[   31.237490]  ret_from_fork+0x10/0x20
[   31.237539] 
[   31.237557] Allocated by task 167:
[   31.237583]  kasan_save_stack+0x3c/0x68
[   31.237619]  kasan_save_track+0x20/0x40
[   31.237652]  kasan_save_alloc_info+0x40/0x58
[   31.237696]  __kasan_kmalloc+0xd4/0xd8
[   31.237729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.237772]  kmalloc_oob_right+0xb0/0x660
[   31.237809]  kunit_try_run_case+0x170/0x3f0
[   31.237843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.237891]  kthread+0x328/0x630
[   31.237931]  ret_from_fork+0x10/0x20
[   31.237965] 
[   31.237982] The buggy address belongs to the object at fff00000c3efd500
[   31.237982]  which belongs to the cache kmalloc-128 of size 128
[   31.238041] The buggy address is located 5 bytes to the right of
[   31.238041]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.238111] 
[   31.238129] The buggy address belongs to the physical page:
[   31.238157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.238206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.238252] page_type: f5(slab)
[   31.238287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.238334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.238372] page dumped because: kasan: bad access detected
[   31.238400] 
[   31.238417] Memory state around the buggy address:
[   31.238446]  fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.238486]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238526] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.238562]                                                                 ^
[   31.238600]  fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238638]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.238673] ==================================================================
[   31.225227] ==================================================================
[   31.225541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   31.226363] Write of size 1 at addr fff00000c3efd573 by task kunit_try_catch/167
[   31.226516] 
[   31.227298] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.227666] Tainted: [N]=TEST
[   31.227700] Hardware name: linux,dummy-virt (DT)
[   31.228966] Call trace:
[   31.229336]  show_stack+0x20/0x38 (C)
[   31.229510]  dump_stack_lvl+0x8c/0xd0
[   31.229566]  print_report+0x118/0x5e8
[   31.229611]  kasan_report+0xdc/0x128
[   31.229653]  __asan_report_store1_noabort+0x20/0x30
[   31.229701]  kmalloc_oob_right+0x5a4/0x660
[   31.229747]  kunit_try_run_case+0x170/0x3f0
[   31.229795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.229844]  kthread+0x328/0x630
[   31.229951]  ret_from_fork+0x10/0x20
[   31.230393] 
[   31.230483] Allocated by task 167:
[   31.230784]  kasan_save_stack+0x3c/0x68
[   31.230940]  kasan_save_track+0x20/0x40
[   31.230975]  kasan_save_alloc_info+0x40/0x58
[   31.231011]  __kasan_kmalloc+0xd4/0xd8
[   31.231043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.231094]  kmalloc_oob_right+0xb0/0x660
[   31.231129]  kunit_try_run_case+0x170/0x3f0
[   31.231164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.231204]  kthread+0x328/0x630
[   31.231236]  ret_from_fork+0x10/0x20
[   31.231432] 
[   31.231553] The buggy address belongs to the object at fff00000c3efd500
[   31.231553]  which belongs to the cache kmalloc-128 of size 128
[   31.231644] The buggy address is located 0 bytes to the right of
[   31.231644]  allocated 115-byte region [fff00000c3efd500, fff00000c3efd573)
[   31.231739] 
[   31.232128] The buggy address belongs to the physical page:
[   31.232627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.233026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.233367] page_type: f5(slab)
[   31.233844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.233976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.234156] page dumped because: kasan: bad access detected
[   31.234201] 
[   31.234226] Memory state around the buggy address:
[   31.234476]  fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.234649]  fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.234738] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.234860]                                                              ^
[   31.235063]  fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235140]  fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235215] ==================================================================


[   24.047626] ==================================================================
[   24.048467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   24.049131] Write of size 1 at addr ffff8881012bce78 by task kunit_try_catch/184
[   24.049788] 
[   24.049979] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.050027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.050038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.050060] Call Trace:
[   24.050073]  <TASK>
[   24.050088]  dump_stack_lvl+0x73/0xb0
[   24.050282]  print_report+0xd1/0x640
[   24.050312]  ? __virt_addr_valid+0x1db/0x2d0
[   24.050335]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.050355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.050380]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.050401]  kasan_report+0x141/0x180
[   24.050422]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.050446]  __asan_report_store1_noabort+0x1b/0x30
[   24.050470]  kmalloc_oob_right+0x6bd/0x7f0
[   24.050491]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.050512]  ? __schedule+0x10da/0x2b60
[   24.050535]  ? __pfx_read_tsc+0x10/0x10
[   24.050556]  ? ktime_get_ts64+0x86/0x230
[   24.050581]  kunit_try_run_case+0x1a5/0x480
[   24.050611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.050665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.050697]  ? __kthread_parkme+0x82/0x180
[   24.050717]  ? preempt_count_sub+0x50/0x80
[   24.050739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.050785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.050864]  kthread+0x337/0x6f0
[   24.050884]  ? trace_preempt_on+0x20/0xc0
[   24.050907]  ? __pfx_kthread+0x10/0x10
[   24.050926]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.050956]  ? calculate_sigpending+0x7b/0xa0
[   24.050980]  ? __pfx_kthread+0x10/0x10
[   24.051000]  ret_from_fork+0x116/0x1d0
[   24.051019]  ? __pfx_kthread+0x10/0x10
[   24.051038]  ret_from_fork_asm+0x1a/0x30
[   24.051068]  </TASK>
[   24.051079] 
[   24.059722] Allocated by task 184:
[   24.059880]  kasan_save_stack+0x45/0x70
[   24.060064]  kasan_save_track+0x18/0x40
[   24.060263]  kasan_save_alloc_info+0x3b/0x50
[   24.060442]  __kasan_kmalloc+0xb7/0xc0
[   24.060567]  __kmalloc_cache_noprof+0x189/0x420
[   24.060716]  kmalloc_oob_right+0xa9/0x7f0
[   24.060848]  kunit_try_run_case+0x1a5/0x480
[   24.060987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.061152]  kthread+0x337/0x6f0
[   24.062286]  ret_from_fork+0x116/0x1d0
[   24.062429]  ret_from_fork_asm+0x1a/0x30
[   24.062764] 
[   24.062899] The buggy address belongs to the object at ffff8881012bce00
[   24.062899]  which belongs to the cache kmalloc-128 of size 128
[   24.063617] The buggy address is located 5 bytes to the right of
[   24.063617]  allocated 115-byte region [ffff8881012bce00, ffff8881012bce73)
[   24.064421] 
[   24.064505] The buggy address belongs to the physical page:
[   24.064804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc
[   24.065535] flags: 0x200000000000000(node=0|zone=2)
[   24.065768] page_type: f5(slab)
[   24.066094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.066427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.066763] page dumped because: kasan: bad access detected
[   24.067045] 
[   24.067537] Memory state around the buggy address:
[   24.067733]  ffff8881012bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.068198]  ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.069208] >ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.069483]                                                                 ^
[   24.070025]  ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.070535]  ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.071023] ==================================================================
[   24.071500] ==================================================================
[   24.071727] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   24.071964] Read of size 1 at addr ffff8881012bce80 by task kunit_try_catch/184
[   24.072671] 
[   24.073581] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.073634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.073647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.073668] Call Trace:
[   24.073684]  <TASK>
[   24.073699]  dump_stack_lvl+0x73/0xb0
[   24.073733]  print_report+0xd1/0x640
[   24.073757]  ? __virt_addr_valid+0x1db/0x2d0
[   24.073780]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.073860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.073885]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.073906]  kasan_report+0x141/0x180
[   24.073927]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.073951]  __asan_report_load1_noabort+0x18/0x20
[   24.073975]  kmalloc_oob_right+0x68a/0x7f0
[   24.073996]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.074016]  ? __schedule+0x10da/0x2b60
[   24.074039]  ? __pfx_read_tsc+0x10/0x10
[   24.074060]  ? ktime_get_ts64+0x86/0x230
[   24.074084]  kunit_try_run_case+0x1a5/0x480
[   24.074107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.074128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.074160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.074208]  ? __kthread_parkme+0x82/0x180
[   24.074227]  ? preempt_count_sub+0x50/0x80
[   24.074250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.074272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.074293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.074317]  kthread+0x337/0x6f0
[   24.074335]  ? trace_preempt_on+0x20/0xc0
[   24.074358]  ? __pfx_kthread+0x10/0x10
[   24.074377]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.074406]  ? calculate_sigpending+0x7b/0xa0
[   24.074429]  ? __pfx_kthread+0x10/0x10
[   24.074449]  ret_from_fork+0x116/0x1d0
[   24.074467]  ? __pfx_kthread+0x10/0x10
[   24.074486]  ret_from_fork_asm+0x1a/0x30
[   24.074516]  </TASK>
[   24.074526] 
[   24.084454] Allocated by task 184:
[   24.084588]  kasan_save_stack+0x45/0x70
[   24.084732]  kasan_save_track+0x18/0x40
[   24.085115]  kasan_save_alloc_info+0x3b/0x50
[   24.085331]  __kasan_kmalloc+0xb7/0xc0
[   24.085494]  __kmalloc_cache_noprof+0x189/0x420
[   24.085676]  kmalloc_oob_right+0xa9/0x7f0
[   24.086711]  kunit_try_run_case+0x1a5/0x480
[   24.086875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.087435]  kthread+0x337/0x6f0
[   24.088193]  ret_from_fork+0x116/0x1d0
[   24.088622]  ret_from_fork_asm+0x1a/0x30
[   24.089081] 
[   24.089164] The buggy address belongs to the object at ffff8881012bce00
[   24.089164]  which belongs to the cache kmalloc-128 of size 128
[   24.089809] The buggy address is located 13 bytes to the right of
[   24.089809]  allocated 115-byte region [ffff8881012bce00, ffff8881012bce73)
[   24.090719] 
[   24.090823] The buggy address belongs to the physical page:
[   24.091399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc
[   24.091931] flags: 0x200000000000000(node=0|zone=2)
[   24.092375] page_type: f5(slab)
[   24.092556] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.093286] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.093518] page dumped because: kasan: bad access detected
[   24.093684] 
[   24.093749] Memory state around the buggy address:
[   24.094246]  ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.094554]  ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.095287] >ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.095584]                    ^
[   24.095751]  ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.096348]  ffff8881012bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.096777] ==================================================================
[   24.018523] ==================================================================
[   24.019188] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   24.019886] Write of size 1 at addr ffff8881012bce73 by task kunit_try_catch/184
[   24.020303] 
[   24.021494] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   24.021893] Tainted: [N]=TEST
[   24.021928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.022183] Call Trace:
[   24.022252]  <TASK>
[   24.022393]  dump_stack_lvl+0x73/0xb0
[   24.022486]  print_report+0xd1/0x640
[   24.022516]  ? __virt_addr_valid+0x1db/0x2d0
[   24.022542]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.022562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.022587]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.022613]  kasan_report+0x141/0x180
[   24.022635]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.022659]  __asan_report_store1_noabort+0x1b/0x30
[   24.022683]  kmalloc_oob_right+0x6f0/0x7f0
[   24.022704]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.022725]  ? __schedule+0x10da/0x2b60
[   24.022749]  ? __pfx_read_tsc+0x10/0x10
[   24.022772]  ? ktime_get_ts64+0x86/0x230
[   24.022837]  kunit_try_run_case+0x1a5/0x480
[   24.022864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.022885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.022919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.022951]  ? __kthread_parkme+0x82/0x180
[   24.022972]  ? preempt_count_sub+0x50/0x80
[   24.022995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.023018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.023040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.023063]  kthread+0x337/0x6f0
[   24.023082]  ? trace_preempt_on+0x20/0xc0
[   24.023105]  ? __pfx_kthread+0x10/0x10
[   24.023125]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.023154]  ? calculate_sigpending+0x7b/0xa0
[   24.023187]  ? __pfx_kthread+0x10/0x10
[   24.023207]  ret_from_fork+0x116/0x1d0
[   24.023226]  ? __pfx_kthread+0x10/0x10
[   24.023245]  ret_from_fork_asm+0x1a/0x30
[   24.023301]  </TASK>
[   24.023366] 
[   24.030194] Allocated by task 184:
[   24.030845]  kasan_save_stack+0x45/0x70
[   24.031018]  kasan_save_track+0x18/0x40
[   24.031151]  kasan_save_alloc_info+0x3b/0x50
[   24.031534]  __kasan_kmalloc+0xb7/0xc0
[   24.031718]  __kmalloc_cache_noprof+0x189/0x420
[   24.031942]  kmalloc_oob_right+0xa9/0x7f0
[   24.032131]  kunit_try_run_case+0x1a5/0x480
[   24.032339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.032583]  kthread+0x337/0x6f0
[   24.032743]  ret_from_fork+0x116/0x1d0
[   24.032981]  ret_from_fork_asm+0x1a/0x30
[   24.033442] 
[   24.033596] The buggy address belongs to the object at ffff8881012bce00
[   24.033596]  which belongs to the cache kmalloc-128 of size 128
[   24.034314] The buggy address is located 0 bytes to the right of
[   24.034314]  allocated 115-byte region [ffff8881012bce00, ffff8881012bce73)
[   24.035082] 
[   24.035272] The buggy address belongs to the physical page:
[   24.036261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc
[   24.037009] flags: 0x200000000000000(node=0|zone=2)
[   24.037695] page_type: f5(slab)
[   24.038434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.038764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.039683] page dumped because: kasan: bad access detected
[   24.040340] 
[   24.040594] Memory state around the buggy address:
[   24.041439]  ffff8881012bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.042184]  ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.042950] >ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.043329]                                                              ^
[   24.043579]  ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.044919]  ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045188] ==================================================================