Hay
Date
July 1, 2025, 12:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.028169] ==================================================================
[   17.028210] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.028262] Write of size 1 at addr fff00000c4687f78 by task kunit_try_catch/136
[   17.028795] 
[   17.028846] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.028980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.029115] Hardware name: linux,dummy-virt (DT)
[   17.029573] Call trace:
[   17.029631]  show_stack+0x20/0x38 (C)
[   17.029734]  dump_stack_lvl+0x8c/0xd0
[   17.029791]  print_report+0x118/0x608
[   17.029839]  kasan_report+0xdc/0x128
[   17.030122]  __asan_report_store1_noabort+0x20/0x30
[   17.030248]  kmalloc_oob_right+0x538/0x660
[   17.030301]  kunit_try_run_case+0x170/0x3f0
[   17.030415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.030544]  kthread+0x328/0x630
[   17.030595]  ret_from_fork+0x10/0x20
[   17.030671] 
[   17.030779] Allocated by task 136:
[   17.030924]  kasan_save_stack+0x3c/0x68
[   17.030979]  kasan_save_track+0x20/0x40
[   17.031077]  kasan_save_alloc_info+0x40/0x58
[   17.031145]  __kasan_kmalloc+0xd4/0xd8
[   17.031182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.031510]  kmalloc_oob_right+0xb0/0x660
[   17.031603]  kunit_try_run_case+0x170/0x3f0
[   17.031761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.031853]  kthread+0x328/0x630
[   17.031892]  ret_from_fork+0x10/0x20
[   17.032189] 
[   17.032293] The buggy address belongs to the object at fff00000c4687f00
[   17.032293]  which belongs to the cache kmalloc-128 of size 128
[   17.032437] The buggy address is located 5 bytes to the right of
[   17.032437]  allocated 115-byte region [fff00000c4687f00, fff00000c4687f73)
[   17.032618] 
[   17.032641] The buggy address belongs to the physical page:
[   17.032672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687
[   17.033086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.033150] page_type: f5(slab)
[   17.033198] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.033486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.033642] page dumped because: kasan: bad access detected
[   17.033784] 
[   17.033803] Memory state around the buggy address:
[   17.034029]  fff00000c4687e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.034121]  fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.034168] >fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.034217]                                                                 ^
[   17.034266]  fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.034311]  fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.034360] ==================================================================
[   17.019331] ==================================================================
[   17.019770] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.020636] Write of size 1 at addr fff00000c4687f73 by task kunit_try_catch/136
[   17.020748] 
[   17.021558] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   17.021704] Tainted: [N]=TEST
[   17.021737] Hardware name: linux,dummy-virt (DT)
[   17.021961] Call trace:
[   17.022134]  show_stack+0x20/0x38 (C)
[   17.022270]  dump_stack_lvl+0x8c/0xd0
[   17.022332]  print_report+0x118/0x608
[   17.022382]  kasan_report+0xdc/0x128
[   17.022433]  __asan_report_store1_noabort+0x20/0x30
[   17.022492]  kmalloc_oob_right+0x5a4/0x660
[   17.022538]  kunit_try_run_case+0x170/0x3f0
[   17.022589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.022642]  kthread+0x328/0x630
[   17.022685]  ret_from_fork+0x10/0x20
[   17.022850] 
[   17.022889] Allocated by task 136:
[   17.023005]  kasan_save_stack+0x3c/0x68
[   17.023071]  kasan_save_track+0x20/0x40
[   17.023112]  kasan_save_alloc_info+0x40/0x58
[   17.023152]  __kasan_kmalloc+0xd4/0xd8
[   17.023188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.023232]  kmalloc_oob_right+0xb0/0x660
[   17.023267]  kunit_try_run_case+0x170/0x3f0
[   17.023304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.023347]  kthread+0x328/0x630
[   17.023378]  ret_from_fork+0x10/0x20
[   17.023432] 
[   17.023504] The buggy address belongs to the object at fff00000c4687f00
[   17.023504]  which belongs to the cache kmalloc-128 of size 128
[   17.023600] The buggy address is located 0 bytes to the right of
[   17.023600]  allocated 115-byte region [fff00000c4687f00, fff00000c4687f73)
[   17.023667] 
[   17.023750] The buggy address belongs to the physical page:
[   17.023961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687
[   17.024244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.024554] page_type: f5(slab)
[   17.024856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.024918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.025024] page dumped because: kasan: bad access detected
[   17.025064] 
[   17.025089] Memory state around the buggy address:
[   17.025313]  fff00000c4687e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.025379]  fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.025435] >fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.025503]                                                              ^
[   17.025588]  fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.025633]  fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.025695] ==================================================================
[   17.036157] ==================================================================
[   17.036209] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.036258] Read of size 1 at addr fff00000c4687f80 by task kunit_try_catch/136
[   17.036557] 
[   17.036693] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.036781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.036808] Hardware name: linux,dummy-virt (DT)
[   17.036846] Call trace:
[   17.036977]  show_stack+0x20/0x38 (C)
[   17.037033]  dump_stack_lvl+0x8c/0xd0
[   17.037201]  print_report+0x118/0x608
[   17.037268]  kasan_report+0xdc/0x128
[   17.037314]  __asan_report_load1_noabort+0x20/0x30
[   17.037366]  kmalloc_oob_right+0x5d0/0x660
[   17.037411]  kunit_try_run_case+0x170/0x3f0
[   17.037470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.037522]  kthread+0x328/0x630
[   17.037569]  ret_from_fork+0x10/0x20
[   17.037625] 
[   17.037643] Allocated by task 136:
[   17.037671]  kasan_save_stack+0x3c/0x68
[   17.037712]  kasan_save_track+0x20/0x40
[   17.037757]  kasan_save_alloc_info+0x40/0x58
[   17.037805]  __kasan_kmalloc+0xd4/0xd8
[   17.037847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.037886]  kmalloc_oob_right+0xb0/0x660
[   17.037921]  kunit_try_run_case+0x170/0x3f0
[   17.037957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.037999]  kthread+0x328/0x630
[   17.038029]  ret_from_fork+0x10/0x20
[   17.038063] 
[   17.038080] The buggy address belongs to the object at fff00000c4687f00
[   17.038080]  which belongs to the cache kmalloc-128 of size 128
[   17.038142] The buggy address is located 13 bytes to the right of
[   17.038142]  allocated 115-byte region [fff00000c4687f00, fff00000c4687f73)
[   17.038207] 
[   17.038235] The buggy address belongs to the physical page:
[   17.038273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687
[   17.038326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.038374] page_type: f5(slab)
[   17.038411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.038952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.039021] page dumped because: kasan: bad access detected
[   17.039164] 
[   17.039262] Memory state around the buggy address:
[   17.039295]  fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.039431]  fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.039491] >fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.039533]                    ^
[   17.039609]  fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.039760]  fff00000c4688080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   17.040043] ==================================================================

[   10.714858] ==================================================================
[   10.715493] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.716447] Write of size 1 at addr ffff888102cbbd73 by task kunit_try_catch/153
[   10.716800] 
[   10.717855] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.718230] Tainted: [N]=TEST
[   10.718266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.718481] Call Trace:
[   10.718546]  <TASK>
[   10.718702]  dump_stack_lvl+0x73/0xb0
[   10.718790]  print_report+0xd1/0x650
[   10.718818]  ? __virt_addr_valid+0x1db/0x2d0
[   10.718843]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.718863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.718884]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.718905]  kasan_report+0x141/0x180
[   10.718926]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.718951]  __asan_report_store1_noabort+0x1b/0x30
[   10.718970]  kmalloc_oob_right+0x6f0/0x7f0
[   10.718992]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.719013]  ? __schedule+0x10cc/0x2b60
[   10.719063]  ? __pfx_read_tsc+0x10/0x10
[   10.719085]  ? ktime_get_ts64+0x86/0x230
[   10.719110]  kunit_try_run_case+0x1a5/0x480
[   10.719136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.719157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.719180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.719201]  ? __kthread_parkme+0x82/0x180
[   10.719222]  ? preempt_count_sub+0x50/0x80
[   10.719246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.719268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.719289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.719311]  kthread+0x337/0x6f0
[   10.719329]  ? trace_preempt_on+0x20/0xc0
[   10.719352]  ? __pfx_kthread+0x10/0x10
[   10.719371]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.719391]  ? calculate_sigpending+0x7b/0xa0
[   10.719415]  ? __pfx_kthread+0x10/0x10
[   10.719435]  ret_from_fork+0x116/0x1d0
[   10.719452]  ? __pfx_kthread+0x10/0x10
[   10.719471]  ret_from_fork_asm+0x1a/0x30
[   10.719525]  </TASK>
[   10.719590] 
[   10.729853] Allocated by task 153:
[   10.730181]  kasan_save_stack+0x45/0x70
[   10.730395]  kasan_save_track+0x18/0x40
[   10.730583]  kasan_save_alloc_info+0x3b/0x50
[   10.730770]  __kasan_kmalloc+0xb7/0xc0
[   10.730904]  __kmalloc_cache_noprof+0x189/0x420
[   10.731077]  kmalloc_oob_right+0xa9/0x7f0
[   10.731216]  kunit_try_run_case+0x1a5/0x480
[   10.731433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.731680]  kthread+0x337/0x6f0
[   10.731890]  ret_from_fork+0x116/0x1d0
[   10.732035]  ret_from_fork_asm+0x1a/0x30
[   10.732208] 
[   10.732326] The buggy address belongs to the object at ffff888102cbbd00
[   10.732326]  which belongs to the cache kmalloc-128 of size 128
[   10.733426] The buggy address is located 0 bytes to the right of
[   10.733426]  allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73)
[   10.733961] 
[   10.734113] The buggy address belongs to the physical page:
[   10.734482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb
[   10.735088] flags: 0x200000000000000(node=0|zone=2)
[   10.735702] page_type: f5(slab)
[   10.736174] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.736710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.737105] page dumped because: kasan: bad access detected
[   10.737371] 
[   10.737451] Memory state around the buggy address:
[   10.737864]  ffff888102cbbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.738347]  ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.738765] >ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.739070]                                                              ^
[   10.739402]  ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.739735]  ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.740071] ==================================================================
[   10.741614] ==================================================================
[   10.741878] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.742395] Write of size 1 at addr ffff888102cbbd78 by task kunit_try_catch/153
[   10.742672] 
[   10.742759] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.742800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.742812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.742831] Call Trace:
[   10.742843]  <TASK>
[   10.742857]  dump_stack_lvl+0x73/0xb0
[   10.742882]  print_report+0xd1/0x650
[   10.742903]  ? __virt_addr_valid+0x1db/0x2d0
[   10.742923]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.742943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.742963]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.742984]  kasan_report+0x141/0x180
[   10.743004]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.743047]  __asan_report_store1_noabort+0x1b/0x30
[   10.743067]  kmalloc_oob_right+0x6bd/0x7f0
[   10.743088]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.743109]  ? __schedule+0x10cc/0x2b60
[   10.743130]  ? __pfx_read_tsc+0x10/0x10
[   10.743159]  ? ktime_get_ts64+0x86/0x230
[   10.743182]  kunit_try_run_case+0x1a5/0x480
[   10.743204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.743224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.743246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.743267]  ? __kthread_parkme+0x82/0x180
[   10.743286]  ? preempt_count_sub+0x50/0x80
[   10.743307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.743329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.743350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.743372]  kthread+0x337/0x6f0
[   10.743390]  ? trace_preempt_on+0x20/0xc0
[   10.743412]  ? __pfx_kthread+0x10/0x10
[   10.743431]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.743450]  ? calculate_sigpending+0x7b/0xa0
[   10.743472]  ? __pfx_kthread+0x10/0x10
[   10.743493]  ret_from_fork+0x116/0x1d0
[   10.743509]  ? __pfx_kthread+0x10/0x10
[   10.743529]  ret_from_fork_asm+0x1a/0x30
[   10.743557]  </TASK>
[   10.743568] 
[   10.751882] Allocated by task 153:
[   10.752013]  kasan_save_stack+0x45/0x70
[   10.752295]  kasan_save_track+0x18/0x40
[   10.752675]  kasan_save_alloc_info+0x3b/0x50
[   10.752863]  __kasan_kmalloc+0xb7/0xc0
[   10.753057]  __kmalloc_cache_noprof+0x189/0x420
[   10.753292]  kmalloc_oob_right+0xa9/0x7f0
[   10.753432]  kunit_try_run_case+0x1a5/0x480
[   10.753793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.754109]  kthread+0x337/0x6f0
[   10.754297]  ret_from_fork+0x116/0x1d0
[   10.754543]  ret_from_fork_asm+0x1a/0x30
[   10.754712] 
[   10.754782] The buggy address belongs to the object at ffff888102cbbd00
[   10.754782]  which belongs to the cache kmalloc-128 of size 128
[   10.755273] The buggy address is located 5 bytes to the right of
[   10.755273]  allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73)
[   10.755726] 
[   10.755868] The buggy address belongs to the physical page:
[   10.756126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb
[   10.756449] flags: 0x200000000000000(node=0|zone=2)
[   10.756609] page_type: f5(slab)
[   10.756728] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.757490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.757858] page dumped because: kasan: bad access detected
[   10.758168] 
[   10.759095] Memory state around the buggy address:
[   10.759323]  ffff888102cbbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.759640]  ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.759930] >ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.761444]                                                                 ^
[   10.762017]  ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.762994]  ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.763526] ==================================================================
[   10.764820] ==================================================================
[   10.766325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.767486] Read of size 1 at addr ffff888102cbbd80 by task kunit_try_catch/153
[   10.767746] 
[   10.767831] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.767871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.767882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.767903] Call Trace:
[   10.767916]  <TASK>
[   10.767930]  dump_stack_lvl+0x73/0xb0
[   10.767957]  print_report+0xd1/0x650
[   10.767979]  ? __virt_addr_valid+0x1db/0x2d0
[   10.768000]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.768020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.768260]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.768282]  kasan_report+0x141/0x180
[   10.768304]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.768329]  __asan_report_load1_noabort+0x18/0x20
[   10.768352]  kmalloc_oob_right+0x68a/0x7f0
[   10.768604]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.768634]  ? __schedule+0x10cc/0x2b60
[   10.768655]  ? __pfx_read_tsc+0x10/0x10
[   10.768675]  ? ktime_get_ts64+0x86/0x230
[   10.768697]  kunit_try_run_case+0x1a5/0x480
[   10.768719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.768740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.768761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.768782]  ? __kthread_parkme+0x82/0x180
[   10.768800]  ? preempt_count_sub+0x50/0x80
[   10.768822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.768844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.768866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.768888]  kthread+0x337/0x6f0
[   10.768906]  ? trace_preempt_on+0x20/0xc0
[   10.768927]  ? __pfx_kthread+0x10/0x10
[   10.768946]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.768966]  ? calculate_sigpending+0x7b/0xa0
[   10.768989]  ? __pfx_kthread+0x10/0x10
[   10.769009]  ret_from_fork+0x116/0x1d0
[   10.769038]  ? __pfx_kthread+0x10/0x10
[   10.769059]  ret_from_fork_asm+0x1a/0x30
[   10.769088]  </TASK>
[   10.769099] 
[   10.784524] Allocated by task 153:
[   10.784967]  kasan_save_stack+0x45/0x70
[   10.785464]  kasan_save_track+0x18/0x40
[   10.785714]  kasan_save_alloc_info+0x3b/0x50
[   10.786227]  __kasan_kmalloc+0xb7/0xc0
[   10.786629]  __kmalloc_cache_noprof+0x189/0x420
[   10.786790]  kmalloc_oob_right+0xa9/0x7f0
[   10.786926]  kunit_try_run_case+0x1a5/0x480
[   10.787154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.788199]  kthread+0x337/0x6f0
[   10.788579]  ret_from_fork+0x116/0x1d0
[   10.788942]  ret_from_fork_asm+0x1a/0x30
[   10.789366] 
[   10.789583] The buggy address belongs to the object at ffff888102cbbd00
[   10.789583]  which belongs to the cache kmalloc-128 of size 128
[   10.790687] The buggy address is located 13 bytes to the right of
[   10.790687]  allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73)
[   10.791751] 
[   10.791946] The buggy address belongs to the physical page:
[   10.792341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb
[   10.792709] flags: 0x200000000000000(node=0|zone=2)
[   10.792905] page_type: f5(slab)
[   10.793365] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.794087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.794393] page dumped because: kasan: bad access detected
[   10.794814] 
[   10.794998] Memory state around the buggy address:
[   10.795530]  ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.796020]  ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.796445] >ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.796651]                    ^
[   10.796761]  ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.796965]  ffff888102cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.797212] ==================================================================