Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.945181] ==================================================================
[   18.945233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.945281] Read of size 1 at addr fff00000c1d5fa80 by task kunit_try_catch/136
[   18.945728] 
[   18.945819] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.945930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.946170] Hardware name: linux,dummy-virt (DT)
[   18.946215] Call trace:
[   18.946383]  show_stack+0x20/0x38 (C)
[   18.946444]  dump_stack_lvl+0x8c/0xd0
[   18.946624]  print_report+0x118/0x608
[   18.946830]  kasan_report+0xdc/0x128
[   18.946957]  __asan_report_load1_noabort+0x20/0x30
[   18.947044]  kmalloc_oob_right+0x5d0/0x660
[   18.947089]  kunit_try_run_case+0x170/0x3f0
[   18.947292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.947461]  kthread+0x328/0x630
[   18.947522]  ret_from_fork+0x10/0x20
[   18.947656] 
[   18.947704] Allocated by task 136:
[   18.947744]  kasan_save_stack+0x3c/0x68
[   18.947792]  kasan_save_track+0x20/0x40
[   18.947829]  kasan_save_alloc_info+0x40/0x58
[   18.947867]  __kasan_kmalloc+0xd4/0xd8
[   18.947901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.947937]  kmalloc_oob_right+0xb0/0x660
[   18.947971]  kunit_try_run_case+0x170/0x3f0
[   18.948006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.948047]  kthread+0x328/0x630
[   18.948078]  ret_from_fork+0x10/0x20
[   18.948116] 
[   18.948134] The buggy address belongs to the object at fff00000c1d5fa00
[   18.948134]  which belongs to the cache kmalloc-128 of size 128
[   18.948188] The buggy address is located 13 bytes to the right of
[   18.948188]  allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73)
[   18.948250] 
[   18.948268] The buggy address belongs to the physical page:
[   18.948296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f
[   18.948345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.948390] page_type: f5(slab)
[   18.948426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.948474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.948513] page dumped because: kasan: bad access detected
[   18.948542] 
[   18.948559] Memory state around the buggy address:
[   18.948588]  fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948629]  fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.948669] >fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948706]                    ^
[   18.948742]  fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.949058]  fff00000c1d5fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.949294] ==================================================================
[   18.937348] ==================================================================
[   18.937388] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.937434] Write of size 1 at addr fff00000c1d5fa78 by task kunit_try_catch/136
[   18.937481] 
[   18.937510] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.937586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.937744] Hardware name: linux,dummy-virt (DT)
[   18.937805] Call trace:
[   18.937827]  show_stack+0x20/0x38 (C)
[   18.937884]  dump_stack_lvl+0x8c/0xd0
[   18.937929]  print_report+0x118/0x608
[   18.937982]  kasan_report+0xdc/0x128
[   18.938034]  __asan_report_store1_noabort+0x20/0x30
[   18.938084]  kmalloc_oob_right+0x538/0x660
[   18.938127]  kunit_try_run_case+0x170/0x3f0
[   18.938179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.938235]  kthread+0x328/0x630
[   18.938275]  ret_from_fork+0x10/0x20
[   18.938319] 
[   18.938336] Allocated by task 136:
[   18.938363]  kasan_save_stack+0x3c/0x68
[   18.938401]  kasan_save_track+0x20/0x40
[   18.938445]  kasan_save_alloc_info+0x40/0x58
[   18.938489]  __kasan_kmalloc+0xd4/0xd8
[   18.938523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.938559]  kmalloc_oob_right+0xb0/0x660
[   18.938593]  kunit_try_run_case+0x170/0x3f0
[   18.938630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.938672]  kthread+0x328/0x630
[   18.938703]  ret_from_fork+0x10/0x20
[   18.939698] 
[   18.939729] The buggy address belongs to the object at fff00000c1d5fa00
[   18.939729]  which belongs to the cache kmalloc-128 of size 128
[   18.939785] The buggy address is located 5 bytes to the right of
[   18.939785]  allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73)
[   18.940276] 
[   18.940305] The buggy address belongs to the physical page:
[   18.940356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f
[   18.940824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.941109] page_type: f5(slab)
[   18.941475] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.942243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.942420] page dumped because: kasan: bad access detected
[   18.942530] 
[   18.942600] Memory state around the buggy address:
[   18.942986]  fff00000c1d5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.943113]  fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.943297] >fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.943336]                                                                 ^
[   18.943767]  fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.943883]  fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.943965] ==================================================================
[   18.928124] ==================================================================
[   18.928463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.929286] Write of size 1 at addr fff00000c1d5fa73 by task kunit_try_catch/136
[   18.929392] 
[   18.930169] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   18.930312] Tainted: [N]=TEST
[   18.930345] Hardware name: linux,dummy-virt (DT)
[   18.930561] Call trace:
[   18.930737]  show_stack+0x20/0x38 (C)
[   18.930871]  dump_stack_lvl+0x8c/0xd0
[   18.930930]  print_report+0x118/0x608
[   18.930977]  kasan_report+0xdc/0x128
[   18.931021]  __asan_report_store1_noabort+0x20/0x30
[   18.931071]  kmalloc_oob_right+0x5a4/0x660
[   18.931115]  kunit_try_run_case+0x170/0x3f0
[   18.931165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.931216]  kthread+0x328/0x630
[   18.931259]  ret_from_fork+0x10/0x20
[   18.931409] 
[   18.931863] Allocated by task 136:
[   18.932012]  kasan_save_stack+0x3c/0x68
[   18.932081]  kasan_save_track+0x20/0x40
[   18.932124]  kasan_save_alloc_info+0x40/0x58
[   18.932163]  __kasan_kmalloc+0xd4/0xd8
[   18.932197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.932237]  kmalloc_oob_right+0xb0/0x660
[   18.932272]  kunit_try_run_case+0x170/0x3f0
[   18.932308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.932349]  kthread+0x328/0x630
[   18.932380]  ret_from_fork+0x10/0x20
[   18.932435] 
[   18.932494] The buggy address belongs to the object at fff00000c1d5fa00
[   18.932494]  which belongs to the cache kmalloc-128 of size 128
[   18.932586] The buggy address is located 0 bytes to the right of
[   18.932586]  allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73)
[   18.932651] 
[   18.932746] The buggy address belongs to the physical page:
[   18.932924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f
[   18.933187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.933473] page_type: f5(slab)
[   18.933783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.933848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.933951] page dumped because: kasan: bad access detected
[   18.933990] 
[   18.934015] Memory state around the buggy address:
[   18.934231]  fff00000c1d5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.934295]  fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934349] >fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.934401]                                                              ^
[   18.934479]  fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934520]  fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934580] ==================================================================

[   12.072827] ==================================================================
[   12.073153] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.073561] Write of size 1 at addr ffff888102602478 by task kunit_try_catch/153
[   12.073902] 
[   12.074023] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.074270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.074287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.074308] Call Trace:
[   12.074346]  <TASK>
[   12.074364]  dump_stack_lvl+0x73/0xb0
[   12.074393]  print_report+0xd1/0x650
[   12.074414]  ? __virt_addr_valid+0x1db/0x2d0
[   12.074435]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.074454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.074479]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.074499]  kasan_report+0x141/0x180
[   12.074519]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.074544]  __asan_report_store1_noabort+0x1b/0x30
[   12.074567]  kmalloc_oob_right+0x6bd/0x7f0
[   12.074588]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.074629]  ? __schedule+0x10cc/0x2b60
[   12.074651]  ? __pfx_read_tsc+0x10/0x10
[   12.074670]  ? ktime_get_ts64+0x86/0x230
[   12.074695]  kunit_try_run_case+0x1a5/0x480
[   12.074717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.074738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.074760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.074799]  ? __kthread_parkme+0x82/0x180
[   12.074818]  ? preempt_count_sub+0x50/0x80
[   12.074840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.074863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.074884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.074905]  kthread+0x337/0x6f0
[   12.074923]  ? trace_preempt_on+0x20/0xc0
[   12.074945]  ? __pfx_kthread+0x10/0x10
[   12.074964]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.074983]  ? calculate_sigpending+0x7b/0xa0
[   12.075007]  ? __pfx_kthread+0x10/0x10
[   12.075027]  ret_from_fork+0x116/0x1d0
[   12.075055]  ? __pfx_kthread+0x10/0x10
[   12.075075]  ret_from_fork_asm+0x1a/0x30
[   12.075106]  </TASK>
[   12.075119] 
[   12.083483] Allocated by task 153:
[   12.083682]  kasan_save_stack+0x45/0x70
[   12.083887]  kasan_save_track+0x18/0x40
[   12.084101]  kasan_save_alloc_info+0x3b/0x50
[   12.084439]  __kasan_kmalloc+0xb7/0xc0
[   12.084748]  __kmalloc_cache_noprof+0x189/0x420
[   12.084967]  kmalloc_oob_right+0xa9/0x7f0
[   12.085217]  kunit_try_run_case+0x1a5/0x480
[   12.085430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.085685]  kthread+0x337/0x6f0
[   12.086026]  ret_from_fork+0x116/0x1d0
[   12.086174]  ret_from_fork_asm+0x1a/0x30
[   12.086370] 
[   12.086462] The buggy address belongs to the object at ffff888102602400
[   12.086462]  which belongs to the cache kmalloc-128 of size 128
[   12.087417] The buggy address is located 5 bytes to the right of
[   12.087417]  allocated 115-byte region [ffff888102602400, ffff888102602473)
[   12.088006] 
[   12.088113] The buggy address belongs to the physical page:
[   12.088400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   12.088645] flags: 0x200000000000000(node=0|zone=2)
[   12.088973] page_type: f5(slab)
[   12.089289] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.089753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.090065] page dumped because: kasan: bad access detected
[   12.090237] 
[   12.090307] Memory state around the buggy address:
[   12.090602]  ffff888102602300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.090989]  ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.091719] >ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.091942]                                                                 ^
[   12.092563]  ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.093161]  ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.093599] ==================================================================
[   12.038174] ==================================================================
[   12.039339] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.040859] Write of size 1 at addr ffff888102602473 by task kunit_try_catch/153
[   12.042146] 
[   12.043545] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.043899] Tainted: [N]=TEST
[   12.043930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.044175] Call Trace:
[   12.044243]  <TASK>
[   12.044387]  dump_stack_lvl+0x73/0xb0
[   12.044475]  print_report+0xd1/0x650
[   12.044534]  ? __virt_addr_valid+0x1db/0x2d0
[   12.044561]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.044581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.044606]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.044626]  kasan_report+0x141/0x180
[   12.044647]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.044673]  __asan_report_store1_noabort+0x1b/0x30
[   12.044695]  kmalloc_oob_right+0x6f0/0x7f0
[   12.044716]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.044738]  ? __schedule+0x10cc/0x2b60
[   12.044760]  ? __pfx_read_tsc+0x10/0x10
[   12.044781]  ? ktime_get_ts64+0x86/0x230
[   12.044806]  kunit_try_run_case+0x1a5/0x480
[   12.044832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.044852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.044876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.044897]  ? __kthread_parkme+0x82/0x180
[   12.044918]  ? preempt_count_sub+0x50/0x80
[   12.044942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.044964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.044985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.045007]  kthread+0x337/0x6f0
[   12.045026]  ? trace_preempt_on+0x20/0xc0
[   12.045077]  ? __pfx_kthread+0x10/0x10
[   12.045097]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.045117]  ? calculate_sigpending+0x7b/0xa0
[   12.045141]  ? __pfx_kthread+0x10/0x10
[   12.045161]  ret_from_fork+0x116/0x1d0
[   12.045179]  ? __pfx_kthread+0x10/0x10
[   12.045198]  ret_from_fork_asm+0x1a/0x30
[   12.045257]  </TASK>
[   12.045322] 
[   12.057872] Allocated by task 153:
[   12.058487]  kasan_save_stack+0x45/0x70
[   12.058829]  kasan_save_track+0x18/0x40
[   12.059191]  kasan_save_alloc_info+0x3b/0x50
[   12.059454]  __kasan_kmalloc+0xb7/0xc0
[   12.059664]  __kmalloc_cache_noprof+0x189/0x420
[   12.059950]  kmalloc_oob_right+0xa9/0x7f0
[   12.060260]  kunit_try_run_case+0x1a5/0x480
[   12.060446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.060810]  kthread+0x337/0x6f0
[   12.060977]  ret_from_fork+0x116/0x1d0
[   12.061338]  ret_from_fork_asm+0x1a/0x30
[   12.061651] 
[   12.061840] The buggy address belongs to the object at ffff888102602400
[   12.061840]  which belongs to the cache kmalloc-128 of size 128
[   12.062773] The buggy address is located 0 bytes to the right of
[   12.062773]  allocated 115-byte region [ffff888102602400, ffff888102602473)
[   12.063779] 
[   12.064238] The buggy address belongs to the physical page:
[   12.064745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   12.065451] flags: 0x200000000000000(node=0|zone=2)
[   12.066095] page_type: f5(slab)
[   12.066868] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.067346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.067820] page dumped because: kasan: bad access detected
[   12.068084] 
[   12.068213] Memory state around the buggy address:
[   12.068756]  ffff888102602300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.069220]  ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.069545] >ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.069951]                                                              ^
[   12.070417]  ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.070927]  ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.071338] ==================================================================
[   12.094158] ==================================================================
[   12.094502] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.095545] Read of size 1 at addr ffff888102602480 by task kunit_try_catch/153
[   12.095890] 
[   12.096008] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.096067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.096079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.096100] Call Trace:
[   12.096115]  <TASK>
[   12.096130]  dump_stack_lvl+0x73/0xb0
[   12.096156]  print_report+0xd1/0x650
[   12.096177]  ? __virt_addr_valid+0x1db/0x2d0
[   12.096197]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.096217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.096241]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.096262]  kasan_report+0x141/0x180
[   12.096283]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.096308]  __asan_report_load1_noabort+0x18/0x20
[   12.096330]  kmalloc_oob_right+0x68a/0x7f0
[   12.096350]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.096371]  ? __schedule+0x10cc/0x2b60
[   12.096392]  ? __pfx_read_tsc+0x10/0x10
[   12.096411]  ? ktime_get_ts64+0x86/0x230
[   12.096435]  kunit_try_run_case+0x1a5/0x480
[   12.096458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.096479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.096499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.096521]  ? __kthread_parkme+0x82/0x180
[   12.096539]  ? preempt_count_sub+0x50/0x80
[   12.096561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.096582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.096604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.096625]  kthread+0x337/0x6f0
[   12.096643]  ? trace_preempt_on+0x20/0xc0
[   12.096664]  ? __pfx_kthread+0x10/0x10
[   12.096683]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.096702]  ? calculate_sigpending+0x7b/0xa0
[   12.096725]  ? __pfx_kthread+0x10/0x10
[   12.096745]  ret_from_fork+0x116/0x1d0
[   12.096761]  ? __pfx_kthread+0x10/0x10
[   12.096780]  ret_from_fork_asm+0x1a/0x30
[   12.096810]  </TASK>
[   12.096820] 
[   12.108415] Allocated by task 153:
[   12.108766]  kasan_save_stack+0x45/0x70
[   12.109226]  kasan_save_track+0x18/0x40
[   12.109425]  kasan_save_alloc_info+0x3b/0x50
[   12.109662]  __kasan_kmalloc+0xb7/0xc0
[   12.109836]  __kmalloc_cache_noprof+0x189/0x420
[   12.110061]  kmalloc_oob_right+0xa9/0x7f0
[   12.110645]  kunit_try_run_case+0x1a5/0x480
[   12.110819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.111301]  kthread+0x337/0x6f0
[   12.111627]  ret_from_fork+0x116/0x1d0
[   12.111907]  ret_from_fork_asm+0x1a/0x30
[   12.112087] 
[   12.112358] The buggy address belongs to the object at ffff888102602400
[   12.112358]  which belongs to the cache kmalloc-128 of size 128
[   12.113024] The buggy address is located 13 bytes to the right of
[   12.113024]  allocated 115-byte region [ffff888102602400, ffff888102602473)
[   12.113952] 
[   12.114055] The buggy address belongs to the physical page:
[   12.114494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602
[   12.114791] flags: 0x200000000000000(node=0|zone=2)
[   12.115031] page_type: f5(slab)
[   12.115201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.115922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.116418] page dumped because: kasan: bad access detected
[   12.116613] 
[   12.116899] Memory state around the buggy address:
[   12.117279]  ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.117884]  ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.118426] >ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.118903]                    ^
[   12.119185]  ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.119646]  ffff888102602580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.120034] ==================================================================