Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.045072] ==================================================================
[   15.045423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   15.046237] Write of size 1 at addr fff00000c3f39173 by task kunit_try_catch/136
[   15.046346] 
[   15.047172] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7 #1 PREEMPT 
[   15.047316] Tainted: [N]=TEST
[   15.047348] Hardware name: linux,dummy-virt (DT)
[   15.047563] Call trace:
[   15.047729]  show_stack+0x20/0x38 (C)
[   15.047932]  dump_stack_lvl+0x8c/0xd0
[   15.048005]  print_report+0x118/0x5d0
[   15.048053]  kasan_report+0xdc/0x128
[   15.048099]  __asan_report_store1_noabort+0x20/0x30
[   15.048150]  kmalloc_oob_right+0x5a4/0x660
[   15.048197]  kunit_try_run_case+0x170/0x3f0
[   15.048249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.048303]  kthread+0x328/0x630
[   15.048346]  ret_from_fork+0x10/0x20
[   15.048501] 
[   15.048539] Allocated by task 136:
[   15.048656]  kasan_save_stack+0x3c/0x68
[   15.048720]  kasan_save_track+0x20/0x40
[   15.048759]  kasan_save_alloc_info+0x40/0x58
[   15.048799]  __kasan_kmalloc+0xd4/0xd8
[   15.048835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.048891]  kmalloc_oob_right+0xb0/0x660
[   15.048927]  kunit_try_run_case+0x170/0x3f0
[   15.048964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.049008]  kthread+0x328/0x630
[   15.049040]  ret_from_fork+0x10/0x20
[   15.049096] 
[   15.049155] The buggy address belongs to the object at fff00000c3f39100
[   15.049155]  which belongs to the cache kmalloc-128 of size 128
[   15.049249] The buggy address is located 0 bytes to the right of
[   15.049249]  allocated 115-byte region [fff00000c3f39100, fff00000c3f39173)
[   15.049318] 
[   15.049399] The buggy address belongs to the physical page:
[   15.049604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.049899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.050183] page_type: f5(slab)
[   15.050490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.050555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.050678] page dumped because: kasan: bad access detected
[   15.050720] 
[   15.050746] Memory state around the buggy address:
[   15.050975]  fff00000c3f39000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.051044]  fff00000c3f39080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.051099] >fff00000c3f39100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.051153]                                                              ^
[   15.051234]  fff00000c3f39180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.051277]  fff00000c3f39200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.051341] ==================================================================
[   15.057782] ==================================================================
[   15.057946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   15.058035] Read of size 1 at addr fff00000c3f39180 by task kunit_try_catch/136
[   15.058086] 
[   15.058114] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.058193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.058314] Hardware name: linux,dummy-virt (DT)
[   15.058344] Call trace:
[   15.058503]  show_stack+0x20/0x38 (C)
[   15.058667]  dump_stack_lvl+0x8c/0xd0
[   15.058765]  print_report+0x118/0x5d0
[   15.058964]  kasan_report+0xdc/0x128
[   15.059013]  __asan_report_load1_noabort+0x20/0x30
[   15.059064]  kmalloc_oob_right+0x5d0/0x660
[   15.059251]  kunit_try_run_case+0x170/0x3f0
[   15.059309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.059425]  kthread+0x328/0x630
[   15.059573]  ret_from_fork+0x10/0x20
[   15.059631] 
[   15.059649] Allocated by task 136:
[   15.059678]  kasan_save_stack+0x3c/0x68
[   15.059718]  kasan_save_track+0x20/0x40
[   15.059754]  kasan_save_alloc_info+0x40/0x58
[   15.059935]  __kasan_kmalloc+0xd4/0xd8
[   15.060055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.060148]  kmalloc_oob_right+0xb0/0x660
[   15.060216]  kunit_try_run_case+0x170/0x3f0
[   15.060283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.060325]  kthread+0x328/0x630
[   15.060357]  ret_from_fork+0x10/0x20
[   15.060401] 
[   15.060420] The buggy address belongs to the object at fff00000c3f39100
[   15.060420]  which belongs to the cache kmalloc-128 of size 128
[   15.060487] The buggy address is located 13 bytes to the right of
[   15.060487]  allocated 115-byte region [fff00000c3f39100, fff00000c3f39173)
[   15.060569] 
[   15.060588] The buggy address belongs to the physical page:
[   15.060625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.060677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.060734] page_type: f5(slab)
[   15.060781] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.060840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.060891] page dumped because: kasan: bad access detected
[   15.060922] 
[   15.060939] Memory state around the buggy address:
[   15.060969]  fff00000c3f39080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.061011]  fff00000c3f39100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.061090] >fff00000c3f39180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.061307]                    ^
[   15.061444]  fff00000c3f39200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.061599]  fff00000c3f39280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.061694] ==================================================================
[   15.052739] ==================================================================
[   15.052778] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   15.052824] Write of size 1 at addr fff00000c3f39178 by task kunit_try_catch/136
[   15.052890] 
[   15.052919] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   15.052999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.053025] Hardware name: linux,dummy-virt (DT)
[   15.053054] Call trace:
[   15.053075]  show_stack+0x20/0x38 (C)
[   15.053122]  dump_stack_lvl+0x8c/0xd0
[   15.053170]  print_report+0x118/0x5d0
[   15.053218]  kasan_report+0xdc/0x128
[   15.053280]  __asan_report_store1_noabort+0x20/0x30
[   15.053332]  kmalloc_oob_right+0x538/0x660
[   15.053377]  kunit_try_run_case+0x170/0x3f0
[   15.053426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.053478]  kthread+0x328/0x630
[   15.053519]  ret_from_fork+0x10/0x20
[   15.053565] 
[   15.053582] Allocated by task 136:
[   15.053610]  kasan_save_stack+0x3c/0x68
[   15.053649]  kasan_save_track+0x20/0x40
[   15.053685]  kasan_save_alloc_info+0x40/0x58
[   15.054390]  __kasan_kmalloc+0xd4/0xd8
[   15.054630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.054838]  kmalloc_oob_right+0xb0/0x660
[   15.054923]  kunit_try_run_case+0x170/0x3f0
[   15.054971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.055084]  kthread+0x328/0x630
[   15.055151]  ret_from_fork+0x10/0x20
[   15.055280] 
[   15.055356] The buggy address belongs to the object at fff00000c3f39100
[   15.055356]  which belongs to the cache kmalloc-128 of size 128
[   15.055418] The buggy address is located 5 bytes to the right of
[   15.055418]  allocated 115-byte region [fff00000c3f39100, fff00000c3f39173)
[   15.055632] 
[   15.055651] The buggy address belongs to the physical page:
[   15.055681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39
[   15.055751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.056027] page_type: f5(slab)
[   15.056108] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.056161] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.056201] page dumped because: kasan: bad access detected
[   15.056235] 
[   15.056255] Memory state around the buggy address:
[   15.056487]  fff00000c3f39000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.056565]  fff00000c3f39080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056705] >fff00000c3f39100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.056836]                                                                 ^
[   15.056897]  fff00000c3f39180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056939]  fff00000c3f39200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056997] ==================================================================

[   11.980339] ==================================================================
[   11.981336] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.982058] Write of size 1 at addr ffff8881025bdc73 by task kunit_try_catch/153
[   11.982793] 
[   11.983868] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   11.984233] Tainted: [N]=TEST
[   11.984266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.984484] Call Trace:
[   11.984551]  <TASK>
[   11.984696]  dump_stack_lvl+0x73/0xb0
[   11.984781]  print_report+0xd1/0x610
[   11.984809]  ? __virt_addr_valid+0x1db/0x2d0
[   11.984854]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.984875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.984896]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.984917]  kasan_report+0x141/0x180
[   11.984938]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.984963]  __asan_report_store1_noabort+0x1b/0x30
[   11.984986]  kmalloc_oob_right+0x6f0/0x7f0
[   11.985007]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.985029]  ? __schedule+0x10c6/0x2b60
[   11.985052]  ? __pfx_read_tsc+0x10/0x10
[   11.985095]  ? ktime_get_ts64+0x86/0x230
[   11.985122]  kunit_try_run_case+0x1a5/0x480
[   11.985148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.985193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.985216]  ? __kthread_parkme+0x82/0x180
[   11.985236]  ? preempt_count_sub+0x50/0x80
[   11.985261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.985283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.985306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.985328]  kthread+0x337/0x6f0
[   11.985347]  ? trace_preempt_on+0x20/0xc0
[   11.985371]  ? __pfx_kthread+0x10/0x10
[   11.985390]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.985411]  ? calculate_sigpending+0x7b/0xa0
[   11.985435]  ? __pfx_kthread+0x10/0x10
[   11.985456]  ret_from_fork+0x116/0x1d0
[   11.985474]  ? __pfx_kthread+0x10/0x10
[   11.985494]  ret_from_fork_asm+0x1a/0x30
[   11.985551]  </TASK>
[   11.985623] 
[   11.995391] Allocated by task 153:
[   11.995649]  kasan_save_stack+0x45/0x70
[   11.995827]  kasan_save_track+0x18/0x40
[   11.995991]  kasan_save_alloc_info+0x3b/0x50
[   11.996199]  __kasan_kmalloc+0xb7/0xc0
[   11.996378]  __kmalloc_cache_noprof+0x189/0x420
[   11.996560]  kmalloc_oob_right+0xa9/0x7f0
[   11.996762]  kunit_try_run_case+0x1a5/0x480
[   11.996973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.997203]  kthread+0x337/0x6f0
[   11.997373]  ret_from_fork+0x116/0x1d0
[   11.997549]  ret_from_fork_asm+0x1a/0x30
[   11.997725] 
[   11.997856] The buggy address belongs to the object at ffff8881025bdc00
[   11.997856]  which belongs to the cache kmalloc-128 of size 128
[   11.998490] The buggy address is located 0 bytes to the right of
[   11.998490]  allocated 115-byte region [ffff8881025bdc00, ffff8881025bdc73)
[   11.999025] 
[   11.999224] The buggy address belongs to the physical page:
[   11.999600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd
[   12.000229] flags: 0x200000000000000(node=0|zone=2)
[   12.000871] page_type: f5(slab)
[   12.001383] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.001712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.002119] page dumped because: kasan: bad access detected
[   12.002359] 
[   12.002465] Memory state around the buggy address:
[   12.002896]  ffff8881025bdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.003261]  ffff8881025bdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.003578] >ffff8881025bdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.003879]                                                              ^
[   12.004245]  ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.004535]  ffff8881025bdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.004871] ==================================================================
[   12.006406] ==================================================================
[   12.006724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.007034] Write of size 1 at addr ffff8881025bdc78 by task kunit_try_catch/153
[   12.007424] 
[   12.007540] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.007586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.007597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.007617] Call Trace:
[   12.007633]  <TASK>
[   12.007648]  dump_stack_lvl+0x73/0xb0
[   12.007676]  print_report+0xd1/0x610
[   12.007697]  ? __virt_addr_valid+0x1db/0x2d0
[   12.007719]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.007739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.007760]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.007781]  kasan_report+0x141/0x180
[   12.007801]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.007837]  __asan_report_store1_noabort+0x1b/0x30
[   12.007861]  kmalloc_oob_right+0x6bd/0x7f0
[   12.007882]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.007904]  ? __schedule+0x10c6/0x2b60
[   12.007925]  ? __pfx_read_tsc+0x10/0x10
[   12.007945]  ? ktime_get_ts64+0x86/0x230
[   12.007968]  kunit_try_run_case+0x1a5/0x480
[   12.007991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.008013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.008035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.008058]  ? __kthread_parkme+0x82/0x180
[   12.008097]  ? preempt_count_sub+0x50/0x80
[   12.008120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.008143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.008165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.008188]  kthread+0x337/0x6f0
[   12.008207]  ? trace_preempt_on+0x20/0xc0
[   12.008229]  ? __pfx_kthread+0x10/0x10
[   12.008249]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.008269]  ? calculate_sigpending+0x7b/0xa0
[   12.008292]  ? __pfx_kthread+0x10/0x10
[   12.008313]  ret_from_fork+0x116/0x1d0
[   12.008330]  ? __pfx_kthread+0x10/0x10
[   12.008350]  ret_from_fork_asm+0x1a/0x30
[   12.008379]  </TASK>
[   12.008389] 
[   12.015002] Allocated by task 153:
[   12.015186]  kasan_save_stack+0x45/0x70
[   12.015360]  kasan_save_track+0x18/0x40
[   12.015505]  kasan_save_alloc_info+0x3b/0x50
[   12.015719]  __kasan_kmalloc+0xb7/0xc0
[   12.015885]  __kmalloc_cache_noprof+0x189/0x420
[   12.016119]  kmalloc_oob_right+0xa9/0x7f0
[   12.016277]  kunit_try_run_case+0x1a5/0x480
[   12.016483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.016659]  kthread+0x337/0x6f0
[   12.016779]  ret_from_fork+0x116/0x1d0
[   12.016926]  ret_from_fork_asm+0x1a/0x30
[   12.017111] 
[   12.017204] The buggy address belongs to the object at ffff8881025bdc00
[   12.017204]  which belongs to the cache kmalloc-128 of size 128
[   12.017724] The buggy address is located 5 bytes to the right of
[   12.017724]  allocated 115-byte region [ffff8881025bdc00, ffff8881025bdc73)
[   12.018204] 
[   12.018303] The buggy address belongs to the physical page:
[   12.018563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd
[   12.018905] flags: 0x200000000000000(node=0|zone=2)
[   12.019149] page_type: f5(slab)
[   12.019292] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.019601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.019920] page dumped because: kasan: bad access detected
[   12.020159] 
[   12.020479] Memory state around the buggy address:
[   12.020689]  ffff8881025bdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.020956]  ffff8881025bdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.021203] >ffff8881025bdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.021418]                                                                 ^
[   12.021632]  ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.021938]  ffff8881025bdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.022273] ==================================================================
[   12.022801] ==================================================================
[   12.023177] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.023517] Read of size 1 at addr ffff8881025bdc80 by task kunit_try_catch/153
[   12.023808] 
[   12.023903] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.023945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.023956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.023976] Call Trace:
[   12.023989]  <TASK>
[   12.024002]  dump_stack_lvl+0x73/0xb0
[   12.024027]  print_report+0xd1/0x610
[   12.024048]  ? __virt_addr_valid+0x1db/0x2d0
[   12.024069]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.024110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.024131]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.024151]  kasan_report+0x141/0x180
[   12.024172]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.024197]  __asan_report_load1_noabort+0x18/0x20
[   12.024220]  kmalloc_oob_right+0x68a/0x7f0
[   12.024241]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.024263]  ? __schedule+0x10c6/0x2b60
[   12.024284]  ? __pfx_read_tsc+0x10/0x10
[   12.024304]  ? ktime_get_ts64+0x86/0x230
[   12.024327]  kunit_try_run_case+0x1a5/0x480
[   12.024349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.024371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.024393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.024415]  ? __kthread_parkme+0x82/0x180
[   12.024434]  ? preempt_count_sub+0x50/0x80
[   12.024456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.024479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.024501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.024523]  kthread+0x337/0x6f0
[   12.024541]  ? trace_preempt_on+0x20/0xc0
[   12.024563]  ? __pfx_kthread+0x10/0x10
[   12.024582]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.024603]  ? calculate_sigpending+0x7b/0xa0
[   12.024625]  ? __pfx_kthread+0x10/0x10
[   12.024646]  ret_from_fork+0x116/0x1d0
[   12.024663]  ? __pfx_kthread+0x10/0x10
[   12.024683]  ret_from_fork_asm+0x1a/0x30
[   12.024712]  </TASK>
[   12.024721] 
[   12.033779] Allocated by task 153:
[   12.033929]  kasan_save_stack+0x45/0x70
[   12.034164]  kasan_save_track+0x18/0x40
[   12.034338]  kasan_save_alloc_info+0x3b/0x50
[   12.034525]  __kasan_kmalloc+0xb7/0xc0
[   12.034687]  __kmalloc_cache_noprof+0x189/0x420
[   12.034881]  kmalloc_oob_right+0xa9/0x7f0
[   12.035106]  kunit_try_run_case+0x1a5/0x480
[   12.035320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.035528]  kthread+0x337/0x6f0
[   12.035650]  ret_from_fork+0x116/0x1d0
[   12.035784]  ret_from_fork_asm+0x1a/0x30
[   12.035991] 
[   12.036112] The buggy address belongs to the object at ffff8881025bdc00
[   12.036112]  which belongs to the cache kmalloc-128 of size 128
[   12.036573] The buggy address is located 13 bytes to the right of
[   12.036573]  allocated 115-byte region [ffff8881025bdc00, ffff8881025bdc73)
[   12.037114] 
[   12.037213] The buggy address belongs to the physical page:
[   12.037465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd
[   12.037776] flags: 0x200000000000000(node=0|zone=2)
[   12.037992] page_type: f5(slab)
[   12.038139] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.038487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.038760] page dumped because: kasan: bad access detected
[   12.038944] 
[   12.039016] Memory state around the buggy address:
[   12.039267]  ffff8881025bdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.039586]  ffff8881025bdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.039910] >ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.040156]                    ^
[   12.040298]  ffff8881025bdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.040615]  ffff8881025bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.040940] ==================================================================