Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.130805] ==================================================================
[   19.130912] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.131018] Read of size 1 at addr fff00000c6345680 by task kunit_try_catch/136
[   19.131148] 
[   19.131252] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.131439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.131487] Hardware name: linux,dummy-virt (DT)
[   19.131571] Call trace:
[   19.131620]  show_stack+0x20/0x38 (C)
[   19.131718]  dump_stack_lvl+0x8c/0xd0
[   19.131818]  print_report+0x118/0x608
[   19.131911]  kasan_report+0xdc/0x128
[   19.132006]  __asan_report_load1_noabort+0x20/0x30
[   19.132128]  kmalloc_oob_right+0x5d0/0x660
[   19.132225]  kunit_try_run_case+0x170/0x3f0
[   19.132324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.132429]  kthread+0x328/0x630
[   19.132524]  ret_from_fork+0x10/0x20
[   19.132626] 
[   19.132666] Allocated by task 136:
[   19.132728]  kasan_save_stack+0x3c/0x68
[   19.132810]  kasan_save_track+0x20/0x40
[   19.132885]  kasan_save_alloc_info+0x40/0x58
[   19.133001]  __kasan_kmalloc+0xd4/0xd8
[   19.133120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.133250]  kmalloc_oob_right+0xb0/0x660
[   19.133332]  kunit_try_run_case+0x170/0x3f0
[   19.133430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.133564]  kthread+0x328/0x630
[   19.133728]  ret_from_fork+0x10/0x20
[   19.133847] 
[   19.133946] The buggy address belongs to the object at fff00000c6345600
[   19.133946]  which belongs to the cache kmalloc-128 of size 128
[   19.134092] The buggy address is located 13 bytes to the right of
[   19.134092]  allocated 115-byte region [fff00000c6345600, fff00000c6345673)
[   19.134214] 
[   19.134271] The buggy address belongs to the physical page:
[   19.134329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.134435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.134521] page_type: f5(slab)
[   19.134596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.134701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.134782] page dumped because: kasan: bad access detected
[   19.134879] 
[   19.134931] Memory state around the buggy address:
[   19.135000]  fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.135115]  fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.135207] >fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.135297]                    ^
[   19.135371]  fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.135511]  fff00000c6345780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.135636] ==================================================================
[   19.125306] ==================================================================
[   19.125403] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.125651] Write of size 1 at addr fff00000c6345678 by task kunit_try_catch/136
[   19.125772] 
[   19.125856] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.126052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.126107] Hardware name: linux,dummy-virt (DT)
[   19.126175] Call trace:
[   19.126219]  show_stack+0x20/0x38 (C)
[   19.126314]  dump_stack_lvl+0x8c/0xd0
[   19.126405]  print_report+0x118/0x608
[   19.126507]  kasan_report+0xdc/0x128
[   19.126602]  __asan_report_store1_noabort+0x20/0x30
[   19.126703]  kmalloc_oob_right+0x538/0x660
[   19.126798]  kunit_try_run_case+0x170/0x3f0
[   19.126917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.127075]  kthread+0x328/0x630
[   19.127182]  ret_from_fork+0x10/0x20
[   19.127312] 
[   19.127348] Allocated by task 136:
[   19.127419]  kasan_save_stack+0x3c/0x68
[   19.127538]  kasan_save_track+0x20/0x40
[   19.127607]  kasan_save_alloc_info+0x40/0x58
[   19.127679]  __kasan_kmalloc+0xd4/0xd8
[   19.127745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.127826]  kmalloc_oob_right+0xb0/0x660
[   19.127901]  kunit_try_run_case+0x170/0x3f0
[   19.127974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.128064]  kthread+0x328/0x630
[   19.128130]  ret_from_fork+0x10/0x20
[   19.128193] 
[   19.128231] The buggy address belongs to the object at fff00000c6345600
[   19.128231]  which belongs to the cache kmalloc-128 of size 128
[   19.128351] The buggy address is located 5 bytes to the right of
[   19.128351]  allocated 115-byte region [fff00000c6345600, fff00000c6345673)
[   19.128535] 
[   19.128586] The buggy address belongs to the physical page:
[   19.128659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.128776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.128874] page_type: f5(slab)
[   19.128955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.129083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.129178] page dumped because: kasan: bad access detected
[   19.129277] 
[   19.129332] Memory state around the buggy address:
[   19.129433]  fff00000c6345500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.129528]  fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129621] >fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.129731]                                                                 ^
[   19.129811]  fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129903]  fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129983] ==================================================================
[   19.116806] ==================================================================
[   19.117219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   19.118506] Write of size 1 at addr fff00000c6345673 by task kunit_try_catch/136
[   19.118632] 
[   19.119562] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   19.119723] Tainted: [N]=TEST
[   19.119761] Hardware name: linux,dummy-virt (DT)
[   19.120016] Call trace:
[   19.120233]  show_stack+0x20/0x38 (C)
[   19.120408]  dump_stack_lvl+0x8c/0xd0
[   19.120480]  print_report+0x118/0x608
[   19.120553]  kasan_report+0xdc/0x128
[   19.120605]  __asan_report_store1_noabort+0x20/0x30
[   19.120655]  kmalloc_oob_right+0x5a4/0x660
[   19.120704]  kunit_try_run_case+0x170/0x3f0
[   19.120760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.120816]  kthread+0x328/0x630
[   19.120865]  ret_from_fork+0x10/0x20
[   19.121064] 
[   19.121114] Allocated by task 136:
[   19.121278]  kasan_save_stack+0x3c/0x68
[   19.121354]  kasan_save_track+0x20/0x40
[   19.121395]  kasan_save_alloc_info+0x40/0x58
[   19.121435]  __kasan_kmalloc+0xd4/0xd8
[   19.121471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.121511]  kmalloc_oob_right+0xb0/0x660
[   19.121545]  kunit_try_run_case+0x170/0x3f0
[   19.121582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.121622]  kthread+0x328/0x630
[   19.121654]  ret_from_fork+0x10/0x20
[   19.121781] 
[   19.121882] The buggy address belongs to the object at fff00000c6345600
[   19.121882]  which belongs to the cache kmalloc-128 of size 128
[   19.122004] The buggy address is located 0 bytes to the right of
[   19.122004]  allocated 115-byte region [fff00000c6345600, fff00000c6345673)
[   19.122094] 
[   19.122186] The buggy address belongs to the physical page:
[   19.122432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345
[   19.122736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.123073] page_type: f5(slab)
[   19.123433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.123500] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.123629] page dumped because: kasan: bad access detected
[   19.123676] 
[   19.123704] Memory state around the buggy address:
[   19.123941]  fff00000c6345500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.124016]  fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.124093] >fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.124150]                                                              ^
[   19.124245]  fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.124288]  fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.124354] ==================================================================

[   10.826760] ==================================================================
[   10.827474] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.827741] Write of size 1 at addr ffff888103173c78 by task kunit_try_catch/153
[   10.828404] 
[   10.828574] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.828616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.828635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.828655] Call Trace:
[   10.828672]  <TASK>
[   10.828688]  dump_stack_lvl+0x73/0xb0
[   10.828713]  print_report+0xd1/0x650
[   10.828735]  ? __virt_addr_valid+0x1db/0x2d0
[   10.828758]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.828777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.828798]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.828819]  kasan_report+0x141/0x180
[   10.828839]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.828864]  __asan_report_store1_noabort+0x1b/0x30
[   10.828883]  kmalloc_oob_right+0x6bd/0x7f0
[   10.828904]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.828926]  ? __schedule+0x10cc/0x2b60
[   10.828946]  ? __pfx_read_tsc+0x10/0x10
[   10.828966]  ? ktime_get_ts64+0x86/0x230
[   10.828989]  kunit_try_run_case+0x1a5/0x480
[   10.829013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.829033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.829056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.829077]  ? __kthread_parkme+0x82/0x180
[   10.829097]  ? preempt_count_sub+0x50/0x80
[   10.829131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.829153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.829175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.829197]  kthread+0x337/0x6f0
[   10.829215]  ? trace_preempt_on+0x20/0xc0
[   10.829237]  ? __pfx_kthread+0x10/0x10
[   10.829257]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.829276]  ? calculate_sigpending+0x7b/0xa0
[   10.829299]  ? __pfx_kthread+0x10/0x10
[   10.829319]  ret_from_fork+0x116/0x1d0
[   10.829336]  ? __pfx_kthread+0x10/0x10
[   10.829356]  ret_from_fork_asm+0x1a/0x30
[   10.829386]  </TASK>
[   10.829396] 
[   10.836518] Allocated by task 153:
[   10.836665]  kasan_save_stack+0x45/0x70
[   10.836909]  kasan_save_track+0x18/0x40
[   10.837093]  kasan_save_alloc_info+0x3b/0x50
[   10.837340]  __kasan_kmalloc+0xb7/0xc0
[   10.837474]  __kmalloc_cache_noprof+0x189/0x420
[   10.837629]  kmalloc_oob_right+0xa9/0x7f0
[   10.837926]  kunit_try_run_case+0x1a5/0x480
[   10.838151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.838496]  kthread+0x337/0x6f0
[   10.838723]  ret_from_fork+0x116/0x1d0
[   10.838908]  ret_from_fork_asm+0x1a/0x30
[   10.839105] 
[   10.839226] The buggy address belongs to the object at ffff888103173c00
[   10.839226]  which belongs to the cache kmalloc-128 of size 128
[   10.839626] The buggy address is located 5 bytes to the right of
[   10.839626]  allocated 115-byte region [ffff888103173c00, ffff888103173c73)
[   10.840091] 
[   10.840171] The buggy address belongs to the physical page:
[   10.840568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   10.841730] flags: 0x200000000000000(node=0|zone=2)
[   10.841944] page_type: f5(slab)
[   10.842087] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.842376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.842607] page dumped because: kasan: bad access detected
[   10.842779] 
[   10.842848] Memory state around the buggy address:
[   10.843005]  ffff888103173b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.843596]  ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.844272] >ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.844885]                                                                 ^
[   10.845175]  ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.845390]  ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.845695] ==================================================================
[   10.846689] ==================================================================
[   10.847278] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.847571] Read of size 1 at addr ffff888103173c80 by task kunit_try_catch/153
[   10.848070] 
[   10.848187] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.848226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.848257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.848278] Call Trace:
[   10.848303]  <TASK>
[   10.848315]  dump_stack_lvl+0x73/0xb0
[   10.848354]  print_report+0xd1/0x650
[   10.848375]  ? __virt_addr_valid+0x1db/0x2d0
[   10.848397]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.848430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.848451]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.848485]  kasan_report+0x141/0x180
[   10.848519]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.848557]  __asan_report_load1_noabort+0x18/0x20
[   10.848580]  kmalloc_oob_right+0x68a/0x7f0
[   10.848601]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.848622]  ? __schedule+0x10cc/0x2b60
[   10.848643]  ? __pfx_read_tsc+0x10/0x10
[   10.848662]  ? ktime_get_ts64+0x86/0x230
[   10.848685]  kunit_try_run_case+0x1a5/0x480
[   10.848708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.848728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.848750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.848771]  ? __kthread_parkme+0x82/0x180
[   10.849577]  ? preempt_count_sub+0x50/0x80
[   10.849614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.849739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.849763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.849785]  kthread+0x337/0x6f0
[   10.849803]  ? trace_preempt_on+0x20/0xc0
[   10.849825]  ? __pfx_kthread+0x10/0x10
[   10.849845]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.849865]  ? calculate_sigpending+0x7b/0xa0
[   10.849887]  ? __pfx_kthread+0x10/0x10
[   10.849909]  ret_from_fork+0x116/0x1d0
[   10.849927]  ? __pfx_kthread+0x10/0x10
[   10.849946]  ret_from_fork_asm+0x1a/0x30
[   10.849974]  </TASK>
[   10.849985] 
[   10.861604] Allocated by task 153:
[   10.861768]  kasan_save_stack+0x45/0x70
[   10.862025]  kasan_save_track+0x18/0x40
[   10.862330]  kasan_save_alloc_info+0x3b/0x50
[   10.862527]  __kasan_kmalloc+0xb7/0xc0
[   10.862712]  __kmalloc_cache_noprof+0x189/0x420
[   10.862926]  kmalloc_oob_right+0xa9/0x7f0
[   10.863110]  kunit_try_run_case+0x1a5/0x480
[   10.863420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.863606]  kthread+0x337/0x6f0
[   10.863775]  ret_from_fork+0x116/0x1d0
[   10.864007]  ret_from_fork_asm+0x1a/0x30
[   10.864245] 
[   10.864318] The buggy address belongs to the object at ffff888103173c00
[   10.864318]  which belongs to the cache kmalloc-128 of size 128
[   10.864790] The buggy address is located 13 bytes to the right of
[   10.864790]  allocated 115-byte region [ffff888103173c00, ffff888103173c73)
[   10.865434] 
[   10.865531] The buggy address belongs to the physical page:
[   10.865918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   10.866422] flags: 0x200000000000000(node=0|zone=2)
[   10.866650] page_type: f5(slab)
[   10.866804] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.867195] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.867454] page dumped because: kasan: bad access detected
[   10.867708] 
[   10.867803] Memory state around the buggy address:
[   10.868035]  ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.868412]  ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.868681] >ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.869044]                    ^
[   10.869292]  ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.869562]  ffff888103173d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.869881] ==================================================================
[   10.790248] ==================================================================
[   10.791390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.792393] Write of size 1 at addr ffff888103173c73 by task kunit_try_catch/153
[   10.793214] 
[   10.794183] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.794539] Tainted: [N]=TEST
[   10.794571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.794784] Call Trace:
[   10.794848]  <TASK>
[   10.794995]  dump_stack_lvl+0x73/0xb0
[   10.795079]  print_report+0xd1/0x650
[   10.795108]  ? __virt_addr_valid+0x1db/0x2d0
[   10.795147]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.795167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.795188]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.795209]  kasan_report+0x141/0x180
[   10.795230]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.795255]  __asan_report_store1_noabort+0x1b/0x30
[   10.795275]  kmalloc_oob_right+0x6f0/0x7f0
[   10.795296]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.795320]  ? __schedule+0x10cc/0x2b60
[   10.795343]  ? __pfx_read_tsc+0x10/0x10
[   10.795365]  ? ktime_get_ts64+0x86/0x230
[   10.795390]  kunit_try_run_case+0x1a5/0x480
[   10.795416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.795437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.795460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.795481]  ? __kthread_parkme+0x82/0x180
[   10.795502]  ? preempt_count_sub+0x50/0x80
[   10.795526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.795548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.795570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.795592]  kthread+0x337/0x6f0
[   10.795610]  ? trace_preempt_on+0x20/0xc0
[   10.795633]  ? __pfx_kthread+0x10/0x10
[   10.795653]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.795672]  ? calculate_sigpending+0x7b/0xa0
[   10.795696]  ? __pfx_kthread+0x10/0x10
[   10.795716]  ret_from_fork+0x116/0x1d0
[   10.795734]  ? __pfx_kthread+0x10/0x10
[   10.795753]  ret_from_fork_asm+0x1a/0x30
[   10.795810]  </TASK>
[   10.795873] 
[   10.808485] Allocated by task 153:
[   10.808985]  kasan_save_stack+0x45/0x70
[   10.809336]  kasan_save_track+0x18/0x40
[   10.809728]  kasan_save_alloc_info+0x3b/0x50
[   10.810022]  __kasan_kmalloc+0xb7/0xc0
[   10.810450]  __kmalloc_cache_noprof+0x189/0x420
[   10.810748]  kmalloc_oob_right+0xa9/0x7f0
[   10.810938]  kunit_try_run_case+0x1a5/0x480
[   10.811390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.811973]  kthread+0x337/0x6f0
[   10.812345]  ret_from_fork+0x116/0x1d0
[   10.812731]  ret_from_fork_asm+0x1a/0x30
[   10.813095] 
[   10.813290] The buggy address belongs to the object at ffff888103173c00
[   10.813290]  which belongs to the cache kmalloc-128 of size 128
[   10.814531] The buggy address is located 0 bytes to the right of
[   10.814531]  allocated 115-byte region [ffff888103173c00, ffff888103173c73)
[   10.815597] 
[   10.815831] The buggy address belongs to the physical page:
[   10.816402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173
[   10.817383] flags: 0x200000000000000(node=0|zone=2)
[   10.818151] page_type: f5(slab)
[   10.818587] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.818835] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.819150] page dumped because: kasan: bad access detected
[   10.819694] 
[   10.819933] Memory state around the buggy address:
[   10.820671]  ffff888103173b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.821347]  ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.822107] >ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.822887]                                                              ^
[   10.823658]  ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.824389]  ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.825016] ==================================================================