Hay
Date
July 4, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.675871] ==================================================================
[   17.675917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.675967] Write of size 1 at addr fff00000c638e778 by task kunit_try_catch/136
[   17.676014] 
[   17.676058] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.676171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.676201] Hardware name: linux,dummy-virt (DT)
[   17.676231] Call trace:
[   17.676252]  show_stack+0x20/0x38 (C)
[   17.676467]  dump_stack_lvl+0x8c/0xd0
[   17.676579]  print_report+0x118/0x608
[   17.676703]  kasan_report+0xdc/0x128
[   17.676929]  __asan_report_store1_noabort+0x20/0x30
[   17.677004]  kmalloc_oob_right+0x538/0x660
[   17.677214]  kunit_try_run_case+0x170/0x3f0
[   17.677315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.677475]  kthread+0x328/0x630
[   17.677516]  ret_from_fork+0x10/0x20
[   17.677563] 
[   17.677587] Allocated by task 136:
[   17.677691]  kasan_save_stack+0x3c/0x68
[   17.677771]  kasan_save_track+0x20/0x40
[   17.678123]  kasan_save_alloc_info+0x40/0x58
[   17.678242]  __kasan_kmalloc+0xd4/0xd8
[   17.678365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.678403]  kmalloc_oob_right+0xb0/0x660
[   17.678438]  kunit_try_run_case+0x170/0x3f0
[   17.678474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.678515]  kthread+0x328/0x630
[   17.678972]  ret_from_fork+0x10/0x20
[   17.679025] 
[   17.679044] The buggy address belongs to the object at fff00000c638e700
[   17.679044]  which belongs to the cache kmalloc-128 of size 128
[   17.679213] The buggy address is located 5 bytes to the right of
[   17.679213]  allocated 115-byte region [fff00000c638e700, fff00000c638e773)
[   17.679280] 
[   17.679299] The buggy address belongs to the physical page:
[   17.679328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.679378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.679422] page_type: f5(slab)
[   17.679458] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.679506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.679544] page dumped because: kasan: bad access detected
[   17.679573] 
[   17.679591] Memory state around the buggy address:
[   17.679623]  fff00000c638e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.679665]  fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679705] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.679740]                                                                 ^
[   17.679778]  fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679828]  fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679867] ==================================================================
[   17.664002] ==================================================================
[   17.664366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.665846] Write of size 1 at addr fff00000c638e773 by task kunit_try_catch/136
[   17.665959] 
[   17.667077] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   17.667419] Tainted: [N]=TEST
[   17.667454] Hardware name: linux,dummy-virt (DT)
[   17.667684] Call trace:
[   17.668102]  show_stack+0x20/0x38 (C)
[   17.668453]  dump_stack_lvl+0x8c/0xd0
[   17.668668]  print_report+0x118/0x608
[   17.668740]  kasan_report+0xdc/0x128
[   17.668784]  __asan_report_store1_noabort+0x20/0x30
[   17.669290]  kmalloc_oob_right+0x5a4/0x660
[   17.669382]  kunit_try_run_case+0x170/0x3f0
[   17.669433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669484]  kthread+0x328/0x630
[   17.669527]  ret_from_fork+0x10/0x20
[   17.669783] 
[   17.669837] Allocated by task 136:
[   17.670030]  kasan_save_stack+0x3c/0x68
[   17.670115]  kasan_save_track+0x20/0x40
[   17.670155]  kasan_save_alloc_info+0x40/0x58
[   17.670228]  __kasan_kmalloc+0xd4/0xd8
[   17.670265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.670305]  kmalloc_oob_right+0xb0/0x660
[   17.670339]  kunit_try_run_case+0x170/0x3f0
[   17.670375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.670416]  kthread+0x328/0x630
[   17.670477]  ret_from_fork+0x10/0x20
[   17.670537] 
[   17.670599] The buggy address belongs to the object at fff00000c638e700
[   17.670599]  which belongs to the cache kmalloc-128 of size 128
[   17.670994] The buggy address is located 0 bytes to the right of
[   17.670994]  allocated 115-byte region [fff00000c638e700, fff00000c638e773)
[   17.671081] 
[   17.671190] The buggy address belongs to the physical page:
[   17.671446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.672037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.672447] page_type: f5(slab)
[   17.672878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.673034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.673241] page dumped because: kasan: bad access detected
[   17.673425] 
[   17.673453] Memory state around the buggy address:
[   17.674220]  fff00000c638e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.674325]  fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674380] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.674503]                                                              ^
[   17.674714]  fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674795]  fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674876] ==================================================================
[   17.680724] ==================================================================
[   17.680768] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.680828] Read of size 1 at addr fff00000c638e780 by task kunit_try_catch/136
[   17.680874] 
[   17.680902] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.680992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.681018] Hardware name: linux,dummy-virt (DT)
[   17.681047] Call trace:
[   17.681068]  show_stack+0x20/0x38 (C)
[   17.681291]  dump_stack_lvl+0x8c/0xd0
[   17.681517]  print_report+0x118/0x608
[   17.681706]  kasan_report+0xdc/0x128
[   17.681750]  __asan_report_load1_noabort+0x20/0x30
[   17.681994]  kmalloc_oob_right+0x5d0/0x660
[   17.682041]  kunit_try_run_case+0x170/0x3f0
[   17.682244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.682485]  kthread+0x328/0x630
[   17.682567]  ret_from_fork+0x10/0x20
[   17.682855] 
[   17.682874] Allocated by task 136:
[   17.682902]  kasan_save_stack+0x3c/0x68
[   17.683171]  kasan_save_track+0x20/0x40
[   17.683335]  kasan_save_alloc_info+0x40/0x58
[   17.683455]  __kasan_kmalloc+0xd4/0xd8
[   17.683521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.683560]  kmalloc_oob_right+0xb0/0x660
[   17.683596]  kunit_try_run_case+0x170/0x3f0
[   17.683632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.683699]  kthread+0x328/0x630
[   17.683815]  ret_from_fork+0x10/0x20
[   17.683855] 
[   17.683873] The buggy address belongs to the object at fff00000c638e700
[   17.683873]  which belongs to the cache kmalloc-128 of size 128
[   17.683932] The buggy address is located 13 bytes to the right of
[   17.683932]  allocated 115-byte region [fff00000c638e700, fff00000c638e773)
[   17.683993] 
[   17.684011] The buggy address belongs to the physical page:
[   17.684039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.684086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.684131] page_type: f5(slab)
[   17.684166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.684214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.684251] page dumped because: kasan: bad access detected
[   17.684280] 
[   17.684297] Memory state around the buggy address:
[   17.684344]  fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684469]  fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.684565] >fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684651]                    ^
[   17.684731]  fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684772]  fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684844] ==================================================================

[   11.129646] ==================================================================
[   11.129910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.130719] Write of size 1 at addr ffff88810262f778 by task kunit_try_catch/153
[   11.131264] 
[   11.131452] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.131501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.131512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.131545] Call Trace:
[   11.131571]  <TASK>
[   11.131591]  dump_stack_lvl+0x73/0xb0
[   11.131624]  print_report+0xd1/0x650
[   11.131657]  ? __virt_addr_valid+0x1db/0x2d0
[   11.131679]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.131699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.131719]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.131739]  kasan_report+0x141/0x180
[   11.131759]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.131783]  __asan_report_store1_noabort+0x1b/0x30
[   11.131802]  kmalloc_oob_right+0x6bd/0x7f0
[   11.131823]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.131845]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.131869]  kunit_try_run_case+0x1a5/0x480
[   11.131893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.131914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.131936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.131957]  ? __kthread_parkme+0x82/0x180
[   11.131976]  ? preempt_count_sub+0x50/0x80
[   11.131999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.132020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.132041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.132062]  kthread+0x337/0x6f0
[   11.132080]  ? trace_preempt_on+0x20/0xc0
[   11.132102]  ? __pfx_kthread+0x10/0x10
[   11.132121]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.132141]  ? calculate_sigpending+0x7b/0xa0
[   11.132163]  ? __pfx_kthread+0x10/0x10
[   11.132183]  ret_from_fork+0x116/0x1d0
[   11.132201]  ? __pfx_kthread+0x10/0x10
[   11.132230]  ret_from_fork_asm+0x1a/0x30
[   11.132259]  </TASK>
[   11.132270] 
[   11.143312] Allocated by task 153:
[   11.143596]  kasan_save_stack+0x45/0x70
[   11.143999]  kasan_save_track+0x18/0x40
[   11.144255]  kasan_save_alloc_info+0x3b/0x50
[   11.144652]  __kasan_kmalloc+0xb7/0xc0
[   11.144805]  __kmalloc_cache_noprof+0x189/0x420
[   11.144963]  kmalloc_oob_right+0xa9/0x7f0
[   11.145103]  kunit_try_run_case+0x1a5/0x480
[   11.145280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.145545]  kthread+0x337/0x6f0
[   11.145685]  ret_from_fork+0x116/0x1d0
[   11.145881]  ret_from_fork_asm+0x1a/0x30
[   11.146081] 
[   11.146187] The buggy address belongs to the object at ffff88810262f700
[   11.146187]  which belongs to the cache kmalloc-128 of size 128
[   11.146636] The buggy address is located 5 bytes to the right of
[   11.146636]  allocated 115-byte region [ffff88810262f700, ffff88810262f773)
[   11.147087] 
[   11.147173] The buggy address belongs to the physical page:
[   11.147669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   11.148049] flags: 0x200000000000000(node=0|zone=2)
[   11.148271] page_type: f5(slab)
[   11.148444] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.148770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.149107] page dumped because: kasan: bad access detected
[   11.149366] 
[   11.149472] Memory state around the buggy address:
[   11.149695]  ffff88810262f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.150012]  ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.150250] >ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.150562]                                                                 ^
[   11.150874]  ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.151105]  ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.151396] ==================================================================
[   11.152189] ==================================================================
[   11.152657] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.152974] Read of size 1 at addr ffff88810262f780 by task kunit_try_catch/153
[   11.153215] 
[   11.153404] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.153449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.153460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.154500] Call Trace:
[   11.154526]  <TASK>
[   11.154547]  dump_stack_lvl+0x73/0xb0
[   11.154583]  print_report+0xd1/0x650
[   11.154606]  ? __virt_addr_valid+0x1db/0x2d0
[   11.154628]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.154649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.154670]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.154691]  kasan_report+0x141/0x180
[   11.154711]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.154735]  __asan_report_load1_noabort+0x18/0x20
[   11.154758]  kmalloc_oob_right+0x68a/0x7f0
[   11.154778]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.154801]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.154825]  kunit_try_run_case+0x1a5/0x480
[   11.154849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.154869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.154891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.154912]  ? __kthread_parkme+0x82/0x180
[   11.154932]  ? preempt_count_sub+0x50/0x80
[   11.154955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.154977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.154997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.155018]  kthread+0x337/0x6f0
[   11.155036]  ? trace_preempt_on+0x20/0xc0
[   11.155058]  ? __pfx_kthread+0x10/0x10
[   11.155077]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.155096]  ? calculate_sigpending+0x7b/0xa0
[   11.155119]  ? __pfx_kthread+0x10/0x10
[   11.155139]  ret_from_fork+0x116/0x1d0
[   11.155157]  ? __pfx_kthread+0x10/0x10
[   11.155175]  ret_from_fork_asm+0x1a/0x30
[   11.155205]  </TASK>
[   11.155215] 
[   11.161779] Allocated by task 153:
[   11.162005]  kasan_save_stack+0x45/0x70
[   11.162250]  kasan_save_track+0x18/0x40
[   11.162455]  kasan_save_alloc_info+0x3b/0x50
[   11.162599]  __kasan_kmalloc+0xb7/0xc0
[   11.162726]  __kmalloc_cache_noprof+0x189/0x420
[   11.162875]  kmalloc_oob_right+0xa9/0x7f0
[   11.163010]  kunit_try_run_case+0x1a5/0x480
[   11.163162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.163557]  kthread+0x337/0x6f0
[   11.163901]  ret_from_fork+0x116/0x1d0
[   11.164119]  ret_from_fork_asm+0x1a/0x30
[   11.164856] 
[   11.165121] The buggy address belongs to the object at ffff88810262f700
[   11.165121]  which belongs to the cache kmalloc-128 of size 128
[   11.166272] The buggy address is located 13 bytes to the right of
[   11.166272]  allocated 115-byte region [ffff88810262f700, ffff88810262f773)
[   11.167139] 
[   11.167247] The buggy address belongs to the physical page:
[   11.167523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   11.168129] flags: 0x200000000000000(node=0|zone=2)
[   11.168704] page_type: f5(slab)
[   11.168841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.169311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.169952] page dumped because: kasan: bad access detected
[   11.170190] 
[   11.170351] Memory state around the buggy address:
[   11.170622]  ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.170940]  ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.171163] >ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.171763]                    ^
[   11.171893]  ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.172226]  ffff88810262f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.173025] ==================================================================
[   11.096977] ==================================================================
[   11.097785] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.098544] Write of size 1 at addr ffff88810262f773 by task kunit_try_catch/153
[   11.099008] 
[   11.100260] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.100773] Tainted: [N]=TEST
[   11.100816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.101035] Call Trace:
[   11.101105]  <TASK>
[   11.101283]  dump_stack_lvl+0x73/0xb0
[   11.101383]  print_report+0xd1/0x650
[   11.101412]  ? __virt_addr_valid+0x1db/0x2d0
[   11.101436]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.101457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.101478]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.101498]  kasan_report+0x141/0x180
[   11.101518]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.101543]  __asan_report_store1_noabort+0x1b/0x30
[   11.101561]  kmalloc_oob_right+0x6f0/0x7f0
[   11.101582]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.101604]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.101629]  kunit_try_run_case+0x1a5/0x480
[   11.101654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.101674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.101697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.101718]  ? __kthread_parkme+0x82/0x180
[   11.101739]  ? preempt_count_sub+0x50/0x80
[   11.101762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.101784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.101805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.101826]  kthread+0x337/0x6f0
[   11.101843]  ? trace_preempt_on+0x20/0xc0
[   11.101866]  ? __pfx_kthread+0x10/0x10
[   11.101885]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.101904]  ? calculate_sigpending+0x7b/0xa0
[   11.101928]  ? __pfx_kthread+0x10/0x10
[   11.101947]  ret_from_fork+0x116/0x1d0
[   11.101966]  ? __pfx_kthread+0x10/0x10
[   11.101985]  ret_from_fork_asm+0x1a/0x30
[   11.102035]  </TASK>
[   11.102097] 
[   11.110964] Allocated by task 153:
[   11.111644]  kasan_save_stack+0x45/0x70
[   11.112054]  kasan_save_track+0x18/0x40
[   11.112516]  kasan_save_alloc_info+0x3b/0x50
[   11.112943]  __kasan_kmalloc+0xb7/0xc0
[   11.113344]  __kmalloc_cache_noprof+0x189/0x420
[   11.113788]  kmalloc_oob_right+0xa9/0x7f0
[   11.114183]  kunit_try_run_case+0x1a5/0x480
[   11.114470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.114642]  kthread+0x337/0x6f0
[   11.114758]  ret_from_fork+0x116/0x1d0
[   11.114887]  ret_from_fork_asm+0x1a/0x30
[   11.115077] 
[   11.115206] The buggy address belongs to the object at ffff88810262f700
[   11.115206]  which belongs to the cache kmalloc-128 of size 128
[   11.116672] The buggy address is located 0 bytes to the right of
[   11.116672]  allocated 115-byte region [ffff88810262f700, ffff88810262f773)
[   11.117982] 
[   11.118288] The buggy address belongs to the physical page:
[   11.119070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f
[   11.120001] flags: 0x200000000000000(node=0|zone=2)
[   11.120919] page_type: f5(slab)
[   11.121576] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.121814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.122098] page dumped because: kasan: bad access detected
[   11.122420] 
[   11.122660] Memory state around the buggy address:
[   11.123411]  ffff88810262f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.124046]  ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.124743] >ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.125440]                                                              ^
[   11.126096]  ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.126732]  ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.127413] ==================================================================