Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.441108] ==================================================================
[   18.441528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.442755] Write of size 1 at addr fff00000c56f1573 by task kunit_try_catch/137
[   18.442967] 
[   18.443938] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   18.444104] Tainted: [N]=TEST
[   18.444143] Hardware name: linux,dummy-virt (DT)
[   18.444420] Call trace:
[   18.444618]  show_stack+0x20/0x38 (C)
[   18.444787]  dump_stack_lvl+0x8c/0xd0
[   18.444857]  print_report+0x118/0x608
[   18.444910]  kasan_report+0xdc/0x128
[   18.444956]  __asan_report_store1_noabort+0x20/0x30
[   18.445005]  kmalloc_oob_right+0x5a4/0x660
[   18.445051]  kunit_try_run_case+0x170/0x3f0
[   18.445102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.445155]  kthread+0x328/0x630
[   18.445199]  ret_from_fork+0x10/0x20
[   18.445383] 
[   18.445429] Allocated by task 137:
[   18.445553]  kasan_save_stack+0x3c/0x68
[   18.445625]  kasan_save_track+0x20/0x40
[   18.445666]  kasan_save_alloc_info+0x40/0x58
[   18.445707]  __kasan_kmalloc+0xd4/0xd8
[   18.445743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.445784]  kmalloc_oob_right+0xb0/0x660
[   18.445820]  kunit_try_run_case+0x170/0x3f0
[   18.445856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.445898]  kthread+0x328/0x630
[   18.445930]  ret_from_fork+0x10/0x20
[   18.445984] 
[   18.446231] The buggy address belongs to the object at fff00000c56f1500
[   18.446231]  which belongs to the cache kmalloc-128 of size 128
[   18.446436] The buggy address is located 0 bytes to the right of
[   18.446436]  allocated 115-byte region [fff00000c56f1500, fff00000c56f1573)
[   18.446520] 
[   18.446619] The buggy address belongs to the physical page:
[   18.446862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   18.447166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.447510] page_type: f5(slab)
[   18.447848] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.447913] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.448030] page dumped because: kasan: bad access detected
[   18.448074] 
[   18.448102] Memory state around the buggy address:
[   18.448339]  fff00000c56f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.448432]  fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.448489] >fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.448542]                                                              ^
[   18.448629]  fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.448671]  fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.448735] ==================================================================
[   18.455236] ==================================================================
[   18.455338] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.455461] Read of size 1 at addr fff00000c56f1580 by task kunit_try_catch/137
[   18.455570] 
[   18.455641] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.455802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.455852] Hardware name: linux,dummy-virt (DT)
[   18.455913] Call trace:
[   18.455957]  show_stack+0x20/0x38 (C)
[   18.456047]  dump_stack_lvl+0x8c/0xd0
[   18.456132]  print_report+0x118/0x608
[   18.456211]  kasan_report+0xdc/0x128
[   18.456336]  __asan_report_load1_noabort+0x20/0x30
[   18.456475]  kmalloc_oob_right+0x5d0/0x660
[   18.456560]  kunit_try_run_case+0x170/0x3f0
[   18.456657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.456764]  kthread+0x328/0x630
[   18.456910]  ret_from_fork+0x10/0x20
[   18.457082] 
[   18.457133] Allocated by task 137:
[   18.457404]  kasan_save_stack+0x3c/0x68
[   18.457507]  kasan_save_track+0x20/0x40
[   18.457603]  kasan_save_alloc_info+0x40/0x58
[   18.457691]  __kasan_kmalloc+0xd4/0xd8
[   18.457772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.457857]  kmalloc_oob_right+0xb0/0x660
[   18.457934]  kunit_try_run_case+0x170/0x3f0
[   18.458030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.458323]  kthread+0x328/0x630
[   18.458420]  ret_from_fork+0x10/0x20
[   18.458507] 
[   18.458550] The buggy address belongs to the object at fff00000c56f1500
[   18.458550]  which belongs to the cache kmalloc-128 of size 128
[   18.458661] The buggy address is located 13 bytes to the right of
[   18.458661]  allocated 115-byte region [fff00000c56f1500, fff00000c56f1573)
[   18.458779] 
[   18.459147] The buggy address belongs to the physical page:
[   18.459218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   18.459369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.459481] page_type: f5(slab)
[   18.459565] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.459678] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.459765] page dumped because: kasan: bad access detected
[   18.459837] 
[   18.459881] Memory state around the buggy address:
[   18.459975]  fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.460103]  fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.460202] >fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.460286]                    ^
[   18.460349]  fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.460439]  fff00000c56f1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.460514] ==================================================================
[   18.449641] ==================================================================
[   18.449728] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.449890] Write of size 1 at addr fff00000c56f1578 by task kunit_try_catch/137
[   18.450003] 
[   18.450069] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.450232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.450290] Hardware name: linux,dummy-virt (DT)
[   18.450371] Call trace:
[   18.450422]  show_stack+0x20/0x38 (C)
[   18.450540]  dump_stack_lvl+0x8c/0xd0
[   18.450644]  print_report+0x118/0x608
[   18.450745]  kasan_report+0xdc/0x128
[   18.450845]  __asan_report_store1_noabort+0x20/0x30
[   18.450951]  kmalloc_oob_right+0x538/0x660
[   18.451052]  kunit_try_run_case+0x170/0x3f0
[   18.451158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.451278]  kthread+0x328/0x630
[   18.451427]  ret_from_fork+0x10/0x20
[   18.451568] 
[   18.451624] Allocated by task 137:
[   18.451705]  kasan_save_stack+0x3c/0x68
[   18.451819]  kasan_save_track+0x20/0x40
[   18.451923]  kasan_save_alloc_info+0x40/0x58
[   18.452008]  __kasan_kmalloc+0xd4/0xd8
[   18.452119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.452236]  kmalloc_oob_right+0xb0/0x660
[   18.452315]  kunit_try_run_case+0x170/0x3f0
[   18.452434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452514]  kthread+0x328/0x630
[   18.452578]  ret_from_fork+0x10/0x20
[   18.452646] 
[   18.452681] The buggy address belongs to the object at fff00000c56f1500
[   18.452681]  which belongs to the cache kmalloc-128 of size 128
[   18.452786] The buggy address is located 5 bytes to the right of
[   18.452786]  allocated 115-byte region [fff00000c56f1500, fff00000c56f1573)
[   18.452912] 
[   18.452956] The buggy address belongs to the physical page:
[   18.453017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   18.453127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.453224] page_type: f5(slab)
[   18.453306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.453436] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.453516] page dumped because: kasan: bad access detected
[   18.453582] 
[   18.453624] Memory state around the buggy address:
[   18.454025]  fff00000c56f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.454132]  fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.454214] >fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.454283]                                                                 ^
[   18.454378]  fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.454470]  fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.454552] ==================================================================

[   12.718451] ==================================================================
[   12.718978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.719371] Write of size 1 at addr ffff888103324f78 by task kunit_try_catch/153
[   12.720248] 
[   12.720370] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.720425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.720439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.720466] Call Trace:
[   12.720489]  <TASK>
[   12.720512]  dump_stack_lvl+0x73/0xb0
[   12.720546]  print_report+0xd1/0x650
[   12.720572]  ? __virt_addr_valid+0x1db/0x2d0
[   12.720599]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.720624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.720666]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.720691]  kasan_report+0x141/0x180
[   12.720717]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.720747]  __asan_report_store1_noabort+0x1b/0x30
[   12.720770]  kmalloc_oob_right+0x6bd/0x7f0
[   12.720807]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.720836]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.720866]  kunit_try_run_case+0x1a5/0x480
[   12.720937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.720963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.721006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.721032]  ? __kthread_parkme+0x82/0x180
[   12.721055]  ? preempt_count_sub+0x50/0x80
[   12.721084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.721111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.721137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.721163]  kthread+0x337/0x6f0
[   12.721186]  ? trace_preempt_on+0x20/0xc0
[   12.721213]  ? __pfx_kthread+0x10/0x10
[   12.721236]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.721260]  ? calculate_sigpending+0x7b/0xa0
[   12.721288]  ? __pfx_kthread+0x10/0x10
[   12.721312]  ret_from_fork+0x116/0x1d0
[   12.721334]  ? __pfx_kthread+0x10/0x10
[   12.721358]  ret_from_fork_asm+0x1a/0x30
[   12.721394]  </TASK>
[   12.721407] 
[   12.731947] Allocated by task 153:
[   12.732502]  kasan_save_stack+0x45/0x70
[   12.732752]  kasan_save_track+0x18/0x40
[   12.733107]  kasan_save_alloc_info+0x3b/0x50
[   12.733333]  __kasan_kmalloc+0xb7/0xc0
[   12.733532]  __kmalloc_cache_noprof+0x189/0x420
[   12.733777]  kmalloc_oob_right+0xa9/0x7f0
[   12.733969]  kunit_try_run_case+0x1a5/0x480
[   12.734212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.734464]  kthread+0x337/0x6f0
[   12.734636]  ret_from_fork+0x116/0x1d0
[   12.735356]  ret_from_fork_asm+0x1a/0x30
[   12.735537] 
[   12.735820] The buggy address belongs to the object at ffff888103324f00
[   12.735820]  which belongs to the cache kmalloc-128 of size 128
[   12.736522] The buggy address is located 5 bytes to the right of
[   12.736522]  allocated 115-byte region [ffff888103324f00, ffff888103324f73)
[   12.737609] 
[   12.737756] The buggy address belongs to the physical page:
[   12.738200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   12.738941] flags: 0x200000000000000(node=0|zone=2)
[   12.739294] page_type: f5(slab)
[   12.739464] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.740058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.740667] page dumped because: kasan: bad access detected
[   12.741016] 
[   12.741269] Memory state around the buggy address:
[   12.741483]  ffff888103324e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.742108]  ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.742448] >ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.742849]                                                                 ^
[   12.743333]  ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.744010]  ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.744456] ==================================================================
[   12.680202] ==================================================================
[   12.681120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.682006] Write of size 1 at addr ffff888103324f73 by task kunit_try_catch/153
[   12.682756] 
[   12.684277] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.684705] Tainted: [N]=TEST
[   12.684745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.685049] Call Trace:
[   12.685129]  <TASK>
[   12.685297]  dump_stack_lvl+0x73/0xb0
[   12.685403]  print_report+0xd1/0x650
[   12.685436]  ? __virt_addr_valid+0x1db/0x2d0
[   12.685466]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.685491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.685517]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.685542]  kasan_report+0x141/0x180
[   12.685567]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.685598]  __asan_report_store1_noabort+0x1b/0x30
[   12.685622]  kmalloc_oob_right+0x6f0/0x7f0
[   12.685662]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.685691]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.685721]  kunit_try_run_case+0x1a5/0x480
[   12.685752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.685850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.685876]  ? __kthread_parkme+0x82/0x180
[   12.685901]  ? preempt_count_sub+0x50/0x80
[   12.685931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.686009]  kthread+0x337/0x6f0
[   12.686032]  ? trace_preempt_on+0x20/0xc0
[   12.686060]  ? __pfx_kthread+0x10/0x10
[   12.686084]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.686108]  ? calculate_sigpending+0x7b/0xa0
[   12.686138]  ? __pfx_kthread+0x10/0x10
[   12.686163]  ret_from_fork+0x116/0x1d0
[   12.686187]  ? __pfx_kthread+0x10/0x10
[   12.686211]  ret_from_fork_asm+0x1a/0x30
[   12.686278]  </TASK>
[   12.686360] 
[   12.698754] Allocated by task 153:
[   12.699290]  kasan_save_stack+0x45/0x70
[   12.699610]  kasan_save_track+0x18/0x40
[   12.700016]  kasan_save_alloc_info+0x3b/0x50
[   12.700221]  __kasan_kmalloc+0xb7/0xc0
[   12.700476]  __kmalloc_cache_noprof+0x189/0x420
[   12.700756]  kmalloc_oob_right+0xa9/0x7f0
[   12.701021]  kunit_try_run_case+0x1a5/0x480
[   12.701315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.702071]  kthread+0x337/0x6f0
[   12.702288]  ret_from_fork+0x116/0x1d0
[   12.702511]  ret_from_fork_asm+0x1a/0x30
[   12.703308] 
[   12.703732] The buggy address belongs to the object at ffff888103324f00
[   12.703732]  which belongs to the cache kmalloc-128 of size 128
[   12.704646] The buggy address is located 0 bytes to the right of
[   12.704646]  allocated 115-byte region [ffff888103324f00, ffff888103324f73)
[   12.706070] 
[   12.706293] The buggy address belongs to the physical page:
[   12.706886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   12.707886] flags: 0x200000000000000(node=0|zone=2)
[   12.709022] page_type: f5(slab)
[   12.709941] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.710546] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.710957] page dumped because: kasan: bad access detected
[   12.711566] 
[   12.711783] Memory state around the buggy address:
[   12.712639]  ffff888103324e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.713540]  ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.714223] >ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.714985]                                                              ^
[   12.715717]  ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.716044]  ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.716893] ==================================================================
[   12.745360] ==================================================================
[   12.746202] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.746572] Read of size 1 at addr ffff888103324f80 by task kunit_try_catch/153
[   12.747113] 
[   12.747275] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.747533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.747547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.747573] Call Trace:
[   12.747588]  <TASK>
[   12.747609]  dump_stack_lvl+0x73/0xb0
[   12.747643]  print_report+0xd1/0x650
[   12.747687]  ? __virt_addr_valid+0x1db/0x2d0
[   12.747713]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.747738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.747763]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.747788]  kasan_report+0x141/0x180
[   12.747814]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.747845]  __asan_report_load1_noabort+0x18/0x20
[   12.747953]  kmalloc_oob_right+0x68a/0x7f0
[   12.747983]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.748011]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.748041]  kunit_try_run_case+0x1a5/0x480
[   12.748070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.748095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.748123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.748150]  ? __kthread_parkme+0x82/0x180
[   12.748173]  ? preempt_count_sub+0x50/0x80
[   12.748200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.748227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.748253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.748279]  kthread+0x337/0x6f0
[   12.748302]  ? trace_preempt_on+0x20/0xc0
[   12.748342]  ? __pfx_kthread+0x10/0x10
[   12.748366]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.748390]  ? calculate_sigpending+0x7b/0xa0
[   12.748417]  ? __pfx_kthread+0x10/0x10
[   12.748443]  ret_from_fork+0x116/0x1d0
[   12.748465]  ? __pfx_kthread+0x10/0x10
[   12.748489]  ret_from_fork_asm+0x1a/0x30
[   12.748525]  </TASK>
[   12.748541] 
[   12.758551] Allocated by task 153:
[   12.758771]  kasan_save_stack+0x45/0x70
[   12.758980]  kasan_save_track+0x18/0x40
[   12.759881]  kasan_save_alloc_info+0x3b/0x50
[   12.760149]  __kasan_kmalloc+0xb7/0xc0
[   12.760316]  __kmalloc_cache_noprof+0x189/0x420
[   12.760507]  kmalloc_oob_right+0xa9/0x7f0
[   12.760688]  kunit_try_run_case+0x1a5/0x480
[   12.761677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.762399]  kthread+0x337/0x6f0
[   12.762600]  ret_from_fork+0x116/0x1d0
[   12.762786]  ret_from_fork_asm+0x1a/0x30
[   12.763020] 
[   12.763108] The buggy address belongs to the object at ffff888103324f00
[   12.763108]  which belongs to the cache kmalloc-128 of size 128
[   12.763724] The buggy address is located 13 bytes to the right of
[   12.763724]  allocated 115-byte region [ffff888103324f00, ffff888103324f73)
[   12.764403] 
[   12.764491] The buggy address belongs to the physical page:
[   12.764961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324
[   12.765297] flags: 0x200000000000000(node=0|zone=2)
[   12.765554] page_type: f5(slab)
[   12.765778] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.766185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.766561] page dumped because: kasan: bad access detected
[   12.766961] 
[   12.767051] Memory state around the buggy address:
[   12.767325]  ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.767691]  ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.768106] >ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.768515]                    ^
[   12.769007]  ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.769350]  ffff888103325080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.769703] ==================================================================