Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.292142] ==================================================================
[   16.292183] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.292268] Write of size 1 at addr fff00000c6f3f178 by task kunit_try_catch/137
[   16.292318] 
[   16.292350] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.292581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.292629] Hardware name: linux,dummy-virt (DT)
[   16.292677] Call trace:
[   16.292712]  show_stack+0x20/0x38 (C)
[   16.292787]  dump_stack_lvl+0x8c/0xd0
[   16.292835]  print_report+0x118/0x608
[   16.293086]  kasan_report+0xdc/0x128
[   16.293146]  __asan_report_store1_noabort+0x20/0x30
[   16.293205]  kmalloc_oob_right+0x538/0x660
[   16.293308]  kunit_try_run_case+0x170/0x3f0
[   16.293374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.293426]  kthread+0x328/0x630
[   16.293468]  ret_from_fork+0x10/0x20
[   16.293674] 
[   16.293701] Allocated by task 137:
[   16.293761]  kasan_save_stack+0x3c/0x68
[   16.293870]  kasan_save_track+0x20/0x40
[   16.293919]  kasan_save_alloc_info+0x40/0x58
[   16.293976]  __kasan_kmalloc+0xd4/0xd8
[   16.294012]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.294108]  kmalloc_oob_right+0xb0/0x660
[   16.294153]  kunit_try_run_case+0x170/0x3f0
[   16.294190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.294252]  kthread+0x328/0x630
[   16.294284]  ret_from_fork+0x10/0x20
[   16.294411] 
[   16.294604] The buggy address belongs to the object at fff00000c6f3f100
[   16.294604]  which belongs to the cache kmalloc-128 of size 128
[   16.294697] The buggy address is located 5 bytes to the right of
[   16.294697]  allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173)
[   16.294930] 
[   16.294951] The buggy address belongs to the physical page:
[   16.294981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.295050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.295097] page_type: f5(slab)
[   16.295135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.295183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.295453] page dumped because: kasan: bad access detected
[   16.295490] 
[   16.295507] Memory state around the buggy address:
[   16.295597]  fff00000c6f3f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.295663]  fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295712] >fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.295747]                                                                 ^
[   16.295785]  fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295826]  fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295882] ==================================================================
[   16.296612] ==================================================================
[   16.296734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.296788] Read of size 1 at addr fff00000c6f3f180 by task kunit_try_catch/137
[   16.296836] 
[   16.296916] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.297016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.297056] Hardware name: linux,dummy-virt (DT)
[   16.297103] Call trace:
[   16.297142]  show_stack+0x20/0x38 (C)
[   16.297189]  dump_stack_lvl+0x8c/0xd0
[   16.297357]  print_report+0x118/0x608
[   16.297536]  kasan_report+0xdc/0x128
[   16.297630]  __asan_report_load1_noabort+0x20/0x30
[   16.297682]  kmalloc_oob_right+0x5d0/0x660
[   16.297727]  kunit_try_run_case+0x170/0x3f0
[   16.297773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.297909]  kthread+0x328/0x630
[   16.297977]  ret_from_fork+0x10/0x20
[   16.298115] 
[   16.298167] Allocated by task 137:
[   16.298225]  kasan_save_stack+0x3c/0x68
[   16.298294]  kasan_save_track+0x20/0x40
[   16.298359]  kasan_save_alloc_info+0x40/0x58
[   16.298399]  __kasan_kmalloc+0xd4/0xd8
[   16.298665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.298771]  kmalloc_oob_right+0xb0/0x660
[   16.298814]  kunit_try_run_case+0x170/0x3f0
[   16.298878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.298920]  kthread+0x328/0x630
[   16.298951]  ret_from_fork+0x10/0x20
[   16.298985] 
[   16.299004] The buggy address belongs to the object at fff00000c6f3f100
[   16.299004]  which belongs to the cache kmalloc-128 of size 128
[   16.299059] The buggy address is located 13 bytes to the right of
[   16.299059]  allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173)
[   16.299121] 
[   16.299139] The buggy address belongs to the physical page:
[   16.299167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.299216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.299261] page_type: f5(slab)
[   16.299297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.299574] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.299686] page dumped because: kasan: bad access detected
[   16.299800] 
[   16.299849] Memory state around the buggy address:
[   16.299894]  fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299963]  fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.300005] >fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300041]                    ^
[   16.300068]  fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300121]  fff00000c6f3f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300171] ==================================================================
[   16.275951] ==================================================================
[   16.276434] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.277526] Write of size 1 at addr fff00000c6f3f173 by task kunit_try_catch/137
[   16.277689] 
[   16.278490] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.278634] Tainted: [N]=TEST
[   16.278666] Hardware name: linux,dummy-virt (DT)
[   16.279276] Call trace:
[   16.280043]  show_stack+0x20/0x38 (C)
[   16.280415]  dump_stack_lvl+0x8c/0xd0
[   16.280767]  print_report+0x118/0x608
[   16.280831]  kasan_report+0xdc/0x128
[   16.280888]  __asan_report_store1_noabort+0x20/0x30
[   16.280939]  kmalloc_oob_right+0x5a4/0x660
[   16.280985]  kunit_try_run_case+0x170/0x3f0
[   16.281036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.281089]  kthread+0x328/0x630
[   16.281170]  ret_from_fork+0x10/0x20
[   16.281585] 
[   16.281641] Allocated by task 137:
[   16.282079]  kasan_save_stack+0x3c/0x68
[   16.282260]  kasan_save_track+0x20/0x40
[   16.282341]  kasan_save_alloc_info+0x40/0x58
[   16.282381]  __kasan_kmalloc+0xd4/0xd8
[   16.282632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.282747]  kmalloc_oob_right+0xb0/0x660
[   16.282824]  kunit_try_run_case+0x170/0x3f0
[   16.282874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.282916]  kthread+0x328/0x630
[   16.282964]  ret_from_fork+0x10/0x20
[   16.283427] 
[   16.283662] The buggy address belongs to the object at fff00000c6f3f100
[   16.283662]  which belongs to the cache kmalloc-128 of size 128
[   16.284185] The buggy address is located 0 bytes to the right of
[   16.284185]  allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173)
[   16.284293] 
[   16.284773] The buggy address belongs to the physical page:
[   16.285499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   16.286563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.287396] page_type: f5(slab)
[   16.288283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.288503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.288935] page dumped because: kasan: bad access detected
[   16.289032] 
[   16.289102] Memory state around the buggy address:
[   16.289824]  fff00000c6f3f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.290327]  fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.290449] >fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.290643]                                                              ^
[   16.290907]  fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.290962]  fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.291034] ==================================================================

[   11.676520] ==================================================================
[   11.677387] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.678800] Write of size 1 at addr ffff8881029f2973 by task kunit_try_catch/153
[   11.679342] 
[   11.680504] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.680843] Tainted: [N]=TEST
[   11.680873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.681174] Call Trace:
[   11.681245]  <TASK>
[   11.681386]  dump_stack_lvl+0x73/0xb0
[   11.681476]  print_report+0xd1/0x650
[   11.681504]  ? __virt_addr_valid+0x1db/0x2d0
[   11.681530]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.681551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.681574]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.681596]  kasan_report+0x141/0x180
[   11.681618]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.681646]  __asan_report_store1_noabort+0x1b/0x30
[   11.681671]  kmalloc_oob_right+0x6f0/0x7f0
[   11.681695]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.681717]  ? __schedule+0x10cc/0x2b60
[   11.681741]  ? __pfx_read_tsc+0x10/0x10
[   11.681764]  ? ktime_get_ts64+0x86/0x230
[   11.681793]  kunit_try_run_case+0x1a5/0x480
[   11.681819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.681842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.681867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.681890]  ? __kthread_parkme+0x82/0x180
[   11.681912]  ? preempt_count_sub+0x50/0x80
[   11.681951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.681976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.682000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.682025]  kthread+0x337/0x6f0
[   11.682044]  ? trace_preempt_on+0x20/0xc0
[   11.682068]  ? __pfx_kthread+0x10/0x10
[   11.682089]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.682111]  ? calculate_sigpending+0x7b/0xa0
[   11.682135]  ? __pfx_kthread+0x10/0x10
[   11.682157]  ret_from_fork+0x116/0x1d0
[   11.682175]  ? __pfx_kthread+0x10/0x10
[   11.682196]  ret_from_fork_asm+0x1a/0x30
[   11.682253]  </TASK>
[   11.682316] 
[   11.693851] Allocated by task 153:
[   11.694374]  kasan_save_stack+0x45/0x70
[   11.694602]  kasan_save_track+0x18/0x40
[   11.694810]  kasan_save_alloc_info+0x3b/0x50
[   11.695229]  __kasan_kmalloc+0xb7/0xc0
[   11.695436]  __kmalloc_cache_noprof+0x189/0x420
[   11.695882]  kmalloc_oob_right+0xa9/0x7f0
[   11.696316]  kunit_try_run_case+0x1a5/0x480
[   11.696618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.697096]  kthread+0x337/0x6f0
[   11.697351]  ret_from_fork+0x116/0x1d0
[   11.697587]  ret_from_fork_asm+0x1a/0x30
[   11.697977] 
[   11.698373] The buggy address belongs to the object at ffff8881029f2900
[   11.698373]  which belongs to the cache kmalloc-128 of size 128
[   11.699258] The buggy address is located 0 bytes to the right of
[   11.699258]  allocated 115-byte region [ffff8881029f2900, ffff8881029f2973)
[   11.700098] 
[   11.700356] The buggy address belongs to the physical page:
[   11.700763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   11.701331] flags: 0x200000000000000(node=0|zone=2)
[   11.701957] page_type: f5(slab)
[   11.702435] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.702762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.703244] page dumped because: kasan: bad access detected
[   11.703486] 
[   11.703567] Memory state around the buggy address:
[   11.704022]  ffff8881029f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.704464]  ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.704792] >ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.705216]                                                              ^
[   11.705539]  ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.705801]  ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.706347] ==================================================================
[   11.707397] ==================================================================
[   11.707625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.707842] Write of size 1 at addr ffff8881029f2978 by task kunit_try_catch/153
[   11.708078] 
[   11.708159] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.708198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.708209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.708228] Call Trace:
[   11.708243]  <TASK>
[   11.708257]  dump_stack_lvl+0x73/0xb0
[   11.708283]  print_report+0xd1/0x650
[   11.708305]  ? __virt_addr_valid+0x1db/0x2d0
[   11.708326]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.708346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.708368]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.708389]  kasan_report+0x141/0x180
[   11.708410]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.708436]  __asan_report_store1_noabort+0x1b/0x30
[   11.708460]  kmalloc_oob_right+0x6bd/0x7f0
[   11.708481]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.708503]  ? __schedule+0x10cc/0x2b60
[   11.708524]  ? __pfx_read_tsc+0x10/0x10
[   11.708544]  ? ktime_get_ts64+0x86/0x230
[   11.708567]  kunit_try_run_case+0x1a5/0x480
[   11.708590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.708611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.708633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.708656]  ? __kthread_parkme+0x82/0x180
[   11.708675]  ? preempt_count_sub+0x50/0x80
[   11.708697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.708721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.708743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.708766]  kthread+0x337/0x6f0
[   11.708785]  ? trace_preempt_on+0x20/0xc0
[   11.708807]  ? __pfx_kthread+0x10/0x10
[   11.708827]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.708915]  ? calculate_sigpending+0x7b/0xa0
[   11.708952]  ? __pfx_kthread+0x10/0x10
[   11.708974]  ret_from_fork+0x116/0x1d0
[   11.708993]  ? __pfx_kthread+0x10/0x10
[   11.709050]  ret_from_fork_asm+0x1a/0x30
[   11.709082]  </TASK>
[   11.709091] 
[   11.716678] Allocated by task 153:
[   11.716807]  kasan_save_stack+0x45/0x70
[   11.717067]  kasan_save_track+0x18/0x40
[   11.717274]  kasan_save_alloc_info+0x3b/0x50
[   11.717490]  __kasan_kmalloc+0xb7/0xc0
[   11.717680]  __kmalloc_cache_noprof+0x189/0x420
[   11.717890]  kmalloc_oob_right+0xa9/0x7f0
[   11.718268]  kunit_try_run_case+0x1a5/0x480
[   11.718425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.718610]  kthread+0x337/0x6f0
[   11.718730]  ret_from_fork+0x116/0x1d0
[   11.718860]  ret_from_fork_asm+0x1a/0x30
[   11.719015] 
[   11.719108] The buggy address belongs to the object at ffff8881029f2900
[   11.719108]  which belongs to the cache kmalloc-128 of size 128
[   11.719632] The buggy address is located 5 bytes to the right of
[   11.719632]  allocated 115-byte region [ffff8881029f2900, ffff8881029f2973)
[   11.720460] 
[   11.720533] The buggy address belongs to the physical page:
[   11.720702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   11.721503] flags: 0x200000000000000(node=0|zone=2)
[   11.721719] page_type: f5(slab)
[   11.721930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.722491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.722755] page dumped because: kasan: bad access detected
[   11.722938] 
[   11.723007] Memory state around the buggy address:
[   11.723160]  ffff8881029f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.723476]  ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.723707] >ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.724037]                                                                 ^
[   11.724805]  ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.725351]  ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.725674] ==================================================================
[   11.726338] ==================================================================
[   11.726663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.726885] Read of size 1 at addr ffff8881029f2980 by task kunit_try_catch/153
[   11.729012] 
[   11.729132] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.729173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.729185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.729204] Call Trace:
[   11.729218]  <TASK>
[   11.729234]  dump_stack_lvl+0x73/0xb0
[   11.729265]  print_report+0xd1/0x650
[   11.729286]  ? __virt_addr_valid+0x1db/0x2d0
[   11.729308]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.729328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.729349]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.729370]  kasan_report+0x141/0x180
[   11.729391]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.729417]  __asan_report_load1_noabort+0x18/0x20
[   11.729440]  kmalloc_oob_right+0x68a/0x7f0
[   11.729462]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.729484]  ? __schedule+0x10cc/0x2b60
[   11.729505]  ? __pfx_read_tsc+0x10/0x10
[   11.729524]  ? ktime_get_ts64+0x86/0x230
[   11.729547]  kunit_try_run_case+0x1a5/0x480
[   11.729571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.729592]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.729614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.729637]  ? __kthread_parkme+0x82/0x180
[   11.729655]  ? preempt_count_sub+0x50/0x80
[   11.729679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.729702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.729725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.729748]  kthread+0x337/0x6f0
[   11.729766]  ? trace_preempt_on+0x20/0xc0
[   11.729788]  ? __pfx_kthread+0x10/0x10
[   11.729808]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.729829]  ? calculate_sigpending+0x7b/0xa0
[   11.729852]  ? __pfx_kthread+0x10/0x10
[   11.729873]  ret_from_fork+0x116/0x1d0
[   11.729891]  ? __pfx_kthread+0x10/0x10
[   11.729910]  ret_from_fork_asm+0x1a/0x30
[   11.729955]  </TASK>
[   11.729964] 
[   11.741782] Allocated by task 153:
[   11.741972]  kasan_save_stack+0x45/0x70
[   11.742246]  kasan_save_track+0x18/0x40
[   11.742408]  kasan_save_alloc_info+0x3b/0x50
[   11.742563]  __kasan_kmalloc+0xb7/0xc0
[   11.742736]  __kmalloc_cache_noprof+0x189/0x420
[   11.742997]  kmalloc_oob_right+0xa9/0x7f0
[   11.743354]  kunit_try_run_case+0x1a5/0x480
[   11.743555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.743769]  kthread+0x337/0x6f0
[   11.743955]  ret_from_fork+0x116/0x1d0
[   11.744257]  ret_from_fork_asm+0x1a/0x30
[   11.744458] 
[   11.744529] The buggy address belongs to the object at ffff8881029f2900
[   11.744529]  which belongs to the cache kmalloc-128 of size 128
[   11.745117] The buggy address is located 13 bytes to the right of
[   11.745117]  allocated 115-byte region [ffff8881029f2900, ffff8881029f2973)
[   11.745631] 
[   11.745703] The buggy address belongs to the physical page:
[   11.745888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   11.746229] flags: 0x200000000000000(node=0|zone=2)
[   11.746463] page_type: f5(slab)
[   11.747436] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.747799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.748156] page dumped because: kasan: bad access detected
[   11.748414] 
[   11.748510] Memory state around the buggy address:
[   11.748755]  ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.749101]  ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.749435] >ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.749664]                    ^
[   11.749797]  ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.750197]  ffff8881029f2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.750522] ==================================================================