Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.381430] ==================================================================
[   16.381473] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.381520] Write of size 1 at addr fff00000c585e778 by task kunit_try_catch/136
[   16.381598] 
[   16.381645] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.381736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.381763] Hardware name: linux,dummy-virt (DT)
[   16.381792] Call trace:
[   16.381813]  show_stack+0x20/0x38 (C)
[   16.382050]  dump_stack_lvl+0x8c/0xd0
[   16.382125]  print_report+0x118/0x5d0
[   16.382184]  kasan_report+0xdc/0x128
[   16.382394]  __asan_report_store1_noabort+0x20/0x30
[   16.382567]  kmalloc_oob_right+0x538/0x660
[   16.382664]  kunit_try_run_case+0x170/0x3f0
[   16.382714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.382765]  kthread+0x328/0x630
[   16.382814]  ret_from_fork+0x10/0x20
[   16.382861] 
[   16.382885] Allocated by task 136:
[   16.382920]  kasan_save_stack+0x3c/0x68
[   16.382966]  kasan_save_track+0x20/0x40
[   16.383003]  kasan_save_alloc_info+0x40/0x58
[   16.383050]  __kasan_kmalloc+0xd4/0xd8
[   16.383085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.383123]  kmalloc_oob_right+0xb0/0x660
[   16.383166]  kunit_try_run_case+0x170/0x3f0
[   16.383296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.383579]  kthread+0x328/0x630
[   16.383619]  ret_from_fork+0x10/0x20
[   16.383677] 
[   16.383696] The buggy address belongs to the object at fff00000c585e700
[   16.383696]  which belongs to the cache kmalloc-128 of size 128
[   16.383754] The buggy address is located 5 bytes to the right of
[   16.383754]  allocated 115-byte region [fff00000c585e700, fff00000c585e773)
[   16.383818] 
[   16.383836] The buggy address belongs to the physical page:
[   16.383915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.384062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.384114] page_type: f5(slab)
[   16.384154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.384218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.384258] page dumped because: kasan: bad access detected
[   16.384287] 
[   16.384304] Memory state around the buggy address:
[   16.384334]  fff00000c585e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.384376]  fff00000c585e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384417] >fff00000c585e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.384454]                                                                 ^
[   16.384493]  fff00000c585e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384534]  fff00000c585e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384570] ==================================================================
[   16.370551] ==================================================================
[   16.370916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.373565] Write of size 1 at addr fff00000c585e773 by task kunit_try_catch/136
[   16.373681] 
[   16.374664] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.374818] Tainted: [N]=TEST
[   16.374850] Hardware name: linux,dummy-virt (DT)
[   16.375077] Call trace:
[   16.375273]  show_stack+0x20/0x38 (C)
[   16.375413]  dump_stack_lvl+0x8c/0xd0
[   16.375473]  print_report+0x118/0x5d0
[   16.375523]  kasan_report+0xdc/0x128
[   16.375568]  __asan_report_store1_noabort+0x20/0x30
[   16.375619]  kmalloc_oob_right+0x5a4/0x660
[   16.375665]  kunit_try_run_case+0x170/0x3f0
[   16.375715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.375767]  kthread+0x328/0x630
[   16.375810]  ret_from_fork+0x10/0x20
[   16.375965] 
[   16.376002] Allocated by task 136:
[   16.376135]  kasan_save_stack+0x3c/0x68
[   16.376223]  kasan_save_track+0x20/0x40
[   16.376262]  kasan_save_alloc_info+0x40/0x58
[   16.376301]  __kasan_kmalloc+0xd4/0xd8
[   16.376337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.376377]  kmalloc_oob_right+0xb0/0x660
[   16.376412]  kunit_try_run_case+0x170/0x3f0
[   16.376449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.376491]  kthread+0x328/0x630
[   16.376523]  ret_from_fork+0x10/0x20
[   16.376576] 
[   16.376635] The buggy address belongs to the object at fff00000c585e700
[   16.376635]  which belongs to the cache kmalloc-128 of size 128
[   16.376729] The buggy address is located 0 bytes to the right of
[   16.376729]  allocated 115-byte region [fff00000c585e700, fff00000c585e773)
[   16.376797] 
[   16.376875] The buggy address belongs to the physical page:
[   16.377084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.377390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.377678] page_type: f5(slab)
[   16.377979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.378044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.378148] page dumped because: kasan: bad access detected
[   16.378201] 
[   16.378226] Memory state around the buggy address:
[   16.378444]  fff00000c585e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.378510]  fff00000c585e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378564] >fff00000c585e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.378617]                                                              ^
[   16.378697]  fff00000c585e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378740]  fff00000c585e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378799] ==================================================================
[   16.385438] ==================================================================
[   16.385504] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.385564] Read of size 1 at addr fff00000c585e780 by task kunit_try_catch/136
[   16.385629] 
[   16.385659] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.385873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.386061] Hardware name: linux,dummy-virt (DT)
[   16.386158] Call trace:
[   16.386192]  show_stack+0x20/0x38 (C)
[   16.386260]  dump_stack_lvl+0x8c/0xd0
[   16.386542]  print_report+0x118/0x5d0
[   16.386661]  kasan_report+0xdc/0x128
[   16.386770]  __asan_report_load1_noabort+0x20/0x30
[   16.386823]  kmalloc_oob_right+0x5d0/0x660
[   16.386868]  kunit_try_run_case+0x170/0x3f0
[   16.387092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.387249]  kthread+0x328/0x630
[   16.387376]  ret_from_fork+0x10/0x20
[   16.387494] 
[   16.387511] Allocated by task 136:
[   16.387538]  kasan_save_stack+0x3c/0x68
[   16.387705]  kasan_save_track+0x20/0x40
[   16.387750]  kasan_save_alloc_info+0x40/0x58
[   16.387789]  __kasan_kmalloc+0xd4/0xd8
[   16.387969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.388052]  kmalloc_oob_right+0xb0/0x660
[   16.388135]  kunit_try_run_case+0x170/0x3f0
[   16.388232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.388315]  kthread+0x328/0x630
[   16.388346]  ret_from_fork+0x10/0x20
[   16.388381] 
[   16.388399] The buggy address belongs to the object at fff00000c585e700
[   16.388399]  which belongs to the cache kmalloc-128 of size 128
[   16.388457] The buggy address is located 13 bytes to the right of
[   16.388457]  allocated 115-byte region [fff00000c585e700, fff00000c585e773)
[   16.388753] 
[   16.388812] The buggy address belongs to the physical page:
[   16.388893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10585e
[   16.388948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.389053] page_type: f5(slab)
[   16.389406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.389517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.389596] page dumped because: kasan: bad access detected
[   16.389657] 
[   16.389702] Memory state around the buggy address:
[   16.389733]  fff00000c585e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.389780]  fff00000c585e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.389830] >fff00000c585e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.389866]                    ^
[   16.389900]  fff00000c585e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.389953]  fff00000c585e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.390006] ==================================================================

[   12.216837] ==================================================================
[   12.217510] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.218139] Read of size 1 at addr ffff8881029ef480 by task kunit_try_catch/153
[   12.218758] 
[   12.218926] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.218967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.218979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.219000] Call Trace:
[   12.219012]  <TASK>
[   12.219027]  dump_stack_lvl+0x73/0xb0
[   12.219054]  print_report+0xd1/0x610
[   12.219076]  ? __virt_addr_valid+0x1db/0x2d0
[   12.219100]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.219121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.219144]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.219165]  kasan_report+0x141/0x180
[   12.219187]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.219213]  __asan_report_load1_noabort+0x18/0x20
[   12.219238]  kmalloc_oob_right+0x68a/0x7f0
[   12.219270]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.219294]  ? __schedule+0x10cc/0x2b60
[   12.219315]  ? __pfx_read_tsc+0x10/0x10
[   12.219336]  ? ktime_get_ts64+0x86/0x230
[   12.219361]  kunit_try_run_case+0x1a5/0x480
[   12.219386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.219408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.219433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.219457]  ? __kthread_parkme+0x82/0x180
[   12.219477]  ? preempt_count_sub+0x50/0x80
[   12.219502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.219526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.219551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.219576]  kthread+0x337/0x6f0
[   12.219594]  ? trace_preempt_on+0x20/0xc0
[   12.219617]  ? __pfx_kthread+0x10/0x10
[   12.219638]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.219659]  ? calculate_sigpending+0x7b/0xa0
[   12.219683]  ? __pfx_kthread+0x10/0x10
[   12.219704]  ret_from_fork+0x116/0x1d0
[   12.219722]  ? __pfx_kthread+0x10/0x10
[   12.219742]  ret_from_fork_asm+0x1a/0x30
[   12.219773]  </TASK>
[   12.219783] 
[   12.230612] Allocated by task 153:
[   12.230922]  kasan_save_stack+0x45/0x70
[   12.231138]  kasan_save_track+0x18/0x40
[   12.231284]  kasan_save_alloc_info+0x3b/0x50
[   12.231434]  __kasan_kmalloc+0xb7/0xc0
[   12.231567]  __kmalloc_cache_noprof+0x189/0x420
[   12.231723]  kmalloc_oob_right+0xa9/0x7f0
[   12.231863]  kunit_try_run_case+0x1a5/0x480
[   12.232009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.232187]  kthread+0x337/0x6f0
[   12.232394]  ret_from_fork+0x116/0x1d0
[   12.232725]  ret_from_fork_asm+0x1a/0x30
[   12.233067] 
[   12.233220] The buggy address belongs to the object at ffff8881029ef400
[   12.233220]  which belongs to the cache kmalloc-128 of size 128
[   12.234269] The buggy address is located 13 bytes to the right of
[   12.234269]  allocated 115-byte region [ffff8881029ef400, ffff8881029ef473)
[   12.235333] 
[   12.235489] The buggy address belongs to the physical page:
[   12.235957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   12.236625] flags: 0x200000000000000(node=0|zone=2)
[   12.237055] page_type: f5(slab)
[   12.237345] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.237988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.238623] page dumped because: kasan: bad access detected
[   12.238813] 
[   12.238882] Memory state around the buggy address:
[   12.239035]  ffff8881029ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.239249]  ffff8881029ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.239842] >ffff8881029ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.240468]                    ^
[   12.240750]  ffff8881029ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.241354]  ffff8881029ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.241948] ==================================================================
[   12.175190] ==================================================================
[   12.175899] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.176590] Write of size 1 at addr ffff8881029ef473 by task kunit_try_catch/153
[   12.176991] 
[   12.177998] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.178345] Tainted: [N]=TEST
[   12.178376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.178585] Call Trace:
[   12.178652]  <TASK>
[   12.178800]  dump_stack_lvl+0x73/0xb0
[   12.178889]  print_report+0xd1/0x610
[   12.178918]  ? __virt_addr_valid+0x1db/0x2d0
[   12.178944]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.178967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.178990]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.179012]  kasan_report+0x141/0x180
[   12.179034]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.179060]  __asan_report_store1_noabort+0x1b/0x30
[   12.179086]  kmalloc_oob_right+0x6f0/0x7f0
[   12.179108]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.179131]  ? __schedule+0x10cc/0x2b60
[   12.179154]  ? __pfx_read_tsc+0x10/0x10
[   12.179176]  ? ktime_get_ts64+0x86/0x230
[   12.179202]  kunit_try_run_case+0x1a5/0x480
[   12.179229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.179252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.179291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.179315]  ? __kthread_parkme+0x82/0x180
[   12.179336]  ? preempt_count_sub+0x50/0x80
[   12.179362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.179387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.179411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.179437]  kthread+0x337/0x6f0
[   12.179455]  ? trace_preempt_on+0x20/0xc0
[   12.179480]  ? __pfx_kthread+0x10/0x10
[   12.179500]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.179522]  ? calculate_sigpending+0x7b/0xa0
[   12.179547]  ? __pfx_kthread+0x10/0x10
[   12.179569]  ret_from_fork+0x116/0x1d0
[   12.179587]  ? __pfx_kthread+0x10/0x10
[   12.179608]  ret_from_fork_asm+0x1a/0x30
[   12.179662]  </TASK>
[   12.179723] 
[   12.186558] Allocated by task 153:
[   12.186818]  kasan_save_stack+0x45/0x70
[   12.187048]  kasan_save_track+0x18/0x40
[   12.187282]  kasan_save_alloc_info+0x3b/0x50
[   12.187517]  __kasan_kmalloc+0xb7/0xc0
[   12.187722]  __kmalloc_cache_noprof+0x189/0x420
[   12.187952]  kmalloc_oob_right+0xa9/0x7f0
[   12.188170]  kunit_try_run_case+0x1a5/0x480
[   12.188390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.188658]  kthread+0x337/0x6f0
[   12.188812]  ret_from_fork+0x116/0x1d0
[   12.188984]  ret_from_fork_asm+0x1a/0x30
[   12.189201] 
[   12.189361] The buggy address belongs to the object at ffff8881029ef400
[   12.189361]  which belongs to the cache kmalloc-128 of size 128
[   12.189875] The buggy address is located 0 bytes to the right of
[   12.189875]  allocated 115-byte region [ffff8881029ef400, ffff8881029ef473)
[   12.190421] 
[   12.190587] The buggy address belongs to the physical page:
[   12.191007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   12.191596] flags: 0x200000000000000(node=0|zone=2)
[   12.192143] page_type: f5(slab)
[   12.192577] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.192937] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.193351] page dumped because: kasan: bad access detected
[   12.193612] 
[   12.193713] Memory state around the buggy address:
[   12.194165]  ffff8881029ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.194522]  ffff8881029ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.194829] >ffff8881029ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.195162]                                                              ^
[   12.195417]  ffff8881029ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.195728]  ffff8881029ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.196039] ==================================================================
[   12.197944] ==================================================================
[   12.198724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.199003] Write of size 1 at addr ffff8881029ef478 by task kunit_try_catch/153
[   12.199310] 
[   12.199425] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.199467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.199479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.199501] Call Trace:
[   12.199517]  <TASK>
[   12.199532]  dump_stack_lvl+0x73/0xb0
[   12.199560]  print_report+0xd1/0x610
[   12.199582]  ? __virt_addr_valid+0x1db/0x2d0
[   12.199605]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.199627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.199650]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.199671]  kasan_report+0x141/0x180
[   12.199693]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.199719]  __asan_report_store1_noabort+0x1b/0x30
[   12.199745]  kmalloc_oob_right+0x6bd/0x7f0
[   12.199767]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.199790]  ? __schedule+0x10cc/0x2b60
[   12.199812]  ? __pfx_read_tsc+0x10/0x10
[   12.199833]  ? ktime_get_ts64+0x86/0x230
[   12.199858]  kunit_try_run_case+0x1a5/0x480
[   12.199882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.199905]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.199929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.199952]  ? __kthread_parkme+0x82/0x180
[   12.199973]  ? preempt_count_sub+0x50/0x80
[   12.199997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.200021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.200046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.200071]  kthread+0x337/0x6f0
[   12.200090]  ? trace_preempt_on+0x20/0xc0
[   12.200114]  ? __pfx_kthread+0x10/0x10
[   12.200134]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.200155]  ? calculate_sigpending+0x7b/0xa0
[   12.200179]  ? __pfx_kthread+0x10/0x10
[   12.200201]  ret_from_fork+0x116/0x1d0
[   12.200219]  ? __pfx_kthread+0x10/0x10
[   12.200239]  ret_from_fork_asm+0x1a/0x30
[   12.200280]  </TASK>
[   12.200290] 
[   12.206119] Allocated by task 153:
[   12.206245]  kasan_save_stack+0x45/0x70
[   12.206395]  kasan_save_track+0x18/0x40
[   12.206531]  kasan_save_alloc_info+0x3b/0x50
[   12.206680]  __kasan_kmalloc+0xb7/0xc0
[   12.206876]  __kmalloc_cache_noprof+0x189/0x420
[   12.207100]  kmalloc_oob_right+0xa9/0x7f0
[   12.207307]  kunit_try_run_case+0x1a5/0x480
[   12.207519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.207773]  kthread+0x337/0x6f0
[   12.207941]  ret_from_fork+0x116/0x1d0
[   12.208127]  ret_from_fork_asm+0x1a/0x30
[   12.208333] 
[   12.208427] The buggy address belongs to the object at ffff8881029ef400
[   12.208427]  which belongs to the cache kmalloc-128 of size 128
[   12.208923] The buggy address is located 5 bytes to the right of
[   12.208923]  allocated 115-byte region [ffff8881029ef400, ffff8881029ef473)
[   12.209423] 
[   12.209512] The buggy address belongs to the physical page:
[   12.209726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   12.210055] flags: 0x200000000000000(node=0|zone=2)
[   12.210340] page_type: f5(slab)
[   12.210627] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.211253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.211880] page dumped because: kasan: bad access detected
[   12.212341] 
[   12.212493] Memory state around the buggy address:
[   12.212897]  ffff8881029ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.213529]  ffff8881029ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.214132] >ffff8881029ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.214750]                                                                 ^
[   12.215331]  ffff8881029ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.215910]  ffff8881029ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.216124] ==================================================================