Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.998367] ==================================================================
[   18.998415] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.998460] Read of size 1 at addr fff00000c6343680 by task kunit_try_catch/136
[   18.998508] 
[   18.998535] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.998611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.998836] Hardware name: linux,dummy-virt (DT)
[   18.998962] Call trace:
[   18.999303]  show_stack+0x20/0x38 (C)
[   18.999699]  dump_stack_lvl+0x8c/0xd0
[   18.999960]  print_report+0x118/0x608
[   19.000061]  kasan_report+0xdc/0x128
[   19.000188]  __asan_report_load1_noabort+0x20/0x30
[   19.000238]  kmalloc_oob_right+0x5d0/0x660
[   19.000282]  kunit_try_run_case+0x170/0x3f0
[   19.000327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.000650]  kthread+0x328/0x630
[   19.000718]  ret_from_fork+0x10/0x20
[   19.000766] 
[   19.000783] Allocated by task 136:
[   19.000810]  kasan_save_stack+0x3c/0x68
[   19.000888]  kasan_save_track+0x20/0x40
[   19.000949]  kasan_save_alloc_info+0x40/0x58
[   19.000989]  __kasan_kmalloc+0xd4/0xd8
[   19.001118]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.001324]  kmalloc_oob_right+0xb0/0x660
[   19.001474]  kunit_try_run_case+0x170/0x3f0
[   19.001654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.001712]  kthread+0x328/0x630
[   19.001744]  ret_from_fork+0x10/0x20
[   19.001891] 
[   19.002140] The buggy address belongs to the object at fff00000c6343600
[   19.002140]  which belongs to the cache kmalloc-128 of size 128
[   19.002344] The buggy address is located 13 bytes to the right of
[   19.002344]  allocated 115-byte region [fff00000c6343600, fff00000c6343673)
[   19.002409] 
[   19.002427] The buggy address belongs to the physical page:
[   19.002466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   19.002584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.002629] page_type: f5(slab)
[   19.002666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.002715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.003090] page dumped because: kasan: bad access detected
[   19.003238] 
[   19.003302] Memory state around the buggy address:
[   19.003339]  fff00000c6343580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003480]  fff00000c6343600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.003521] >fff00000c6343680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003557]                    ^
[   19.003583]  fff00000c6343700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003779]  fff00000c6343780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003965] ==================================================================
[   18.978665] ==================================================================
[   18.979007] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.979847] Write of size 1 at addr fff00000c6343673 by task kunit_try_catch/136
[   18.979954] 
[   18.980716] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   18.980858] Tainted: [N]=TEST
[   18.980890] Hardware name: linux,dummy-virt (DT)
[   18.981109] Call trace:
[   18.981288]  show_stack+0x20/0x38 (C)
[   18.981422]  dump_stack_lvl+0x8c/0xd0
[   18.981482]  print_report+0x118/0x608
[   18.981530]  kasan_report+0xdc/0x128
[   18.981575]  __asan_report_store1_noabort+0x20/0x30
[   18.981626]  kmalloc_oob_right+0x5a4/0x660
[   18.981671]  kunit_try_run_case+0x170/0x3f0
[   18.981721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.981772]  kthread+0x328/0x630
[   18.981816]  ret_from_fork+0x10/0x20
[   18.981966] 
[   18.982003] Allocated by task 136:
[   18.982120]  kasan_save_stack+0x3c/0x68
[   18.982198]  kasan_save_track+0x20/0x40
[   18.982236]  kasan_save_alloc_info+0x40/0x58
[   18.982276]  __kasan_kmalloc+0xd4/0xd8
[   18.982312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.982352]  kmalloc_oob_right+0xb0/0x660
[   18.982387]  kunit_try_run_case+0x170/0x3f0
[   18.982425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.982467]  kthread+0x328/0x630
[   18.982499]  ret_from_fork+0x10/0x20
[   18.982552] 
[   18.982611] The buggy address belongs to the object at fff00000c6343600
[   18.982611]  which belongs to the cache kmalloc-128 of size 128
[   18.982702] The buggy address is located 0 bytes to the right of
[   18.982702]  allocated 115-byte region [fff00000c6343600, fff00000c6343673)
[   18.982768] 
[   18.982846] The buggy address belongs to the physical page:
[   18.983021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   18.983296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.983692] page_type: f5(slab)
[   18.983990] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.984053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.984172] page dumped because: kasan: bad access detected
[   18.984213] 
[   18.984238] Memory state around the buggy address:
[   18.984456]  fff00000c6343500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.984520]  fff00000c6343580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.984573] >fff00000c6343600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.984626]                                                              ^
[   18.984706]  fff00000c6343680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.984747]  fff00000c6343700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.984810] ==================================================================
[   18.989531] ==================================================================
[   18.989694] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.989958] Write of size 1 at addr fff00000c6343678 by task kunit_try_catch/136
[   18.990007] 
[   18.990615] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.991049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.991088] Hardware name: linux,dummy-virt (DT)
[   18.991121] Call trace:
[   18.991142]  show_stack+0x20/0x38 (C)
[   18.991763]  dump_stack_lvl+0x8c/0xd0
[   18.991930]  print_report+0x118/0x608
[   18.991980]  kasan_report+0xdc/0x128
[   18.992027]  __asan_report_store1_noabort+0x20/0x30
[   18.992534]  kmalloc_oob_right+0x538/0x660
[   18.992882]  kunit_try_run_case+0x170/0x3f0
[   18.992942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.993325]  kthread+0x328/0x630
[   18.993593]  ret_from_fork+0x10/0x20
[   18.993652] 
[   18.993671] Allocated by task 136:
[   18.994027]  kasan_save_stack+0x3c/0x68
[   18.994078]  kasan_save_track+0x20/0x40
[   18.994115]  kasan_save_alloc_info+0x40/0x58
[   18.994262]  __kasan_kmalloc+0xd4/0xd8
[   18.994301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.994683]  kmalloc_oob_right+0xb0/0x660
[   18.994727]  kunit_try_run_case+0x170/0x3f0
[   18.994936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.995277]  kthread+0x328/0x630
[   18.995326]  ret_from_fork+0x10/0x20
[   18.995894] 
[   18.995927] The buggy address belongs to the object at fff00000c6343600
[   18.995927]  which belongs to the cache kmalloc-128 of size 128
[   18.996090] The buggy address is located 5 bytes to the right of
[   18.996090]  allocated 115-byte region [fff00000c6343600, fff00000c6343673)
[   18.996177] 
[   18.996195] The buggy address belongs to the physical page:
[   18.996310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343
[   18.996494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.996542] page_type: f5(slab)
[   18.996822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.996880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.996921] page dumped because: kasan: bad access detected
[   18.996952] 
[   18.997010] Memory state around the buggy address:
[   18.997155]  fff00000c6343500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.997209]  fff00000c6343580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.997353] >fff00000c6343600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.997467]                                                                 ^
[   18.997508]  fff00000c6343680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.997644]  fff00000c6343700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.997690] ==================================================================

[   11.799788] ==================================================================
[   11.800321] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.800645] Read of size 1 at addr ffff888102662a80 by task kunit_try_catch/154
[   11.800992] 
[   11.801077] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.801132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.801143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.801162] Call Trace:
[   11.801177]  <TASK>
[   11.801192]  dump_stack_lvl+0x73/0xb0
[   11.801218]  print_report+0xd1/0x650
[   11.801239]  ? __virt_addr_valid+0x1db/0x2d0
[   11.801260]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.801281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.801303]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.801324]  kasan_report+0x141/0x180
[   11.801345]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.801371]  __asan_report_load1_noabort+0x18/0x20
[   11.801396]  kmalloc_oob_right+0x68a/0x7f0
[   11.801417]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.801440]  ? __schedule+0x10cc/0x2b60
[   11.801461]  ? __pfx_read_tsc+0x10/0x10
[   11.801481]  ? ktime_get_ts64+0x86/0x230
[   11.801504]  kunit_try_run_case+0x1a5/0x480
[   11.801527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.801550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.801573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.801607]  ? __kthread_parkme+0x82/0x180
[   11.801627]  ? preempt_count_sub+0x50/0x80
[   11.801650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.801674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.801697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.801725]  kthread+0x337/0x6f0
[   11.801743]  ? trace_preempt_on+0x20/0xc0
[   11.801766]  ? __pfx_kthread+0x10/0x10
[   11.801786]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.801806]  ? calculate_sigpending+0x7b/0xa0
[   11.801830]  ? __pfx_kthread+0x10/0x10
[   11.801850]  ret_from_fork+0x116/0x1d0
[   11.801868]  ? __pfx_kthread+0x10/0x10
[   11.801888]  ret_from_fork_asm+0x1a/0x30
[   11.801919]  </TASK>
[   11.801928] 
[   11.811941] Allocated by task 154:
[   11.812127]  kasan_save_stack+0x45/0x70
[   11.812323]  kasan_save_track+0x18/0x40
[   11.812774]  kasan_save_alloc_info+0x3b/0x50
[   11.812949]  __kasan_kmalloc+0xb7/0xc0
[   11.813416]  __kmalloc_cache_noprof+0x189/0x420
[   11.813626]  kmalloc_oob_right+0xa9/0x7f0
[   11.813921]  kunit_try_run_case+0x1a5/0x480
[   11.814327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.814738]  kthread+0x337/0x6f0
[   11.814935]  ret_from_fork+0x116/0x1d0
[   11.815288]  ret_from_fork_asm+0x1a/0x30
[   11.815519] 
[   11.815634] The buggy address belongs to the object at ffff888102662a00
[   11.815634]  which belongs to the cache kmalloc-128 of size 128
[   11.816375] The buggy address is located 13 bytes to the right of
[   11.816375]  allocated 115-byte region [ffff888102662a00, ffff888102662a73)
[   11.817154] 
[   11.817297] The buggy address belongs to the physical page:
[   11.817871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   11.818426] flags: 0x200000000000000(node=0|zone=2)
[   11.818663] page_type: f5(slab)
[   11.818829] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.819206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.819834] page dumped because: kasan: bad access detected
[   11.820049] 
[   11.820367] Memory state around the buggy address:
[   11.820612]  ffff888102662980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.821171]  ffff888102662a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.821494] >ffff888102662a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.821798]                    ^
[   11.821949]  ffff888102662b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.822494]  ffff888102662b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.822883] ==================================================================
[   11.772441] ==================================================================
[   11.773201] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.773857] Write of size 1 at addr ffff888102662a78 by task kunit_try_catch/154
[   11.774564] 
[   11.774810] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.774854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.774866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.774887] Call Trace:
[   11.774900]  <TASK>
[   11.774916]  dump_stack_lvl+0x73/0xb0
[   11.774956]  print_report+0xd1/0x650
[   11.774978]  ? __virt_addr_valid+0x1db/0x2d0
[   11.775001]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.775023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.775045]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.775067]  kasan_report+0x141/0x180
[   11.775088]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.775114]  __asan_report_store1_noabort+0x1b/0x30
[   11.775138]  kmalloc_oob_right+0x6bd/0x7f0
[   11.775160]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.775182]  ? __schedule+0x10cc/0x2b60
[   11.775205]  ? __pfx_read_tsc+0x10/0x10
[   11.775225]  ? ktime_get_ts64+0x86/0x230
[   11.775250]  kunit_try_run_case+0x1a5/0x480
[   11.775273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.775296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.775319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.775342]  ? __kthread_parkme+0x82/0x180
[   11.775362]  ? preempt_count_sub+0x50/0x80
[   11.775386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.775410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.775434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.775458]  kthread+0x337/0x6f0
[   11.775477]  ? trace_preempt_on+0x20/0xc0
[   11.775500]  ? __pfx_kthread+0x10/0x10
[   11.775520]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.775541]  ? calculate_sigpending+0x7b/0xa0
[   11.775565]  ? __pfx_kthread+0x10/0x10
[   11.775586]  ret_from_fork+0x116/0x1d0
[   11.775615]  ? __pfx_kthread+0x10/0x10
[   11.775635]  ret_from_fork_asm+0x1a/0x30
[   11.775666]  </TASK>
[   11.775676] 
[   11.787266] Allocated by task 154:
[   11.787583]  kasan_save_stack+0x45/0x70
[   11.788009]  kasan_save_track+0x18/0x40
[   11.788148]  kasan_save_alloc_info+0x3b/0x50
[   11.788295]  __kasan_kmalloc+0xb7/0xc0
[   11.788426]  __kmalloc_cache_noprof+0x189/0x420
[   11.788616]  kmalloc_oob_right+0xa9/0x7f0
[   11.788756]  kunit_try_run_case+0x1a5/0x480
[   11.789038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.789555]  kthread+0x337/0x6f0
[   11.789944]  ret_from_fork+0x116/0x1d0
[   11.790304]  ret_from_fork_asm+0x1a/0x30
[   11.790705] 
[   11.790881] The buggy address belongs to the object at ffff888102662a00
[   11.790881]  which belongs to the cache kmalloc-128 of size 128
[   11.792101] The buggy address is located 5 bytes to the right of
[   11.792101]  allocated 115-byte region [ffff888102662a00, ffff888102662a73)
[   11.792863] 
[   11.793044] The buggy address belongs to the physical page:
[   11.793560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   11.794229] flags: 0x200000000000000(node=0|zone=2)
[   11.794392] page_type: f5(slab)
[   11.794717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.795443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.796172] page dumped because: kasan: bad access detected
[   11.796354] 
[   11.796422] Memory state around the buggy address:
[   11.796642]  ffff888102662900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.796928]  ffff888102662980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.797512] >ffff888102662a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.798174]                                                                 ^
[   11.798871]  ffff888102662a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.799153]  ffff888102662b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.799362] ==================================================================
[   11.736569] ==================================================================
[   11.737383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.738288] Write of size 1 at addr ffff888102662a73 by task kunit_try_catch/154
[   11.738745] 
[   11.739997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.740340] Tainted: [N]=TEST
[   11.740371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.740629] Call Trace:
[   11.740698]  <TASK>
[   11.740837]  dump_stack_lvl+0x73/0xb0
[   11.741218]  print_report+0xd1/0x650
[   11.741263]  ? __virt_addr_valid+0x1db/0x2d0
[   11.741289]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.741310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.741333]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.741354]  kasan_report+0x141/0x180
[   11.741376]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.741402]  __asan_report_store1_noabort+0x1b/0x30
[   11.741427]  kmalloc_oob_right+0x6f0/0x7f0
[   11.741449]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.741471]  ? __schedule+0x10cc/0x2b60
[   11.741493]  ? __pfx_read_tsc+0x10/0x10
[   11.741516]  ? ktime_get_ts64+0x86/0x230
[   11.741542]  kunit_try_run_case+0x1a5/0x480
[   11.741568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.741590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.741631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.741654]  ? __kthread_parkme+0x82/0x180
[   11.741676]  ? preempt_count_sub+0x50/0x80
[   11.741704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.741728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.741752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.741776]  kthread+0x337/0x6f0
[   11.741794]  ? trace_preempt_on+0x20/0xc0
[   11.741818]  ? __pfx_kthread+0x10/0x10
[   11.741838]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.741860]  ? calculate_sigpending+0x7b/0xa0
[   11.741884]  ? __pfx_kthread+0x10/0x10
[   11.741904]  ret_from_fork+0x116/0x1d0
[   11.741982]  ? __pfx_kthread+0x10/0x10
[   11.742004]  ret_from_fork_asm+0x1a/0x30
[   11.742066]  </TASK>
[   11.742134] 
[   11.754878] Allocated by task 154:
[   11.755545]  kasan_save_stack+0x45/0x70
[   11.755972]  kasan_save_track+0x18/0x40
[   11.756405]  kasan_save_alloc_info+0x3b/0x50
[   11.756585]  __kasan_kmalloc+0xb7/0xc0
[   11.756959]  __kmalloc_cache_noprof+0x189/0x420
[   11.757476]  kmalloc_oob_right+0xa9/0x7f0
[   11.757888]  kunit_try_run_case+0x1a5/0x480
[   11.758124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.758622]  kthread+0x337/0x6f0
[   11.758744]  ret_from_fork+0x116/0x1d0
[   11.758874]  ret_from_fork_asm+0x1a/0x30
[   11.759351] 
[   11.759670] The buggy address belongs to the object at ffff888102662a00
[   11.759670]  which belongs to the cache kmalloc-128 of size 128
[   11.760480] The buggy address is located 0 bytes to the right of
[   11.760480]  allocated 115-byte region [ffff888102662a00, ffff888102662a73)
[   11.761826] 
[   11.762100] The buggy address belongs to the physical page:
[   11.762819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   11.763546] flags: 0x200000000000000(node=0|zone=2)
[   11.764416] page_type: f5(slab)
[   11.765108] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.765824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.766501] page dumped because: kasan: bad access detected
[   11.766856] 
[   11.767042] Memory state around the buggy address:
[   11.767811]  ffff888102662900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.768251]  ffff888102662980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.768486] >ffff888102662a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.768734]                                                              ^
[   11.769085]  ffff888102662a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.769841]  ffff888102662b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.770622] ==================================================================