Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.319527] ==================================================================
[   16.319890] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.320727] Write of size 1 at addr fff00000c638b573 by task kunit_try_catch/136
[   16.320834] 
[   16.321603] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.321743] Tainted: [N]=TEST
[   16.321775] Hardware name: linux,dummy-virt (DT)
[   16.321995] Call trace:
[   16.322176]  show_stack+0x20/0x38 (C)
[   16.322313]  dump_stack_lvl+0x8c/0xd0
[   16.322379]  print_report+0x118/0x608
[   16.322427]  kasan_report+0xdc/0x128
[   16.322472]  __asan_report_store1_noabort+0x20/0x30
[   16.322523]  kmalloc_oob_right+0x5a4/0x660
[   16.322568]  kunit_try_run_case+0x170/0x3f0
[   16.322618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.322671]  kthread+0x328/0x630
[   16.322716]  ret_from_fork+0x10/0x20
[   16.322873] 
[   16.322911] Allocated by task 136:
[   16.323023]  kasan_save_stack+0x3c/0x68
[   16.323090]  kasan_save_track+0x20/0x40
[   16.323140]  kasan_save_alloc_info+0x40/0x58
[   16.323179]  __kasan_kmalloc+0xd4/0xd8
[   16.323215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.323256]  kmalloc_oob_right+0xb0/0x660
[   16.323291]  kunit_try_run_case+0x170/0x3f0
[   16.323329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.323372]  kthread+0x328/0x630
[   16.323405]  ret_from_fork+0x10/0x20
[   16.323462] 
[   16.323522] The buggy address belongs to the object at fff00000c638b500
[   16.323522]  which belongs to the cache kmalloc-128 of size 128
[   16.323618] The buggy address is located 0 bytes to the right of
[   16.323618]  allocated 115-byte region [fff00000c638b500, fff00000c638b573)
[   16.323820] 
[   16.323916] The buggy address belongs to the physical page:
[   16.324140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b
[   16.324420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.324708] page_type: f5(slab)
[   16.324997] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.325061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.325178] page dumped because: kasan: bad access detected
[   16.325218] 
[   16.325243] Memory state around the buggy address:
[   16.325459]  fff00000c638b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.325530]  fff00000c638b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325584] >fff00000c638b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.325636]                                                              ^
[   16.325716]  fff00000c638b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325757]  fff00000c638b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.325818] ==================================================================
[   16.333856] ==================================================================
[   16.333907] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.333952] Read of size 1 at addr fff00000c638b580 by task kunit_try_catch/136
[   16.334007] 
[   16.334087] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.334217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.334384] Hardware name: linux,dummy-virt (DT)
[   16.334420] Call trace:
[   16.334441]  show_stack+0x20/0x38 (C)
[   16.334536]  dump_stack_lvl+0x8c/0xd0
[   16.334589]  print_report+0x118/0x608
[   16.334635]  kasan_report+0xdc/0x128
[   16.334679]  __asan_report_load1_noabort+0x20/0x30
[   16.334753]  kmalloc_oob_right+0x5d0/0x660
[   16.334820]  kunit_try_run_case+0x170/0x3f0
[   16.334868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.335072]  kthread+0x328/0x630
[   16.335133]  ret_from_fork+0x10/0x20
[   16.335247] 
[   16.335285] Allocated by task 136:
[   16.335406]  kasan_save_stack+0x3c/0x68
[   16.335451]  kasan_save_track+0x20/0x40
[   16.335493]  kasan_save_alloc_info+0x40/0x58
[   16.335549]  __kasan_kmalloc+0xd4/0xd8
[   16.335586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.335724]  kmalloc_oob_right+0xb0/0x660
[   16.335894]  kunit_try_run_case+0x170/0x3f0
[   16.335943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.335992]  kthread+0x328/0x630
[   16.336023]  ret_from_fork+0x10/0x20
[   16.336176] 
[   16.336198] The buggy address belongs to the object at fff00000c638b500
[   16.336198]  which belongs to the cache kmalloc-128 of size 128
[   16.336281] The buggy address is located 13 bytes to the right of
[   16.336281]  allocated 115-byte region [fff00000c638b500, fff00000c638b573)
[   16.336466] 
[   16.336505] The buggy address belongs to the physical page:
[   16.336564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b
[   16.336740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.336902] page_type: f5(slab)
[   16.337000] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.337212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.337284] page dumped because: kasan: bad access detected
[   16.337315] 
[   16.337332] Memory state around the buggy address:
[   16.337400]  fff00000c638b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.337464]  fff00000c638b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.337553] >fff00000c638b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.337601]                    ^
[   16.337630]  fff00000c638b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.337672]  fff00000c638b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.337736] ==================================================================
[   16.326883] ==================================================================
[   16.326931] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.326979] Write of size 1 at addr fff00000c638b578 by task kunit_try_catch/136
[   16.327367] 
[   16.327421] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.327533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.327560] Hardware name: linux,dummy-virt (DT)
[   16.328108] Call trace:
[   16.328258]  show_stack+0x20/0x38 (C)
[   16.328313]  dump_stack_lvl+0x8c/0xd0
[   16.328581]  print_report+0x118/0x608
[   16.328814]  kasan_report+0xdc/0x128
[   16.328869]  __asan_report_store1_noabort+0x20/0x30
[   16.328921]  kmalloc_oob_right+0x538/0x660
[   16.329101]  kunit_try_run_case+0x170/0x3f0
[   16.329257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.329439]  kthread+0x328/0x630
[   16.329542]  ret_from_fork+0x10/0x20
[   16.329720] 
[   16.329758] Allocated by task 136:
[   16.329792]  kasan_save_stack+0x3c/0x68
[   16.330065]  kasan_save_track+0x20/0x40
[   16.330254]  kasan_save_alloc_info+0x40/0x58
[   16.330305]  __kasan_kmalloc+0xd4/0xd8
[   16.330431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.330554]  kmalloc_oob_right+0xb0/0x660
[   16.330642]  kunit_try_run_case+0x170/0x3f0
[   16.330759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.330931]  kthread+0x328/0x630
[   16.331044]  ret_from_fork+0x10/0x20
[   16.331146] 
[   16.331176] The buggy address belongs to the object at fff00000c638b500
[   16.331176]  which belongs to the cache kmalloc-128 of size 128
[   16.331327] The buggy address is located 5 bytes to the right of
[   16.331327]  allocated 115-byte region [fff00000c638b500, fff00000c638b573)
[   16.331449] 
[   16.331507] The buggy address belongs to the physical page:
[   16.331538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b
[   16.331886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.332071] page_type: f5(slab)
[   16.332125] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.332182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.332226] page dumped because: kasan: bad access detected
[   16.332256] 
[   16.332273] Memory state around the buggy address:
[   16.332302]  fff00000c638b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.332343]  fff00000c638b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332508] >fff00000c638b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.332768]                                                                 ^
[   16.332952]  fff00000c638b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.333056]  fff00000c638b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.333245] ==================================================================

[   11.873371] ==================================================================
[   11.873599] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.874154] Write of size 1 at addr ffff8881031db578 by task kunit_try_catch/153
[   11.874394] 
[   11.874579] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.874654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.874666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.874697] Call Trace:
[   11.874718]  <TASK>
[   11.874732]  dump_stack_lvl+0x73/0xb0
[   11.874760]  print_report+0xd1/0x650
[   11.874781]  ? __virt_addr_valid+0x1db/0x2d0
[   11.874803]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.874823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.874846]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.874868]  kasan_report+0x141/0x180
[   11.874889]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.874915]  __asan_report_store1_noabort+0x1b/0x30
[   11.874940]  kmalloc_oob_right+0x6bd/0x7f0
[   11.874961]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.874983]  ? __schedule+0x10cc/0x2b60
[   11.875005]  ? __pfx_read_tsc+0x10/0x10
[   11.875026]  ? ktime_get_ts64+0x86/0x230
[   11.875065]  kunit_try_run_case+0x1a5/0x480
[   11.875089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.875112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.875135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.875158]  ? __kthread_parkme+0x82/0x180
[   11.875177]  ? preempt_count_sub+0x50/0x80
[   11.875201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.875225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.875249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.875273]  kthread+0x337/0x6f0
[   11.875291]  ? trace_preempt_on+0x20/0xc0
[   11.875314]  ? __pfx_kthread+0x10/0x10
[   11.875334]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.875355]  ? calculate_sigpending+0x7b/0xa0
[   11.875381]  ? __pfx_kthread+0x10/0x10
[   11.875401]  ret_from_fork+0x116/0x1d0
[   11.875419]  ? __pfx_kthread+0x10/0x10
[   11.875439]  ret_from_fork_asm+0x1a/0x30
[   11.875469]  </TASK>
[   11.875478] 
[   11.884411] Allocated by task 153:
[   11.884586]  kasan_save_stack+0x45/0x70
[   11.884795]  kasan_save_track+0x18/0x40
[   11.884985]  kasan_save_alloc_info+0x3b/0x50
[   11.885290]  __kasan_kmalloc+0xb7/0xc0
[   11.885471]  __kmalloc_cache_noprof+0x189/0x420
[   11.885661]  kmalloc_oob_right+0xa9/0x7f0
[   11.885840]  kunit_try_run_case+0x1a5/0x480
[   11.886032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.886251]  kthread+0x337/0x6f0
[   11.886384]  ret_from_fork+0x116/0x1d0
[   11.886567]  ret_from_fork_asm+0x1a/0x30
[   11.886776] 
[   11.886868] The buggy address belongs to the object at ffff8881031db500
[   11.886868]  which belongs to the cache kmalloc-128 of size 128
[   11.887363] The buggy address is located 5 bytes to the right of
[   11.887363]  allocated 115-byte region [ffff8881031db500, ffff8881031db573)
[   11.887748] 
[   11.887854] The buggy address belongs to the physical page:
[   11.888174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db
[   11.888534] flags: 0x200000000000000(node=0|zone=2)
[   11.888728] page_type: f5(slab)
[   11.888846] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.889074] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.889525] page dumped because: kasan: bad access detected
[   11.889792] 
[   11.889882] Memory state around the buggy address:
[   11.890110]  ffff8881031db400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.890544]  ffff8881031db480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.890790] >ffff8881031db500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.891178]                                                                 ^
[   11.891470]  ffff8881031db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.891713]  ffff8881031db600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.892030] ==================================================================
[   11.845728] ==================================================================
[   11.846432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.847136] Write of size 1 at addr ffff8881031db573 by task kunit_try_catch/153
[   11.847604] 
[   11.848724] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.849100] Tainted: [N]=TEST
[   11.849132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.849348] Call Trace:
[   11.849413]  <TASK>
[   11.849555]  dump_stack_lvl+0x73/0xb0
[   11.849642]  print_report+0xd1/0x650
[   11.849671]  ? __virt_addr_valid+0x1db/0x2d0
[   11.849696]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.849746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.849769]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.849791]  kasan_report+0x141/0x180
[   11.849812]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.849838]  __asan_report_store1_noabort+0x1b/0x30
[   11.849863]  kmalloc_oob_right+0x6f0/0x7f0
[   11.849885]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.849907]  ? __schedule+0x10cc/0x2b60
[   11.849929]  ? __pfx_read_tsc+0x10/0x10
[   11.849951]  ? ktime_get_ts64+0x86/0x230
[   11.849977]  kunit_try_run_case+0x1a5/0x480
[   11.850003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.850044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.850070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.850093]  ? __kthread_parkme+0x82/0x180
[   11.850115]  ? preempt_count_sub+0x50/0x80
[   11.850139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.850163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.850187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.850211]  kthread+0x337/0x6f0
[   11.850230]  ? trace_preempt_on+0x20/0xc0
[   11.850253]  ? __pfx_kthread+0x10/0x10
[   11.850273]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.850294]  ? calculate_sigpending+0x7b/0xa0
[   11.850321]  ? __pfx_kthread+0x10/0x10
[   11.850342]  ret_from_fork+0x116/0x1d0
[   11.850360]  ? __pfx_kthread+0x10/0x10
[   11.850380]  ret_from_fork_asm+0x1a/0x30
[   11.850437]  </TASK>
[   11.850502] 
[   11.859003] Allocated by task 153:
[   11.859530]  kasan_save_stack+0x45/0x70
[   11.859775]  kasan_save_track+0x18/0x40
[   11.860021]  kasan_save_alloc_info+0x3b/0x50
[   11.860219]  __kasan_kmalloc+0xb7/0xc0
[   11.860353]  __kmalloc_cache_noprof+0x189/0x420
[   11.860508]  kmalloc_oob_right+0xa9/0x7f0
[   11.860644]  kunit_try_run_case+0x1a5/0x480
[   11.861046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.861479]  kthread+0x337/0x6f0
[   11.861671]  ret_from_fork+0x116/0x1d0
[   11.861906]  ret_from_fork_asm+0x1a/0x30
[   11.862189] 
[   11.862392] The buggy address belongs to the object at ffff8881031db500
[   11.862392]  which belongs to the cache kmalloc-128 of size 128
[   11.862999] The buggy address is located 0 bytes to the right of
[   11.862999]  allocated 115-byte region [ffff8881031db500, ffff8881031db573)
[   11.863609] 
[   11.863901] The buggy address belongs to the physical page:
[   11.864523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db
[   11.865293] flags: 0x200000000000000(node=0|zone=2)
[   11.866071] page_type: f5(slab)
[   11.866590] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.867015] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.867549] page dumped because: kasan: bad access detected
[   11.867960] 
[   11.868095] Memory state around the buggy address:
[   11.868641]  ffff8881031db400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.869125]  ffff8881031db480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.869433] >ffff8881031db500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.869740]                                                              ^
[   11.870061]  ffff8881031db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.870420]  ffff8881031db600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.870770] ==================================================================
[   11.892632] ==================================================================
[   11.892939] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.893283] Read of size 1 at addr ffff8881031db580 by task kunit_try_catch/153
[   11.893608] 
[   11.893688] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.893740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.893751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.893769] Call Trace:
[   11.893781]  <TASK>
[   11.893793]  dump_stack_lvl+0x73/0xb0
[   11.893818]  print_report+0xd1/0x650
[   11.893838]  ? __virt_addr_valid+0x1db/0x2d0
[   11.893862]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.893884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.893907]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.893928]  kasan_report+0x141/0x180
[   11.893949]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.893975]  __asan_report_load1_noabort+0x18/0x20
[   11.893999]  kmalloc_oob_right+0x68a/0x7f0
[   11.894020]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.894042]  ? __schedule+0x10cc/0x2b60
[   11.894064]  ? __pfx_read_tsc+0x10/0x10
[   11.894084]  ? ktime_get_ts64+0x86/0x230
[   11.894107]  kunit_try_run_case+0x1a5/0x480
[   11.894130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.894152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.894175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.894497]  ? __kthread_parkme+0x82/0x180
[   11.894522]  ? preempt_count_sub+0x50/0x80
[   11.894545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.894569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.894593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.894617]  kthread+0x337/0x6f0
[   11.894635]  ? trace_preempt_on+0x20/0xc0
[   11.894723]  ? __pfx_kthread+0x10/0x10
[   11.894746]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.894767]  ? calculate_sigpending+0x7b/0xa0
[   11.894793]  ? __pfx_kthread+0x10/0x10
[   11.894814]  ret_from_fork+0x116/0x1d0
[   11.894832]  ? __pfx_kthread+0x10/0x10
[   11.894852]  ret_from_fork_asm+0x1a/0x30
[   11.894882]  </TASK>
[   11.894892] 
[   11.901809] Allocated by task 153:
[   11.901964]  kasan_save_stack+0x45/0x70
[   11.902143]  kasan_save_track+0x18/0x40
[   11.902279]  kasan_save_alloc_info+0x3b/0x50
[   11.902426]  __kasan_kmalloc+0xb7/0xc0
[   11.902557]  __kmalloc_cache_noprof+0x189/0x420
[   11.902722]  kmalloc_oob_right+0xa9/0x7f0
[   11.902873]  kunit_try_run_case+0x1a5/0x480
[   11.903078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.903326]  kthread+0x337/0x6f0
[   11.903490]  ret_from_fork+0x116/0x1d0
[   11.903676]  ret_from_fork_asm+0x1a/0x30
[   11.904048] 
[   11.904135] The buggy address belongs to the object at ffff8881031db500
[   11.904135]  which belongs to the cache kmalloc-128 of size 128
[   11.904493] The buggy address is located 13 bytes to the right of
[   11.904493]  allocated 115-byte region [ffff8881031db500, ffff8881031db573)
[   11.904872] 
[   11.904941] The buggy address belongs to the physical page:
[   11.905308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031db
[   11.905592] flags: 0x200000000000000(node=0|zone=2)
[   11.905825] page_type: f5(slab)
[   11.905988] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.906312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.906616] page dumped because: kasan: bad access detected
[   11.906839] 
[   11.906907] Memory state around the buggy address:
[   11.907075]  ffff8881031db480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.907389]  ffff8881031db500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.907679] >ffff8881031db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.907988]                    ^
[   11.908143]  ffff8881031db600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.908401]  ffff8881031db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.908732] ==================================================================