Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.237576] ==================================================================
[   16.237938] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.238753] Write of size 1 at addr fff00000c6691173 by task kunit_try_catch/136
[   16.238860] 
[   16.239605] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   16.239745] Tainted: [N]=TEST
[   16.239903] Hardware name: linux,dummy-virt (DT)
[   16.240138] Call trace:
[   16.240313]  show_stack+0x20/0x38 (C)
[   16.240443]  dump_stack_lvl+0x8c/0xd0
[   16.240504]  print_report+0x118/0x5d0
[   16.240552]  kasan_report+0xdc/0x128
[   16.240598]  __asan_report_store1_noabort+0x20/0x30
[   16.240649]  kmalloc_oob_right+0x5a4/0x660
[   16.240694]  kunit_try_run_case+0x170/0x3f0
[   16.240743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.240793]  kthread+0x328/0x630
[   16.240836]  ret_from_fork+0x10/0x20
[   16.241003] 
[   16.241042] Allocated by task 136:
[   16.241153]  kasan_save_stack+0x3c/0x68
[   16.241216]  kasan_save_track+0x20/0x40
[   16.241253]  kasan_save_alloc_info+0x40/0x58
[   16.241291]  __kasan_kmalloc+0xd4/0xd8
[   16.241326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.241366]  kmalloc_oob_right+0xb0/0x660
[   16.241400]  kunit_try_run_case+0x170/0x3f0
[   16.241436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.241477]  kthread+0x328/0x630
[   16.241508]  ret_from_fork+0x10/0x20
[   16.241560] 
[   16.241618] The buggy address belongs to the object at fff00000c6691100
[   16.241618]  which belongs to the cache kmalloc-128 of size 128
[   16.241707] The buggy address is located 0 bytes to the right of
[   16.241707]  allocated 115-byte region [fff00000c6691100, fff00000c6691173)
[   16.241772] 
[   16.241854] The buggy address belongs to the physical page:
[   16.242038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.242302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.242580] page_type: f5(slab)
[   16.242873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.242937] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.243042] page dumped because: kasan: bad access detected
[   16.243082] 
[   16.243107] Memory state around the buggy address:
[   16.243331]  fff00000c6691000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.243395]  fff00000c6691080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.243448] >fff00000c6691100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.243499]                                                              ^
[   16.243588]  fff00000c6691180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.243629]  fff00000c6691200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.243689] ==================================================================
[   16.245967] ==================================================================
[   16.246472] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.246527] Write of size 1 at addr fff00000c6691178 by task kunit_try_catch/136
[   16.246575] 
[   16.246607] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.247253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.247402] Hardware name: linux,dummy-virt (DT)
[   16.247622] Call trace:
[   16.247731]  show_stack+0x20/0x38 (C)
[   16.248287]  dump_stack_lvl+0x8c/0xd0
[   16.248758]  print_report+0x118/0x5d0
[   16.249149]  kasan_report+0xdc/0x128
[   16.249328]  __asan_report_store1_noabort+0x20/0x30
[   16.249378]  kmalloc_oob_right+0x538/0x660
[   16.249960]  kunit_try_run_case+0x170/0x3f0
[   16.250779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.251004]  kthread+0x328/0x630
[   16.251070]  ret_from_fork+0x10/0x20
[   16.251774] 
[   16.251848] Allocated by task 136:
[   16.251892]  kasan_save_stack+0x3c/0x68
[   16.252164]  kasan_save_track+0x20/0x40
[   16.252615]  kasan_save_alloc_info+0x40/0x58
[   16.253033]  __kasan_kmalloc+0xd4/0xd8
[   16.253159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.253198]  kmalloc_oob_right+0xb0/0x660
[   16.253721]  kunit_try_run_case+0x170/0x3f0
[   16.253772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.254471]  kthread+0x328/0x630
[   16.254923]  ret_from_fork+0x10/0x20
[   16.255343] 
[   16.255724] The buggy address belongs to the object at fff00000c6691100
[   16.255724]  which belongs to the cache kmalloc-128 of size 128
[   16.255883] The buggy address is located 5 bytes to the right of
[   16.255883]  allocated 115-byte region [fff00000c6691100, fff00000c6691173)
[   16.256501] 
[   16.256545] The buggy address belongs to the physical page:
[   16.257238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.257687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.257748] page_type: f5(slab)
[   16.257791] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.259389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.259642] page dumped because: kasan: bad access detected
[   16.259674] 
[   16.259719] Memory state around the buggy address:
[   16.259782]  fff00000c6691000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.259901]  fff00000c6691080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.260233] >fff00000c6691100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.260426]                                                                 ^
[   16.260998]  fff00000c6691180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261090]  fff00000c6691200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.261390] ==================================================================
[   16.262827] ==================================================================
[   16.262896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.262948] Read of size 1 at addr fff00000c6691180 by task kunit_try_catch/136
[   16.262996] 
[   16.263029] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.263106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.263132] Hardware name: linux,dummy-virt (DT)
[   16.263162] Call trace:
[   16.263183]  show_stack+0x20/0x38 (C)
[   16.263669]  dump_stack_lvl+0x8c/0xd0
[   16.263751]  print_report+0x118/0x5d0
[   16.263893]  kasan_report+0xdc/0x128
[   16.263942]  __asan_report_load1_noabort+0x20/0x30
[   16.263991]  kmalloc_oob_right+0x5d0/0x660
[   16.264035]  kunit_try_run_case+0x170/0x3f0
[   16.264081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.264131]  kthread+0x328/0x630
[   16.264171]  ret_from_fork+0x10/0x20
[   16.264216] 
[   16.264234] Allocated by task 136:
[   16.264261]  kasan_save_stack+0x3c/0x68
[   16.264300]  kasan_save_track+0x20/0x40
[   16.264335]  kasan_save_alloc_info+0x40/0x58
[   16.264373]  __kasan_kmalloc+0xd4/0xd8
[   16.264408]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.264447]  kmalloc_oob_right+0xb0/0x660
[   16.264482]  kunit_try_run_case+0x170/0x3f0
[   16.264518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.264559]  kthread+0x328/0x630
[   16.264590]  ret_from_fork+0x10/0x20
[   16.264627] 
[   16.264646] The buggy address belongs to the object at fff00000c6691100
[   16.264646]  which belongs to the cache kmalloc-128 of size 128
[   16.264700] The buggy address is located 13 bytes to the right of
[   16.264700]  allocated 115-byte region [fff00000c6691100, fff00000c6691173)
[   16.264760] 
[   16.264779] The buggy address belongs to the physical page:
[   16.264808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   16.264856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.264912] page_type: f5(slab)
[   16.264948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.264995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.265033] page dumped because: kasan: bad access detected
[   16.265062] 
[   16.265079] Memory state around the buggy address:
[   16.265108]  fff00000c6691080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265298]  fff00000c6691100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.265340] >fff00000c6691180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265751]                    ^
[   16.265793]  fff00000c6691200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265835]  fff00000c6691280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265881] ==================================================================

[   11.484976] ==================================================================
[   11.485712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.486433] Write of size 1 at addr ffff888102f33d73 by task kunit_try_catch/153
[   11.486986] 
[   11.488280] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.488653] Tainted: [N]=TEST
[   11.488685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.488897] Call Trace:
[   11.488965]  <TASK>
[   11.489125]  dump_stack_lvl+0x73/0xb0
[   11.489213]  print_report+0xd1/0x610
[   11.489242]  ? __virt_addr_valid+0x1db/0x2d0
[   11.489267]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.489288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.489310]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.489332]  kasan_report+0x141/0x180
[   11.489353]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.489380]  __asan_report_store1_noabort+0x1b/0x30
[   11.489404]  kmalloc_oob_right+0x6f0/0x7f0
[   11.489425]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.489447]  ? __schedule+0x10cc/0x2b60
[   11.489469]  ? __pfx_read_tsc+0x10/0x10
[   11.489491]  ? ktime_get_ts64+0x86/0x230
[   11.489517]  kunit_try_run_case+0x1a5/0x480
[   11.489543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.489565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.489607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.489631]  ? __kthread_parkme+0x82/0x180
[   11.489653]  ? preempt_count_sub+0x50/0x80
[   11.489677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.489700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.489723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.489746]  kthread+0x337/0x6f0
[   11.489765]  ? trace_preempt_on+0x20/0xc0
[   11.489788]  ? __pfx_kthread+0x10/0x10
[   11.489808]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.489828]  ? calculate_sigpending+0x7b/0xa0
[   11.489853]  ? __pfx_kthread+0x10/0x10
[   11.489874]  ret_from_fork+0x116/0x1d0
[   11.489892]  ? __pfx_kthread+0x10/0x10
[   11.489911]  ret_from_fork_asm+0x1a/0x30
[   11.489968]  </TASK>
[   11.490032] 
[   11.499304] Allocated by task 153:
[   11.499972]  kasan_save_stack+0x45/0x70
[   11.500388]  kasan_save_track+0x18/0x40
[   11.500892]  kasan_save_alloc_info+0x3b/0x50
[   11.501385]  __kasan_kmalloc+0xb7/0xc0
[   11.501861]  __kmalloc_cache_noprof+0x189/0x420
[   11.502176]  kmalloc_oob_right+0xa9/0x7f0
[   11.502328]  kunit_try_run_case+0x1a5/0x480
[   11.502475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.502664]  kthread+0x337/0x6f0
[   11.503099]  ret_from_fork+0x116/0x1d0
[   11.503297]  ret_from_fork_asm+0x1a/0x30
[   11.503536] 
[   11.503703] The buggy address belongs to the object at ffff888102f33d00
[   11.503703]  which belongs to the cache kmalloc-128 of size 128
[   11.504424] The buggy address is located 0 bytes to the right of
[   11.504424]  allocated 115-byte region [ffff888102f33d00, ffff888102f33d73)
[   11.505310] 
[   11.505629] The buggy address belongs to the physical page:
[   11.506260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f33
[   11.507016] flags: 0x200000000000000(node=0|zone=2)
[   11.507642] page_type: f5(slab)
[   11.508366] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.508743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.509157] page dumped because: kasan: bad access detected
[   11.509388] 
[   11.509495] Memory state around the buggy address:
[   11.510353]  ffff888102f33c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.510699]  ffff888102f33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.511171] >ffff888102f33d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.511638]                                                              ^
[   11.512076]  ffff888102f33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.512489]  ffff888102f33e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.512950] ==================================================================
[   11.514814] ==================================================================
[   11.515241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.515657] Write of size 1 at addr ffff888102f33d78 by task kunit_try_catch/153
[   11.516152] 
[   11.516412] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.516460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.516473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.516494] Call Trace:
[   11.516507]  <TASK>
[   11.516615]  dump_stack_lvl+0x73/0xb0
[   11.516651]  print_report+0xd1/0x610
[   11.516672]  ? __virt_addr_valid+0x1db/0x2d0
[   11.516694]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.516716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.516738]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.516759]  kasan_report+0x141/0x180
[   11.516780]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.516807]  __asan_report_store1_noabort+0x1b/0x30
[   11.516831]  kmalloc_oob_right+0x6bd/0x7f0
[   11.516852]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.516874]  ? __schedule+0x10cc/0x2b60
[   11.516896]  ? __pfx_read_tsc+0x10/0x10
[   11.516916]  ? ktime_get_ts64+0x86/0x230
[   11.516940]  kunit_try_run_case+0x1a5/0x480
[   11.516964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.516985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.517009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.517032]  ? __kthread_parkme+0x82/0x180
[   11.517067]  ? preempt_count_sub+0x50/0x80
[   11.517091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.517114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.517137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.517160]  kthread+0x337/0x6f0
[   11.517178]  ? trace_preempt_on+0x20/0xc0
[   11.517201]  ? __pfx_kthread+0x10/0x10
[   11.517220]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.517241]  ? calculate_sigpending+0x7b/0xa0
[   11.517265]  ? __pfx_kthread+0x10/0x10
[   11.517285]  ret_from_fork+0x116/0x1d0
[   11.517303]  ? __pfx_kthread+0x10/0x10
[   11.517322]  ret_from_fork_asm+0x1a/0x30
[   11.517354]  </TASK>
[   11.517364] 
[   11.526480] Allocated by task 153:
[   11.526635]  kasan_save_stack+0x45/0x70
[   11.527251]  kasan_save_track+0x18/0x40
[   11.527407]  kasan_save_alloc_info+0x3b/0x50
[   11.527765]  __kasan_kmalloc+0xb7/0xc0
[   11.528037]  __kmalloc_cache_noprof+0x189/0x420
[   11.528369]  kmalloc_oob_right+0xa9/0x7f0
[   11.528711]  kunit_try_run_case+0x1a5/0x480
[   11.528938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.529282]  kthread+0x337/0x6f0
[   11.529554]  ret_from_fork+0x116/0x1d0
[   11.529716]  ret_from_fork_asm+0x1a/0x30
[   11.530064] 
[   11.530262] The buggy address belongs to the object at ffff888102f33d00
[   11.530262]  which belongs to the cache kmalloc-128 of size 128
[   11.531032] The buggy address is located 5 bytes to the right of
[   11.531032]  allocated 115-byte region [ffff888102f33d00, ffff888102f33d73)
[   11.531566] 
[   11.531827] The buggy address belongs to the physical page:
[   11.532165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f33
[   11.532508] flags: 0x200000000000000(node=0|zone=2)
[   11.533033] page_type: f5(slab)
[   11.533226] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.533634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.534075] page dumped because: kasan: bad access detected
[   11.534403] 
[   11.534504] Memory state around the buggy address:
[   11.534966]  ffff888102f33c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.535290]  ffff888102f33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.535779] >ffff888102f33d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.536098]                                                                 ^
[   11.536466]  ffff888102f33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.536957]  ffff888102f33e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.537347] ==================================================================
[   11.538504] ==================================================================
[   11.538959] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.539276] Read of size 1 at addr ffff888102f33d80 by task kunit_try_catch/153
[   11.539588] 
[   11.539925] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.539974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.539985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.540008] Call Trace:
[   11.540222]  <TASK>
[   11.540245]  dump_stack_lvl+0x73/0xb0
[   11.540276]  print_report+0xd1/0x610
[   11.540298]  ? __virt_addr_valid+0x1db/0x2d0
[   11.540321]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.540342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.540364]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.540385]  kasan_report+0x141/0x180
[   11.540407]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.540433]  __asan_report_load1_noabort+0x18/0x20
[   11.540457]  kmalloc_oob_right+0x68a/0x7f0
[   11.540481]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.540503]  ? __schedule+0x10cc/0x2b60
[   11.540525]  ? __pfx_read_tsc+0x10/0x10
[   11.540544]  ? ktime_get_ts64+0x86/0x230
[   11.540569]  kunit_try_run_case+0x1a5/0x480
[   11.540593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.540614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.540637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.540660]  ? __kthread_parkme+0x82/0x180
[   11.540680]  ? preempt_count_sub+0x50/0x80
[   11.540704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.540727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.540750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.540773]  kthread+0x337/0x6f0
[   11.540791]  ? trace_preempt_on+0x20/0xc0
[   11.540814]  ? __pfx_kthread+0x10/0x10
[   11.540833]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.540853]  ? calculate_sigpending+0x7b/0xa0
[   11.540877]  ? __pfx_kthread+0x10/0x10
[   11.540897]  ret_from_fork+0x116/0x1d0
[   11.540914]  ? __pfx_kthread+0x10/0x10
[   11.540934]  ret_from_fork_asm+0x1a/0x30
[   11.540965]  </TASK>
[   11.540975] 
[   11.550571] Allocated by task 153:
[   11.550746]  kasan_save_stack+0x45/0x70
[   11.550948]  kasan_save_track+0x18/0x40
[   11.551156]  kasan_save_alloc_info+0x3b/0x50
[   11.551357]  __kasan_kmalloc+0xb7/0xc0
[   11.551541]  __kmalloc_cache_noprof+0x189/0x420
[   11.552205]  kmalloc_oob_right+0xa9/0x7f0
[   11.552509]  kunit_try_run_case+0x1a5/0x480
[   11.552765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.553086]  kthread+0x337/0x6f0
[   11.553347]  ret_from_fork+0x116/0x1d0
[   11.553588]  ret_from_fork_asm+0x1a/0x30
[   11.553855] 
[   11.554085] The buggy address belongs to the object at ffff888102f33d00
[   11.554085]  which belongs to the cache kmalloc-128 of size 128
[   11.554742] The buggy address is located 13 bytes to the right of
[   11.554742]  allocated 115-byte region [ffff888102f33d00, ffff888102f33d73)
[   11.555501] 
[   11.555628] The buggy address belongs to the physical page:
[   11.555931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f33
[   11.556347] flags: 0x200000000000000(node=0|zone=2)
[   11.556774] page_type: f5(slab)
[   11.556921] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.557281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.557867] page dumped because: kasan: bad access detected
[   11.558119] 
[   11.558220] Memory state around the buggy address:
[   11.558562]  ffff888102f33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.558966]  ffff888102f33d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.559339] >ffff888102f33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.559773]                    ^
[   11.559941]  ffff888102f33e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.560253]  ffff888102f33e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.560559] ==================================================================