Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.940046] ==================================================================
[   29.941381] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.942092] Read of size 1 at addr fff00000c6089b80 by task kunit_try_catch/125
[   29.943003] 
[   29.943394] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.944323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.944942] Hardware name: linux,dummy-virt (DT)
[   29.945601] Call trace:
[   29.947045]  show_stack+0x20/0x38 (C)
[   29.947619]  dump_stack_lvl+0x8c/0xd0
[   29.948017]  print_report+0x118/0x5e0
[   29.948707]  kasan_report+0xc8/0x118
[   29.949833]  __asan_report_load1_noabort+0x20/0x30
[   29.950498]  kmalloc_oob_right+0x5d0/0x660
[   29.950996]  kunit_try_run_case+0x14c/0x3d0
[   29.951665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.952685]  kthread+0x24c/0x2d0
[   29.953186]  ret_from_fork+0x10/0x20
[   29.953848] 
[   29.954140] Allocated by task 125:
[   29.954916]  kasan_save_stack+0x3c/0x68
[   29.955958]  kasan_save_track+0x20/0x40
[   29.956888]  kasan_save_alloc_info+0x40/0x58
[   29.957581]  __kasan_kmalloc+0xd4/0xd8
[   29.958206]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.958890]  kmalloc_oob_right+0xb0/0x660
[   29.959414]  kunit_try_run_case+0x14c/0x3d0
[   29.959999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.960973]  kthread+0x24c/0x2d0
[   29.961987]  ret_from_fork+0x10/0x20
[   29.962345] 
[   29.962637] The buggy address belongs to the object at fff00000c6089b00
[   29.962637]  which belongs to the cache kmalloc-128 of size 128
[   29.963708] The buggy address is located 13 bytes to the right of
[   29.963708]  allocated 115-byte region [fff00000c6089b00, fff00000c6089b73)
[   29.966005] 
[   29.966419] The buggy address belongs to the physical page:
[   29.967193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089
[   29.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.969553] page_type: f5(slab)
[   29.970022] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.971071] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.971981] page dumped because: kasan: bad access detected
[   29.972816] 
[   29.973435] Memory state around the buggy address:
[   29.974307]  fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.975386]  fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.976461] >fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977527]                    ^
[   29.978380]  fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979314]  fff00000c6089c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.980163] ==================================================================
[   29.844775] ==================================================================
[   29.846610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.848854] Write of size 1 at addr fff00000c6089b73 by task kunit_try_catch/125
[   29.849650] 
[   29.851558] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241126 #1
[   29.853008] Tainted: [N]=TEST
[   29.853484] Hardware name: linux,dummy-virt (DT)
[   29.854580] Call trace:
[   29.856218]  show_stack+0x20/0x38 (C)
[   29.857118]  dump_stack_lvl+0x8c/0xd0
[   29.857772]  print_report+0x118/0x5e0
[   29.858312]  kasan_report+0xc8/0x118
[   29.859181]  __asan_report_store1_noabort+0x20/0x30
[   29.860025]  kmalloc_oob_right+0x5a4/0x660
[   29.861500]  kunit_try_run_case+0x14c/0x3d0
[   29.862293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.863022]  kthread+0x24c/0x2d0
[   29.863729]  ret_from_fork+0x10/0x20
[   29.865102] 
[   29.865629] Allocated by task 125:
[   29.866548]  kasan_save_stack+0x3c/0x68
[   29.867247]  kasan_save_track+0x20/0x40
[   29.867725]  kasan_save_alloc_info+0x40/0x58
[   29.868333]  __kasan_kmalloc+0xd4/0xd8
[   29.868857]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.869478]  kmalloc_oob_right+0xb0/0x660
[   29.870054]  kunit_try_run_case+0x14c/0x3d0
[   29.870706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871682]  kthread+0x24c/0x2d0
[   29.872228]  ret_from_fork+0x10/0x20
[   29.873488] 
[   29.874252] The buggy address belongs to the object at fff00000c6089b00
[   29.874252]  which belongs to the cache kmalloc-128 of size 128
[   29.876127] The buggy address is located 0 bytes to the right of
[   29.876127]  allocated 115-byte region [fff00000c6089b00, fff00000c6089b73)
[   29.877550] 
[   29.878166] The buggy address belongs to the physical page:
[   29.879416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089
[   29.880755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.882270] page_type: f5(slab)
[   29.883432] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.884749] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.885809] page dumped because: kasan: bad access detected
[   29.886530] 
[   29.886879] Memory state around the buggy address:
[   29.888122]  fff00000c6089a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.889022]  fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889759] >fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.891016]                                                              ^
[   29.892098]  fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.893202]  fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894258] ==================================================================
[   29.898685] ==================================================================
[   29.899516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.900327] Write of size 1 at addr fff00000c6089b78 by task kunit_try_catch/125
[   29.901846] 
[   29.902166] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.902958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.903549] Hardware name: linux,dummy-virt (DT)
[   29.904059] Call trace:
[   29.904802]  show_stack+0x20/0x38 (C)
[   29.905470]  dump_stack_lvl+0x8c/0xd0
[   29.906545]  print_report+0x118/0x5e0
[   29.907639]  kasan_report+0xc8/0x118
[   29.908176]  __asan_report_store1_noabort+0x20/0x30
[   29.909271]  kmalloc_oob_right+0x538/0x660
[   29.909846]  kunit_try_run_case+0x14c/0x3d0
[   29.910492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.911357]  kthread+0x24c/0x2d0
[   29.911813]  ret_from_fork+0x10/0x20
[   29.912711] 
[   29.913133] Allocated by task 125:
[   29.913681]  kasan_save_stack+0x3c/0x68
[   29.914313]  kasan_save_track+0x20/0x40
[   29.914798]  kasan_save_alloc_info+0x40/0x58
[   29.915640]  __kasan_kmalloc+0xd4/0xd8
[   29.916269]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.917147]  kmalloc_oob_right+0xb0/0x660
[   29.917925]  kunit_try_run_case+0x14c/0x3d0
[   29.918413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.919320]  kthread+0x24c/0x2d0
[   29.919931]  ret_from_fork+0x10/0x20
[   29.920686] 
[   29.921145] The buggy address belongs to the object at fff00000c6089b00
[   29.921145]  which belongs to the cache kmalloc-128 of size 128
[   29.922190] The buggy address is located 5 bytes to the right of
[   29.922190]  allocated 115-byte region [fff00000c6089b00, fff00000c6089b73)
[   29.923781] 
[   29.924276] The buggy address belongs to the physical page:
[   29.925081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089
[   29.926589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.927345] page_type: f5(slab)
[   29.928164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.929654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.930626] page dumped because: kasan: bad access detected
[   29.931339] 
[   29.931677] Memory state around the buggy address:
[   29.932418]  fff00000c6089a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.933279]  fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.934099] >fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.935612]                                                                 ^
[   29.936441]  fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.937786]  fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.938580] ==================================================================

[   29.787485] ==================================================================
[   29.789023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.791798] Write of size 1 at addr fff00000c64ec673 by task kunit_try_catch/125
[   29.792648] 
[   29.794687] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241126 #1
[   29.796112] Tainted: [N]=TEST
[   29.796617] Hardware name: linux,dummy-virt (DT)
[   29.797781] Call trace:
[   29.798664]  show_stack+0x20/0x38 (C)
[   29.799547]  dump_stack_lvl+0x8c/0xd0
[   29.800228]  print_report+0x118/0x5e0
[   29.800755]  kasan_report+0xc8/0x118
[   29.801371]  __asan_report_store1_noabort+0x20/0x30
[   29.802115]  kmalloc_oob_right+0x5a4/0x660
[   29.802795]  kunit_try_run_case+0x14c/0x3d0
[   29.803206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804019]  kthread+0x24c/0x2d0
[   29.804559]  ret_from_fork+0x10/0x20
[   29.805509] 
[   29.806360] Allocated by task 125:
[   29.807238]  kasan_save_stack+0x3c/0x68
[   29.807924]  kasan_save_track+0x20/0x40
[   29.808445]  kasan_save_alloc_info+0x40/0x58
[   29.809170]  __kasan_kmalloc+0xd4/0xd8
[   29.809733]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.810440]  kmalloc_oob_right+0xb0/0x660
[   29.812002]  kunit_try_run_case+0x14c/0x3d0
[   29.812630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.813300]  kthread+0x24c/0x2d0
[   29.814518]  ret_from_fork+0x10/0x20
[   29.815163] 
[   29.815667] The buggy address belongs to the object at fff00000c64ec600
[   29.815667]  which belongs to the cache kmalloc-128 of size 128
[   29.817080] The buggy address is located 0 bytes to the right of
[   29.817080]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.818668] 
[   29.819296] The buggy address belongs to the physical page:
[   29.820578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.822213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823498] page_type: f5(slab)
[   29.824694] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.825587] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.826992] page dumped because: kasan: bad access detected
[   29.827735] 
[   29.828081] Memory state around the buggy address:
[   29.829350]  fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.830357]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.831583] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.832730]                                                              ^
[   29.833809]  fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834977]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.836099] ==================================================================
[   29.840499] ==================================================================
[   29.841259] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.842432] Write of size 1 at addr fff00000c64ec678 by task kunit_try_catch/125
[   29.844063] 
[   29.844480] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.846094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.846763] Hardware name: linux,dummy-virt (DT)
[   29.847456] Call trace:
[   29.847942]  show_stack+0x20/0x38 (C)
[   29.848602]  dump_stack_lvl+0x8c/0xd0
[   29.849220]  print_report+0x118/0x5e0
[   29.849997]  kasan_report+0xc8/0x118
[   29.850818]  __asan_report_store1_noabort+0x20/0x30
[   29.851466]  kmalloc_oob_right+0x538/0x660
[   29.851786]  kunit_try_run_case+0x14c/0x3d0
[   29.852212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.853078]  kthread+0x24c/0x2d0
[   29.853698]  ret_from_fork+0x10/0x20
[   29.854289] 
[   29.854912] Allocated by task 125:
[   29.855422]  kasan_save_stack+0x3c/0x68
[   29.855991]  kasan_save_track+0x20/0x40
[   29.856631]  kasan_save_alloc_info+0x40/0x58
[   29.857292]  __kasan_kmalloc+0xd4/0xd8
[   29.858213]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.858807]  kmalloc_oob_right+0xb0/0x660
[   29.859453]  kunit_try_run_case+0x14c/0x3d0
[   29.860122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.860925]  kthread+0x24c/0x2d0
[   29.861445]  ret_from_fork+0x10/0x20
[   29.862985] 
[   29.863336] The buggy address belongs to the object at fff00000c64ec600
[   29.863336]  which belongs to the cache kmalloc-128 of size 128
[   29.864845] The buggy address is located 5 bytes to the right of
[   29.864845]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.866673] 
[   29.867093] The buggy address belongs to the physical page:
[   29.867799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.868687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.869624] page_type: f5(slab)
[   29.870486] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.871558] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.872231] page dumped because: kasan: bad access detected
[   29.873135] 
[   29.873311] Memory state around the buggy address:
[   29.873995]  fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.874723]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.875724] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.876663]                                                                 ^
[   29.877661]  fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.878865]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.879565] ==================================================================
[   29.880837] ==================================================================
[   29.881610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.882307] Read of size 1 at addr fff00000c64ec680 by task kunit_try_catch/125
[   29.883164] 
[   29.883797] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.885175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.886394] Hardware name: linux,dummy-virt (DT)
[   29.887202] Call trace:
[   29.887634]  show_stack+0x20/0x38 (C)
[   29.888299]  dump_stack_lvl+0x8c/0xd0
[   29.889018]  print_report+0x118/0x5e0
[   29.889891]  kasan_report+0xc8/0x118
[   29.890367]  __asan_report_load1_noabort+0x20/0x30
[   29.891156]  kmalloc_oob_right+0x5d0/0x660
[   29.891943]  kunit_try_run_case+0x14c/0x3d0
[   29.892696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.893498]  kthread+0x24c/0x2d0
[   29.894354]  ret_from_fork+0x10/0x20
[   29.895024] 
[   29.895397] Allocated by task 125:
[   29.895865]  kasan_save_stack+0x3c/0x68
[   29.896547]  kasan_save_track+0x20/0x40
[   29.897110]  kasan_save_alloc_info+0x40/0x58
[   29.898086]  __kasan_kmalloc+0xd4/0xd8
[   29.898646]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.899473]  kmalloc_oob_right+0xb0/0x660
[   29.900082]  kunit_try_run_case+0x14c/0x3d0
[   29.900731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.901407]  kthread+0x24c/0x2d0
[   29.902485]  ret_from_fork+0x10/0x20
[   29.903226] 
[   29.903574] The buggy address belongs to the object at fff00000c64ec600
[   29.903574]  which belongs to the cache kmalloc-128 of size 128
[   29.905424] The buggy address is located 13 bytes to the right of
[   29.905424]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.907245] 
[   29.907590] The buggy address belongs to the physical page:
[   29.908315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.909355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.910494] page_type: f5(slab)
[   29.910993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.911983] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.912905] page dumped because: kasan: bad access detected
[   29.913577] 
[   29.914257] Memory state around the buggy address:
[   29.914930]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915742]  fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.916662] >fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.917463]                    ^
[   29.918354]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.919184]  fff00000c64ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.920052] ==================================================================

[   23.788757] ==================================================================
[   23.789573] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   23.791214] Write of size 1 at addr ffff888102933573 by task kunit_try_catch/143
[   23.791891] 
[   23.793791] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241126 #1
[   23.794653] Tainted: [N]=TEST
[   23.795060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.796205] Call Trace:
[   23.796790]  <TASK>
[   23.797512]  dump_stack_lvl+0x73/0xb0
[   23.798021]  print_report+0xd1/0x640
[   23.798413]  ? __virt_addr_valid+0x1db/0x2d0
[   23.798913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.799468]  kasan_report+0x102/0x140
[   23.799816]  ? kmalloc_oob_right+0x6f2/0x7f0
[   23.800294]  ? kmalloc_oob_right+0x6f2/0x7f0
[   23.800820]  __asan_report_store1_noabort+0x1b/0x30
[   23.801320]  kmalloc_oob_right+0x6f2/0x7f0
[   23.801681]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.802137]  ? __schedule+0xc3e/0x2790
[   23.802603]  ? __pfx_read_tsc+0x10/0x10
[   23.803087]  ? ktime_get_ts64+0x84/0x230
[   23.803485]  kunit_try_run_case+0x1b3/0x490
[   23.803981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.804524]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.805199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.805614]  ? __kthread_parkme+0x82/0x160
[   23.806218]  ? preempt_count_sub+0x50/0x80
[   23.806568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.806915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.807649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.808151]  kthread+0x257/0x310
[   23.808435]  ? __pfx_kthread+0x10/0x10
[   23.808900]  ret_from_fork+0x41/0x80
[   23.809450]  ? __pfx_kthread+0x10/0x10
[   23.809951]  ret_from_fork_asm+0x1a/0x30
[   23.810458]  </TASK>
[   23.810933] 
[   23.811279] Allocated by task 143:
[   23.812032]  kasan_save_stack+0x3d/0x60
[   23.812605]  kasan_save_track+0x18/0x40
[   23.813079]  kasan_save_alloc_info+0x3b/0x50
[   23.813490]  __kasan_kmalloc+0xb7/0xc0
[   23.813856]  __kmalloc_cache_noprof+0x184/0x410
[   23.814352]  kmalloc_oob_right+0xaa/0x7f0
[   23.814814]  kunit_try_run_case+0x1b3/0x490
[   23.815095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.815653]  kthread+0x257/0x310
[   23.816081]  ret_from_fork+0x41/0x80
[   23.816486]  ret_from_fork_asm+0x1a/0x30
[   23.817065] 
[   23.817501] The buggy address belongs to the object at ffff888102933500
[   23.817501]  which belongs to the cache kmalloc-128 of size 128
[   23.818856] The buggy address is located 0 bytes to the right of
[   23.818856]  allocated 115-byte region [ffff888102933500, ffff888102933573)
[   23.820186] 
[   23.820795] The buggy address belongs to the physical page:
[   23.821739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933
[   23.822983] flags: 0x200000000000000(node=0|zone=2)
[   23.824507] page_type: f5(slab)
[   23.825779] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.826544] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.827735] page dumped because: kasan: bad access detected
[   23.828339] 
[   23.828557] Memory state around the buggy address:
[   23.829904]  ffff888102933400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.830556]  ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.831132] >ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.831942]                                                              ^
[   23.832584]  ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.833224]  ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.834035] ==================================================================
[   23.873574] ==================================================================
[   23.874546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   23.875347] Read of size 1 at addr ffff888102933580 by task kunit_try_catch/143
[   23.876141] 
[   23.876411] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.877402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.877922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.878835] Call Trace:
[   23.879174]  <TASK>
[   23.879483]  dump_stack_lvl+0x73/0xb0
[   23.880033]  print_report+0xd1/0x640
[   23.880488]  ? __virt_addr_valid+0x1db/0x2d0
[   23.881175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.881831]  kasan_report+0x102/0x140
[   23.882290]  ? kmalloc_oob_right+0x68c/0x7f0
[   23.882831]  ? kmalloc_oob_right+0x68c/0x7f0
[   23.883200]  __asan_report_load1_noabort+0x18/0x20
[   23.883759]  kmalloc_oob_right+0x68c/0x7f0
[   23.884262]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.884802]  ? __schedule+0xc3e/0x2790
[   23.885264]  ? __pfx_read_tsc+0x10/0x10
[   23.885801]  ? ktime_get_ts64+0x84/0x230
[   23.886254]  kunit_try_run_case+0x1b3/0x490
[   23.886560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.887022]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.887331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.887645]  ? __kthread_parkme+0x82/0x160
[   23.887959]  ? preempt_count_sub+0x50/0x80
[   23.888284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.888589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.888997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.889349]  kthread+0x257/0x310
[   23.889607]  ? __pfx_kthread+0x10/0x10
[   23.889920]  ret_from_fork+0x41/0x80
[   23.890189]  ? __pfx_kthread+0x10/0x10
[   23.890460]  ret_from_fork_asm+0x1a/0x30
[   23.891505]  </TASK>
[   23.891900] 
[   23.892313] Allocated by task 143:
[   23.892548]  kasan_save_stack+0x3d/0x60
[   23.893083]  kasan_save_track+0x18/0x40
[   23.893546]  kasan_save_alloc_info+0x3b/0x50
[   23.893970]  __kasan_kmalloc+0xb7/0xc0
[   23.894277]  __kmalloc_cache_noprof+0x184/0x410
[   23.894874]  kmalloc_oob_right+0xaa/0x7f0
[   23.895373]  kunit_try_run_case+0x1b3/0x490
[   23.895942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.896587]  kthread+0x257/0x310
[   23.897098]  ret_from_fork+0x41/0x80
[   23.897579]  ret_from_fork_asm+0x1a/0x30
[   23.898137] 
[   23.898425] The buggy address belongs to the object at ffff888102933500
[   23.898425]  which belongs to the cache kmalloc-128 of size 128
[   23.899158] The buggy address is located 13 bytes to the right of
[   23.899158]  allocated 115-byte region [ffff888102933500, ffff888102933573)
[   23.899510] 
[   23.899597] The buggy address belongs to the physical page:
[   23.899894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933
[   23.900292] flags: 0x200000000000000(node=0|zone=2)
[   23.901068] page_type: f5(slab)
[   23.901482] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.902367] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.903216] page dumped because: kasan: bad access detected
[   23.903767] 
[   23.903983] Memory state around the buggy address:
[   23.904520]  ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.905057]  ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.905613] >ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.906434]                    ^
[   23.906932]  ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.907682]  ffff888102933680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.908178] ==================================================================
[   23.838112] ==================================================================
[   23.838792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   23.839406] Write of size 1 at addr ffff888102933578 by task kunit_try_catch/143
[   23.839982] 
[   23.840167] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   23.841081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.841503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.842060] Call Trace:
[   23.842398]  <TASK>
[   23.842675]  dump_stack_lvl+0x73/0xb0
[   23.843147]  print_report+0xd1/0x640
[   23.843572]  ? __virt_addr_valid+0x1db/0x2d0
[   23.844106]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.844646]  kasan_report+0x102/0x140
[   23.845075]  ? kmalloc_oob_right+0x6bf/0x7f0
[   23.845481]  ? kmalloc_oob_right+0x6bf/0x7f0
[   23.845952]  __asan_report_store1_noabort+0x1b/0x30
[   23.846456]  kmalloc_oob_right+0x6bf/0x7f0
[   23.847252]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.847637]  ? __schedule+0xc3e/0x2790
[   23.848088]  ? __pfx_read_tsc+0x10/0x10
[   23.848456]  ? ktime_get_ts64+0x84/0x230
[   23.848859]  kunit_try_run_case+0x1b3/0x490
[   23.849260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.849762]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.850431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.850801]  ? __kthread_parkme+0x82/0x160
[   23.851096]  ? preempt_count_sub+0x50/0x80
[   23.851396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.851618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.852195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.852865]  kthread+0x257/0x310
[   23.853296]  ? __pfx_kthread+0x10/0x10
[   23.853824]  ret_from_fork+0x41/0x80
[   23.854268]  ? __pfx_kthread+0x10/0x10
[   23.854768]  ret_from_fork_asm+0x1a/0x30
[   23.855268]  </TASK>
[   23.855586] 
[   23.855921] Allocated by task 143:
[   23.856327]  kasan_save_stack+0x3d/0x60
[   23.856860]  kasan_save_track+0x18/0x40
[   23.857319]  kasan_save_alloc_info+0x3b/0x50
[   23.857864]  __kasan_kmalloc+0xb7/0xc0
[   23.858302]  __kmalloc_cache_noprof+0x184/0x410
[   23.858894]  kmalloc_oob_right+0xaa/0x7f0
[   23.859362]  kunit_try_run_case+0x1b3/0x490
[   23.859899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.860459]  kthread+0x257/0x310
[   23.860922]  ret_from_fork+0x41/0x80
[   23.861367]  ret_from_fork_asm+0x1a/0x30
[   23.861879] 
[   23.862119] The buggy address belongs to the object at ffff888102933500
[   23.862119]  which belongs to the cache kmalloc-128 of size 128
[   23.863281] The buggy address is located 5 bytes to the right of
[   23.863281]  allocated 115-byte region [ffff888102933500, ffff888102933573)
[   23.864483] 
[   23.864809] The buggy address belongs to the physical page:
[   23.865369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933
[   23.866015] flags: 0x200000000000000(node=0|zone=2)
[   23.866528] page_type: f5(slab)
[   23.867000] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.867435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.867865] page dumped because: kasan: bad access detected
[   23.868157] 
[   23.868276] Memory state around the buggy address:
[   23.868435]  ffff888102933400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.868640]  ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.869333] >ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.870047]                                                                 ^
[   23.870754]  ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.871446]  ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.872236] ==================================================================

[   19.111914] ==================================================================
[   19.112300] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   19.112776] Read of size 1 at addr ffff888102956880 by task kunit_try_catch/143
[   19.113154] 
[   19.113336] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.114368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.115024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.115904] Call Trace:
[   19.116308]  <TASK>
[   19.116740]  dump_stack_lvl+0x73/0xb0
[   19.117162]  print_report+0xd1/0x640
[   19.117749]  ? __virt_addr_valid+0x1db/0x2d0
[   19.118231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.118683]  kasan_report+0x102/0x140
[   19.119247]  ? kmalloc_oob_right+0x68c/0x7f0
[   19.119864]  ? kmalloc_oob_right+0x68c/0x7f0
[   19.120333]  __asan_report_load1_noabort+0x18/0x20
[   19.120976]  kmalloc_oob_right+0x68c/0x7f0
[   19.121458]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   19.121945]  ? __schedule+0xc3e/0x2790
[   19.122419]  ? __pfx_read_tsc+0x10/0x10
[   19.122954]  ? ktime_get_ts64+0x84/0x230
[   19.123406]  kunit_try_run_case+0x1b3/0x490
[   19.123932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.124423]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.124914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.125289]  ? __kthread_parkme+0x82/0x160
[   19.125603]  ? preempt_count_sub+0x50/0x80
[   19.126074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.126760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.127444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.128109]  kthread+0x257/0x310
[   19.128655]  ? __pfx_kthread+0x10/0x10
[   19.129097]  ret_from_fork+0x41/0x80
[   19.129556]  ? __pfx_kthread+0x10/0x10
[   19.129895]  ret_from_fork_asm+0x1a/0x30
[   19.130354]  </TASK>
[   19.130758] 
[   19.130984] Allocated by task 143:
[   19.131424]  kasan_save_stack+0x3d/0x60
[   19.131911]  kasan_save_track+0x18/0x40
[   19.132408]  kasan_save_alloc_info+0x3b/0x50
[   19.132981]  __kasan_kmalloc+0xb7/0xc0
[   19.133340]  __kmalloc_cache_noprof+0x184/0x410
[   19.133801]  kmalloc_oob_right+0xaa/0x7f0
[   19.134262]  kunit_try_run_case+0x1b3/0x490
[   19.134647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.135086]  kthread+0x257/0x310
[   19.135473]  ret_from_fork+0x41/0x80
[   19.135969]  ret_from_fork_asm+0x1a/0x30
[   19.136397] 
[   19.136687] The buggy address belongs to the object at ffff888102956800
[   19.136687]  which belongs to the cache kmalloc-128 of size 128
[   19.137769] The buggy address is located 13 bytes to the right of
[   19.137769]  allocated 115-byte region [ffff888102956800, ffff888102956873)
[   19.138957] 
[   19.139279] The buggy address belongs to the physical page:
[   19.139897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956
[   19.140691] flags: 0x200000000000000(node=0|zone=2)
[   19.141186] page_type: f5(slab)
[   19.141632] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.142314] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.143031] page dumped because: kasan: bad access detected
[   19.143625] 
[   19.143885] Memory state around the buggy address:
[   19.144288]  ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.145042]  ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.145796] >ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.146266]                    ^
[   19.146623]  ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147307]  ffff888102956980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.148088] ==================================================================
[   19.022570] ==================================================================
[   19.023903] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   19.025118] Write of size 1 at addr ffff888102956873 by task kunit_try_catch/143
[   19.025995] 
[   19.028128] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241126 #1
[   19.029264] Tainted: [N]=TEST
[   19.029621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.030797] Call Trace:
[   19.031249]  <TASK>
[   19.031861]  dump_stack_lvl+0x73/0xb0
[   19.032547]  print_report+0xd1/0x640
[   19.033126]  ? __virt_addr_valid+0x1db/0x2d0
[   19.033424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.034032]  kasan_report+0x102/0x140
[   19.034394]  ? kmalloc_oob_right+0x6f2/0x7f0
[   19.034968]  ? kmalloc_oob_right+0x6f2/0x7f0
[   19.035476]  __asan_report_store1_noabort+0x1b/0x30
[   19.036139]  kmalloc_oob_right+0x6f2/0x7f0
[   19.036527]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   19.036906]  ? __schedule+0xc3e/0x2790
[   19.037377]  ? __pfx_read_tsc+0x10/0x10
[   19.037943]  ? ktime_get_ts64+0x84/0x230
[   19.038261]  kunit_try_run_case+0x1b3/0x490
[   19.038851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.039225]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.039739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.041097]  ? __kthread_parkme+0x82/0x160
[   19.041415]  ? preempt_count_sub+0x50/0x80
[   19.041934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.042391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.042973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.043463]  kthread+0x257/0x310
[   19.043842]  ? __pfx_kthread+0x10/0x10
[   19.044419]  ret_from_fork+0x41/0x80
[   19.045392]  ? __pfx_kthread+0x10/0x10
[   19.045775]  ret_from_fork_asm+0x1a/0x30
[   19.046970]  </TASK>
[   19.047372] 
[   19.047633] Allocated by task 143:
[   19.048366]  kasan_save_stack+0x3d/0x60
[   19.048853]  kasan_save_track+0x18/0x40
[   19.049430]  kasan_save_alloc_info+0x3b/0x50
[   19.049958]  __kasan_kmalloc+0xb7/0xc0
[   19.050347]  __kmalloc_cache_noprof+0x184/0x410
[   19.050847]  kmalloc_oob_right+0xaa/0x7f0
[   19.051661]  kunit_try_run_case+0x1b3/0x490
[   19.051965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.052354]  kthread+0x257/0x310
[   19.052751]  ret_from_fork+0x41/0x80
[   19.053123]  ret_from_fork_asm+0x1a/0x30
[   19.053623] 
[   19.054001] The buggy address belongs to the object at ffff888102956800
[   19.054001]  which belongs to the cache kmalloc-128 of size 128
[   19.055675] The buggy address is located 0 bytes to the right of
[   19.055675]  allocated 115-byte region [ffff888102956800, ffff888102956873)
[   19.057453] 
[   19.057972] The buggy address belongs to the physical page:
[   19.059226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956
[   19.060514] flags: 0x200000000000000(node=0|zone=2)
[   19.061605] page_type: f5(slab)
[   19.062828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.063511] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.064237] page dumped because: kasan: bad access detected
[   19.064625] 
[   19.064938] Memory state around the buggy address:
[   19.066217]  ffff888102956700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.066881]  ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.067541] >ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.068171]                                                              ^
[   19.068971]  ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.069673]  ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.071017] ==================================================================
[   19.073851] ==================================================================
[   19.074685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   19.075394] Write of size 1 at addr ffff888102956878 by task kunit_try_catch/143
[   19.076384] 
[   19.076617] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.077474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.077998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.078671] Call Trace:
[   19.078983]  <TASK>
[   19.079355]  dump_stack_lvl+0x73/0xb0
[   19.079810]  print_report+0xd1/0x640
[   19.080294]  ? __virt_addr_valid+0x1db/0x2d0
[   19.081291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.081961]  kasan_report+0x102/0x140
[   19.082456]  ? kmalloc_oob_right+0x6bf/0x7f0
[   19.082844]  ? kmalloc_oob_right+0x6bf/0x7f0
[   19.083326]  __asan_report_store1_noabort+0x1b/0x30
[   19.083858]  kmalloc_oob_right+0x6bf/0x7f0
[   19.084212]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   19.084787]  ? __schedule+0xc3e/0x2790
[   19.085105]  ? __pfx_read_tsc+0x10/0x10
[   19.085718]  ? ktime_get_ts64+0x84/0x230
[   19.086092]  kunit_try_run_case+0x1b3/0x490
[   19.086655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.087007]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.087392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.088033]  ? __kthread_parkme+0x82/0x160
[   19.088474]  ? preempt_count_sub+0x50/0x80
[   19.089009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.089324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.090015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.090637]  kthread+0x257/0x310
[   19.091012]  ? __pfx_kthread+0x10/0x10
[   19.091293]  ret_from_fork+0x41/0x80
[   19.091779]  ? __pfx_kthread+0x10/0x10
[   19.092258]  ret_from_fork_asm+0x1a/0x30
[   19.092768]  </TASK>
[   19.093050] 
[   19.093257] Allocated by task 143:
[   19.093543]  kasan_save_stack+0x3d/0x60
[   19.094027]  kasan_save_track+0x18/0x40
[   19.094473]  kasan_save_alloc_info+0x3b/0x50
[   19.094879]  __kasan_kmalloc+0xb7/0xc0
[   19.095350]  __kmalloc_cache_noprof+0x184/0x410
[   19.095897]  kmalloc_oob_right+0xaa/0x7f0
[   19.096236]  kunit_try_run_case+0x1b3/0x490
[   19.096724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.097239]  kthread+0x257/0x310
[   19.097509]  ret_from_fork+0x41/0x80
[   19.097994]  ret_from_fork_asm+0x1a/0x30
[   19.098434] 
[   19.098748] The buggy address belongs to the object at ffff888102956800
[   19.098748]  which belongs to the cache kmalloc-128 of size 128
[   19.099568] The buggy address is located 5 bytes to the right of
[   19.099568]  allocated 115-byte region [ffff888102956800, ffff888102956873)
[   19.100543] 
[   19.100856] The buggy address belongs to the physical page:
[   19.101301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956
[   19.101956] flags: 0x200000000000000(node=0|zone=2)
[   19.102432] page_type: f5(slab)
[   19.102866] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.103364] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.104057] page dumped because: kasan: bad access detected
[   19.104359] 
[   19.104536] Memory state around the buggy address:
[   19.105084]  ffff888102956700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.105832]  ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.106510] >ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.107084]                                                                 ^
[   19.107447]  ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.107889]  ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.110329] ==================================================================