Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.101852] ==================================================================
[   30.102986] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   30.103794] Write of size 1 at addr fff00000c6089f78 by task kunit_try_catch/131
[   30.104703] 
[   30.105064] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.106131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.106729] Hardware name: linux,dummy-virt (DT)
[   30.107321] Call trace:
[   30.107768]  show_stack+0x20/0x38 (C)
[   30.109019]  dump_stack_lvl+0x8c/0xd0
[   30.109602]  print_report+0x118/0x5e0
[   30.110313]  kasan_report+0xc8/0x118
[   30.110762]  __asan_report_store1_noabort+0x20/0x30
[   30.111315]  kmalloc_track_caller_oob_right+0x414/0x490
[   30.111839]  kunit_try_run_case+0x14c/0x3d0
[   30.113550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.114485]  kthread+0x24c/0x2d0
[   30.115000]  ret_from_fork+0x10/0x20
[   30.115504] 
[   30.115839] Allocated by task 131:
[   30.116981]  kasan_save_stack+0x3c/0x68
[   30.117434]  kasan_save_track+0x20/0x40
[   30.117956]  kasan_save_alloc_info+0x40/0x58
[   30.119141]  __kasan_kmalloc+0xd4/0xd8
[   30.119873]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.120837]  kmalloc_track_caller_oob_right+0xa8/0x490
[   30.122017]  kunit_try_run_case+0x14c/0x3d0
[   30.122587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.123262]  kthread+0x24c/0x2d0
[   30.123722]  ret_from_fork+0x10/0x20
[   30.124688] 
[   30.125346] The buggy address belongs to the object at fff00000c6089f00
[   30.125346]  which belongs to the cache kmalloc-128 of size 128
[   30.126282] The buggy address is located 0 bytes to the right of
[   30.126282]  allocated 120-byte region [fff00000c6089f00, fff00000c6089f78)
[   30.127678] 
[   30.128117] The buggy address belongs to the physical page:
[   30.129491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089
[   30.130635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.131603] page_type: f5(slab)
[   30.132333] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.133229] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.133821] page dumped because: kasan: bad access detected
[   30.134563] 
[   30.134862] Memory state around the buggy address:
[   30.135509]  fff00000c6089e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.136863]  fff00000c6089e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.138189] >fff00000c6089f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.138962]                                                                 ^
[   30.139732]  fff00000c6089f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.140778]  fff00000c608a000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   30.142248] ==================================================================

[   30.086841] ==================================================================
[   30.087901] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   30.088797] Write of size 1 at addr fff00000c5e7d478 by task kunit_try_catch/131
[   30.089414] 
[   30.089867] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.091092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091709] Hardware name: linux,dummy-virt (DT)
[   30.092197] Call trace:
[   30.092624]  show_stack+0x20/0x38 (C)
[   30.093661]  dump_stack_lvl+0x8c/0xd0
[   30.094204]  print_report+0x118/0x5e0
[   30.094908]  kasan_report+0xc8/0x118
[   30.095633]  __asan_report_store1_noabort+0x20/0x30
[   30.096459]  kmalloc_track_caller_oob_right+0x420/0x490
[   30.097271]  kunit_try_run_case+0x14c/0x3d0
[   30.098012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098910]  kthread+0x24c/0x2d0
[   30.099631]  ret_from_fork+0x10/0x20
[   30.100223] 
[   30.100653] Allocated by task 131:
[   30.101128]  kasan_save_stack+0x3c/0x68
[   30.101780]  kasan_save_track+0x20/0x40
[   30.102288]  kasan_save_alloc_info+0x40/0x58
[   30.102986]  __kasan_kmalloc+0xd4/0xd8
[   30.103630]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.104330]  kmalloc_track_caller_oob_right+0x184/0x490
[   30.105058]  kunit_try_run_case+0x14c/0x3d0
[   30.105775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.106462]  kthread+0x24c/0x2d0
[   30.107095]  ret_from_fork+0x10/0x20
[   30.107646] 
[   30.108060] The buggy address belongs to the object at fff00000c5e7d400
[   30.108060]  which belongs to the cache kmalloc-128 of size 128
[   30.109343] The buggy address is located 0 bytes to the right of
[   30.109343]  allocated 120-byte region [fff00000c5e7d400, fff00000c5e7d478)
[   30.110768] 
[   30.111115] The buggy address belongs to the physical page:
[   30.111908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d
[   30.112839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.113699] page_type: f5(slab)
[   30.114294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.115190] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.116104] page dumped because: kasan: bad access detected
[   30.116823] 
[   30.117190] Memory state around the buggy address:
[   30.117794]  fff00000c5e7d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.118771]  fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.119547] >fff00000c5e7d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.120477]                                                                 ^
[   30.121256]  fff00000c5e7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.122162]  fff00000c5e7d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.123006] ==================================================================
[   30.047218] ==================================================================
[   30.048423] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   30.049388] Write of size 1 at addr fff00000c5e7d378 by task kunit_try_catch/131
[   30.050542] 
[   30.050943] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.052196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.052793] Hardware name: linux,dummy-virt (DT)
[   30.053326] Call trace:
[   30.053798]  show_stack+0x20/0x38 (C)
[   30.054334]  dump_stack_lvl+0x8c/0xd0
[   30.054969]  print_report+0x118/0x5e0
[   30.055610]  kasan_report+0xc8/0x118
[   30.056153]  __asan_report_store1_noabort+0x20/0x30
[   30.056888]  kmalloc_track_caller_oob_right+0x414/0x490
[   30.057589]  kunit_try_run_case+0x14c/0x3d0
[   30.058271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.058986]  kthread+0x24c/0x2d0
[   30.059591]  ret_from_fork+0x10/0x20
[   30.060159] 
[   30.060509] Allocated by task 131:
[   30.061083]  kasan_save_stack+0x3c/0x68
[   30.061603]  kasan_save_track+0x20/0x40
[   30.062221]  kasan_save_alloc_info+0x40/0x58
[   30.062807]  __kasan_kmalloc+0xd4/0xd8
[   30.063429]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.064155]  kmalloc_track_caller_oob_right+0xa8/0x490
[   30.064917]  kunit_try_run_case+0x14c/0x3d0
[   30.065606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.066310]  kthread+0x24c/0x2d0
[   30.066893]  ret_from_fork+0x10/0x20
[   30.067440] 
[   30.067829] The buggy address belongs to the object at fff00000c5e7d300
[   30.067829]  which belongs to the cache kmalloc-128 of size 128
[   30.069013] The buggy address is located 0 bytes to the right of
[   30.069013]  allocated 120-byte region [fff00000c5e7d300, fff00000c5e7d378)
[   30.070347] 
[   30.070739] The buggy address belongs to the physical page:
[   30.071476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d
[   30.072347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.073036] page_type: f5(slab)
[   30.073622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.074453] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.075751] page dumped because: kasan: bad access detected
[   30.076469] 
[   30.076857] Memory state around the buggy address:
[   30.077598]  fff00000c5e7d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.078267]  fff00000c5e7d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.079821] >fff00000c5e7d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.080807]                                                                 ^
[   30.081841]  fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.082608]  fff00000c5e7d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083401] ==================================================================

[   24.027414] ==================================================================
[   24.028316] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[   24.029112] Write of size 1 at addr ffff8881028d8a78 by task kunit_try_catch/149
[   24.030494] 
[   24.030946] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.032650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.033246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.034418] Call Trace:
[   24.034873]  <TASK>
[   24.035445]  dump_stack_lvl+0x73/0xb0
[   24.036195]  print_report+0xd1/0x640
[   24.037079]  ? __virt_addr_valid+0x1db/0x2d0
[   24.037724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.038598]  kasan_report+0x102/0x140
[   24.039191]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   24.040377]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   24.041050]  __asan_report_store1_noabort+0x1b/0x30
[   24.041556]  kmalloc_track_caller_oob_right+0x4ca/0x530
[   24.042758]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   24.043776]  ? __schedule+0xc3e/0x2790
[   24.044541]  ? __pfx_read_tsc+0x10/0x10
[   24.045243]  ? ktime_get_ts64+0x84/0x230
[   24.045816]  kunit_try_run_case+0x1b3/0x490
[   24.046466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.047131]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.048273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.048629]  ? __kthread_parkme+0x82/0x160
[   24.048979]  ? preempt_count_sub+0x50/0x80
[   24.050068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.051004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.051569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.052451]  kthread+0x257/0x310
[   24.053628]  ? __pfx_kthread+0x10/0x10
[   24.054069]  ret_from_fork+0x41/0x80
[   24.055207]  ? __pfx_kthread+0x10/0x10
[   24.055582]  ret_from_fork_asm+0x1a/0x30
[   24.056577]  </TASK>
[   24.057531] 
[   24.057735] Allocated by task 149:
[   24.058488]  kasan_save_stack+0x3d/0x60
[   24.058976]  kasan_save_track+0x18/0x40
[   24.059370]  kasan_save_alloc_info+0x3b/0x50
[   24.059820]  __kasan_kmalloc+0xb7/0xc0
[   24.060209]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   24.060921]  kmalloc_track_caller_oob_right+0x9a/0x530
[   24.061489]  kunit_try_run_case+0x1b3/0x490
[   24.062166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.062922]  kthread+0x257/0x310
[   24.063214]  ret_from_fork+0x41/0x80
[   24.064119]  ret_from_fork_asm+0x1a/0x30
[   24.064600] 
[   24.065993] The buggy address belongs to the object at ffff8881028d8a00
[   24.065993]  which belongs to the cache kmalloc-128 of size 128
[   24.067396] The buggy address is located 0 bytes to the right of
[   24.067396]  allocated 120-byte region [ffff8881028d8a00, ffff8881028d8a78)
[   24.069412] 
[   24.069837] The buggy address belongs to the physical page:
[   24.070650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   24.071036] flags: 0x200000000000000(node=0|zone=2)
[   24.071239] page_type: f5(slab)
[   24.071392] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.071657] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.072185] page dumped because: kasan: bad access detected
[   24.073647] 
[   24.073859] Memory state around the buggy address:
[   24.074305]  ffff8881028d8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.075051]  ffff8881028d8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.075737] >ffff8881028d8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.076310]                                                                 ^
[   24.077149]  ffff8881028d8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.077724]  ffff8881028d8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.078529] ==================================================================
[   24.079977] ==================================================================
[   24.080958] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b3/0x530
[   24.081820] Write of size 1 at addr ffff8881028d8b78 by task kunit_try_catch/149
[   24.082372] 
[   24.082555] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.083725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.084153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.084966] Call Trace:
[   24.085369]  <TASK>
[   24.085753]  dump_stack_lvl+0x73/0xb0
[   24.086269]  print_report+0xd1/0x640
[   24.086779]  ? __virt_addr_valid+0x1db/0x2d0
[   24.087196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.087908]  kasan_report+0x102/0x140
[   24.088482]  ? kmalloc_track_caller_oob_right+0x4b3/0x530
[   24.088943]  ? kmalloc_track_caller_oob_right+0x4b3/0x530
[   24.089644]  __asan_report_store1_noabort+0x1b/0x30
[   24.090358]  kmalloc_track_caller_oob_right+0x4b3/0x530
[   24.091064]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   24.091542]  ? __schedule+0xc3e/0x2790
[   24.092077]  ? __pfx_read_tsc+0x10/0x10
[   24.092570]  ? ktime_get_ts64+0x84/0x230
[   24.093056]  kunit_try_run_case+0x1b3/0x490
[   24.093720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.094252]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.094793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.095390]  ? __kthread_parkme+0x82/0x160
[   24.095837]  ? preempt_count_sub+0x50/0x80
[   24.096392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.096982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.097740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.098342]  kthread+0x257/0x310
[   24.098810]  ? __pfx_kthread+0x10/0x10
[   24.099220]  ret_from_fork+0x41/0x80
[   24.099592]  ? __pfx_kthread+0x10/0x10
[   24.101372]  ret_from_fork_asm+0x1a/0x30
[   24.101968]  </TASK>
[   24.102518] 
[   24.102832] Allocated by task 149:
[   24.103413]  kasan_save_stack+0x3d/0x60
[   24.104768]  kasan_save_track+0x18/0x40
[   24.105688]  kasan_save_alloc_info+0x3b/0x50
[   24.106457]  __kasan_kmalloc+0xb7/0xc0
[   24.106986]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   24.107849]  kmalloc_track_caller_oob_right+0x19b/0x530
[   24.108444]  kunit_try_run_case+0x1b3/0x490
[   24.109876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.110303]  kthread+0x257/0x310
[   24.111181]  ret_from_fork+0x41/0x80
[   24.111640]  ret_from_fork_asm+0x1a/0x30
[   24.112578] 
[   24.113101] The buggy address belongs to the object at ffff8881028d8b00
[   24.113101]  which belongs to the cache kmalloc-128 of size 128
[   24.114640] The buggy address is located 0 bytes to the right of
[   24.114640]  allocated 120-byte region [ffff8881028d8b00, ffff8881028d8b78)
[   24.116415] 
[   24.117153] The buggy address belongs to the physical page:
[   24.117545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   24.118846] flags: 0x200000000000000(node=0|zone=2)
[   24.119670] page_type: f5(slab)
[   24.120586] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.121729] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.122751] page dumped because: kasan: bad access detected
[   24.123407] 
[   24.123861] Memory state around the buggy address:
[   24.124845]  ffff8881028d8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.126071]  ffff8881028d8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.127055] >ffff8881028d8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.128538]                                                                 ^
[   24.129514]  ffff8881028d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.130817]  ffff8881028d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.132000] ==================================================================

[   19.281634] ==================================================================
[   19.282898] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[   19.283773] Write of size 1 at addr ffff8881028b4778 by task kunit_try_catch/149
[   19.284721] 
[   19.284964] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.286698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.286998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.287775] Call Trace:
[   19.288077]  <TASK>
[   19.288367]  dump_stack_lvl+0x73/0xb0
[   19.288938]  print_report+0xd1/0x640
[   19.289406]  ? __virt_addr_valid+0x1db/0x2d0
[   19.289906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.290358]  kasan_report+0x102/0x140
[   19.290927]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   19.291674]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   19.292390]  __asan_report_store1_noabort+0x1b/0x30
[   19.293079]  kmalloc_track_caller_oob_right+0x4ca/0x530
[   19.293637]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   19.294424]  ? __schedule+0xc3e/0x2790
[   19.294854]  ? __pfx_read_tsc+0x10/0x10
[   19.295354]  ? ktime_get_ts64+0x84/0x230
[   19.295770]  kunit_try_run_case+0x1b3/0x490
[   19.296140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.296816]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.297437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.297913]  ? __kthread_parkme+0x82/0x160
[   19.298543]  ? preempt_count_sub+0x50/0x80
[   19.299232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.299671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.300432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.300867]  kthread+0x257/0x310
[   19.301411]  ? __pfx_kthread+0x10/0x10
[   19.301850]  ret_from_fork+0x41/0x80
[   19.302267]  ? __pfx_kthread+0x10/0x10
[   19.302588]  ret_from_fork_asm+0x1a/0x30
[   19.303050]  </TASK>
[   19.303329] 
[   19.303518] Allocated by task 149:
[   19.303878]  kasan_save_stack+0x3d/0x60
[   19.304446]  kasan_save_track+0x18/0x40
[   19.304842]  kasan_save_alloc_info+0x3b/0x50
[   19.305406]  __kasan_kmalloc+0xb7/0xc0
[   19.305890]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   19.306509]  kmalloc_track_caller_oob_right+0x9a/0x530
[   19.307203]  kunit_try_run_case+0x1b3/0x490
[   19.307512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.308218]  kthread+0x257/0x310
[   19.308617]  ret_from_fork+0x41/0x80
[   19.308998]  ret_from_fork_asm+0x1a/0x30
[   19.309567] 
[   19.309765] The buggy address belongs to the object at ffff8881028b4700
[   19.309765]  which belongs to the cache kmalloc-128 of size 128
[   19.310610] The buggy address is located 0 bytes to the right of
[   19.310610]  allocated 120-byte region [ffff8881028b4700, ffff8881028b4778)
[   19.311296] 
[   19.311461] The buggy address belongs to the physical page:
[   19.312043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b4
[   19.314006] flags: 0x200000000000000(node=0|zone=2)
[   19.315166] page_type: f5(slab)
[   19.315558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.316201] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.317150] page dumped because: kasan: bad access detected
[   19.317725] 
[   19.318089] Memory state around the buggy address:
[   19.318619]  ffff8881028b4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   19.319400]  ffff8881028b4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320762] >ffff8881028b4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.321568]                                                                 ^
[   19.322327]  ffff8881028b4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.322781]  ffff8881028b4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.323409] ==================================================================