Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.216553] ==================================================================
[   20.217391] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   20.218275] Read of size 1 at addr fff00000c40eff80 by task kunit_try_catch/126
[   20.219052] 
[   20.219396] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.219654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.219733] Hardware name: linux,dummy-virt (DT)
[   20.219866] Call trace:
[   20.219936]  dump_backtrace+0x9c/0x128
[   20.220068]  show_stack+0x20/0x38
[   20.220164]  dump_stack_lvl+0x8c/0xd0
[   20.220264]  print_report+0x118/0x5f0
[   20.220363]  kasan_report+0xdc/0x128
[   20.220458]  __asan_report_load1_noabort+0x20/0x30
[   20.220551]  kmalloc_oob_right+0x588/0x5f0
[   20.220640]  kunit_try_run_case+0x170/0x3f0
[   20.220730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.220849]  kthread+0x24c/0x2d0
[   20.220936]  ret_from_fork+0x10/0x20
[   20.221053] 
[   20.229938] Allocated by task 126:
[   20.230528]  kasan_save_stack+0x3c/0x68
[   20.231088]  kasan_save_track+0x20/0x40
[   20.231900]  kasan_save_alloc_info+0x40/0x58
[   20.232942]  __kasan_kmalloc+0xd4/0xd8
[   20.233800]  __kmalloc_cache_noprof+0x154/0x320
[   20.234426]  kmalloc_oob_right+0xb8/0x5f0
[   20.235050]  kunit_try_run_case+0x170/0x3f0
[   20.236157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.236805]  kthread+0x24c/0x2d0
[   20.237248]  ret_from_fork+0x10/0x20
[   20.237691] 
[   20.238397] The buggy address belongs to the object at fff00000c40eff00
[   20.238397]  which belongs to the cache kmalloc-128 of size 128
[   20.239642] The buggy address is located 13 bytes to the right of
[   20.239642]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.241317] 
[   20.241644] The buggy address belongs to the physical page:
[   20.242487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.243230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.243894] page_type: f5(slab)
[   20.244355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.245465] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.246358] page dumped because: kasan: bad access detected
[   20.246914] 
[   20.247253] Memory state around the buggy address:
[   20.247955]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.248679]  fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.249441] >fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.250573]                    ^
[   20.251212]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.252299]  fff00000c40f0080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.252866] ==================================================================
[   20.178821] ==================================================================
[   20.179418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   20.180231] Write of size 1 at addr fff00000c40eff78 by task kunit_try_catch/126
[   20.181067] 
[   20.181400] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.181615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.181693] Hardware name: linux,dummy-virt (DT)
[   20.181782] Call trace:
[   20.181847]  dump_backtrace+0x9c/0x128
[   20.182139]  show_stack+0x20/0x38
[   20.182253]  dump_stack_lvl+0x8c/0xd0
[   20.182369]  print_report+0x118/0x5f0
[   20.182479]  kasan_report+0xdc/0x128
[   20.182585]  __asan_report_store1_noabort+0x20/0x30
[   20.182711]  kmalloc_oob_right+0x528/0x5f0
[   20.182826]  kunit_try_run_case+0x170/0x3f0
[   20.182885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.182941]  kthread+0x24c/0x2d0
[   20.183017]  ret_from_fork+0x10/0x20
[   20.183068] 
[   20.193163] Allocated by task 126:
[   20.193678]  kasan_save_stack+0x3c/0x68
[   20.194242]  kasan_save_track+0x20/0x40
[   20.194869]  kasan_save_alloc_info+0x40/0x58
[   20.195637]  __kasan_kmalloc+0xd4/0xd8
[   20.196140]  __kmalloc_cache_noprof+0x154/0x320
[   20.196710]  kmalloc_oob_right+0xb8/0x5f0
[   20.197271]  kunit_try_run_case+0x170/0x3f0
[   20.197793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.198453]  kthread+0x24c/0x2d0
[   20.198922]  ret_from_fork+0x10/0x20
[   20.200224] 
[   20.200483] The buggy address belongs to the object at fff00000c40eff00
[   20.200483]  which belongs to the cache kmalloc-128 of size 128
[   20.201545] The buggy address is located 5 bytes to the right of
[   20.201545]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.202845] 
[   20.203170] The buggy address belongs to the physical page:
[   20.204081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.204914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.205727] page_type: f5(slab)
[   20.206217] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.207011] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.208055] page dumped because: kasan: bad access detected
[   20.208712] 
[   20.209039] Memory state around the buggy address:
[   20.209499]  fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.210741]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.211576] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.212393]                                                                 ^
[   20.212996]  fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.213782]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.214488] ==================================================================
[   20.128681] ==================================================================
[   20.130740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   20.136356] Write of size 1 at addr fff00000c40eff73 by task kunit_try_catch/126
[   20.137937] 
[   20.140420] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G                 N 6.12.33-rc1 #1
[   20.141341] Tainted: [N]=TEST
[   20.141393] Hardware name: linux,dummy-virt (DT)
[   20.141692] Call trace:
[   20.141742]  dump_backtrace+0x9c/0x128
[   20.141835]  show_stack+0x20/0x38
[   20.141883]  dump_stack_lvl+0x8c/0xd0
[   20.141938]  print_report+0x118/0x5f0
[   20.142019]  kasan_report+0xdc/0x128
[   20.142066]  __asan_report_store1_noabort+0x20/0x30
[   20.142117]  kmalloc_oob_right+0x56c/0x5f0
[   20.142165]  kunit_try_run_case+0x170/0x3f0
[   20.142216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142268]  kthread+0x24c/0x2d0
[   20.142315]  ret_from_fork+0x10/0x20
[   20.142462] 
[   20.150748] Allocated by task 126:
[   20.151629]  kasan_save_stack+0x3c/0x68
[   20.152224]  kasan_save_track+0x20/0x40
[   20.152671]  kasan_save_alloc_info+0x40/0x58
[   20.153257]  __kasan_kmalloc+0xd4/0xd8
[   20.153777]  __kmalloc_cache_noprof+0x154/0x320
[   20.154836]  kmalloc_oob_right+0xb8/0x5f0
[   20.155571]  kunit_try_run_case+0x170/0x3f0
[   20.156250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.156870]  kthread+0x24c/0x2d0
[   20.157451]  ret_from_fork+0x10/0x20
[   20.158072] 
[   20.158394] The buggy address belongs to the object at fff00000c40eff00
[   20.158394]  which belongs to the cache kmalloc-128 of size 128
[   20.160303] The buggy address is located 0 bytes to the right of
[   20.160303]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.161447] 
[   20.161942] The buggy address belongs to the physical page:
[   20.162875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.164284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.165375] page_type: f5(slab)
[   20.166353] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.167075] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.168120] page dumped because: kasan: bad access detected
[   20.169011] 
[   20.169406] Memory state around the buggy address:
[   20.170212]  fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.170933]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172023] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.172691]                                                              ^
[   20.173322]  fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.174096]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.174884] ==================================================================

[   16.287994] ==================================================================
[   16.288466] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   16.290248] Read of size 1 at addr ffff888102304f80 by task kunit_try_catch/143
[   16.290901] 
[   16.291112] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.291244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.291295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.291338] Call Trace:
[   16.291361]  <TASK>
[   16.291382]  dump_stack_lvl+0x73/0xb0
[   16.291420]  print_report+0xd1/0x640
[   16.291455]  ? __virt_addr_valid+0x1db/0x2d0
[   16.291564]  ? kmalloc_oob_right+0x68c/0x7f0
[   16.291642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.291716]  ? kmalloc_oob_right+0x68c/0x7f0
[   16.291787]  kasan_report+0x140/0x180
[   16.291864]  ? kmalloc_oob_right+0x68c/0x7f0
[   16.291949]  __asan_report_load1_noabort+0x18/0x20
[   16.292018]  kmalloc_oob_right+0x68c/0x7f0
[   16.292134]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.292236]  ? __schedule+0xc49/0x27a0
[   16.292273]  ? __pfx_read_tsc+0x10/0x10
[   16.292301]  ? ktime_get_ts64+0x84/0x230
[   16.292336]  kunit_try_run_case+0x1a6/0x480
[   16.292367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.292395]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.292422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.292673]  ? __kthread_parkme+0x82/0x160
[   16.292708]  ? preempt_count_sub+0x50/0x80
[   16.292738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.292765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.292801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.292864]  kthread+0x257/0x310
[   16.292893]  ? __pfx_kthread+0x10/0x10
[   16.292919]  ret_from_fork+0x41/0x80
[   16.292951]  ? __pfx_kthread+0x10/0x10
[   16.292976]  ret_from_fork_asm+0x1a/0x30
[   16.293015]  </TASK>
[   16.293028] 
[   16.316011] Allocated by task 143:
[   16.316447]  kasan_save_stack+0x45/0x70
[   16.317235]  kasan_save_track+0x18/0x40
[   16.318186]  kasan_save_alloc_info+0x3b/0x50
[   16.318959]  __kasan_kmalloc+0xb7/0xc0
[   16.319245]  __kmalloc_cache_noprof+0x168/0x350
[   16.319926]  kmalloc_oob_right+0xaa/0x7f0
[   16.320381]  kunit_try_run_case+0x1a6/0x480
[   16.320785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.321883]  kthread+0x257/0x310
[   16.322263]  ret_from_fork+0x41/0x80
[   16.322807]  ret_from_fork_asm+0x1a/0x30
[   16.323250] 
[   16.323870] The buggy address belongs to the object at ffff888102304f00
[   16.323870]  which belongs to the cache kmalloc-128 of size 128
[   16.324992] The buggy address is located 13 bytes to the right of
[   16.324992]  allocated 115-byte region [ffff888102304f00, ffff888102304f73)
[   16.326176] 
[   16.326868] The buggy address belongs to the physical page:
[   16.327468] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304
[   16.328532] flags: 0x200000000000000(node=0|zone=2)
[   16.329023] page_type: f5(slab)
[   16.329395] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.330480] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.331425] page dumped because: kasan: bad access detected
[   16.332526] 
[   16.333047] Memory state around the buggy address:
[   16.333877]  ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.334613]  ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.335295] >ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335917]                    ^
[   16.336304]  ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   16.336951]  ffff888102305080: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   16.337572] ==================================================================
[   16.244855] ==================================================================
[   16.245802] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   16.246758] Write of size 1 at addr ffff888102304f78 by task kunit_try_catch/143
[   16.247279] 
[   16.247533] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.247651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.247677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.247708] Call Trace:
[   16.247726]  <TASK>
[   16.247746]  dump_stack_lvl+0x73/0xb0
[   16.247783]  print_report+0xd1/0x640
[   16.247846]  ? __virt_addr_valid+0x1db/0x2d0
[   16.248154]  ? kmalloc_oob_right+0x6bf/0x7f0
[   16.248244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.248318]  ? kmalloc_oob_right+0x6bf/0x7f0
[   16.248388]  kasan_report+0x140/0x180
[   16.248633]  ? kmalloc_oob_right+0x6bf/0x7f0
[   16.248726]  __asan_report_store1_noabort+0x1b/0x30
[   16.248794]  kmalloc_oob_right+0x6bf/0x7f0
[   16.248873]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.248908]  ? __schedule+0xc49/0x27a0
[   16.248935]  ? __pfx_read_tsc+0x10/0x10
[   16.248960]  ? ktime_get_ts64+0x84/0x230
[   16.248994]  kunit_try_run_case+0x1a6/0x480
[   16.249024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.249052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.249079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.249114]  ? __kthread_parkme+0x82/0x160
[   16.249143]  ? preempt_count_sub+0x50/0x80
[   16.249171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.249198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.249262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.249299]  kthread+0x257/0x310
[   16.249324]  ? __pfx_kthread+0x10/0x10
[   16.249350]  ret_from_fork+0x41/0x80
[   16.249378]  ? __pfx_kthread+0x10/0x10
[   16.249403]  ret_from_fork_asm+0x1a/0x30
[   16.249448]  </TASK>
[   16.249506] 
[   16.265859] Allocated by task 143:
[   16.266342]  kasan_save_stack+0x45/0x70
[   16.266977]  kasan_save_track+0x18/0x40
[   16.267423]  kasan_save_alloc_info+0x3b/0x50
[   16.268065]  __kasan_kmalloc+0xb7/0xc0
[   16.268856]  __kmalloc_cache_noprof+0x168/0x350
[   16.269324]  kmalloc_oob_right+0xaa/0x7f0
[   16.269712]  kunit_try_run_case+0x1a6/0x480
[   16.270132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.271011]  kthread+0x257/0x310
[   16.271331]  ret_from_fork+0x41/0x80
[   16.271957]  ret_from_fork_asm+0x1a/0x30
[   16.272425] 
[   16.273014] The buggy address belongs to the object at ffff888102304f00
[   16.273014]  which belongs to the cache kmalloc-128 of size 128
[   16.274241] The buggy address is located 5 bytes to the right of
[   16.274241]  allocated 115-byte region [ffff888102304f00, ffff888102304f73)
[   16.275428] 
[   16.275849] The buggy address belongs to the physical page:
[   16.276386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304
[   16.277423] flags: 0x200000000000000(node=0|zone=2)
[   16.277898] page_type: f5(slab)
[   16.278207] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.279199] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.280101] page dumped because: kasan: bad access detected
[   16.280578] 
[   16.281478] Memory state around the buggy address:
[   16.282443]  ffff888102304e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   16.283180]  ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.284132] >ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.285013]                                                                 ^
[   16.285625]  ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.286374]  ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   16.287067] ==================================================================
[   16.190628] ==================================================================
[   16.192059] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   16.193230] Write of size 1 at addr ffff888102304f73 by task kunit_try_catch/143
[   16.193861] 
[   16.195663] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.12.33-rc1 #1
[   16.196081] Tainted: [N]=TEST
[   16.196117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.196418] Call Trace:
[   16.196584]  <TASK>
[   16.196773]  dump_stack_lvl+0x73/0xb0
[   16.196928]  print_report+0xd1/0x640
[   16.196987]  ? __virt_addr_valid+0x1db/0x2d0
[   16.197030]  ? kmalloc_oob_right+0x6f2/0x7f0
[   16.197061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.197094]  ? kmalloc_oob_right+0x6f2/0x7f0
[   16.197125]  kasan_report+0x140/0x180
[   16.197159]  ? kmalloc_oob_right+0x6f2/0x7f0
[   16.197197]  __asan_report_store1_noabort+0x1b/0x30
[   16.197256]  kmalloc_oob_right+0x6f2/0x7f0
[   16.197291]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.197324]  ? __schedule+0xc49/0x27a0
[   16.197353]  ? __pfx_read_tsc+0x10/0x10
[   16.197381]  ? ktime_get_ts64+0x84/0x230
[   16.197418]  kunit_try_run_case+0x1a6/0x480
[   16.197491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.197565]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.197601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.197667]  ? __kthread_parkme+0x82/0x160
[   16.197698]  ? preempt_count_sub+0x50/0x80
[   16.197745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.197776]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.197823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.197898]  kthread+0x257/0x310
[   16.197947]  ? __pfx_kthread+0x10/0x10
[   16.197982]  ret_from_fork+0x41/0x80
[   16.198015]  ? __pfx_kthread+0x10/0x10
[   16.198059]  ret_from_fork_asm+0x1a/0x30
[   16.198156]  </TASK>
[   16.198278] 
[   16.216833] Allocated by task 143:
[   16.217412]  kasan_save_stack+0x45/0x70
[   16.218094]  kasan_save_track+0x18/0x40
[   16.218653]  kasan_save_alloc_info+0x3b/0x50
[   16.219100]  __kasan_kmalloc+0xb7/0xc0
[   16.219430]  __kmalloc_cache_noprof+0x168/0x350
[   16.220647]  kmalloc_oob_right+0xaa/0x7f0
[   16.221260]  kunit_try_run_case+0x1a6/0x480
[   16.221570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.222465]  kthread+0x257/0x310
[   16.222916]  ret_from_fork+0x41/0x80
[   16.223305]  ret_from_fork_asm+0x1a/0x30
[   16.224278] 
[   16.224681] The buggy address belongs to the object at ffff888102304f00
[   16.224681]  which belongs to the cache kmalloc-128 of size 128
[   16.226184] The buggy address is located 0 bytes to the right of
[   16.226184]  allocated 115-byte region [ffff888102304f00, ffff888102304f73)
[   16.227734] 
[   16.228143] The buggy address belongs to the physical page:
[   16.229194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304
[   16.230314] flags: 0x200000000000000(node=0|zone=2)
[   16.231421] page_type: f5(slab)
[   16.232687] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.233394] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.234854] page dumped because: kasan: bad access detected
[   16.235325] 
[   16.235917] Memory state around the buggy address:
[   16.237126]  ffff888102304e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   16.237718]  ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.238283] >ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.239240]                                                              ^
[   16.239972]  ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.240808]  ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   16.241807] ==================================================================