Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.763138] ==================================================================
[   17.763554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.764336] Write of size 1 at addr fff00000c3e3ee78 by task kunit_try_catch/126
[   17.765362] 
[   17.765818] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   17.766349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766391] Hardware name: linux,dummy-virt (DT)
[   17.766433] Call trace:
[   17.766460]  show_stack+0x20/0x38 (C)
[   17.766529]  dump_stack_lvl+0x8c/0xd0
[   17.766584]  print_report+0x118/0x608
[   17.766637]  kasan_report+0xdc/0x128
[   17.766686]  __asan_report_store1_noabort+0x20/0x30
[   17.766735]  kmalloc_oob_right+0x538/0x660
[   17.766782]  kunit_try_run_case+0x170/0x3f0
[   17.766830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.766882]  kthread+0x318/0x620
[   17.766927]  ret_from_fork+0x10/0x20
[   17.766978] 
[   17.772443] Allocated by task 126:
[   17.772790]  kasan_save_stack+0x3c/0x68
[   17.773730]  kasan_save_track+0x20/0x40
[   17.774523]  kasan_save_alloc_info+0x40/0x58
[   17.774902]  __kasan_kmalloc+0xd4/0xd8
[   17.775475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.776059]  kmalloc_oob_right+0xb0/0x660
[   17.776625]  kunit_try_run_case+0x170/0x3f0
[   17.777209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.777693]  kthread+0x318/0x620
[   17.777994]  ret_from_fork+0x10/0x20
[   17.778873] 
[   17.779390] The buggy address belongs to the object at fff00000c3e3ee00
[   17.779390]  which belongs to the cache kmalloc-128 of size 128
[   17.780393] The buggy address is located 5 bytes to the right of
[   17.780393]  allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73)
[   17.781242] 
[   17.781720] The buggy address belongs to the physical page:
[   17.782052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e
[   17.783075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.783775] page_type: f5(slab)
[   17.784232] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.784818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.785375] page dumped because: kasan: bad access detected
[   17.785991] 
[   17.786295] Memory state around the buggy address:
[   17.786559]  fff00000c3e3ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.786882]  fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.787214] >fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.787855]                                                                 ^
[   17.788562]  fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.789309]  fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.789984] ==================================================================
[   17.725995] ==================================================================
[   17.727661] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.729231] Write of size 1 at addr fff00000c3e3ee73 by task kunit_try_catch/126
[   17.730743] 
[   17.732206] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G                 N 6.14.10-rc1 #1
[   17.732733] Tainted: [N]=TEST
[   17.732776] Hardware name: linux,dummy-virt (DT)
[   17.733089] Call trace:
[   17.733288]  show_stack+0x20/0x38 (C)
[   17.733474]  dump_stack_lvl+0x8c/0xd0
[   17.733565]  print_report+0x118/0x608
[   17.733625]  kasan_report+0xdc/0x128
[   17.733678]  __asan_report_store1_noabort+0x20/0x30
[   17.733732]  kmalloc_oob_right+0x5a4/0x660
[   17.733783]  kunit_try_run_case+0x170/0x3f0
[   17.733839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.733896]  kthread+0x318/0x620
[   17.733950]  ret_from_fork+0x10/0x20
[   17.734243] 
[   17.740416] Allocated by task 126:
[   17.741095]  kasan_save_stack+0x3c/0x68
[   17.741581]  kasan_save_track+0x20/0x40
[   17.741959]  kasan_save_alloc_info+0x40/0x58
[   17.742742]  __kasan_kmalloc+0xd4/0xd8
[   17.743281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.743878]  kmalloc_oob_right+0xb0/0x660
[   17.744448]  kunit_try_run_case+0x170/0x3f0
[   17.744993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.745627]  kthread+0x318/0x620
[   17.745959]  ret_from_fork+0x10/0x20
[   17.746641] 
[   17.747131] The buggy address belongs to the object at fff00000c3e3ee00
[   17.747131]  which belongs to the cache kmalloc-128 of size 128
[   17.748199] The buggy address is located 0 bytes to the right of
[   17.748199]  allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73)
[   17.748820] 
[   17.749083] The buggy address belongs to the physical page:
[   17.749649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e
[   17.751598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.752384] page_type: f5(slab)
[   17.753319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.753918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.754911] page dumped because: kasan: bad access detected
[   17.755322] 
[   17.755487] Memory state around the buggy address:
[   17.756001]  fff00000c3e3ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.756380]  fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756724] >fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.757066]                                                              ^
[   17.758923]  fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.759388]  fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.759993] ==================================================================
[   17.791373] ==================================================================
[   17.791977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.792643] Read of size 1 at addr fff00000c3e3ee80 by task kunit_try_catch/126
[   17.793226] 
[   17.793501] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   17.793690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.793736] Hardware name: linux,dummy-virt (DT)
[   17.793793] Call trace:
[   17.793837]  show_stack+0x20/0x38 (C)
[   17.793956]  dump_stack_lvl+0x8c/0xd0
[   17.794172]  print_report+0x118/0x608
[   17.794296]  kasan_report+0xdc/0x128
[   17.794414]  __asan_report_load1_noabort+0x20/0x30
[   17.794540]  kmalloc_oob_right+0x5d0/0x660
[   17.794659]  kunit_try_run_case+0x170/0x3f0
[   17.794782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.794900]  kthread+0x318/0x620
[   17.795041]  ret_from_fork+0x10/0x20
[   17.795177] 
[   17.800443] Allocated by task 126:
[   17.800863]  kasan_save_stack+0x3c/0x68
[   17.801448]  kasan_save_track+0x20/0x40
[   17.801988]  kasan_save_alloc_info+0x40/0x58
[   17.802753]  __kasan_kmalloc+0xd4/0xd8
[   17.803064]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.803625]  kmalloc_oob_right+0xb0/0x660
[   17.804046]  kunit_try_run_case+0x170/0x3f0
[   17.804481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.804969]  kthread+0x318/0x620
[   17.805345]  ret_from_fork+0x10/0x20
[   17.805753] 
[   17.806042] The buggy address belongs to the object at fff00000c3e3ee00
[   17.806042]  which belongs to the cache kmalloc-128 of size 128
[   17.806912] The buggy address is located 13 bytes to the right of
[   17.806912]  allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73)
[   17.807777] 
[   17.807993] The buggy address belongs to the physical page:
[   17.808741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e
[   17.809408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.810130] page_type: f5(slab)
[   17.810731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.811192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.811968] page dumped because: kasan: bad access detected
[   17.812479] 
[   17.812756] Memory state around the buggy address:
[   17.813247]  fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.813963]  fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.815481] >fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816122]                    ^
[   17.816472]  fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.817004]  fff00000c3e3ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.817472] ==================================================================

[   12.009803] ==================================================================
[   12.010461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   12.011138] Write of size 1 at addr ffff888101bd1873 by task kunit_try_catch/144
[   12.011697] 
[   12.012467] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G                 N 6.14.10-rc1 #1
[   12.012853] Tainted: [N]=TEST
[   12.012881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.013108] Call Trace:
[   12.013176]  <TASK>
[   12.013320]  dump_stack_lvl+0x73/0xb0
[   12.013404]  print_report+0xd1/0x650
[   12.013432]  ? __virt_addr_valid+0x1db/0x2d0
[   12.013456]  ? kmalloc_oob_right+0x6f2/0x7f0
[   12.013475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.013500]  ? kmalloc_oob_right+0x6f2/0x7f0
[   12.013520]  kasan_report+0x140/0x180
[   12.013541]  ? kmalloc_oob_right+0x6f2/0x7f0
[   12.013565]  __asan_report_store1_noabort+0x1b/0x30
[   12.013588]  kmalloc_oob_right+0x6f2/0x7f0
[   12.013609]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.013631]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.013655]  kunit_try_run_case+0x1a6/0x480
[   12.013680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.013700]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.013725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.013757]  ? __kthread_parkme+0x82/0x160
[   12.013780]  ? preempt_count_sub+0x50/0x80
[   12.013805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.013827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.013853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.013878]  kthread+0x324/0x6e0
[   12.013899]  ? trace_preempt_on+0x20/0xc0
[   12.013923]  ? __pfx_kthread+0x10/0x10
[   12.013944]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.013966]  ? calculate_sigpending+0x7b/0xa0
[   12.013988]  ? __pfx_kthread+0x10/0x10
[   12.014010]  ret_from_fork+0x41/0x80
[   12.014039]  ? __pfx_kthread+0x10/0x10
[   12.014060]  ret_from_fork_asm+0x1a/0x30
[   12.014113]  </TASK>
[   12.014175] 
[   12.025067] Allocated by task 144:
[   12.025348]  kasan_save_stack+0x45/0x70
[   12.025568]  kasan_save_track+0x18/0x40
[   12.025778]  kasan_save_alloc_info+0x3b/0x50
[   12.025989]  __kasan_kmalloc+0xb7/0xc0
[   12.026133]  __kmalloc_cache_noprof+0x18a/0x420
[   12.026383]  kmalloc_oob_right+0xaa/0x7f0
[   12.026548]  kunit_try_run_case+0x1a6/0x480
[   12.026773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.027000]  kthread+0x324/0x6e0
[   12.027150]  ret_from_fork+0x41/0x80
[   12.027328]  ret_from_fork_asm+0x1a/0x30
[   12.027556] 
[   12.027754] The buggy address belongs to the object at ffff888101bd1800
[   12.027754]  which belongs to the cache kmalloc-128 of size 128
[   12.028542] The buggy address is located 0 bytes to the right of
[   12.028542]  allocated 115-byte region [ffff888101bd1800, ffff888101bd1873)
[   12.029108] 
[   12.029259] The buggy address belongs to the physical page:
[   12.029693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   12.030222] flags: 0x200000000000000(node=0|zone=2)
[   12.030818] page_type: f5(slab)
[   12.031304] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.031684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.032008] page dumped because: kasan: bad access detected
[   12.032286] 
[   12.032389] Memory state around the buggy address:
[   12.032909]  ffff888101bd1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.033246]  ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.033538] >ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.033875]                                                              ^
[   12.034190]  ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.034470]  ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.034820] ==================================================================
[   12.036111] ==================================================================
[   12.036366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   12.036662] Write of size 1 at addr ffff888101bd1878 by task kunit_try_catch/144
[   12.036889] 
[   12.036994] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   12.037057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.037069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.037087] Call Trace:
[   12.037100]  <TASK>
[   12.037114]  dump_stack_lvl+0x73/0xb0
[   12.037137]  print_report+0xd1/0x650
[   12.037157]  ? __virt_addr_valid+0x1db/0x2d0
[   12.037178]  ? kmalloc_oob_right+0x6bf/0x7f0
[   12.037198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.037222]  ? kmalloc_oob_right+0x6bf/0x7f0
[   12.037242]  kasan_report+0x140/0x180
[   12.037263]  ? kmalloc_oob_right+0x6bf/0x7f0
[   12.037288]  __asan_report_store1_noabort+0x1b/0x30
[   12.037310]  kmalloc_oob_right+0x6bf/0x7f0
[   12.037331]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.037354]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.037378]  kunit_try_run_case+0x1a6/0x480
[   12.037400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.037420]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.037443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.037466]  ? __kthread_parkme+0x82/0x160
[   12.037487]  ? preempt_count_sub+0x50/0x80
[   12.037511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.037533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.037558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.037583]  kthread+0x324/0x6e0
[   12.037603]  ? trace_preempt_on+0x20/0xc0
[   12.037625]  ? __pfx_kthread+0x10/0x10
[   12.037646]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.037667]  ? calculate_sigpending+0x7b/0xa0
[   12.037688]  ? __pfx_kthread+0x10/0x10
[   12.037710]  ret_from_fork+0x41/0x80
[   12.037728]  ? __pfx_kthread+0x10/0x10
[   12.037754]  ret_from_fork_asm+0x1a/0x30
[   12.037783]  </TASK>
[   12.037793] 
[   12.044608] Allocated by task 144:
[   12.044763]  kasan_save_stack+0x45/0x70
[   12.044901]  kasan_save_track+0x18/0x40
[   12.045047]  kasan_save_alloc_info+0x3b/0x50
[   12.045425]  __kasan_kmalloc+0xb7/0xc0
[   12.045698]  __kmalloc_cache_noprof+0x18a/0x420
[   12.045859]  kmalloc_oob_right+0xaa/0x7f0
[   12.046049]  kunit_try_run_case+0x1a6/0x480
[   12.046254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.046448]  kthread+0x324/0x6e0
[   12.046568]  ret_from_fork+0x41/0x80
[   12.046694]  ret_from_fork_asm+0x1a/0x30
[   12.046877] 
[   12.046980] The buggy address belongs to the object at ffff888101bd1800
[   12.046980]  which belongs to the cache kmalloc-128 of size 128
[   12.047606] The buggy address is located 5 bytes to the right of
[   12.047606]  allocated 115-byte region [ffff888101bd1800, ffff888101bd1873)
[   12.047972] 
[   12.048065] The buggy address belongs to the physical page:
[   12.048398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   12.048741] flags: 0x200000000000000(node=0|zone=2)
[   12.048955] page_type: f5(slab)
[   12.049113] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.049366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.049641] page dumped because: kasan: bad access detected
[   12.050039] 
[   12.050130] Memory state around the buggy address:
[   12.050330]  ffff888101bd1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.050696]  ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.050984] >ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.051234]                                                                 ^
[   12.051445]  ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.051659]  ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.051868] ==================================================================
[   12.052324] ==================================================================
[   12.052825] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   12.053151] Read of size 1 at addr ffff888101bd1880 by task kunit_try_catch/144
[   12.053728] 
[   12.053813] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   12.053849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.053860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.053879] Call Trace:
[   12.053892]  <TASK>
[   12.053905]  dump_stack_lvl+0x73/0xb0
[   12.053929]  print_report+0xd1/0x650
[   12.053949]  ? __virt_addr_valid+0x1db/0x2d0
[   12.053970]  ? kmalloc_oob_right+0x68c/0x7f0
[   12.053990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.054014]  ? kmalloc_oob_right+0x68c/0x7f0
[   12.054045]  kasan_report+0x140/0x180
[   12.054066]  ? kmalloc_oob_right+0x68c/0x7f0
[   12.054090]  __asan_report_load1_noabort+0x18/0x20
[   12.054113]  kmalloc_oob_right+0x68c/0x7f0
[   12.054133]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.054156]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.054180]  kunit_try_run_case+0x1a6/0x480
[   12.054202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.054222]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.054245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.054268]  ? __kthread_parkme+0x82/0x160
[   12.054290]  ? preempt_count_sub+0x50/0x80
[   12.054314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.054337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.054362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.054387]  kthread+0x324/0x6e0
[   12.054407]  ? trace_preempt_on+0x20/0xc0
[   12.054429]  ? __pfx_kthread+0x10/0x10
[   12.054452]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.054473]  ? calculate_sigpending+0x7b/0xa0
[   12.054494]  ? __pfx_kthread+0x10/0x10
[   12.054515]  ret_from_fork+0x41/0x80
[   12.054533]  ? __pfx_kthread+0x10/0x10
[   12.054554]  ret_from_fork_asm+0x1a/0x30
[   12.054584]  </TASK>
[   12.054593] 
[   12.061872] Allocated by task 144:
[   12.062047]  kasan_save_stack+0x45/0x70
[   12.062191]  kasan_save_track+0x18/0x40
[   12.062322]  kasan_save_alloc_info+0x3b/0x50
[   12.062468]  __kasan_kmalloc+0xb7/0xc0
[   12.062595]  __kmalloc_cache_noprof+0x18a/0x420
[   12.062747]  kmalloc_oob_right+0xaa/0x7f0
[   12.062883]  kunit_try_run_case+0x1a6/0x480
[   12.063079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.063330]  kthread+0x324/0x6e0
[   12.063597]  ret_from_fork+0x41/0x80
[   12.063777]  ret_from_fork_asm+0x1a/0x30
[   12.063984] 
[   12.064088] The buggy address belongs to the object at ffff888101bd1800
[   12.064088]  which belongs to the cache kmalloc-128 of size 128
[   12.064629] The buggy address is located 13 bytes to the right of
[   12.064629]  allocated 115-byte region [ffff888101bd1800, ffff888101bd1873)
[   12.065086] 
[   12.065236] The buggy address belongs to the physical page:
[   12.065449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   12.065874] flags: 0x200000000000000(node=0|zone=2)
[   12.066098] page_type: f5(slab)
[   12.066214] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.066440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.066970] page dumped because: kasan: bad access detected
[   12.067457] 
[   12.067538] Memory state around the buggy address:
[   12.067791]  ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.068061]  ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.068474] >ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.068882]                    ^
[   12.068996]  ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.069324]  ffff888101bd1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.069543] ==================================================================