Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.802324] ==================================================================
[   16.802393] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.802512] Write of size 1 at addr fff00000c6fb0078 by task kunit_try_catch/138
[   16.802578] 
[   16.802638] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.802783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.802853] Hardware name: linux,dummy-virt (DT)
[   16.802896] Call trace:
[   16.802918]  show_stack+0x20/0x38 (C)
[   16.803014]  dump_stack_lvl+0x8c/0xd0
[   16.803081]  print_report+0x118/0x5d0
[   16.803125]  kasan_report+0xdc/0x128
[   16.803167]  __asan_report_store1_noabort+0x20/0x30
[   16.803216]  kmalloc_oob_right+0x538/0x660
[   16.803266]  kunit_try_run_case+0x170/0x3f0
[   16.803323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.803401]  kthread+0x328/0x630
[   16.803447]  ret_from_fork+0x10/0x20
[   16.803492] 
[   16.803510] Allocated by task 138:
[   16.803537]  kasan_save_stack+0x3c/0x68
[   16.803573]  kasan_save_track+0x20/0x40
[   16.803607]  kasan_save_alloc_info+0x40/0x58
[   16.803643]  __kasan_kmalloc+0xd4/0xd8
[   16.803677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.803877]  kmalloc_oob_right+0xb0/0x660
[   16.803920]  kunit_try_run_case+0x170/0x3f0
[   16.804045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.804098]  kthread+0x328/0x630
[   16.804132]  ret_from_fork+0x10/0x20
[   16.804201] 
[   16.804270] The buggy address belongs to the object at fff00000c6fb0000
[   16.804270]  which belongs to the cache kmalloc-128 of size 128
[   16.804347] The buggy address is located 5 bytes to the right of
[   16.804347]  allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073)
[   16.804407] 
[   16.804428] The buggy address belongs to the physical page:
[   16.804456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0
[   16.804504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.804849] page_type: f5(slab)
[   16.805030] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.805142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.805209] page dumped because: kasan: bad access detected
[   16.805239] 
[   16.805257] Memory state around the buggy address:
[   16.806067]  fff00000c6faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.806146]  fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.806204] >fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.806304]                                                                 ^
[   16.806399]  fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806455]  fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806522] ==================================================================
[   16.795456] ==================================================================
[   16.795799] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.796638] Write of size 1 at addr fff00000c6fb0073 by task kunit_try_catch/138
[   16.796743] 
[   16.797511] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.8-rc1 #1 PREEMPT 
[   16.797652] Tainted: [N]=TEST
[   16.797684] Hardware name: linux,dummy-virt (DT)
[   16.797901] Call trace:
[   16.798064]  show_stack+0x20/0x38 (C)
[   16.798194]  dump_stack_lvl+0x8c/0xd0
[   16.798256]  print_report+0x118/0x5d0
[   16.798315]  kasan_report+0xdc/0x128
[   16.798358]  __asan_report_store1_noabort+0x20/0x30
[   16.798407]  kmalloc_oob_right+0x5a4/0x660
[   16.798454]  kunit_try_run_case+0x170/0x3f0
[   16.798505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.798554]  kthread+0x328/0x630
[   16.798600]  ret_from_fork+0x10/0x20
[   16.798793] 
[   16.798855] Allocated by task 138:
[   16.798972]  kasan_save_stack+0x3c/0x68
[   16.799038]  kasan_save_track+0x20/0x40
[   16.799074]  kasan_save_alloc_info+0x40/0x58
[   16.799111]  __kasan_kmalloc+0xd4/0xd8
[   16.799145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.799182]  kmalloc_oob_right+0xb0/0x660
[   16.799219]  kunit_try_run_case+0x170/0x3f0
[   16.799257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.799309]  kthread+0x328/0x630
[   16.799343]  ret_from_fork+0x10/0x20
[   16.799397] 
[   16.799455] The buggy address belongs to the object at fff00000c6fb0000
[   16.799455]  which belongs to the cache kmalloc-128 of size 128
[   16.799546] The buggy address is located 0 bytes to the right of
[   16.799546]  allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073)
[   16.799610] 
[   16.799690] The buggy address belongs to the physical page:
[   16.799864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0
[   16.800122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.800417] page_type: f5(slab)
[   16.800704] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.800766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.800869] page dumped because: kasan: bad access detected
[   16.800908] 
[   16.800933] Memory state around the buggy address:
[   16.801140]  fff00000c6faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.801203]  fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.801254] >fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.801320]                                                              ^
[   16.801412]  fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.801459]  fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.801523] ==================================================================
[   16.807495] ==================================================================
[   16.807543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.807591] Read of size 1 at addr fff00000c6fb0080 by task kunit_try_catch/138
[   16.807637] 
[   16.807675] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   16.807766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.807798] Hardware name: linux,dummy-virt (DT)
[   16.807830] Call trace:
[   16.807859]  show_stack+0x20/0x38 (C)
[   16.807905]  dump_stack_lvl+0x8c/0xd0
[   16.807951]  print_report+0x118/0x5d0
[   16.807994]  kasan_report+0xdc/0x128
[   16.808036]  __asan_report_load1_noabort+0x20/0x30
[   16.808091]  kmalloc_oob_right+0x5d0/0x660
[   16.808147]  kunit_try_run_case+0x170/0x3f0
[   16.808193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.808241]  kthread+0x328/0x630
[   16.808297]  ret_from_fork+0x10/0x20
[   16.808342] 
[   16.808360] Allocated by task 138:
[   16.808385]  kasan_save_stack+0x3c/0x68
[   16.808421]  kasan_save_track+0x20/0x40
[   16.808455]  kasan_save_alloc_info+0x40/0x58
[   16.808491]  __kasan_kmalloc+0xd4/0xd8
[   16.808524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.808560]  kmalloc_oob_right+0xb0/0x660
[   16.808829]  kunit_try_run_case+0x170/0x3f0
[   16.808882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.808942]  kthread+0x328/0x630
[   16.809163]  ret_from_fork+0x10/0x20
[   16.809203] 
[   16.809260] The buggy address belongs to the object at fff00000c6fb0000
[   16.809260]  which belongs to the cache kmalloc-128 of size 128
[   16.809357] The buggy address is located 13 bytes to the right of
[   16.809357]  allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073)
[   16.809424] 
[   16.809443] The buggy address belongs to the physical page:
[   16.809491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0
[   16.809557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.809602] page_type: f5(slab)
[   16.809637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.809690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.809736] page dumped because: kasan: bad access detected
[   16.809765] 
[   16.809782] Memory state around the buggy address:
[   16.809811]  fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.809851]  fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.809902] >fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.809938]                    ^
[   16.809963]  fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.810003]  fff00000c6fb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.810040] ==================================================================

[   10.347960] ==================================================================
[   10.348415] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.349025] Write of size 1 at addr ffff88810306a578 by task kunit_try_catch/156
[   10.349589] 
[   10.349795] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.349841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.349852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.349873] Call Trace:
[   10.349890]  <TASK>
[   10.349907]  dump_stack_lvl+0x73/0xb0
[   10.349933]  print_report+0xd1/0x610
[   10.349955]  ? __virt_addr_valid+0x1db/0x2d0
[   10.349977]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.349998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.350019]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.350041]  kasan_report+0x141/0x180
[   10.350062]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.350089]  __asan_report_store1_noabort+0x1b/0x30
[   10.350109]  kmalloc_oob_right+0x6bd/0x7f0
[   10.350131]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.350154]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.350180]  kunit_try_run_case+0x1a5/0x480
[   10.350235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.350254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.350274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.350309]  ? __kthread_parkme+0x82/0x180
[   10.350331]  ? preempt_count_sub+0x50/0x80
[   10.350356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.350376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.350399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.350421]  kthread+0x337/0x6f0
[   10.350437]  ? trace_preempt_on+0x20/0xc0
[   10.350460]  ? __pfx_kthread+0x10/0x10
[   10.350477]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.350499]  ? calculate_sigpending+0x7b/0xa0
[   10.350520]  ? __pfx_kthread+0x10/0x10
[   10.350538]  ret_from_fork+0x41/0x80
[   10.350559]  ? __pfx_kthread+0x10/0x10
[   10.350576]  ret_from_fork_asm+0x1a/0x30
[   10.350607]  </TASK>
[   10.350617] 
[   10.362569] Allocated by task 156:
[   10.363021]  kasan_save_stack+0x45/0x70
[   10.363453]  kasan_save_track+0x18/0x40
[   10.363862]  kasan_save_alloc_info+0x3b/0x50
[   10.364290]  __kasan_kmalloc+0xb7/0xc0
[   10.364458]  __kmalloc_cache_noprof+0x189/0x420
[   10.364617]  kmalloc_oob_right+0xa9/0x7f0
[   10.364757]  kunit_try_run_case+0x1a5/0x480
[   10.364900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.365181]  kthread+0x337/0x6f0
[   10.365364]  ret_from_fork+0x41/0x80
[   10.365549]  ret_from_fork_asm+0x1a/0x30
[   10.365832] 
[   10.365930] The buggy address belongs to the object at ffff88810306a500
[   10.365930]  which belongs to the cache kmalloc-128 of size 128
[   10.366401] The buggy address is located 5 bytes to the right of
[   10.366401]  allocated 115-byte region [ffff88810306a500, ffff88810306a573)
[   10.366988] 
[   10.367118] The buggy address belongs to the physical page:
[   10.367395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a
[   10.367642] flags: 0x200000000000000(node=0|zone=2)
[   10.367929] page_type: f5(slab)
[   10.368098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.368602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.369047] page dumped because: kasan: bad access detected
[   10.369328] 
[   10.369454] Memory state around the buggy address:
[   10.369613]  ffff88810306a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.370249]  ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.370647] >ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.370858]                                                                 ^
[   10.371068]  ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.371686]  ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.371998] ==================================================================
[   10.372627] ==================================================================
[   10.373100] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.373532] Read of size 1 at addr ffff88810306a580 by task kunit_try_catch/156
[   10.373900] 
[   10.373994] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.374037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.374048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.374068] Call Trace:
[   10.374086]  <TASK>
[   10.374103]  dump_stack_lvl+0x73/0xb0
[   10.374128]  print_report+0xd1/0x610
[   10.374151]  ? __virt_addr_valid+0x1db/0x2d0
[   10.374172]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.374192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.374215]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.374246]  kasan_report+0x141/0x180
[   10.374269]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.374296]  __asan_report_load1_noabort+0x18/0x20
[   10.374316]  kmalloc_oob_right+0x68a/0x7f0
[   10.374338]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.374374]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.374401]  kunit_try_run_case+0x1a5/0x480
[   10.374456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.374476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.374496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.374548]  ? __kthread_parkme+0x82/0x180
[   10.374570]  ? preempt_count_sub+0x50/0x80
[   10.374623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.374642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.374665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.374687]  kthread+0x337/0x6f0
[   10.374703]  ? trace_preempt_on+0x20/0xc0
[   10.374726]  ? __pfx_kthread+0x10/0x10
[   10.374743]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.374764]  ? calculate_sigpending+0x7b/0xa0
[   10.374785]  ? __pfx_kthread+0x10/0x10
[   10.374803]  ret_from_fork+0x41/0x80
[   10.374825]  ? __pfx_kthread+0x10/0x10
[   10.374842]  ret_from_fork_asm+0x1a/0x30
[   10.374873]  </TASK>
[   10.374883] 
[   10.382043] Allocated by task 156:
[   10.382346]  kasan_save_stack+0x45/0x70
[   10.382524]  kasan_save_track+0x18/0x40
[   10.382686]  kasan_save_alloc_info+0x3b/0x50
[   10.382827]  __kasan_kmalloc+0xb7/0xc0
[   10.382953]  __kmalloc_cache_noprof+0x189/0x420
[   10.383099]  kmalloc_oob_right+0xa9/0x7f0
[   10.383242]  kunit_try_run_case+0x1a5/0x480
[   10.383378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.383646]  kthread+0x337/0x6f0
[   10.383812]  ret_from_fork+0x41/0x80
[   10.383996]  ret_from_fork_asm+0x1a/0x30
[   10.384183] 
[   10.384284] The buggy address belongs to the object at ffff88810306a500
[   10.384284]  which belongs to the cache kmalloc-128 of size 128
[   10.384793] The buggy address is located 13 bytes to the right of
[   10.384793]  allocated 115-byte region [ffff88810306a500, ffff88810306a573)
[   10.385667] 
[   10.385735] The buggy address belongs to the physical page:
[   10.385898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a
[   10.386129] flags: 0x200000000000000(node=0|zone=2)
[   10.386306] page_type: f5(slab)
[   10.386496] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.386837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.387554] page dumped because: kasan: bad access detected
[   10.387970] 
[   10.388038] Memory state around the buggy address:
[   10.388291]  ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.388650]  ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.389065] >ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.389468]                    ^
[   10.389691]  ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.390113]  ffff88810306a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.390497] ==================================================================
[   10.308995] ==================================================================
[   10.309955] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.310610] Write of size 1 at addr ffff88810306a573 by task kunit_try_catch/156
[   10.310910] 
[   10.311846] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G                 N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   10.313103] Tainted: [N]=TEST
[   10.313145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.313462] Call Trace:
[   10.313553]  <TASK>
[   10.313794]  dump_stack_lvl+0x73/0xb0
[   10.313898]  print_report+0xd1/0x610
[   10.313927]  ? __virt_addr_valid+0x1db/0x2d0
[   10.313951]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.313972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.313993]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.314015]  kasan_report+0x141/0x180
[   10.314037]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.314064]  __asan_report_store1_noabort+0x1b/0x30
[   10.314084]  kmalloc_oob_right+0x6f0/0x7f0
[   10.314106]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.314130]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.314161]  kunit_try_run_case+0x1a5/0x480
[   10.314183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.314201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.314232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.314256]  ? __kthread_parkme+0x82/0x180
[   10.314278]  ? preempt_count_sub+0x50/0x80
[   10.314306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.314325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.314354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.314376]  kthread+0x337/0x6f0
[   10.314392]  ? trace_preempt_on+0x20/0xc0
[   10.314417]  ? __pfx_kthread+0x10/0x10
[   10.314434]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.314455]  ? calculate_sigpending+0x7b/0xa0
[   10.314477]  ? __pfx_kthread+0x10/0x10
[   10.314495]  ret_from_fork+0x41/0x80
[   10.314516]  ? __pfx_kthread+0x10/0x10
[   10.314533]  ret_from_fork_asm+0x1a/0x30
[   10.314591]  </TASK>
[   10.314657] 
[   10.328525] Allocated by task 156:
[   10.329014]  kasan_save_stack+0x45/0x70
[   10.329336]  kasan_save_track+0x18/0x40
[   10.329682]  kasan_save_alloc_info+0x3b/0x50
[   10.329855]  __kasan_kmalloc+0xb7/0xc0
[   10.330172]  __kmalloc_cache_noprof+0x189/0x420
[   10.330673]  kmalloc_oob_right+0xa9/0x7f0
[   10.330968]  kunit_try_run_case+0x1a5/0x480
[   10.331131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.331646]  kthread+0x337/0x6f0
[   10.331828]  ret_from_fork+0x41/0x80
[   10.332263]  ret_from_fork_asm+0x1a/0x30
[   10.332586] 
[   10.332825] The buggy address belongs to the object at ffff88810306a500
[   10.332825]  which belongs to the cache kmalloc-128 of size 128
[   10.333947] The buggy address is located 0 bytes to the right of
[   10.333947]  allocated 115-byte region [ffff88810306a500, ffff88810306a573)
[   10.335300] 
[   10.335499] The buggy address belongs to the physical page:
[   10.336453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a
[   10.337561] flags: 0x200000000000000(node=0|zone=2)
[   10.338567] page_type: f5(slab)
[   10.339017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.339269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.340198] page dumped because: kasan: bad access detected
[   10.340818] 
[   10.341079] Memory state around the buggy address:
[   10.341841]  ffff88810306a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.342709]  ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.343499] >ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.344281]                                                              ^
[   10.345037]  ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.345708]  ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.346131] ==================================================================