Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.633236] ==================================================================
[   16.633288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.633333] Read of size 1 at addr fff00000c5733380 by task kunit_try_catch/137
[   16.633436] 
[   16.633467] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.633548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.633585] Hardware name: linux,dummy-virt (DT)
[   16.633614] Call trace:
[   16.633634]  show_stack+0x20/0x38 (C)
[   16.633680]  dump_stack_lvl+0x8c/0xd0
[   16.634202]  print_report+0x118/0x608
[   16.634321]  kasan_report+0xdc/0x128
[   16.634369]  __asan_report_load1_noabort+0x20/0x30
[   16.634419]  kmalloc_oob_right+0x5d0/0x660
[   16.634465]  kunit_try_run_case+0x170/0x3f0
[   16.634512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.634576]  kthread+0x328/0x630
[   16.634616]  ret_from_fork+0x10/0x20
[   16.634700] 
[   16.634842] Allocated by task 137:
[   16.634879]  kasan_save_stack+0x3c/0x68
[   16.635142]  kasan_save_track+0x20/0x40
[   16.635258]  kasan_save_alloc_info+0x40/0x58
[   16.635304]  __kasan_kmalloc+0xd4/0xd8
[   16.635339]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.635379]  kmalloc_oob_right+0xb0/0x660
[   16.635914]  kunit_try_run_case+0x170/0x3f0
[   16.636147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.636194]  kthread+0x328/0x630
[   16.636225]  ret_from_fork+0x10/0x20
[   16.636631] 
[   16.636883] The buggy address belongs to the object at fff00000c5733300
[   16.636883]  which belongs to the cache kmalloc-128 of size 128
[   16.637113] The buggy address is located 13 bytes to the right of
[   16.637113]  allocated 115-byte region [fff00000c5733300, fff00000c5733373)
[   16.637409] 
[   16.637488] The buggy address belongs to the physical page:
[   16.637584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   16.638078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.638742] page_type: f5(slab)
[   16.639114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.639278] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.639383] page dumped because: kasan: bad access detected
[   16.639414] 
[   16.639682] Memory state around the buggy address:
[   16.639785]  fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639916]  fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.640460] >fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.640872]                    ^
[   16.640907]  fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.641164]  fff00000c5733480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.641240] ==================================================================
[   16.630100] ==================================================================
[   16.630144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.630219] Write of size 1 at addr fff00000c5733378 by task kunit_try_catch/137
[   16.630269] 
[   16.630297] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.630376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.630401] Hardware name: linux,dummy-virt (DT)
[   16.630430] Call trace:
[   16.630450]  show_stack+0x20/0x38 (C)
[   16.630497]  dump_stack_lvl+0x8c/0xd0
[   16.630543]  print_report+0x118/0x608
[   16.630602]  kasan_report+0xdc/0x128
[   16.630646]  __asan_report_store1_noabort+0x20/0x30
[   16.630694]  kmalloc_oob_right+0x538/0x660
[   16.630747]  kunit_try_run_case+0x170/0x3f0
[   16.630794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.630845]  kthread+0x328/0x630
[   16.630885]  ret_from_fork+0x10/0x20
[   16.630933] 
[   16.631129] Allocated by task 137:
[   16.631163]  kasan_save_stack+0x3c/0x68
[   16.631207]  kasan_save_track+0x20/0x40
[   16.631243]  kasan_save_alloc_info+0x40/0x58
[   16.631281]  __kasan_kmalloc+0xd4/0xd8
[   16.631316]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.631354]  kmalloc_oob_right+0xb0/0x660
[   16.631388]  kunit_try_run_case+0x170/0x3f0
[   16.631424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.631466]  kthread+0x328/0x630
[   16.631497]  ret_from_fork+0x10/0x20
[   16.631530] 
[   16.631548] The buggy address belongs to the object at fff00000c5733300
[   16.631548]  which belongs to the cache kmalloc-128 of size 128
[   16.631617] The buggy address is located 5 bytes to the right of
[   16.631617]  allocated 115-byte region [fff00000c5733300, fff00000c5733373)
[   16.631680] 
[   16.631699] The buggy address belongs to the physical page:
[   16.631762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   16.631851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.631986] page_type: f5(slab)
[   16.632053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.632129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.632169] page dumped because: kasan: bad access detected
[   16.632199] 
[   16.632233] Memory state around the buggy address:
[   16.632282]  fff00000c5733200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.632325]  fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.632838] >fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.632973]                                                                 ^
[   16.633022]  fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.633064]  fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.633101] ==================================================================
[   16.622561] ==================================================================
[   16.623046] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.623891] Write of size 1 at addr fff00000c5733373 by task kunit_try_catch/137
[   16.623998] 
[   16.624814] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   16.624957] Tainted: [N]=TEST
[   16.624989] Hardware name: linux,dummy-virt (DT)
[   16.625209] Call trace:
[   16.625396]  show_stack+0x20/0x38 (C)
[   16.625549]  dump_stack_lvl+0x8c/0xd0
[   16.625624]  print_report+0x118/0x608
[   16.625674]  kasan_report+0xdc/0x128
[   16.625719]  __asan_report_store1_noabort+0x20/0x30
[   16.625767]  kmalloc_oob_right+0x5a4/0x660
[   16.625812]  kunit_try_run_case+0x170/0x3f0
[   16.625863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.625915]  kthread+0x328/0x630
[   16.625958]  ret_from_fork+0x10/0x20
[   16.626117] 
[   16.626155] Allocated by task 137:
[   16.626269]  kasan_save_stack+0x3c/0x68
[   16.626332]  kasan_save_track+0x20/0x40
[   16.626370]  kasan_save_alloc_info+0x40/0x58
[   16.626409]  __kasan_kmalloc+0xd4/0xd8
[   16.626444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.626484]  kmalloc_oob_right+0xb0/0x660
[   16.626519]  kunit_try_run_case+0x170/0x3f0
[   16.626556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.626609]  kthread+0x328/0x630
[   16.626641]  ret_from_fork+0x10/0x20
[   16.626694] 
[   16.626753] The buggy address belongs to the object at fff00000c5733300
[   16.626753]  which belongs to the cache kmalloc-128 of size 128
[   16.626847] The buggy address is located 0 bytes to the right of
[   16.626847]  allocated 115-byte region [fff00000c5733300, fff00000c5733373)
[   16.626915] 
[   16.626994] The buggy address belongs to the physical page:
[   16.627192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   16.627460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.627761] page_type: f5(slab)
[   16.628057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.628118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.628228] page dumped because: kasan: bad access detected
[   16.628267] 
[   16.628292] Memory state around the buggy address:
[   16.628511]  fff00000c5733200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.628590]  fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.628645] >fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.628700]                                                              ^
[   16.628784]  fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.628828]  fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.628890] ==================================================================

[   10.864872] ==================================================================
[   10.865396] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.865944] Read of size 1 at addr ffff88810339bd80 by task kunit_try_catch/153
[   10.866428] 
[   10.866538] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.866583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.866594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.866616] Call Trace:
[   10.866629]  <TASK>
[   10.866647]  dump_stack_lvl+0x73/0xb0
[   10.866676]  print_report+0xd1/0x650
[   10.866698]  ? __virt_addr_valid+0x1db/0x2d0
[   10.866721]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.866741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.866762]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.866782]  kasan_report+0x141/0x180
[   10.866803]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.866827]  __asan_report_load1_noabort+0x18/0x20
[   10.866850]  kmalloc_oob_right+0x68a/0x7f0
[   10.866871]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.866892]  ? __schedule+0x10cc/0x2b60
[   10.866913]  ? __pfx_read_tsc+0x10/0x10
[   10.866933]  ? ktime_get_ts64+0x86/0x230
[   10.866956]  kunit_try_run_case+0x1a5/0x480
[   10.866979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.867000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.867033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.867054]  ? __kthread_parkme+0x82/0x180
[   10.867074]  ? preempt_count_sub+0x50/0x80
[   10.867097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.867120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.867141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.867164]  kthread+0x337/0x6f0
[   10.867183]  ? trace_preempt_on+0x20/0xc0
[   10.867208]  ? __pfx_kthread+0x10/0x10
[   10.867229]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.867249]  ? calculate_sigpending+0x7b/0xa0
[   10.867272]  ? __pfx_kthread+0x10/0x10
[   10.867292]  ret_from_fork+0x116/0x1d0
[   10.867309]  ? __pfx_kthread+0x10/0x10
[   10.867328]  ret_from_fork_asm+0x1a/0x30
[   10.867358]  </TASK>
[   10.867370] 
[   10.873610] Allocated by task 153:
[   10.873795]  kasan_save_stack+0x45/0x70
[   10.873992]  kasan_save_track+0x18/0x40
[   10.874184]  kasan_save_alloc_info+0x3b/0x50
[   10.874381]  __kasan_kmalloc+0xb7/0xc0
[   10.874513]  __kmalloc_cache_noprof+0x189/0x420
[   10.874729]  kmalloc_oob_right+0xa9/0x7f0
[   10.874928]  kunit_try_run_case+0x1a5/0x480
[   10.875145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.875397]  kthread+0x337/0x6f0
[   10.875553]  ret_from_fork+0x116/0x1d0
[   10.875721]  ret_from_fork_asm+0x1a/0x30
[   10.875889] 
[   10.875983] The buggy address belongs to the object at ffff88810339bd00
[   10.875983]  which belongs to the cache kmalloc-128 of size 128
[   10.876363] The buggy address is located 13 bytes to the right of
[   10.876363]  allocated 115-byte region [ffff88810339bd00, ffff88810339bd73)
[   10.876969] 
[   10.877062] The buggy address belongs to the physical page:
[   10.877265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b
[   10.877592] flags: 0x200000000000000(node=0|zone=2)
[   10.877766] page_type: f5(slab)
[   10.877881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.878111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.878324] page dumped because: kasan: bad access detected
[   10.878564] 
[   10.878665] Memory state around the buggy address:
[   10.878882]  ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.879197]  ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.879505] >ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.879908]                    ^
[   10.880031]  ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.880242]  ffff88810339be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.880548] ==================================================================
[   10.812395] ==================================================================
[   10.813015] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.814050] Write of size 1 at addr ffff88810339bd73 by task kunit_try_catch/153
[   10.814447] 
[   10.815498] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.815912] Tainted: [N]=TEST
[   10.815947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.816174] Call Trace:
[   10.816241]  <TASK>
[   10.816394]  dump_stack_lvl+0x73/0xb0
[   10.816479]  print_report+0xd1/0x650
[   10.816507]  ? __virt_addr_valid+0x1db/0x2d0
[   10.816532]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.816552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.816573]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.816594]  kasan_report+0x141/0x180
[   10.816615]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.816727]  __asan_report_store1_noabort+0x1b/0x30
[   10.816752]  kmalloc_oob_right+0x6f0/0x7f0
[   10.816774]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.816796]  ? __schedule+0x10cc/0x2b60
[   10.816818]  ? __pfx_read_tsc+0x10/0x10
[   10.816839]  ? ktime_get_ts64+0x86/0x230
[   10.816864]  kunit_try_run_case+0x1a5/0x480
[   10.816889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.816910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.816933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.816954]  ? __kthread_parkme+0x82/0x180
[   10.816975]  ? preempt_count_sub+0x50/0x80
[   10.816999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.817032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.817054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.817075]  kthread+0x337/0x6f0
[   10.817093]  ? trace_preempt_on+0x20/0xc0
[   10.817116]  ? __pfx_kthread+0x10/0x10
[   10.817136]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.817155]  ? calculate_sigpending+0x7b/0xa0
[   10.817178]  ? __pfx_kthread+0x10/0x10
[   10.817198]  ret_from_fork+0x116/0x1d0
[   10.817215]  ? __pfx_kthread+0x10/0x10
[   10.817234]  ret_from_fork_asm+0x1a/0x30
[   10.817295]  </TASK>
[   10.817360] 
[   10.825178] Allocated by task 153:
[   10.825530]  kasan_save_stack+0x45/0x70
[   10.826174]  kasan_save_track+0x18/0x40
[   10.826347]  kasan_save_alloc_info+0x3b/0x50
[   10.826497]  __kasan_kmalloc+0xb7/0xc0
[   10.826707]  __kmalloc_cache_noprof+0x189/0x420
[   10.826942]  kmalloc_oob_right+0xa9/0x7f0
[   10.827174]  kunit_try_run_case+0x1a5/0x480
[   10.827390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.827829]  kthread+0x337/0x6f0
[   10.828262]  ret_from_fork+0x116/0x1d0
[   10.828926]  ret_from_fork_asm+0x1a/0x30
[   10.829278] 
[   10.829570] The buggy address belongs to the object at ffff88810339bd00
[   10.829570]  which belongs to the cache kmalloc-128 of size 128
[   10.830530] The buggy address is located 0 bytes to the right of
[   10.830530]  allocated 115-byte region [ffff88810339bd00, ffff88810339bd73)
[   10.831476] 
[   10.831650] The buggy address belongs to the physical page:
[   10.832334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b
[   10.833067] flags: 0x200000000000000(node=0|zone=2)
[   10.833970] page_type: f5(slab)
[   10.834641] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.835369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.835780] page dumped because: kasan: bad access detected
[   10.836403] 
[   10.836529] Memory state around the buggy address:
[   10.837435]  ffff88810339bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.837745]  ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.838295] >ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.838888]                                                              ^
[   10.839329]  ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.839639]  ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.840156] ==================================================================
[   10.843119] ==================================================================
[   10.843614] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.844054] Write of size 1 at addr ffff88810339bd78 by task kunit_try_catch/153
[   10.844416] 
[   10.844516] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.844757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.844773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.844795] Call Trace:
[   10.844837]  <TASK>
[   10.844918]  dump_stack_lvl+0x73/0xb0
[   10.844950]  print_report+0xd1/0x650
[   10.844972]  ? __virt_addr_valid+0x1db/0x2d0
[   10.845015]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.845048]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.845084]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.845104]  kasan_report+0x141/0x180
[   10.845126]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.845256]  __asan_report_store1_noabort+0x1b/0x30
[   10.845278]  kmalloc_oob_right+0x6bd/0x7f0
[   10.845300]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.845321]  ? __schedule+0x10cc/0x2b60
[   10.845342]  ? __pfx_read_tsc+0x10/0x10
[   10.845362]  ? ktime_get_ts64+0x86/0x230
[   10.845385]  kunit_try_run_case+0x1a5/0x480
[   10.845409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.845429]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.845450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.845472]  ? __kthread_parkme+0x82/0x180
[   10.845491]  ? preempt_count_sub+0x50/0x80
[   10.845513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.845535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.845556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.845578]  kthread+0x337/0x6f0
[   10.845595]  ? trace_preempt_on+0x20/0xc0
[   10.845618]  ? __pfx_kthread+0x10/0x10
[   10.845714]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.845739]  ? calculate_sigpending+0x7b/0xa0
[   10.845765]  ? __pfx_kthread+0x10/0x10
[   10.845787]  ret_from_fork+0x116/0x1d0
[   10.845805]  ? __pfx_kthread+0x10/0x10
[   10.845824]  ret_from_fork_asm+0x1a/0x30
[   10.845855]  </TASK>
[   10.845866] 
[   10.854134] Allocated by task 153:
[   10.854341]  kasan_save_stack+0x45/0x70
[   10.854563]  kasan_save_track+0x18/0x40
[   10.854837]  kasan_save_alloc_info+0x3b/0x50
[   10.855003]  __kasan_kmalloc+0xb7/0xc0
[   10.855142]  __kmalloc_cache_noprof+0x189/0x420
[   10.855415]  kmalloc_oob_right+0xa9/0x7f0
[   10.855740]  kunit_try_run_case+0x1a5/0x480
[   10.855963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.856331]  kthread+0x337/0x6f0
[   10.856514]  ret_from_fork+0x116/0x1d0
[   10.856730]  ret_from_fork_asm+0x1a/0x30
[   10.856865] 
[   10.857040] The buggy address belongs to the object at ffff88810339bd00
[   10.857040]  which belongs to the cache kmalloc-128 of size 128
[   10.857698] The buggy address is located 5 bytes to the right of
[   10.857698]  allocated 115-byte region [ffff88810339bd00, ffff88810339bd73)
[   10.858201] 
[   10.858273] The buggy address belongs to the physical page:
[   10.858525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b
[   10.859006] flags: 0x200000000000000(node=0|zone=2)
[   10.859283] page_type: f5(slab)
[   10.859429] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.859715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.860305] page dumped because: kasan: bad access detected
[   10.860651] 
[   10.860748] Memory state around the buggy address:
[   10.861291]  ffff88810339bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.861637]  ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.861994] >ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.862367]                                                                 ^
[   10.862575]  ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.863119]  ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.863553] ==================================================================