Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.431535] ==================================================================
[   16.431863] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.432758] Write of size 1 at addr fff00000c652da73 by task kunit_try_catch/136
[   16.432864] 
[   16.433662] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   16.433804] Tainted: [N]=TEST
[   16.433837] Hardware name: linux,dummy-virt (DT)
[   16.434077] Call trace:
[   16.434248]  show_stack+0x20/0x38 (C)
[   16.434379]  dump_stack_lvl+0x8c/0xd0
[   16.434441]  print_report+0x118/0x608
[   16.434489]  kasan_report+0xdc/0x128
[   16.434535]  __asan_report_store1_noabort+0x20/0x30
[   16.434583]  kmalloc_oob_right+0x5a4/0x660
[   16.434628]  kunit_try_run_case+0x170/0x3f0
[   16.434678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.434729]  kthread+0x328/0x630
[   16.434772]  ret_from_fork+0x10/0x20
[   16.434923] 
[   16.434962] Allocated by task 136:
[   16.435109]  kasan_save_stack+0x3c/0x68
[   16.435177]  kasan_save_track+0x20/0x40
[   16.435214]  kasan_save_alloc_info+0x40/0x58
[   16.435253]  __kasan_kmalloc+0xd4/0xd8
[   16.435288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.435327]  kmalloc_oob_right+0xb0/0x660
[   16.435362]  kunit_try_run_case+0x170/0x3f0
[   16.435398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.435440]  kthread+0x328/0x630
[   16.435471]  ret_from_fork+0x10/0x20
[   16.435523] 
[   16.435586] The buggy address belongs to the object at fff00000c652da00
[   16.435586]  which belongs to the cache kmalloc-128 of size 128
[   16.435677] The buggy address is located 0 bytes to the right of
[   16.435677]  allocated 115-byte region [fff00000c652da00, fff00000c652da73)
[   16.435741] 
[   16.435820] The buggy address belongs to the physical page:
[   16.436015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d
[   16.436298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.436597] page_type: f5(slab)
[   16.436945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.437020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.437166] page dumped because: kasan: bad access detected
[   16.437208] 
[   16.437234] Memory state around the buggy address:
[   16.437449]  fff00000c652d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.437513]  fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.437566] >fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.437619]                                                              ^
[   16.437699]  fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.437740]  fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.437800] ==================================================================
[   16.443024] ==================================================================
[   16.443133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.443212] Read of size 1 at addr fff00000c652da80 by task kunit_try_catch/136
[   16.443297] 
[   16.443344] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.443460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.443487] Hardware name: linux,dummy-virt (DT)
[   16.443517] Call trace:
[   16.443568]  show_stack+0x20/0x38 (C)
[   16.443640]  dump_stack_lvl+0x8c/0xd0
[   16.443687]  print_report+0x118/0x608
[   16.443731]  kasan_report+0xdc/0x128
[   16.443946]  __asan_report_load1_noabort+0x20/0x30
[   16.444007]  kmalloc_oob_right+0x5d0/0x660
[   16.444064]  kunit_try_run_case+0x170/0x3f0
[   16.444174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.444226]  kthread+0x328/0x630
[   16.444275]  ret_from_fork+0x10/0x20
[   16.444321] 
[   16.444339] Allocated by task 136:
[   16.444570]  kasan_save_stack+0x3c/0x68
[   16.444666]  kasan_save_track+0x20/0x40
[   16.444808]  kasan_save_alloc_info+0x40/0x58
[   16.444878]  __kasan_kmalloc+0xd4/0xd8
[   16.444987]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.445054]  kmalloc_oob_right+0xb0/0x660
[   16.445089]  kunit_try_run_case+0x170/0x3f0
[   16.445247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.445294]  kthread+0x328/0x630
[   16.445325]  ret_from_fork+0x10/0x20
[   16.445359] 
[   16.445378] The buggy address belongs to the object at fff00000c652da00
[   16.445378]  which belongs to the cache kmalloc-128 of size 128
[   16.445434] The buggy address is located 13 bytes to the right of
[   16.445434]  allocated 115-byte region [fff00000c652da00, fff00000c652da73)
[   16.445496] 
[   16.445516] The buggy address belongs to the physical page:
[   16.445545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d
[   16.445595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.445642] page_type: f5(slab)
[   16.445678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.445726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.445764] page dumped because: kasan: bad access detected
[   16.445793] 
[   16.445810] Memory state around the buggy address:
[   16.445839]  fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.445959]  fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.446085] >fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.446196]                    ^
[   16.446243]  fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.446492]  fff00000c652db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.446695] ==================================================================
[   16.438358] ==================================================================
[   16.438436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.438501] Write of size 1 at addr fff00000c652da78 by task kunit_try_catch/136
[   16.438549] 
[   16.438613] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   16.438692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.438792] Hardware name: linux,dummy-virt (DT)
[   16.438829] Call trace:
[   16.438856]  show_stack+0x20/0x38 (C)
[   16.439007]  dump_stack_lvl+0x8c/0xd0
[   16.439122]  print_report+0x118/0x608
[   16.439228]  kasan_report+0xdc/0x128
[   16.439273]  __asan_report_store1_noabort+0x20/0x30
[   16.439320]  kmalloc_oob_right+0x538/0x660
[   16.439381]  kunit_try_run_case+0x170/0x3f0
[   16.439427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.439477]  kthread+0x328/0x630
[   16.439517]  ret_from_fork+0x10/0x20
[   16.439728] 
[   16.439754] Allocated by task 136:
[   16.439871]  kasan_save_stack+0x3c/0x68
[   16.439913]  kasan_save_track+0x20/0x40
[   16.439980]  kasan_save_alloc_info+0x40/0x58
[   16.440046]  __kasan_kmalloc+0xd4/0xd8
[   16.440083]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.440513]  kmalloc_oob_right+0xb0/0x660
[   16.440600]  kunit_try_run_case+0x170/0x3f0
[   16.440671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.440723]  kthread+0x328/0x630
[   16.440755]  ret_from_fork+0x10/0x20
[   16.440812] 
[   16.440911] The buggy address belongs to the object at fff00000c652da00
[   16.440911]  which belongs to the cache kmalloc-128 of size 128
[   16.441216] The buggy address is located 5 bytes to the right of
[   16.441216]  allocated 115-byte region [fff00000c652da00, fff00000c652da73)
[   16.441331] 
[   16.441350] The buggy address belongs to the physical page:
[   16.441507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d
[   16.441762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.441822] page_type: f5(slab)
[   16.441868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.441926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.441964] page dumped because: kasan: bad access detected
[   16.442003] 
[   16.442021] Memory state around the buggy address:
[   16.442060]  fff00000c652d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.442102]  fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.442142] >fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.442187]                                                                 ^
[   16.442231]  fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.442272]  fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.442309] ==================================================================

[   10.739055] ==================================================================
[   10.740284] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.741921] Write of size 1 at addr ffff8881029db173 by task kunit_try_catch/154
[   10.742275] 
[   10.743251] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.743595] Tainted: [N]=TEST
[   10.743627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.743848] Call Trace:
[   10.743913]  <TASK>
[   10.744073]  dump_stack_lvl+0x73/0xb0
[   10.744201]  print_report+0xd1/0x650
[   10.744230]  ? __virt_addr_valid+0x1db/0x2d0
[   10.744255]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.744276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.744297]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.744339]  kasan_report+0x141/0x180
[   10.744361]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.744418]  __asan_report_store1_noabort+0x1b/0x30
[   10.744439]  kmalloc_oob_right+0x6f0/0x7f0
[   10.744473]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.744495]  ? __schedule+0x10cc/0x2b60
[   10.744517]  ? __pfx_read_tsc+0x10/0x10
[   10.744539]  ? ktime_get_ts64+0x86/0x230
[   10.744565]  kunit_try_run_case+0x1a5/0x480
[   10.744591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.744612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.744635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.744656]  ? __kthread_parkme+0x82/0x180
[   10.744678]  ? preempt_count_sub+0x50/0x80
[   10.744701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.744724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.744745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.744767]  kthread+0x337/0x6f0
[   10.744786]  ? trace_preempt_on+0x20/0xc0
[   10.744809]  ? __pfx_kthread+0x10/0x10
[   10.744829]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.744849]  ? calculate_sigpending+0x7b/0xa0
[   10.744873]  ? __pfx_kthread+0x10/0x10
[   10.744893]  ret_from_fork+0x116/0x1d0
[   10.744911]  ? __pfx_kthread+0x10/0x10
[   10.744930]  ret_from_fork_asm+0x1a/0x30
[   10.744990]  </TASK>
[   10.745062] 
[   10.755804] Allocated by task 154:
[   10.756169]  kasan_save_stack+0x45/0x70
[   10.756526]  kasan_save_track+0x18/0x40
[   10.756693]  kasan_save_alloc_info+0x3b/0x50
[   10.756894]  __kasan_kmalloc+0xb7/0xc0
[   10.757087]  __kmalloc_cache_noprof+0x189/0x420
[   10.757292]  kmalloc_oob_right+0xa9/0x7f0
[   10.757460]  kunit_try_run_case+0x1a5/0x480
[   10.757636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.757883]  kthread+0x337/0x6f0
[   10.758026]  ret_from_fork+0x116/0x1d0
[   10.758206]  ret_from_fork_asm+0x1a/0x30
[   10.758530] 
[   10.758669] The buggy address belongs to the object at ffff8881029db100
[   10.758669]  which belongs to the cache kmalloc-128 of size 128
[   10.759236] The buggy address is located 0 bytes to the right of
[   10.759236]  allocated 115-byte region [ffff8881029db100, ffff8881029db173)
[   10.759784] 
[   10.759984] The buggy address belongs to the physical page:
[   10.760462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   10.760954] flags: 0x200000000000000(node=0|zone=2)
[   10.761598] page_type: f5(slab)
[   10.762067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.762433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.762834] page dumped because: kasan: bad access detected
[   10.763078] 
[   10.763195] Memory state around the buggy address:
[   10.763628]  ffff8881029db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.763988]  ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.764323] >ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.764638]                                                              ^
[   10.764960]  ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.765233]  ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.765603] ==================================================================
[   10.766872] ==================================================================
[   10.767523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.767801] Write of size 1 at addr ffff8881029db178 by task kunit_try_catch/154
[   10.768101] 
[   10.768227] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.768268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.768280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.768299] Call Trace:
[   10.768311]  <TASK>
[   10.768325]  dump_stack_lvl+0x73/0xb0
[   10.768349]  print_report+0xd1/0x650
[   10.768370]  ? __virt_addr_valid+0x1db/0x2d0
[   10.768391]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.768411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.768432]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.768452]  kasan_report+0x141/0x180
[   10.768473]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.768498]  __asan_report_store1_noabort+0x1b/0x30
[   10.768517]  kmalloc_oob_right+0x6bd/0x7f0
[   10.768538]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.768569]  ? __schedule+0x10cc/0x2b60
[   10.768590]  ? __pfx_read_tsc+0x10/0x10
[   10.768610]  ? ktime_get_ts64+0x86/0x230
[   10.768632]  kunit_try_run_case+0x1a5/0x480
[   10.768654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.768675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.768695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.768717]  ? __kthread_parkme+0x82/0x180
[   10.768737]  ? preempt_count_sub+0x50/0x80
[   10.768759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.768781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.768802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.768824]  kthread+0x337/0x6f0
[   10.768842]  ? trace_preempt_on+0x20/0xc0
[   10.768864]  ? __pfx_kthread+0x10/0x10
[   10.768883]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.768903]  ? calculate_sigpending+0x7b/0xa0
[   10.768925]  ? __pfx_kthread+0x10/0x10
[   10.768945]  ret_from_fork+0x116/0x1d0
[   10.768962]  ? __pfx_kthread+0x10/0x10
[   10.768981]  ret_from_fork_asm+0x1a/0x30
[   10.769010]  </TASK>
[   10.769021] 
[   10.775887] Allocated by task 154:
[   10.776016]  kasan_save_stack+0x45/0x70
[   10.776167]  kasan_save_track+0x18/0x40
[   10.776301]  kasan_save_alloc_info+0x3b/0x50
[   10.776457]  __kasan_kmalloc+0xb7/0xc0
[   10.776681]  __kmalloc_cache_noprof+0x189/0x420
[   10.777012]  kmalloc_oob_right+0xa9/0x7f0
[   10.777313]  kunit_try_run_case+0x1a5/0x480
[   10.777476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.777645]  kthread+0x337/0x6f0
[   10.777767]  ret_from_fork+0x116/0x1d0
[   10.777953]  ret_from_fork_asm+0x1a/0x30
[   10.778157] 
[   10.778254] The buggy address belongs to the object at ffff8881029db100
[   10.778254]  which belongs to the cache kmalloc-128 of size 128
[   10.779994] The buggy address is located 5 bytes to the right of
[   10.779994]  allocated 115-byte region [ffff8881029db100, ffff8881029db173)
[   10.780741] 
[   10.780848] The buggy address belongs to the physical page:
[   10.781202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   10.781719] flags: 0x200000000000000(node=0|zone=2)
[   10.781923] page_type: f5(slab)
[   10.782081] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.782654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.783201] page dumped because: kasan: bad access detected
[   10.783469] 
[   10.783542] Memory state around the buggy address:
[   10.783699]  ffff8881029db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.783915]  ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.784140] >ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.784350]                                                                 ^
[   10.784560]  ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.784771]  ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.784981] ==================================================================
[   10.786889] ==================================================================
[   10.787158] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.787462] Read of size 1 at addr ffff8881029db180 by task kunit_try_catch/154
[   10.787817] 
[   10.788423] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.788470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.788482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.788503] Call Trace:
[   10.788517]  <TASK>
[   10.788530]  dump_stack_lvl+0x73/0xb0
[   10.788557]  print_report+0xd1/0x650
[   10.788579]  ? __virt_addr_valid+0x1db/0x2d0
[   10.788600]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.788620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.788641]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.788661]  kasan_report+0x141/0x180
[   10.788681]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.788706]  __asan_report_load1_noabort+0x18/0x20
[   10.788729]  kmalloc_oob_right+0x68a/0x7f0
[   10.788750]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.788771]  ? __schedule+0x10cc/0x2b60
[   10.788791]  ? __pfx_read_tsc+0x10/0x10
[   10.788811]  ? ktime_get_ts64+0x86/0x230
[   10.788834]  kunit_try_run_case+0x1a5/0x480
[   10.788856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.788876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.788897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.788918]  ? __kthread_parkme+0x82/0x180
[   10.788937]  ? preempt_count_sub+0x50/0x80
[   10.788959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.788983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.789005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.789027]  kthread+0x337/0x6f0
[   10.789046]  ? trace_preempt_on+0x20/0xc0
[   10.789068]  ? __pfx_kthread+0x10/0x10
[   10.789087]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.789122]  ? calculate_sigpending+0x7b/0xa0
[   10.789145]  ? __pfx_kthread+0x10/0x10
[   10.789175]  ret_from_fork+0x116/0x1d0
[   10.789193]  ? __pfx_kthread+0x10/0x10
[   10.789213]  ret_from_fork_asm+0x1a/0x30
[   10.789242]  </TASK>
[   10.789252] 
[   10.798216] Allocated by task 154:
[   10.798889]  kasan_save_stack+0x45/0x70
[   10.799089]  kasan_save_track+0x18/0x40
[   10.799300]  kasan_save_alloc_info+0x3b/0x50
[   10.800896]  __kasan_kmalloc+0xb7/0xc0
[   10.801095]  __kmalloc_cache_noprof+0x189/0x420
[   10.801328]  kmalloc_oob_right+0xa9/0x7f0
[   10.801840]  kunit_try_run_case+0x1a5/0x480
[   10.802022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.802474]  kthread+0x337/0x6f0
[   10.802775]  ret_from_fork+0x116/0x1d0
[   10.802964]  ret_from_fork_asm+0x1a/0x30
[   10.803376] 
[   10.803735] The buggy address belongs to the object at ffff8881029db100
[   10.803735]  which belongs to the cache kmalloc-128 of size 128
[   10.804374] The buggy address is located 13 bytes to the right of
[   10.804374]  allocated 115-byte region [ffff8881029db100, ffff8881029db173)
[   10.804926] 
[   10.805015] The buggy address belongs to the physical page:
[   10.805262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   10.805836] flags: 0x200000000000000(node=0|zone=2)
[   10.806032] page_type: f5(slab)
[   10.806522] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.806852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.807295] page dumped because: kasan: bad access detected
[   10.807578] 
[   10.807663] Memory state around the buggy address:
[   10.807863]  ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.808173]  ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.808857] >ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.809159]                    ^
[   10.809327]  ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.809825]  ffff8881029db280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.810263] ==================================================================