Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.952979] ==================================================================
[   17.953335] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.954410] Write of size 1 at addr fff00000c5cbb773 by task kunit_try_catch/136
[   17.954537] 
[   17.956117] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT 
[   17.956696] Tainted: [N]=TEST
[   17.956729] Hardware name: linux,dummy-virt (DT)
[   17.957416] Call trace:
[   17.957632]  show_stack+0x20/0x38 (C)
[   17.957815]  dump_stack_lvl+0x8c/0xd0
[   17.958426]  print_report+0x118/0x608
[   17.958588]  kasan_report+0xdc/0x128
[   17.958677]  __asan_report_store1_noabort+0x20/0x30
[   17.958868]  kmalloc_oob_right+0x5a4/0x660
[   17.958939]  kunit_try_run_case+0x170/0x3f0
[   17.958990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959041]  kthread+0x328/0x630
[   17.959084]  ret_from_fork+0x10/0x20
[   17.959240] 
[   17.959291] Allocated by task 136:
[   17.959439]  kasan_save_stack+0x3c/0x68
[   17.959505]  kasan_save_track+0x20/0x40
[   17.959542]  kasan_save_alloc_info+0x40/0x58
[   17.959580]  __kasan_kmalloc+0xd4/0xd8
[   17.959616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.959655]  kmalloc_oob_right+0xb0/0x660
[   17.959689]  kunit_try_run_case+0x170/0x3f0
[   17.959725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959767]  kthread+0x328/0x630
[   17.959874]  ret_from_fork+0x10/0x20
[   17.960020] 
[   17.960288] The buggy address belongs to the object at fff00000c5cbb700
[   17.960288]  which belongs to the cache kmalloc-128 of size 128
[   17.962769] The buggy address is located 0 bytes to the right of
[   17.962769]  allocated 115-byte region [fff00000c5cbb700, fff00000c5cbb773)
[   17.962848] 
[   17.962953] The buggy address belongs to the physical page:
[   17.963156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   17.963426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.963705] page_type: f5(slab)
[   17.964020] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.964080] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.964181] page dumped because: kasan: bad access detected
[   17.964221] 
[   17.964349] Memory state around the buggy address:
[   17.964677]  fff00000c5cbb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.964753]  fff00000c5cbb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.964816] >fff00000c5cbb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.964902]                                                              ^
[   17.965039]  fff00000c5cbb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.965108]  fff00000c5cbb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.965194] ==================================================================
[   17.966692] ==================================================================
[   17.966730] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.966788] Write of size 1 at addr fff00000c5cbb778 by task kunit_try_catch/136
[   17.966839] 
[   17.966883] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.966961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.966986] Hardware name: linux,dummy-virt (DT)
[   17.967016] Call trace:
[   17.967037]  show_stack+0x20/0x38 (C)
[   17.967219]  dump_stack_lvl+0x8c/0xd0
[   17.967336]  print_report+0x118/0x608
[   17.967415]  kasan_report+0xdc/0x128
[   17.967575]  __asan_report_store1_noabort+0x20/0x30
[   17.967658]  kmalloc_oob_right+0x538/0x660
[   17.967703]  kunit_try_run_case+0x170/0x3f0
[   17.967749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.967800]  kthread+0x328/0x630
[   17.967840]  ret_from_fork+0x10/0x20
[   17.967896] 
[   17.967914] Allocated by task 136:
[   17.967940]  kasan_save_stack+0x3c/0x68
[   17.967979]  kasan_save_track+0x20/0x40
[   17.968320]  kasan_save_alloc_info+0x40/0x58
[   17.968410]  __kasan_kmalloc+0xd4/0xd8
[   17.968563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.968647]  kmalloc_oob_right+0xb0/0x660
[   17.968720]  kunit_try_run_case+0x170/0x3f0
[   17.968795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.968837]  kthread+0x328/0x630
[   17.968877]  ret_from_fork+0x10/0x20
[   17.968911] 
[   17.968929] The buggy address belongs to the object at fff00000c5cbb700
[   17.968929]  which belongs to the cache kmalloc-128 of size 128
[   17.968982] The buggy address is located 5 bytes to the right of
[   17.968982]  allocated 115-byte region [fff00000c5cbb700, fff00000c5cbb773)
[   17.969175] 
[   17.969210] The buggy address belongs to the physical page:
[   17.969282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   17.969407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.969510] page_type: f5(slab)
[   17.969631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.969718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.969814] page dumped because: kasan: bad access detected
[   17.969845] 
[   17.969870] Memory state around the buggy address:
[   17.969917]  fff00000c5cbb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.970102]  fff00000c5cbb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970184] >fff00000c5cbb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.970325]                                                                 ^
[   17.970395]  fff00000c5cbb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970441]  fff00000c5cbb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970500] ==================================================================
[   17.971387] ==================================================================
[   17.971475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.971564] Read of size 1 at addr fff00000c5cbb780 by task kunit_try_catch/136
[   17.971630] 
[   17.971677] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.971772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.971798] Hardware name: linux,dummy-virt (DT)
[   17.971827] Call trace:
[   17.971853]  show_stack+0x20/0x38 (C)
[   17.971912]  dump_stack_lvl+0x8c/0xd0
[   17.972181]  print_report+0x118/0x608
[   17.972227]  kasan_report+0xdc/0x128
[   17.972314]  __asan_report_load1_noabort+0x20/0x30
[   17.972401]  kmalloc_oob_right+0x5d0/0x660
[   17.972457]  kunit_try_run_case+0x170/0x3f0
[   17.972509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.972561]  kthread+0x328/0x630
[   17.972618]  ret_from_fork+0x10/0x20
[   17.972709] 
[   17.972753] Allocated by task 136:
[   17.972779]  kasan_save_stack+0x3c/0x68
[   17.972898]  kasan_save_track+0x20/0x40
[   17.972955]  kasan_save_alloc_info+0x40/0x58
[   17.972994]  __kasan_kmalloc+0xd4/0xd8
[   17.973047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.973112]  kmalloc_oob_right+0xb0/0x660
[   17.973254]  kunit_try_run_case+0x170/0x3f0
[   17.973296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.973368]  kthread+0x328/0x630
[   17.973416]  ret_from_fork+0x10/0x20
[   17.973527] 
[   17.973546] The buggy address belongs to the object at fff00000c5cbb700
[   17.973546]  which belongs to the cache kmalloc-128 of size 128
[   17.973615] The buggy address is located 13 bytes to the right of
[   17.973615]  allocated 115-byte region [fff00000c5cbb700, fff00000c5cbb773)
[   17.973724] 
[   17.973743] The buggy address belongs to the physical page:
[   17.973770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cbb
[   17.973919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.973982] page_type: f5(slab)
[   17.974018] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.974087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.974189] page dumped because: kasan: bad access detected
[   17.974218] 
[   17.974235] Memory state around the buggy address:
[   17.974264]  fff00000c5cbb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.974305]  fff00000c5cbb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.974344] >fff00000c5cbb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.974381]                    ^
[   17.974407]  fff00000c5cbb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.974458]  fff00000c5cbb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.974496] ==================================================================

[   10.839792] ==================================================================
[   10.840916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.841868] Write of size 1 at addr ffff8881031a0273 by task kunit_try_catch/154
[   10.842818] 
[   10.844006] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.844366] Tainted: [N]=TEST
[   10.844399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.844732] Call Trace:
[   10.844799]  <TASK>
[   10.844935]  dump_stack_lvl+0x73/0xb0
[   10.845020]  print_report+0xd1/0x650
[   10.845049]  ? __virt_addr_valid+0x1db/0x2d0
[   10.845073]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.845116]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845137]  kasan_report+0x141/0x180
[   10.845158]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845184]  __asan_report_store1_noabort+0x1b/0x30
[   10.845204]  kmalloc_oob_right+0x6f0/0x7f0
[   10.845225]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.845247]  ? __schedule+0x10cc/0x2b60
[   10.845269]  ? __pfx_read_tsc+0x10/0x10
[   10.845290]  ? ktime_get_ts64+0x86/0x230
[   10.845316]  kunit_try_run_case+0x1a5/0x480
[   10.845342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.845364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.845396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.845420]  ? __kthread_parkme+0x82/0x180
[   10.845442]  ? preempt_count_sub+0x50/0x80
[   10.845477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.845499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.845521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.845543]  kthread+0x337/0x6f0
[   10.845562]  ? trace_preempt_on+0x20/0xc0
[   10.845586]  ? __pfx_kthread+0x10/0x10
[   10.845605]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.845625]  ? calculate_sigpending+0x7b/0xa0
[   10.845650]  ? __pfx_kthread+0x10/0x10
[   10.845671]  ret_from_fork+0x116/0x1d0
[   10.845689]  ? __pfx_kthread+0x10/0x10
[   10.845708]  ret_from_fork_asm+0x1a/0x30
[   10.845760]  </TASK>
[   10.845823] 
[   10.856262] Allocated by task 154:
[   10.856657]  kasan_save_stack+0x45/0x70
[   10.856960]  kasan_save_track+0x18/0x40
[   10.857169]  kasan_save_alloc_info+0x3b/0x50
[   10.857586]  __kasan_kmalloc+0xb7/0xc0
[   10.857814]  __kmalloc_cache_noprof+0x189/0x420
[   10.858018]  kmalloc_oob_right+0xa9/0x7f0
[   10.858156]  kunit_try_run_case+0x1a5/0x480
[   10.858299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.858641]  kthread+0x337/0x6f0
[   10.858851]  ret_from_fork+0x116/0x1d0
[   10.859055]  ret_from_fork_asm+0x1a/0x30
[   10.859333] 
[   10.859549] The buggy address belongs to the object at ffff8881031a0200
[   10.859549]  which belongs to the cache kmalloc-128 of size 128
[   10.860116] The buggy address is located 0 bytes to the right of
[   10.860116]  allocated 115-byte region [ffff8881031a0200, ffff8881031a0273)
[   10.861058] 
[   10.861297] The buggy address belongs to the physical page:
[   10.863380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   10.864015] flags: 0x200000000000000(node=0|zone=2)
[   10.864710] page_type: f5(slab)
[   10.865325] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.865854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.866233] page dumped because: kasan: bad access detected
[   10.866782] 
[   10.866965] Memory state around the buggy address:
[   10.867548]  ffff8881031a0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.867987]  ffff8881031a0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.868423] >ffff8881031a0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.868764]                                                              ^
[   10.869119]  ffff8881031a0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.869519]  ffff8881031a0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.869979] ==================================================================
[   10.871322] ==================================================================
[   10.871712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.872324] Write of size 1 at addr ffff8881031a0278 by task kunit_try_catch/154
[   10.872709] 
[   10.872827] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.872869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.872881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.872912] Call Trace:
[   10.872924]  <TASK>
[   10.872940]  dump_stack_lvl+0x73/0xb0
[   10.872967]  print_report+0xd1/0x650
[   10.873002]  ? __virt_addr_valid+0x1db/0x2d0
[   10.873023]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.873043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.873065]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.873086]  kasan_report+0x141/0x180
[   10.873117]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.873143]  __asan_report_store1_noabort+0x1b/0x30
[   10.873163]  kmalloc_oob_right+0x6bd/0x7f0
[   10.873196]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.873271]  ? __schedule+0x10cc/0x2b60
[   10.873294]  ? __pfx_read_tsc+0x10/0x10
[   10.873314]  ? ktime_get_ts64+0x86/0x230
[   10.873337]  kunit_try_run_case+0x1a5/0x480
[   10.873361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.873388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.873409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.873432]  ? __kthread_parkme+0x82/0x180
[   10.873459]  ? preempt_count_sub+0x50/0x80
[   10.873482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.873505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.873527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.873549]  kthread+0x337/0x6f0
[   10.873568]  ? trace_preempt_on+0x20/0xc0
[   10.873590]  ? __pfx_kthread+0x10/0x10
[   10.873610]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.873630]  ? calculate_sigpending+0x7b/0xa0
[   10.873653]  ? __pfx_kthread+0x10/0x10
[   10.873674]  ret_from_fork+0x116/0x1d0
[   10.873691]  ? __pfx_kthread+0x10/0x10
[   10.873711]  ret_from_fork_asm+0x1a/0x30
[   10.873741]  </TASK>
[   10.873752] 
[   10.882232] Allocated by task 154:
[   10.882376]  kasan_save_stack+0x45/0x70
[   10.882589]  kasan_save_track+0x18/0x40
[   10.882997]  kasan_save_alloc_info+0x3b/0x50
[   10.883284]  __kasan_kmalloc+0xb7/0xc0
[   10.883480]  __kmalloc_cache_noprof+0x189/0x420
[   10.883743]  kmalloc_oob_right+0xa9/0x7f0
[   10.883883]  kunit_try_run_case+0x1a5/0x480
[   10.884027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.884196]  kthread+0x337/0x6f0
[   10.884327]  ret_from_fork+0x116/0x1d0
[   10.884722]  ret_from_fork_asm+0x1a/0x30
[   10.885008] 
[   10.885139] The buggy address belongs to the object at ffff8881031a0200
[   10.885139]  which belongs to the cache kmalloc-128 of size 128
[   10.886050] The buggy address is located 5 bytes to the right of
[   10.886050]  allocated 115-byte region [ffff8881031a0200, ffff8881031a0273)
[   10.886619] 
[   10.886696] The buggy address belongs to the physical page:
[   10.886960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   10.887371] flags: 0x200000000000000(node=0|zone=2)
[   10.888117] page_type: f5(slab)
[   10.888510] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.888921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.889430] page dumped because: kasan: bad access detected
[   10.889626] 
[   10.889714] Memory state around the buggy address:
[   10.890068]  ffff8881031a0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.890504]  ffff8881031a0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.890837] >ffff8881031a0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.891283]                                                                 ^
[   10.891671]  ffff8881031a0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.891991]  ffff8881031a0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.892492] ==================================================================
[   10.893060] ==================================================================
[   10.893543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.893982] Read of size 1 at addr ffff8881031a0280 by task kunit_try_catch/154
[   10.894410] 
[   10.894534] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   10.894577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.894589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.894609] Call Trace:
[   10.894624]  <TASK>
[   10.894639]  dump_stack_lvl+0x73/0xb0
[   10.894665]  print_report+0xd1/0x650
[   10.894686]  ? __virt_addr_valid+0x1db/0x2d0
[   10.894707]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.894748]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894769]  kasan_report+0x141/0x180
[   10.894790]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.894816]  __asan_report_load1_noabort+0x18/0x20
[   10.894839]  kmalloc_oob_right+0x68a/0x7f0
[   10.894860]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.894881]  ? __schedule+0x10cc/0x2b60
[   10.894902]  ? __pfx_read_tsc+0x10/0x10
[   10.894922]  ? ktime_get_ts64+0x86/0x230
[   10.894944]  kunit_try_run_case+0x1a5/0x480
[   10.894967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.894988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.895010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.895031]  ? __kthread_parkme+0x82/0x180
[   10.895090]  ? preempt_count_sub+0x50/0x80
[   10.895113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.895135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.895169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.895190]  kthread+0x337/0x6f0
[   10.895209]  ? trace_preempt_on+0x20/0xc0
[   10.895231]  ? __pfx_kthread+0x10/0x10
[   10.895251]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.895271]  ? calculate_sigpending+0x7b/0xa0
[   10.895293]  ? __pfx_kthread+0x10/0x10
[   10.895314]  ret_from_fork+0x116/0x1d0
[   10.895331]  ? __pfx_kthread+0x10/0x10
[   10.895351]  ret_from_fork_asm+0x1a/0x30
[   10.895380]  </TASK>
[   10.895399] 
[   10.906083] Allocated by task 154:
[   10.906571]  kasan_save_stack+0x45/0x70
[   10.907073]  kasan_save_track+0x18/0x40
[   10.907521]  kasan_save_alloc_info+0x3b/0x50
[   10.907997]  __kasan_kmalloc+0xb7/0xc0
[   10.908373]  __kmalloc_cache_noprof+0x189/0x420
[   10.908616]  kmalloc_oob_right+0xa9/0x7f0
[   10.908915]  kunit_try_run_case+0x1a5/0x480
[   10.909667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.909932]  kthread+0x337/0x6f0
[   10.910091]  ret_from_fork+0x116/0x1d0
[   10.910611]  ret_from_fork_asm+0x1a/0x30
[   10.910895] 
[   10.911131] The buggy address belongs to the object at ffff8881031a0200
[   10.911131]  which belongs to the cache kmalloc-128 of size 128
[   10.912017] The buggy address is located 13 bytes to the right of
[   10.912017]  allocated 115-byte region [ffff8881031a0200, ffff8881031a0273)
[   10.913067] 
[   10.913366] The buggy address belongs to the physical page:
[   10.913647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   10.914184] flags: 0x200000000000000(node=0|zone=2)
[   10.914402] page_type: f5(slab)
[   10.914878] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.915321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.915855] page dumped because: kasan: bad access detected
[   10.916103] 
[   10.916387] Memory state around the buggy address:
[   10.916614]  ffff8881031a0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.917221]  ffff8881031a0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.918081] >ffff8881031a0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.918532]                    ^
[   10.918842]  ffff8881031a0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.919504]  ffff8881031a0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.920191] ==================================================================