Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.250842] ==================================================================
[   19.252298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   19.253776] Write of size 1 at addr fff00000c638da73 by task kunit_try_catch/137
[   19.253884] 
[   19.255330] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   19.256210] Tainted: [N]=TEST
[   19.256347] Hardware name: linux,dummy-virt (DT)
[   19.257850] Call trace:
[   19.258473]  show_stack+0x20/0x38 (C)
[   19.259562]  dump_stack_lvl+0x8c/0xd0
[   19.259653]  print_report+0x118/0x608
[   19.259704]  kasan_report+0xdc/0x128
[   19.259751]  __asan_report_store1_noabort+0x20/0x30
[   19.259803]  kmalloc_oob_right+0x5a4/0x660
[   19.259849]  kunit_try_run_case+0x170/0x3f0
[   19.259901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.259963]  kthread+0x328/0x630
[   19.260022]  ret_from_fork+0x10/0x20
[   19.261482] 
[   19.261647] Allocated by task 137:
[   19.261931]  kasan_save_stack+0x3c/0x68
[   19.262251]  kasan_save_track+0x20/0x40
[   19.262341]  kasan_save_alloc_info+0x40/0x58
[   19.262418]  __kasan_kmalloc+0xd4/0xd8
[   19.262458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.262513]  kmalloc_oob_right+0xb0/0x660
[   19.262560]  kunit_try_run_case+0x170/0x3f0
[   19.262597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.262649]  kthread+0x328/0x630
[   19.262682]  ret_from_fork+0x10/0x20
[   19.262763] 
[   19.262883] The buggy address belongs to the object at fff00000c638da00
[   19.262883]  which belongs to the cache kmalloc-128 of size 128
[   19.262999] The buggy address is located 0 bytes to the right of
[   19.262999]  allocated 115-byte region [fff00000c638da00, fff00000c638da73)
[   19.263092] 
[   19.263231] The buggy address belongs to the physical page:
[   19.263481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d
[   19.263786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.264129] page_type: f5(slab)
[   19.264451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.264516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.264622] page dumped because: kasan: bad access detected
[   19.264662] 
[   19.264687] Memory state around the buggy address:
[   19.264908]  fff00000c638d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.267258]  fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.267339] >fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.267456]                                                              ^
[   19.267606]  fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.267650]  fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.267746] ==================================================================
[   19.274505] ==================================================================
[   19.274550] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.274632] Read of size 1 at addr fff00000c638da80 by task kunit_try_catch/137
[   19.274696] 
[   19.274725] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.274803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.274829] Hardware name: linux,dummy-virt (DT)
[   19.274857] Call trace:
[   19.274877]  show_stack+0x20/0x38 (C)
[   19.274937]  dump_stack_lvl+0x8c/0xd0
[   19.275096]  print_report+0x118/0x608
[   19.275181]  kasan_report+0xdc/0x128
[   19.275228]  __asan_report_load1_noabort+0x20/0x30
[   19.275298]  kmalloc_oob_right+0x5d0/0x660
[   19.275387]  kunit_try_run_case+0x170/0x3f0
[   19.275457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.275531]  kthread+0x328/0x630
[   19.275573]  ret_from_fork+0x10/0x20
[   19.275705] 
[   19.275737] Allocated by task 137:
[   19.275765]  kasan_save_stack+0x3c/0x68
[   19.275844]  kasan_save_track+0x20/0x40
[   19.275910]  kasan_save_alloc_info+0x40/0x58
[   19.275998]  __kasan_kmalloc+0xd4/0xd8
[   19.276124]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.276204]  kmalloc_oob_right+0xb0/0x660
[   19.276279]  kunit_try_run_case+0x170/0x3f0
[   19.276357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.276453]  kthread+0x328/0x630
[   19.276487]  ret_from_fork+0x10/0x20
[   19.276534] 
[   19.276552] The buggy address belongs to the object at fff00000c638da00
[   19.276552]  which belongs to the cache kmalloc-128 of size 128
[   19.276756] The buggy address is located 13 bytes to the right of
[   19.276756]  allocated 115-byte region [fff00000c638da00, fff00000c638da73)
[   19.276987] 
[   19.277030] The buggy address belongs to the physical page:
[   19.277080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d
[   19.277163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.277209] page_type: f5(slab)
[   19.277301] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.277389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.277497] page dumped because: kasan: bad access detected
[   19.277564] 
[   19.277623] Memory state around the buggy address:
[   19.277654]  fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278844]  fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.278922] >fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278960]                    ^
[   19.278987]  fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.279028]  fff00000c638db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.279500] ==================================================================
[   19.270301] ==================================================================
[   19.270343] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.270393] Write of size 1 at addr fff00000c638da78 by task kunit_try_catch/137
[   19.270523] 
[   19.270559] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.270748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.270782] Hardware name: linux,dummy-virt (DT)
[   19.270961] Call trace:
[   19.271154]  show_stack+0x20/0x38 (C)
[   19.271208]  dump_stack_lvl+0x8c/0xd0
[   19.271254]  print_report+0x118/0x608
[   19.271299]  kasan_report+0xdc/0x128
[   19.271345]  __asan_report_store1_noabort+0x20/0x30
[   19.271408]  kmalloc_oob_right+0x538/0x660
[   19.271453]  kunit_try_run_case+0x170/0x3f0
[   19.271504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.271555]  kthread+0x328/0x630
[   19.271597]  ret_from_fork+0x10/0x20
[   19.271645] 
[   19.271662] Allocated by task 137:
[   19.271689]  kasan_save_stack+0x3c/0x68
[   19.271729]  kasan_save_track+0x20/0x40
[   19.271766]  kasan_save_alloc_info+0x40/0x58
[   19.271806]  __kasan_kmalloc+0xd4/0xd8
[   19.271843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.271881]  kmalloc_oob_right+0xb0/0x660
[   19.271916]  kunit_try_run_case+0x170/0x3f0
[   19.271953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.272076]  kthread+0x328/0x630
[   19.272131]  ret_from_fork+0x10/0x20
[   19.272353] 
[   19.272448] The buggy address belongs to the object at fff00000c638da00
[   19.272448]  which belongs to the cache kmalloc-128 of size 128
[   19.272556] The buggy address is located 5 bytes to the right of
[   19.272556]  allocated 115-byte region [fff00000c638da00, fff00000c638da73)
[   19.272696] 
[   19.272753] The buggy address belongs to the physical page:
[   19.272783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d
[   19.272867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.272917] page_type: f5(slab)
[   19.272955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.273005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.273045] page dumped because: kasan: bad access detected
[   19.273083] 
[   19.273268] Memory state around the buggy address:
[   19.273353]  fff00000c638d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.273467]  fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.273572] >fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.273673]                                                                 ^
[   19.273730]  fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.273774]  fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.274093] ==================================================================

[   11.944832] ==================================================================
[   11.945169] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.945525] Write of size 1 at addr ffff88810269aa78 by task kunit_try_catch/153
[   11.945801] 
[   11.945886] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.945936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.945949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.945970] Call Trace:
[   11.945986]  <TASK>
[   11.946002]  dump_stack_lvl+0x73/0xb0
[   11.946029]  print_report+0xd1/0x650
[   11.946067]  ? __virt_addr_valid+0x1db/0x2d0
[   11.946091]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.946111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.946134]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.946156]  kasan_report+0x141/0x180
[   11.946177]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.946204]  __asan_report_store1_noabort+0x1b/0x30
[   11.946229]  kmalloc_oob_right+0x6bd/0x7f0
[   11.946259]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.946284]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.946309]  kunit_try_run_case+0x1a5/0x480
[   11.946334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.946356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.946380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.946403]  ? __kthread_parkme+0x82/0x180
[   11.946423]  ? preempt_count_sub+0x50/0x80
[   11.946447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.946471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.946495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.946520]  kthread+0x337/0x6f0
[   11.946538]  ? trace_preempt_on+0x20/0xc0
[   11.946562]  ? __pfx_kthread+0x10/0x10
[   11.946582]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.946603]  ? calculate_sigpending+0x7b/0xa0
[   11.946628]  ? __pfx_kthread+0x10/0x10
[   11.946650]  ret_from_fork+0x116/0x1d0
[   11.946668]  ? __pfx_kthread+0x10/0x10
[   11.946688]  ret_from_fork_asm+0x1a/0x30
[   11.946726]  </TASK>
[   11.946736] 
[   11.954207] Allocated by task 153:
[   11.954335]  kasan_save_stack+0x45/0x70
[   11.954477]  kasan_save_track+0x18/0x40
[   11.954692]  kasan_save_alloc_info+0x3b/0x50
[   11.955146]  __kasan_kmalloc+0xb7/0xc0
[   11.955430]  __kmalloc_cache_noprof+0x189/0x420
[   11.955664]  kmalloc_oob_right+0xa9/0x7f0
[   11.955830]  kunit_try_run_case+0x1a5/0x480
[   11.956072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.956378]  kthread+0x337/0x6f0
[   11.956539]  ret_from_fork+0x116/0x1d0
[   11.956718]  ret_from_fork_asm+0x1a/0x30
[   11.956895] 
[   11.957044] The buggy address belongs to the object at ffff88810269aa00
[   11.957044]  which belongs to the cache kmalloc-128 of size 128
[   11.957482] The buggy address is located 5 bytes to the right of
[   11.957482]  allocated 115-byte region [ffff88810269aa00, ffff88810269aa73)
[   11.957962] 
[   11.958033] The buggy address belongs to the physical page:
[   11.958201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a
[   11.958546] flags: 0x200000000000000(node=0|zone=2)
[   11.958957] page_type: f5(slab)
[   11.959103] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.959528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.959795] page dumped because: kasan: bad access detected
[   11.959972] 
[   11.960063] Memory state around the buggy address:
[   11.960298]  ffff88810269a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.960717]  ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.961123] >ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.961457]                                                                 ^
[   11.961714]  ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.962098]  ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.962365] ==================================================================
[   11.962933] ==================================================================
[   11.963291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.963624] Read of size 1 at addr ffff88810269aa80 by task kunit_try_catch/153
[   11.963852] 
[   11.963975] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.964015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.964026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.964045] Call Trace:
[   11.964062]  <TASK>
[   11.964077]  dump_stack_lvl+0x73/0xb0
[   11.964104]  print_report+0xd1/0x650
[   11.964125]  ? __virt_addr_valid+0x1db/0x2d0
[   11.964147]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.964168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.964191]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.964213]  kasan_report+0x141/0x180
[   11.964234]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.964260]  __asan_report_load1_noabort+0x18/0x20
[   11.964284]  kmalloc_oob_right+0x68a/0x7f0
[   11.964306]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.964331]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.964356]  kunit_try_run_case+0x1a5/0x480
[   11.964380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.964402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.964426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.964449]  ? __kthread_parkme+0x82/0x180
[   11.964469]  ? preempt_count_sub+0x50/0x80
[   11.964493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.964516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.964540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.964565]  kthread+0x337/0x6f0
[   11.964583]  ? trace_preempt_on+0x20/0xc0
[   11.964607]  ? __pfx_kthread+0x10/0x10
[   11.964627]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.964648]  ? calculate_sigpending+0x7b/0xa0
[   11.964672]  ? __pfx_kthread+0x10/0x10
[   11.964693]  ret_from_fork+0x116/0x1d0
[   11.964711]  ? __pfx_kthread+0x10/0x10
[   11.964731]  ret_from_fork_asm+0x1a/0x30
[   11.964761]  </TASK>
[   11.964771] 
[   11.971452] Allocated by task 153:
[   11.971638]  kasan_save_stack+0x45/0x70
[   11.971797]  kasan_save_track+0x18/0x40
[   11.971993]  kasan_save_alloc_info+0x3b/0x50
[   11.972202]  __kasan_kmalloc+0xb7/0xc0
[   11.972467]  __kmalloc_cache_noprof+0x189/0x420
[   11.972621]  kmalloc_oob_right+0xa9/0x7f0
[   11.972760]  kunit_try_run_case+0x1a5/0x480
[   11.972904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.973089]  kthread+0x337/0x6f0
[   11.973209]  ret_from_fork+0x116/0x1d0
[   11.973339]  ret_from_fork_asm+0x1a/0x30
[   11.973479] 
[   11.973546] The buggy address belongs to the object at ffff88810269aa00
[   11.973546]  which belongs to the cache kmalloc-128 of size 128
[   11.974656] The buggy address is located 13 bytes to the right of
[   11.974656]  allocated 115-byte region [ffff88810269aa00, ffff88810269aa73)
[   11.975792] 
[   11.975902] The buggy address belongs to the physical page:
[   11.976941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a
[   11.977280] flags: 0x200000000000000(node=0|zone=2)
[   11.977677] page_type: f5(slab)
[   11.977843] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.978405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.978819] page dumped because: kasan: bad access detected
[   11.979003] 
[   11.979071] Memory state around the buggy address:
[   11.979226]  ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.979436]  ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.979648] >ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.979856]                    ^
[   11.979979]  ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.980339]  ffff88810269ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.982638] ==================================================================
[   11.920294] ==================================================================
[   11.921362] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.922482] Write of size 1 at addr ffff88810269aa73 by task kunit_try_catch/153
[   11.923094] 
[   11.924218] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.924579] Tainted: [N]=TEST
[   11.924610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.924821] Call Trace:
[   11.924888]  <TASK>
[   11.925056]  dump_stack_lvl+0x73/0xb0
[   11.925149]  print_report+0xd1/0x650
[   11.925179]  ? __virt_addr_valid+0x1db/0x2d0
[   11.925205]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.925226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.925249]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.925271]  kasan_report+0x141/0x180
[   11.925293]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.925319]  __asan_report_store1_noabort+0x1b/0x30
[   11.925344]  kmalloc_oob_right+0x6f0/0x7f0
[   11.925366]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.925390]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.925416]  kunit_try_run_case+0x1a5/0x480
[   11.925442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.925465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.925490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.925514]  ? __kthread_parkme+0x82/0x180
[   11.925535]  ? preempt_count_sub+0x50/0x80
[   11.925561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.925585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.925610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.925634]  kthread+0x337/0x6f0
[   11.925653]  ? trace_preempt_on+0x20/0xc0
[   11.925678]  ? __pfx_kthread+0x10/0x10
[   11.925698]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.925720]  ? calculate_sigpending+0x7b/0xa0
[   11.925744]  ? __pfx_kthread+0x10/0x10
[   11.925766]  ret_from_fork+0x116/0x1d0
[   11.925786]  ? __pfx_kthread+0x10/0x10
[   11.925807]  ret_from_fork_asm+0x1a/0x30
[   11.925860]  </TASK>
[   11.925936] 
[   11.933753] Allocated by task 153:
[   11.934066]  kasan_save_stack+0x45/0x70
[   11.934235]  kasan_save_track+0x18/0x40
[   11.934474]  kasan_save_alloc_info+0x3b/0x50
[   11.934724]  __kasan_kmalloc+0xb7/0xc0
[   11.935010]  __kmalloc_cache_noprof+0x189/0x420
[   11.935263]  kmalloc_oob_right+0xa9/0x7f0
[   11.935450]  kunit_try_run_case+0x1a5/0x480
[   11.935626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.935800]  kthread+0x337/0x6f0
[   11.935919]  ret_from_fork+0x116/0x1d0
[   11.936114]  ret_from_fork_asm+0x1a/0x30
[   11.936366] 
[   11.936513] The buggy address belongs to the object at ffff88810269aa00
[   11.936513]  which belongs to the cache kmalloc-128 of size 128
[   11.937220] The buggy address is located 0 bytes to the right of
[   11.937220]  allocated 115-byte region [ffff88810269aa00, ffff88810269aa73)
[   11.937668] 
[   11.937809] The buggy address belongs to the physical page:
[   11.938201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a
[   11.938798] flags: 0x200000000000000(node=0|zone=2)
[   11.939507] page_type: f5(slab)
[   11.940014] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.940284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.940903] page dumped because: kasan: bad access detected
[   11.941134] 
[   11.941265] Memory state around the buggy address:
[   11.941858]  ffff88810269a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.942255]  ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.942516] >ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.942906]                                                              ^
[   11.943333]  ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.943660]  ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.943904] ==================================================================