Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.654742] ==================================================================
[   16.656559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.656815] Read of size 1 at addr fff00000c7767080 by task kunit_try_catch/136
[   16.657271] 
[   16.657306] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.657388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.657909] Hardware name: linux,dummy-virt (DT)
[   16.657956] Call trace:
[   16.658120]  show_stack+0x20/0x38 (C)
[   16.659067]  dump_stack_lvl+0x8c/0xd0
[   16.659580]  print_report+0x118/0x608
[   16.659634]  kasan_report+0xdc/0x128
[   16.659681]  __asan_report_load1_noabort+0x20/0x30
[   16.659733]  kmalloc_oob_right+0x5d0/0x660
[   16.659779]  kunit_try_run_case+0x170/0x3f0
[   16.659827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.659880]  kthread+0x328/0x630
[   16.659922]  ret_from_fork+0x10/0x20
[   16.659971] 
[   16.659988] Allocated by task 136:
[   16.660015]  kasan_save_stack+0x3c/0x68
[   16.660061]  kasan_save_track+0x20/0x40
[   16.660127]  kasan_save_alloc_info+0x40/0x58
[   16.660182]  __kasan_kmalloc+0xd4/0xd8
[   16.660370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.660428]  kmalloc_oob_right+0xb0/0x660
[   16.660650]  kunit_try_run_case+0x170/0x3f0
[   16.660905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.661054]  kthread+0x328/0x630
[   16.661142]  ret_from_fork+0x10/0x20
[   16.661178] 
[   16.661197] The buggy address belongs to the object at fff00000c7767000
[   16.661197]  which belongs to the cache kmalloc-128 of size 128
[   16.661503] The buggy address is located 13 bytes to the right of
[   16.661503]  allocated 115-byte region [fff00000c7767000, fff00000c7767073)
[   16.661574] 
[   16.661625] The buggy address belongs to the physical page:
[   16.661654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   16.661708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.661874] page_type: f5(slab)
[   16.661989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.662046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.662121] page dumped because: kasan: bad access detected
[   16.662152] 
[   16.662169] Memory state around the buggy address:
[   16.662329]  fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.662463]  fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.662547] >fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662693]                    ^
[   16.662774]  fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662877]  fff00000c7767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662958] ==================================================================
[   16.639995] ==================================================================
[   16.640374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.641241] Write of size 1 at addr fff00000c7767073 by task kunit_try_catch/136
[   16.641355] 
[   16.642222] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.642376] Tainted: [N]=TEST
[   16.642409] Hardware name: linux,dummy-virt (DT)
[   16.642629] Call trace:
[   16.642794]  show_stack+0x20/0x38 (C)
[   16.642928]  dump_stack_lvl+0x8c/0xd0
[   16.642990]  print_report+0x118/0x608
[   16.643041]  kasan_report+0xdc/0x128
[   16.643103]  __asan_report_store1_noabort+0x20/0x30
[   16.643157]  kmalloc_oob_right+0x5a4/0x660
[   16.643204]  kunit_try_run_case+0x170/0x3f0
[   16.643257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643310]  kthread+0x328/0x630
[   16.643354]  ret_from_fork+0x10/0x20
[   16.643511] 
[   16.643549] Allocated by task 136:
[   16.643662]  kasan_save_stack+0x3c/0x68
[   16.643726]  kasan_save_track+0x20/0x40
[   16.643764]  kasan_save_alloc_info+0x40/0x58
[   16.643803]  __kasan_kmalloc+0xd4/0xd8
[   16.643840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.643880]  kmalloc_oob_right+0xb0/0x660
[   16.643916]  kunit_try_run_case+0x170/0x3f0
[   16.643953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643995]  kthread+0x328/0x630
[   16.644035]  ret_from_fork+0x10/0x20
[   16.644102] 
[   16.644161] The buggy address belongs to the object at fff00000c7767000
[   16.644161]  which belongs to the cache kmalloc-128 of size 128
[   16.644254] The buggy address is located 0 bytes to the right of
[   16.644254]  allocated 115-byte region [fff00000c7767000, fff00000c7767073)
[   16.644320] 
[   16.644399] The buggy address belongs to the physical page:
[   16.644570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   16.644834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.645126] page_type: f5(slab)
[   16.645426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.645491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.645594] page dumped because: kasan: bad access detected
[   16.645636] 
[   16.645660] Memory state around the buggy address:
[   16.645912]  fff00000c7766f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.645979]  fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.646034] >fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.646100]                                                              ^
[   16.646182]  fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646226]  fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646289] ==================================================================
[   16.647428] ==================================================================
[   16.647837] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.647917] Write of size 1 at addr fff00000c7767078 by task kunit_try_catch/136
[   16.648000] 
[   16.648038] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.648335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.648371] Hardware name: linux,dummy-virt (DT)
[   16.648591] Call trace:
[   16.648632]  show_stack+0x20/0x38 (C)
[   16.648687]  dump_stack_lvl+0x8c/0xd0
[   16.648790]  print_report+0x118/0x608
[   16.648858]  kasan_report+0xdc/0x128
[   16.648997]  __asan_report_store1_noabort+0x20/0x30
[   16.649058]  kmalloc_oob_right+0x538/0x660
[   16.649128]  kunit_try_run_case+0x170/0x3f0
[   16.649180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.649523]  kthread+0x328/0x630
[   16.649593]  ret_from_fork+0x10/0x20
[   16.649950] 
[   16.650073] Allocated by task 136:
[   16.650119]  kasan_save_stack+0x3c/0x68
[   16.650162]  kasan_save_track+0x20/0x40
[   16.650206]  kasan_save_alloc_info+0x40/0x58
[   16.650245]  __kasan_kmalloc+0xd4/0xd8
[   16.650281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.650319]  kmalloc_oob_right+0xb0/0x660
[   16.650354]  kunit_try_run_case+0x170/0x3f0
[   16.650391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.650433]  kthread+0x328/0x630
[   16.650465]  ret_from_fork+0x10/0x20
[   16.650499] 
[   16.650517] The buggy address belongs to the object at fff00000c7767000
[   16.650517]  which belongs to the cache kmalloc-128 of size 128
[   16.650574] The buggy address is located 5 bytes to the right of
[   16.650574]  allocated 115-byte region [fff00000c7767000, fff00000c7767073)
[   16.650637] 
[   16.650655] The buggy address belongs to the physical page:
[   16.650683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767
[   16.650734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.650781] page_type: f5(slab)
[   16.650818] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.650868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.650908] page dumped because: kasan: bad access detected
[   16.650938] 
[   16.650955] Memory state around the buggy address:
[   16.650984]  fff00000c7766f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.651026]  fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.651068] >fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.651113]                                                                 ^
[   16.651152]  fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.651194]  fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.651398] ==================================================================

[   12.026587] ==================================================================
[   12.027581] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.028320] Write of size 1 at addr ffff888102c29a78 by task kunit_try_catch/153
[   12.028616] 
[   12.028711] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.028757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.028769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.028792] Call Trace:
[   12.028961]  <TASK>
[   12.028985]  dump_stack_lvl+0x73/0xb0
[   12.029018]  print_report+0xd1/0x650
[   12.029041]  ? __virt_addr_valid+0x1db/0x2d0
[   12.029064]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.029085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.029108]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.029129]  kasan_report+0x141/0x180
[   12.029150]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.029176]  __asan_report_store1_noabort+0x1b/0x30
[   12.029201]  kmalloc_oob_right+0x6bd/0x7f0
[   12.029223]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.029245]  ? __schedule+0x10cc/0x2b60
[   12.029267]  ? __pfx_read_tsc+0x10/0x10
[   12.029289]  ? ktime_get_ts64+0x86/0x230
[   12.029314]  kunit_try_run_case+0x1a5/0x480
[   12.029339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.029361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.029385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.029408]  ? __kthread_parkme+0x82/0x180
[   12.029429]  ? preempt_count_sub+0x50/0x80
[   12.029454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.029477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.029501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.029526]  kthread+0x337/0x6f0
[   12.029545]  ? trace_preempt_on+0x20/0xc0
[   12.029569]  ? __pfx_kthread+0x10/0x10
[   12.029589]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.029625]  ? calculate_sigpending+0x7b/0xa0
[   12.029649]  ? __pfx_kthread+0x10/0x10
[   12.029670]  ret_from_fork+0x116/0x1d0
[   12.029688]  ? __pfx_kthread+0x10/0x10
[   12.029708]  ret_from_fork_asm+0x1a/0x30
[   12.029739]  </TASK>
[   12.029750] 
[   12.040878] Allocated by task 153:
[   12.041221]  kasan_save_stack+0x45/0x70
[   12.041443]  kasan_save_track+0x18/0x40
[   12.041590]  kasan_save_alloc_info+0x3b/0x50
[   12.041754]  __kasan_kmalloc+0xb7/0xc0
[   12.041940]  __kmalloc_cache_noprof+0x189/0x420
[   12.042165]  kmalloc_oob_right+0xa9/0x7f0
[   12.042526]  kunit_try_run_case+0x1a5/0x480
[   12.042741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.043040]  kthread+0x337/0x6f0
[   12.043258]  ret_from_fork+0x116/0x1d0
[   12.043448]  ret_from_fork_asm+0x1a/0x30
[   12.043653] 
[   12.043736] The buggy address belongs to the object at ffff888102c29a00
[   12.043736]  which belongs to the cache kmalloc-128 of size 128
[   12.044301] The buggy address is located 5 bytes to the right of
[   12.044301]  allocated 115-byte region [ffff888102c29a00, ffff888102c29a73)
[   12.044878] 
[   12.045181] The buggy address belongs to the physical page:
[   12.045404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   12.045691] flags: 0x200000000000000(node=0|zone=2)
[   12.045858] page_type: f5(slab)
[   12.046009] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.046346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.046766] page dumped because: kasan: bad access detected
[   12.047088] 
[   12.047183] Memory state around the buggy address:
[   12.047380]  ffff888102c29900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.047616]  ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.048140] >ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.048412]                                                                 ^
[   12.048665]  ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.048880]  ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.049194] ==================================================================
[   12.049745] ==================================================================
[   12.050250] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.050525] Read of size 1 at addr ffff888102c29a80 by task kunit_try_catch/153
[   12.050969] 
[   12.051090] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.051134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.051145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.051167] Call Trace:
[   12.051184]  <TASK>
[   12.051201]  dump_stack_lvl+0x73/0xb0
[   12.051230]  print_report+0xd1/0x650
[   12.051252]  ? __virt_addr_valid+0x1db/0x2d0
[   12.051275]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.051296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.051318]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.051340]  kasan_report+0x141/0x180
[   12.051362]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.051387]  __asan_report_load1_noabort+0x18/0x20
[   12.051412]  kmalloc_oob_right+0x68a/0x7f0
[   12.051434]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.051456]  ? __schedule+0x10cc/0x2b60
[   12.051478]  ? __pfx_read_tsc+0x10/0x10
[   12.051499]  ? ktime_get_ts64+0x86/0x230
[   12.051523]  kunit_try_run_case+0x1a5/0x480
[   12.051546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.051569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.051606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.051630]  ? __kthread_parkme+0x82/0x180
[   12.051651]  ? preempt_count_sub+0x50/0x80
[   12.051675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.051699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.051723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.051748]  kthread+0x337/0x6f0
[   12.051766]  ? trace_preempt_on+0x20/0xc0
[   12.051802]  ? __pfx_kthread+0x10/0x10
[   12.051822]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.051843]  ? calculate_sigpending+0x7b/0xa0
[   12.051868]  ? __pfx_kthread+0x10/0x10
[   12.051889]  ret_from_fork+0x116/0x1d0
[   12.051907]  ? __pfx_kthread+0x10/0x10
[   12.051928]  ret_from_fork_asm+0x1a/0x30
[   12.051959]  </TASK>
[   12.051969] 
[   12.059319] Allocated by task 153:
[   12.059453]  kasan_save_stack+0x45/0x70
[   12.059611]  kasan_save_track+0x18/0x40
[   12.059747]  kasan_save_alloc_info+0x3b/0x50
[   12.059974]  __kasan_kmalloc+0xb7/0xc0
[   12.060159]  __kmalloc_cache_noprof+0x189/0x420
[   12.060490]  kmalloc_oob_right+0xa9/0x7f0
[   12.061064]  kunit_try_run_case+0x1a5/0x480
[   12.061273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.061536]  kthread+0x337/0x6f0
[   12.061694]  ret_from_fork+0x116/0x1d0
[   12.061971]  ret_from_fork_asm+0x1a/0x30
[   12.062115] 
[   12.062186] The buggy address belongs to the object at ffff888102c29a00
[   12.062186]  which belongs to the cache kmalloc-128 of size 128
[   12.062668] The buggy address is located 13 bytes to the right of
[   12.062668]  allocated 115-byte region [ffff888102c29a00, ffff888102c29a73)
[   12.063216] 
[   12.063293] The buggy address belongs to the physical page:
[   12.063523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   12.064091] flags: 0x200000000000000(node=0|zone=2)
[   12.064333] page_type: f5(slab)
[   12.064502] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.065098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.065351] page dumped because: kasan: bad access detected
[   12.065524] 
[   12.065607] Memory state around the buggy address:
[   12.065954]  ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.066281]  ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.066561] >ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.066784]                    ^
[   12.066907]  ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.067247]  ffff888102c29b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.067884] ==================================================================
[   11.995267] ==================================================================
[   11.996276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.997284] Write of size 1 at addr ffff888102c29a73 by task kunit_try_catch/153
[   11.997609] 
[   11.998520] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   11.998957] Tainted: [N]=TEST
[   11.998994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.999221] Call Trace:
[   11.999287]  <TASK>
[   11.999430]  dump_stack_lvl+0x73/0xb0
[   11.999519]  print_report+0xd1/0x650
[   11.999559]  ? __virt_addr_valid+0x1db/0x2d0
[   11.999585]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.999626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.999649]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.999670]  kasan_report+0x141/0x180
[   11.999704]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.999730]  __asan_report_store1_noabort+0x1b/0x30
[   11.999755]  kmalloc_oob_right+0x6f0/0x7f0
[   11.999830]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.999853]  ? __schedule+0x10cc/0x2b60
[   11.999876]  ? __pfx_read_tsc+0x10/0x10
[   11.999898]  ? ktime_get_ts64+0x86/0x230
[   11.999925]  kunit_try_run_case+0x1a5/0x480
[   11.999952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.999974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.999999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.000022]  ? __kthread_parkme+0x82/0x180
[   12.000044]  ? preempt_count_sub+0x50/0x80
[   12.000069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.000093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.000117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.000142]  kthread+0x337/0x6f0
[   12.000160]  ? trace_preempt_on+0x20/0xc0
[   12.000185]  ? __pfx_kthread+0x10/0x10
[   12.000204]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.000226]  ? calculate_sigpending+0x7b/0xa0
[   12.000250]  ? __pfx_kthread+0x10/0x10
[   12.000271]  ret_from_fork+0x116/0x1d0
[   12.000289]  ? __pfx_kthread+0x10/0x10
[   12.000309]  ret_from_fork_asm+0x1a/0x30
[   12.000372]  </TASK>
[   12.000440] 
[   12.009227] Allocated by task 153:
[   12.009572]  kasan_save_stack+0x45/0x70
[   12.009884]  kasan_save_track+0x18/0x40
[   12.010107]  kasan_save_alloc_info+0x3b/0x50
[   12.010324]  __kasan_kmalloc+0xb7/0xc0
[   12.010532]  __kmalloc_cache_noprof+0x189/0x420
[   12.010755]  kmalloc_oob_right+0xa9/0x7f0
[   12.011007]  kunit_try_run_case+0x1a5/0x480
[   12.011248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.011437]  kthread+0x337/0x6f0
[   12.011560]  ret_from_fork+0x116/0x1d0
[   12.011836]  ret_from_fork_asm+0x1a/0x30
[   12.012098] 
[   12.012250] The buggy address belongs to the object at ffff888102c29a00
[   12.012250]  which belongs to the cache kmalloc-128 of size 128
[   12.012902] The buggy address is located 0 bytes to the right of
[   12.012902]  allocated 115-byte region [ffff888102c29a00, ffff888102c29a73)
[   12.013542] 
[   12.015004] The buggy address belongs to the physical page:
[   12.016643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29
[   12.017507] flags: 0x200000000000000(node=0|zone=2)
[   12.018283] page_type: f5(slab)
[   12.018932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.019263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.019824] page dumped because: kasan: bad access detected
[   12.020188] 
[   12.020422] Memory state around the buggy address:
[   12.021110]  ffff888102c29900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.021423]  ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.021953] >ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.022443]                                                              ^
[   12.022787]  ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.023320]  ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.023781] ==================================================================