Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.357220] ==================================================================
[   16.357260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.357307] Write of size 1 at addr fff00000c6554778 by task kunit_try_catch/136
[   16.357367] 
[   16.357398] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.357478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.357503] Hardware name: linux,dummy-virt (DT)
[   16.357532] Call trace:
[   16.357553]  show_stack+0x20/0x38 (C)
[   16.357600]  dump_stack_lvl+0x8c/0xd0
[   16.357646]  print_report+0x118/0x5d0
[   16.357691]  kasan_report+0xdc/0x128
[   16.357766]  __asan_report_store1_noabort+0x20/0x30
[   16.357826]  kmalloc_oob_right+0x538/0x660
[   16.357880]  kunit_try_run_case+0x170/0x3f0
[   16.357927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.357979]  kthread+0x328/0x630
[   16.358019]  ret_from_fork+0x10/0x20
[   16.358065] 
[   16.358092] Allocated by task 136:
[   16.358119]  kasan_save_stack+0x3c/0x68
[   16.358158]  kasan_save_track+0x20/0x40
[   16.358195]  kasan_save_alloc_info+0x40/0x58
[   16.358234]  __kasan_kmalloc+0xd4/0xd8
[   16.358274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.358317]  kmalloc_oob_right+0xb0/0x660
[   16.358352]  kunit_try_run_case+0x170/0x3f0
[   16.358396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.358439]  kthread+0x328/0x630
[   16.358470]  ret_from_fork+0x10/0x20
[   16.358504] 
[   16.358522] The buggy address belongs to the object at fff00000c6554700
[   16.358522]  which belongs to the cache kmalloc-128 of size 128
[   16.358587] The buggy address is located 5 bytes to the right of
[   16.358587]  allocated 115-byte region [fff00000c6554700, fff00000c6554773)
[   16.358652] 
[   16.358670] The buggy address belongs to the physical page:
[   16.358699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.359014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.359083] page_type: f5(slab)
[   16.359359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.359417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.359471] page dumped because: kasan: bad access detected
[   16.359501] 
[   16.359519] Memory state around the buggy address:
[   16.360193]  fff00000c6554600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.360238]  fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360280] >fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.360318]                                                                 ^
[   16.360357]  fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360398]  fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360435] ==================================================================
[   16.360779] ==================================================================
[   16.360830] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.360876] Read of size 1 at addr fff00000c6554780 by task kunit_try_catch/136
[   16.360931] 
[   16.360959] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.361037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.361063] Hardware name: linux,dummy-virt (DT)
[   16.361091] Call trace:
[   16.361111]  show_stack+0x20/0x38 (C)
[   16.361157]  dump_stack_lvl+0x8c/0xd0
[   16.361276]  print_report+0x118/0x5d0
[   16.361352]  kasan_report+0xdc/0x128
[   16.361432]  __asan_report_load1_noabort+0x20/0x30
[   16.361498]  kmalloc_oob_right+0x5d0/0x660
[   16.361563]  kunit_try_run_case+0x170/0x3f0
[   16.361635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.361689]  kthread+0x328/0x630
[   16.361768]  ret_from_fork+0x10/0x20
[   16.361834] 
[   16.361860] Allocated by task 136:
[   16.361887]  kasan_save_stack+0x3c/0x68
[   16.361927]  kasan_save_track+0x20/0x40
[   16.361963]  kasan_save_alloc_info+0x40/0x58
[   16.362002]  __kasan_kmalloc+0xd4/0xd8
[   16.362177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.362231]  kmalloc_oob_right+0xb0/0x660
[   16.362267]  kunit_try_run_case+0x170/0x3f0
[   16.362369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.362416]  kthread+0x328/0x630
[   16.362448]  ret_from_fork+0x10/0x20
[   16.362482] 
[   16.362927] The buggy address belongs to the object at fff00000c6554700
[   16.362927]  which belongs to the cache kmalloc-128 of size 128
[   16.363035] The buggy address is located 13 bytes to the right of
[   16.363035]  allocated 115-byte region [fff00000c6554700, fff00000c6554773)
[   16.363122] 
[   16.363181] The buggy address belongs to the physical page:
[   16.363219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.363314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.363360] page_type: f5(slab)
[   16.363396] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.363445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.363484] page dumped because: kasan: bad access detected
[   16.363646] 
[   16.363663] Memory state around the buggy address:
[   16.363694]  fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363818]  fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.363891] >fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363968]                    ^
[   16.364057]  fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.364129]  fff00000c6554880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.364210] ==================================================================
[   16.349802] ==================================================================
[   16.350544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.351480] Write of size 1 at addr fff00000c6554773 by task kunit_try_catch/136
[   16.351588] 
[   16.352342] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   16.352488] Tainted: [N]=TEST
[   16.352520] Hardware name: linux,dummy-virt (DT)
[   16.352770] Call trace:
[   16.352944]  show_stack+0x20/0x38 (C)
[   16.353079]  dump_stack_lvl+0x8c/0xd0
[   16.353142]  print_report+0x118/0x5d0
[   16.353191]  kasan_report+0xdc/0x128
[   16.353237]  __asan_report_store1_noabort+0x20/0x30
[   16.353289]  kmalloc_oob_right+0x5a4/0x660
[   16.353335]  kunit_try_run_case+0x170/0x3f0
[   16.353387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.353439]  kthread+0x328/0x630
[   16.353483]  ret_from_fork+0x10/0x20
[   16.353637] 
[   16.353674] Allocated by task 136:
[   16.353816]  kasan_save_stack+0x3c/0x68
[   16.353885]  kasan_save_track+0x20/0x40
[   16.353922]  kasan_save_alloc_info+0x40/0x58
[   16.353961]  __kasan_kmalloc+0xd4/0xd8
[   16.353997]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.354037]  kmalloc_oob_right+0xb0/0x660
[   16.354072]  kunit_try_run_case+0x170/0x3f0
[   16.354110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.354153]  kthread+0x328/0x630
[   16.354185]  ret_from_fork+0x10/0x20
[   16.354238] 
[   16.354296] The buggy address belongs to the object at fff00000c6554700
[   16.354296]  which belongs to the cache kmalloc-128 of size 128
[   16.354388] The buggy address is located 0 bytes to the right of
[   16.354388]  allocated 115-byte region [fff00000c6554700, fff00000c6554773)
[   16.354456] 
[   16.354533] The buggy address belongs to the physical page:
[   16.354738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   16.355010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.355297] page_type: f5(slab)
[   16.355583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.355647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.355768] page dumped because: kasan: bad access detected
[   16.355809] 
[   16.355834] Memory state around the buggy address:
[   16.356056]  fff00000c6554600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.356120]  fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.356174] >fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.356227]                                                              ^
[   16.356308]  fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.356350]  fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.356410] ==================================================================

[   11.819697] ==================================================================
[   11.820926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.821546] Write of size 1 at addr ffff88810305bc73 by task kunit_try_catch/153
[   11.821944] 
[   11.823213] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.823584] Tainted: [N]=TEST
[   11.823617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.823844] Call Trace:
[   11.823911]  <TASK>
[   11.824073]  dump_stack_lvl+0x73/0xb0
[   11.824161]  print_report+0xd1/0x610
[   11.824191]  ? __virt_addr_valid+0x1db/0x2d0
[   11.824217]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.824238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.824261]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.824283]  kasan_report+0x141/0x180
[   11.824305]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.824331]  __asan_report_store1_noabort+0x1b/0x30
[   11.824357]  kmalloc_oob_right+0x6f0/0x7f0
[   11.824379]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.824402]  ? __schedule+0x10cc/0x2b60
[   11.824424]  ? __pfx_read_tsc+0x10/0x10
[   11.824816]  ? ktime_get_ts64+0x86/0x230
[   11.824847]  kunit_try_run_case+0x1a5/0x480
[   11.824875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.824898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.824923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.824947]  ? __kthread_parkme+0x82/0x180
[   11.824969]  ? preempt_count_sub+0x50/0x80
[   11.825042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.825066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.825091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.825117]  kthread+0x337/0x6f0
[   11.825136]  ? trace_preempt_on+0x20/0xc0
[   11.825160]  ? __pfx_kthread+0x10/0x10
[   11.825181]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.825202]  ? calculate_sigpending+0x7b/0xa0
[   11.825228]  ? __pfx_kthread+0x10/0x10
[   11.825249]  ret_from_fork+0x116/0x1d0
[   11.825268]  ? __pfx_kthread+0x10/0x10
[   11.825288]  ret_from_fork_asm+0x1a/0x30
[   11.825355]  </TASK>
[   11.825427] 
[   11.837241] Allocated by task 153:
[   11.837509]  kasan_save_stack+0x45/0x70
[   11.837677]  kasan_save_track+0x18/0x40
[   11.837962]  kasan_save_alloc_info+0x3b/0x50
[   11.838336]  __kasan_kmalloc+0xb7/0xc0
[   11.838476]  __kmalloc_cache_noprof+0x189/0x420
[   11.838927]  kmalloc_oob_right+0xa9/0x7f0
[   11.839312]  kunit_try_run_case+0x1a5/0x480
[   11.839522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.840179]  kthread+0x337/0x6f0
[   11.840543]  ret_from_fork+0x116/0x1d0
[   11.840847]  ret_from_fork_asm+0x1a/0x30
[   11.841116] 
[   11.841349] The buggy address belongs to the object at ffff88810305bc00
[   11.841349]  which belongs to the cache kmalloc-128 of size 128
[   11.842460] The buggy address is located 0 bytes to the right of
[   11.842460]  allocated 115-byte region [ffff88810305bc00, ffff88810305bc73)
[   11.843418] 
[   11.843704] The buggy address belongs to the physical page:
[   11.844428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   11.845178] flags: 0x200000000000000(node=0|zone=2)
[   11.846203] page_type: f5(slab)
[   11.846926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.847695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.848402] page dumped because: kasan: bad access detected
[   11.848591] 
[   11.848668] Memory state around the buggy address:
[   11.849232]  ffff88810305bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.849954]  ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.850819] >ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.851674]                                                              ^
[   11.852282]  ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.852520]  ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.853256] ==================================================================
[   11.855804] ==================================================================
[   11.856127] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.856596] Write of size 1 at addr ffff88810305bc78 by task kunit_try_catch/153
[   11.857214] 
[   11.857481] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.857532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.857543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.857563] Call Trace:
[   11.857575]  <TASK>
[   11.857589]  dump_stack_lvl+0x73/0xb0
[   11.857619]  print_report+0xd1/0x610
[   11.857641]  ? __virt_addr_valid+0x1db/0x2d0
[   11.857664]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.857685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.857708]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.857730]  kasan_report+0x141/0x180
[   11.857765]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.857791]  __asan_report_store1_noabort+0x1b/0x30
[   11.857816]  kmalloc_oob_right+0x6bd/0x7f0
[   11.857838]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.857861]  ? __schedule+0x10cc/0x2b60
[   11.857883]  ? __pfx_read_tsc+0x10/0x10
[   11.857903]  ? ktime_get_ts64+0x86/0x230
[   11.857927]  kunit_try_run_case+0x1a5/0x480
[   11.857951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.857986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.858010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.858035]  ? __kthread_parkme+0x82/0x180
[   11.858055]  ? preempt_count_sub+0x50/0x80
[   11.858078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.858102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.858127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.858151]  kthread+0x337/0x6f0
[   11.858170]  ? trace_preempt_on+0x20/0xc0
[   11.858194]  ? __pfx_kthread+0x10/0x10
[   11.858214]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.858235]  ? calculate_sigpending+0x7b/0xa0
[   11.858260]  ? __pfx_kthread+0x10/0x10
[   11.858281]  ret_from_fork+0x116/0x1d0
[   11.858300]  ? __pfx_kthread+0x10/0x10
[   11.858320]  ret_from_fork_asm+0x1a/0x30
[   11.858350]  </TASK>
[   11.858359] 
[   11.868698] Allocated by task 153:
[   11.868977]  kasan_save_stack+0x45/0x70
[   11.869393]  kasan_save_track+0x18/0x40
[   11.869664]  kasan_save_alloc_info+0x3b/0x50
[   11.869844]  __kasan_kmalloc+0xb7/0xc0
[   11.870333]  __kmalloc_cache_noprof+0x189/0x420
[   11.870604]  kmalloc_oob_right+0xa9/0x7f0
[   11.870922]  kunit_try_run_case+0x1a5/0x480
[   11.871275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.871735]  kthread+0x337/0x6f0
[   11.872055]  ret_from_fork+0x116/0x1d0
[   11.872243]  ret_from_fork_asm+0x1a/0x30
[   11.872655] 
[   11.872743] The buggy address belongs to the object at ffff88810305bc00
[   11.872743]  which belongs to the cache kmalloc-128 of size 128
[   11.873805] The buggy address is located 5 bytes to the right of
[   11.873805]  allocated 115-byte region [ffff88810305bc00, ffff88810305bc73)
[   11.874563] 
[   11.874672] The buggy address belongs to the physical page:
[   11.875096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   11.875673] flags: 0x200000000000000(node=0|zone=2)
[   11.876106] page_type: f5(slab)
[   11.876376] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.876847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.877438] page dumped because: kasan: bad access detected
[   11.877683] 
[   11.877792] Memory state around the buggy address:
[   11.878273]  ffff88810305bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.878636]  ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.879101] >ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.879549]                                                                 ^
[   11.879955]  ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.880509]  ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.881029] ==================================================================
[   11.881771] ==================================================================
[   11.882260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.883036] Read of size 1 at addr ffff88810305bc80 by task kunit_try_catch/153
[   11.883549] 
[   11.883657] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.883941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.883955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.884012] Call Trace:
[   11.884027]  <TASK>
[   11.884041]  dump_stack_lvl+0x73/0xb0
[   11.884072]  print_report+0xd1/0x610
[   11.884094]  ? __virt_addr_valid+0x1db/0x2d0
[   11.884116]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.884137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.884161]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.884183]  kasan_report+0x141/0x180
[   11.884205]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.884231]  __asan_report_load1_noabort+0x18/0x20
[   11.884255]  kmalloc_oob_right+0x68a/0x7f0
[   11.884277]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.884300]  ? __schedule+0x10cc/0x2b60
[   11.884323]  ? __pfx_read_tsc+0x10/0x10
[   11.884344]  ? ktime_get_ts64+0x86/0x230
[   11.884368]  kunit_try_run_case+0x1a5/0x480
[   11.884392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.884414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.884450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.884474]  ? __kthread_parkme+0x82/0x180
[   11.884494]  ? preempt_count_sub+0x50/0x80
[   11.884518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.884542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.884566]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.884591]  kthread+0x337/0x6f0
[   11.884609]  ? trace_preempt_on+0x20/0xc0
[   11.884632]  ? __pfx_kthread+0x10/0x10
[   11.884652]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.884673]  ? calculate_sigpending+0x7b/0xa0
[   11.884698]  ? __pfx_kthread+0x10/0x10
[   11.884719]  ret_from_fork+0x116/0x1d0
[   11.884737]  ? __pfx_kthread+0x10/0x10
[   11.884769]  ret_from_fork_asm+0x1a/0x30
[   11.884799]  </TASK>
[   11.884808] 
[   11.895971] Allocated by task 153:
[   11.896495]  kasan_save_stack+0x45/0x70
[   11.896689]  kasan_save_track+0x18/0x40
[   11.896854]  kasan_save_alloc_info+0x3b/0x50
[   11.897425]  __kasan_kmalloc+0xb7/0xc0
[   11.897617]  __kmalloc_cache_noprof+0x189/0x420
[   11.897922]  kmalloc_oob_right+0xa9/0x7f0
[   11.898358]  kunit_try_run_case+0x1a5/0x480
[   11.898680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.899046]  kthread+0x337/0x6f0
[   11.899217]  ret_from_fork+0x116/0x1d0
[   11.899393]  ret_from_fork_asm+0x1a/0x30
[   11.899923] 
[   11.900054] The buggy address belongs to the object at ffff88810305bc00
[   11.900054]  which belongs to the cache kmalloc-128 of size 128
[   11.900866] The buggy address is located 13 bytes to the right of
[   11.900866]  allocated 115-byte region [ffff88810305bc00, ffff88810305bc73)
[   11.901866] 
[   11.901974] The buggy address belongs to the physical page:
[   11.902457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b
[   11.903190] flags: 0x200000000000000(node=0|zone=2)
[   11.903646] page_type: f5(slab)
[   11.903787] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.904029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.904258] page dumped because: kasan: bad access detected
[   11.904431] 
[   11.904503] Memory state around the buggy address:
[   11.904661]  ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.904942]  ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.905163] >ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.905484]                    ^
[   11.905652]  ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.906028]  ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.906661] ==================================================================