Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   46.174499] ==================================================================
[   46.181762] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744
[   46.188781] Read of size 1 at addr cc228680 by task kunit_try_catch/192
[   46.195434] 
[   46.196960] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   46.196960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.196990] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.196990] Call trace: 
[   46.196990]  unwind_backtrace from show_stack+0x18/0x1c
[   46.197021]  show_stack from dump_stack_lvl+0x70/0x90
[   46.197052]  dump_stack_lvl from print_report+0x158/0x528
[   46.197082]  print_report from kasan_report+0xdc/0x118
[   46.197082]  kasan_report from kmalloc_oob_right+0x6c0/0x744
[   46.197113]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.197143]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.197174]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.197204]  kthread from ret_from_fork+0x14/0x20
[   46.197204] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   46.197235] 3fa0:                                     00000000 00000000 00000000 00000000
[   46.197235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.197265] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.197265] 
[   46.302154] Allocated by task 192:
[   46.305572]  kasan_save_track+0x30/0x5c
[   46.309417]  __kasan_kmalloc+0x8c/0x94
[   46.313201]  kmalloc_oob_right+0xcc/0x744
[   46.317260]  kunit_try_run_case+0x22c/0x5a8
[   46.321472]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.326995]  kthread+0x464/0x810
[   46.330261]  ret_from_fork+0x14/0x20
[   46.333862] 
[   46.335357] The buggy address belongs to the object at cc228600
[   46.335357]  which belongs to the cache kmalloc-128 of size 128
[   46.347259] The buggy address is located 13 bytes to the right of
[   46.347259]  allocated 115-byte region [cc228600, cc228673)
[   46.358978] 
[   46.360504] The buggy address belongs to the physical page:
[   46.366088] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   46.373382] flags: 0x0(zone=0)
[   46.376434] page_type: f5(slab)
[   46.379608] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.387756] raw: 00000000
[   46.390411] page dumped because: kasan: bad access detected
[   46.395996] 
[   46.397491] Memory state around the buggy address:
[   46.402313]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.408905]  cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.415466] >cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.422027]            ^
[   46.424591]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.431152]  cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.437713] ==================================================================
[   45.899719] ==================================================================
[   45.907012] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744
[   45.914001] Write of size 1 at addr cc228678 by task kunit_try_catch/192
[   45.920776] 
[   45.922271] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   45.922302] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.922302] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.922332] Call trace: 
[   45.922332]  unwind_backtrace from show_stack+0x18/0x1c
[   45.922363]  show_stack from dump_stack_lvl+0x70/0x90
[   45.922363]  dump_stack_lvl from print_report+0x158/0x528
[   45.922393]  print_report from kasan_report+0xdc/0x118
[   45.922424]  kasan_report from kmalloc_oob_right+0x660/0x744
[   45.922454]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.922454]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.922485]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.922515]  kthread from ret_from_fork+0x14/0x20
[   45.922546] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   45.922546] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.922576] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.922576] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.922607] 
[   46.027465] Allocated by task 192:
[   46.030883]  kasan_save_track+0x30/0x5c
[   46.034759]  __kasan_kmalloc+0x8c/0x94
[   46.038543]  kmalloc_oob_right+0xcc/0x744
[   46.042602]  kunit_try_run_case+0x22c/0x5a8
[   46.046813]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.052337]  kthread+0x464/0x810
[   46.055603]  ret_from_fork+0x14/0x20
[   46.059204] 
[   46.060699] The buggy address belongs to the object at cc228600
[   46.060699]  which belongs to the cache kmalloc-128 of size 128
[   46.072601] The buggy address is located 5 bytes to the right of
[   46.072601]  allocated 115-byte region [cc228600, cc228673)
[   46.084228] 
[   46.085723] The buggy address belongs to the physical page:
[   46.091339] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   46.098602] flags: 0x0(zone=0)
[   46.101684] page_type: f5(slab)
[   46.104858] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.113006] raw: 00000000
[   46.115661] page dumped because: kasan: bad access detected
[   46.121246] 
[   46.122741] Memory state around the buggy address:
[   46.127593]  cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc
[   46.134155]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.140716] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.147277]                                                         ^
[   46.153778]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.160339]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.166900] ==================================================================
[   45.621215] ==================================================================
[   45.628509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744
[   45.635528] Write of size 1 at addr cc228673 by task kunit_try_catch/192
[   45.642272] 
[   45.643768] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G        W        N  6.15.0-rc3 #1 NONE 
[   45.643798] Tainted: [W]=WARN, [N]=TEST
[   45.643829] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.643829] Call trace: 
[   45.643829]  unwind_backtrace from show_stack+0x18/0x1c
[   45.643859]  show_stack from dump_stack_lvl+0x70/0x90
[   45.643890]  dump_stack_lvl from print_report+0x158/0x528
[   45.643920]  print_report from kasan_report+0xdc/0x118
[   45.643951]  kasan_report from kmalloc_oob_right+0x6a4/0x744
[   45.643951]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.643981]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.644012]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.644042]  kthread from ret_from_fork+0x14/0x20
[   45.644073] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   45.644073] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.644104] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.644104] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.644134] 
[   45.747772] Allocated by task 192:
[   45.751220]  kasan_save_track+0x30/0x5c
[   45.755065]  __kasan_kmalloc+0x8c/0x94
[   45.758850]  kmalloc_oob_right+0xcc/0x744
[   45.762908]  kunit_try_run_case+0x22c/0x5a8
[   45.767120]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.772644]  kthread+0x464/0x810
[   45.775909]  ret_from_fork+0x14/0x20
[   45.779510] 
[   45.781005] The buggy address belongs to the object at cc228600
[   45.781005]  which belongs to the cache kmalloc-128 of size 128
[   45.792907] The buggy address is located 0 bytes to the right of
[   45.792907]  allocated 115-byte region [cc228600, cc228673)
[   45.804534] 
[   45.806060] The buggy address belongs to the physical page:
[   45.811645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228
[   45.818939] flags: 0x0(zone=0)
[   45.822021] page_type: f5(slab)
[   45.825195] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.833312] raw: 00000000
[   45.835968] page dumped because: kasan: bad access detected
[   45.841583] 
[   45.843078] Memory state around the buggy address:
[   45.847900]  cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc
[   45.854461]  cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.861053] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.867614]                                                      ^
[   45.873840]  cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.880401]  cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.886962] ==================================================================

[   13.282470] ==================================================================
[   13.289702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.296678] Write of size 1 at addr ffff888104ee9073 by task kunit_try_catch/179
[   13.304080] 
[   13.305580] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.305588] Tainted: [N]=TEST
[   13.305590] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.305594] Call Trace:
[   13.305596]  <TASK>
[   13.305598]  dump_stack_lvl+0x73/0xb0
[   13.305602]  print_report+0xd1/0x650
[   13.305607]  ? __virt_addr_valid+0x1db/0x2d0
[   13.305612]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.305620]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305624]  kasan_report+0x141/0x180
[   13.305628]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305633]  __asan_report_store1_noabort+0x1b/0x30
[   13.305637]  kmalloc_oob_right+0x6f0/0x7f0
[   13.305641]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.305645]  ? __schedule+0x10cc/0x2b30
[   13.305650]  ? ktime_get_ts64+0x83/0x230
[   13.305655]  kunit_try_run_case+0x1a2/0x480
[   13.305660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.305664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.305669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.305674]  ? __kthread_parkme+0x82/0x180
[   13.305678]  ? preempt_count_sub+0x50/0x80
[   13.305683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.305687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.305692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.305696]  kthread+0x334/0x6f0
[   13.305700]  ? trace_preempt_on+0x20/0xc0
[   13.305705]  ? __pfx_kthread+0x10/0x10
[   13.305709]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.305713]  ? calculate_sigpending+0x7b/0xa0
[   13.305717]  ? __pfx_kthread+0x10/0x10
[   13.305722]  ret_from_fork+0x3e/0x80
[   13.305726]  ? __pfx_kthread+0x10/0x10
[   13.305730]  ret_from_fork_asm+0x1a/0x30
[   13.305736]  </TASK>
[   13.305738] 
[   13.467369] Allocated by task 179:
[   13.470773]  kasan_save_stack+0x45/0x70
[   13.474612]  kasan_save_track+0x18/0x40
[   13.478452]  kasan_save_alloc_info+0x3b/0x50
[   13.482726]  __kasan_kmalloc+0xb7/0xc0
[   13.486477]  __kmalloc_cache_noprof+0x189/0x420
[   13.491008]  kmalloc_oob_right+0xa9/0x7f0
[   13.495021]  kunit_try_run_case+0x1a2/0x480
[   13.499209]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.504606]  kthread+0x334/0x6f0
[   13.507841]  ret_from_fork+0x3e/0x80
[   13.511426]  ret_from_fork_asm+0x1a/0x30
[   13.515354] 
[   13.516852] The buggy address belongs to the object at ffff888104ee9000
[   13.516852]  which belongs to the cache kmalloc-128 of size 128
[   13.529366] The buggy address is located 0 bytes to the right of
[   13.529366]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   13.542315] 
[   13.543813] The buggy address belongs to the physical page:
[   13.549385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   13.557394] flags: 0x200000000000000(node=0|zone=2)
[   13.562282] page_type: f5(slab)
[   13.565429] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   13.573175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.580914] page dumped because: kasan: bad access detected
[   13.586486] 
[   13.587985] Memory state around the buggy address:
[   13.592777]  ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.599999]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.607226] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.614450]                                                              ^
[   13.621325]  ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.628545]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.635762] ==================================================================
[   14.010421] ==================================================================
[   14.017651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   14.024634] Read of size 1 at addr ffff888104ee9080 by task kunit_try_catch/179
[   14.031942] 
[   14.033441] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.033448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.033450] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.033453] Call Trace:
[   14.033455]  <TASK>
[   14.033457]  dump_stack_lvl+0x73/0xb0
[   14.033460]  print_report+0xd1/0x650
[   14.033464]  ? __virt_addr_valid+0x1db/0x2d0
[   14.033468]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.033476]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033480]  kasan_report+0x141/0x180
[   14.033484]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033489]  __asan_report_load1_noabort+0x18/0x20
[   14.033493]  kmalloc_oob_right+0x68a/0x7f0
[   14.033497]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.033502]  ? __schedule+0x10cc/0x2b30
[   14.033506]  ? ktime_get_ts64+0x83/0x230
[   14.033511]  kunit_try_run_case+0x1a2/0x480
[   14.033515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.033524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.033528]  ? __kthread_parkme+0x82/0x180
[   14.033532]  ? preempt_count_sub+0x50/0x80
[   14.033537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033541]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.033545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033548]  kthread+0x334/0x6f0
[   14.033552]  ? trace_preempt_on+0x20/0xc0
[   14.033557]  ? __pfx_kthread+0x10/0x10
[   14.033561]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.033565]  ? calculate_sigpending+0x7b/0xa0
[   14.033569]  ? __pfx_kthread+0x10/0x10
[   14.033573]  ret_from_fork+0x3e/0x80
[   14.033577]  ? __pfx_kthread+0x10/0x10
[   14.033581]  ret_from_fork_asm+0x1a/0x30
[   14.033587]  </TASK>
[   14.033588] 
[   14.196425] Allocated by task 179:
[   14.199834]  kasan_save_stack+0x45/0x70
[   14.203699]  kasan_save_track+0x18/0x40
[   14.207545]  kasan_save_alloc_info+0x3b/0x50
[   14.211818]  __kasan_kmalloc+0xb7/0xc0
[   14.215569]  __kmalloc_cache_noprof+0x189/0x420
[   14.220104]  kmalloc_oob_right+0xa9/0x7f0
[   14.224124]  kunit_try_run_case+0x1a2/0x480
[   14.228310]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.233722]  kthread+0x334/0x6f0
[   14.236958]  ret_from_fork+0x3e/0x80
[   14.240538]  ret_from_fork_asm+0x1a/0x30
[   14.244463] 
[   14.245962] The buggy address belongs to the object at ffff888104ee9000
[   14.245962]  which belongs to the cache kmalloc-128 of size 128
[   14.258468] The buggy address is located 13 bytes to the right of
[   14.258468]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   14.271502] 
[   14.273002] The buggy address belongs to the physical page:
[   14.278575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   14.286581] flags: 0x200000000000000(node=0|zone=2)
[   14.291459] page_type: f5(slab)
[   14.294609] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.302354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.310094] page dumped because: kasan: bad access detected
[   14.315689] 
[   14.317209] Memory state around the buggy address:
[   14.322000]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.329221]  ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.336437] >ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.343673]                    ^
[   14.346933]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354152]  ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361372] ==================================================================
[   13.648445] ==================================================================
[   13.655679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   13.662645] Write of size 1 at addr ffff888104ee9078 by task kunit_try_catch/179
[   13.670047] 
[   13.671545] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.671553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.671555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.671559] Call Trace:
[   13.671560]  <TASK>
[   13.671562]  dump_stack_lvl+0x73/0xb0
[   13.671566]  print_report+0xd1/0x650
[   13.671570]  ? __virt_addr_valid+0x1db/0x2d0
[   13.671573]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.671581]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671585]  kasan_report+0x141/0x180
[   13.671590]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671595]  __asan_report_store1_noabort+0x1b/0x30
[   13.671598]  kmalloc_oob_right+0x6bd/0x7f0
[   13.671602]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.671607]  ? __schedule+0x10cc/0x2b30
[   13.671611]  ? ktime_get_ts64+0x83/0x230
[   13.671616]  kunit_try_run_case+0x1a2/0x480
[   13.671620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.671624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.671629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.671633]  ? __kthread_parkme+0x82/0x180
[   13.671637]  ? preempt_count_sub+0x50/0x80
[   13.671642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.671646]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.671650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.671654]  kthread+0x334/0x6f0
[   13.671658]  ? trace_preempt_on+0x20/0xc0
[   13.671662]  ? __pfx_kthread+0x10/0x10
[   13.671666]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.671670]  ? calculate_sigpending+0x7b/0xa0
[   13.671674]  ? __pfx_kthread+0x10/0x10
[   13.671678]  ret_from_fork+0x3e/0x80
[   13.671682]  ? __pfx_kthread+0x10/0x10
[   13.671686]  ret_from_fork_asm+0x1a/0x30
[   13.671692]  </TASK>
[   13.671694] 
[   13.834549] Allocated by task 179:
[   13.837955]  kasan_save_stack+0x45/0x70
[   13.841793]  kasan_save_track+0x18/0x40
[   13.845633]  kasan_save_alloc_info+0x3b/0x50
[   13.849907]  __kasan_kmalloc+0xb7/0xc0
[   13.853657]  __kmalloc_cache_noprof+0x189/0x420
[   13.858191]  kmalloc_oob_right+0xa9/0x7f0
[   13.862204]  kunit_try_run_case+0x1a2/0x480
[   13.866388]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.871787]  kthread+0x334/0x6f0
[   13.875022]  ret_from_fork+0x3e/0x80
[   13.878607]  ret_from_fork_asm+0x1a/0x30
[   13.882535] 
[   13.884035] The buggy address belongs to the object at ffff888104ee9000
[   13.884035]  which belongs to the cache kmalloc-128 of size 128
[   13.896549] The buggy address is located 5 bytes to the right of
[   13.896549]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   13.909496] 
[   13.910993] The buggy address belongs to the physical page:
[   13.916567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   13.924575] flags: 0x200000000000000(node=0|zone=2)
[   13.929452] page_type: f5(slab)
[   13.932599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   13.940341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.948086] page dumped because: kasan: bad access detected
[   13.953658] 
[   13.955158] Memory state around the buggy address:
[   13.959950]  ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.967170]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.974389] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.981608]                                                                 ^
[   13.988739]  ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.995959]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.003178] ==================================================================