Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   26.666047] ==================================================================
[   26.666800] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   26.668056] Write of size 1 at addr fff00000c5a34773 by task kunit_try_catch/138
[   26.668312] 
[   26.670003] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc7 #1 PREEMPT 
[   26.670361] Tainted: [N]=TEST
[   26.670473] Hardware name: linux,dummy-virt (DT)
[   26.670979] Call trace:
[   26.671318]  show_stack+0x20/0x38 (C)
[   26.671693]  dump_stack_lvl+0x8c/0xd0
[   26.671848]  print_report+0x118/0x608
[   26.672006]  kasan_report+0xdc/0x128
[   26.672123]  __asan_report_store1_noabort+0x20/0x30
[   26.672249]  kmalloc_oob_right+0x5a4/0x660
[   26.672388]  kunit_try_run_case+0x170/0x3f0
[   26.672514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.672660]  kthread+0x328/0x630
[   26.672785]  ret_from_fork+0x10/0x20
[   26.673080] 
[   26.673136] Allocated by task 138:
[   26.673290]  kasan_save_stack+0x3c/0x68
[   26.673384]  kasan_save_track+0x20/0x40
[   26.673439]  kasan_save_alloc_info+0x40/0x58
[   26.673519]  __kasan_kmalloc+0xd4/0xd8
[   26.673568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.673628]  kmalloc_oob_right+0xb0/0x660
[   26.673681]  kunit_try_run_case+0x170/0x3f0
[   26.673735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.673796]  kthread+0x328/0x630
[   26.673846]  ret_from_fork+0x10/0x20
[   26.673923] 
[   26.674005] The buggy address belongs to the object at fff00000c5a34700
[   26.674005]  which belongs to the cache kmalloc-128 of size 128
[   26.674134] The buggy address is located 0 bytes to the right of
[   26.674134]  allocated 115-byte region [fff00000c5a34700, fff00000c5a34773)
[   26.674229] 
[   26.674336] The buggy address belongs to the physical page:
[   26.674587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   26.674951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.675332] page_type: f5(slab)
[   26.675773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.675865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.676068] page dumped because: kasan: bad access detected
[   26.676171] 
[   26.676274] Memory state around the buggy address:
[   26.676588]  fff00000c5a34600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.676687]  fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.676766] >fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.676841]                                                              ^
[   26.676955]  fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.677017]  fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.677108] ==================================================================
[   26.678362] ==================================================================
[   26.678543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   26.678738] Write of size 1 at addr fff00000c5a34778 by task kunit_try_catch/138
[   26.678934] 
[   26.679044] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   26.679300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.679416] Hardware name: linux,dummy-virt (DT)
[   26.679515] Call trace:
[   26.679562]  show_stack+0x20/0x38 (C)
[   26.679677]  dump_stack_lvl+0x8c/0xd0
[   26.679788]  print_report+0x118/0x608
[   26.679890]  kasan_report+0xdc/0x128
[   26.680006]  __asan_report_store1_noabort+0x20/0x30
[   26.680128]  kmalloc_oob_right+0x538/0x660
[   26.680232]  kunit_try_run_case+0x170/0x3f0
[   26.680345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.680499]  kthread+0x328/0x630
[   26.680668]  ret_from_fork+0x10/0x20
[   26.680851] 
[   26.680924] Allocated by task 138:
[   26.681010]  kasan_save_stack+0x3c/0x68
[   26.681172]  kasan_save_track+0x20/0x40
[   26.681312]  kasan_save_alloc_info+0x40/0x58
[   26.681483]  __kasan_kmalloc+0xd4/0xd8
[   26.681619]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.681728]  kmalloc_oob_right+0xb0/0x660
[   26.681817]  kunit_try_run_case+0x170/0x3f0
[   26.683493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.683632]  kthread+0x328/0x630
[   26.683737]  ret_from_fork+0x10/0x20
[   26.683835] 
[   26.683884] The buggy address belongs to the object at fff00000c5a34700
[   26.683884]  which belongs to the cache kmalloc-128 of size 128
[   26.684036] The buggy address is located 5 bytes to the right of
[   26.684036]  allocated 115-byte region [fff00000c5a34700, fff00000c5a34773)
[   26.684212] 
[   26.684271] The buggy address belongs to the physical page:
[   26.684357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   26.684512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.684653] page_type: f5(slab)
[   26.684766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.684915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.685038] page dumped because: kasan: bad access detected
[   26.685130] 
[   26.685180] Memory state around the buggy address:
[   26.685316]  fff00000c5a34600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.685430]  fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.685556] >fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.685648]                                                                 ^
[   26.685801]  fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686041]  fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686159] ==================================================================
[   26.687553] ==================================================================
[   26.687792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   26.688129] Read of size 1 at addr fff00000c5a34780 by task kunit_try_catch/138
[   26.688337] 
[   26.688652] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   26.689251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.689347] Hardware name: linux,dummy-virt (DT)
[   26.689434] Call trace:
[   26.689513]  show_stack+0x20/0x38 (C)
[   26.689652]  dump_stack_lvl+0x8c/0xd0
[   26.689814]  print_report+0x118/0x608
[   26.689950]  kasan_report+0xdc/0x128
[   26.690258]  __asan_report_load1_noabort+0x20/0x30
[   26.690499]  kmalloc_oob_right+0x5d0/0x660
[   26.690662]  kunit_try_run_case+0x170/0x3f0
[   26.690801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.690963]  kthread+0x328/0x630
[   26.691098]  ret_from_fork+0x10/0x20
[   26.691241] 
[   26.691799] Allocated by task 138:
[   26.692049]  kasan_save_stack+0x3c/0x68
[   26.692352]  kasan_save_track+0x20/0x40
[   26.692518]  kasan_save_alloc_info+0x40/0x58
[   26.692622]  __kasan_kmalloc+0xd4/0xd8
[   26.692714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.692823]  kmalloc_oob_right+0xb0/0x660
[   26.693174]  kunit_try_run_case+0x170/0x3f0
[   26.693502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.693697]  kthread+0x328/0x630
[   26.693995]  ret_from_fork+0x10/0x20
[   26.694293] 
[   26.694568] The buggy address belongs to the object at fff00000c5a34700
[   26.694568]  which belongs to the cache kmalloc-128 of size 128
[   26.694852] The buggy address is located 13 bytes to the right of
[   26.694852]  allocated 115-byte region [fff00000c5a34700, fff00000c5a34773)
[   26.695188] 
[   26.695260] The buggy address belongs to the physical page:
[   26.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   26.696055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.696317] page_type: f5(slab)
[   26.696585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.696718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.696817] page dumped because: kasan: bad access detected
[   26.696898] 
[   26.696945] Memory state around the buggy address:
[   26.697034]  fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.697659]  fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.698116] >fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.698429]                    ^
[   26.698667]  fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.698861]  fff00000c5a34880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.699288] ==================================================================

[   11.981279] ==================================================================
[   11.981758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.982074] Read of size 1 at addr ffff888102a2d180 by task kunit_try_catch/155
[   11.982434] 
[   11.982526] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   11.982567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.982579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.982597] Call Trace:
[   11.982611]  <TASK>
[   11.982625]  dump_stack_lvl+0x73/0xb0
[   11.982649]  print_report+0xd1/0x650
[   11.982678]  ? __virt_addr_valid+0x1db/0x2d0
[   11.982697]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.982718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.982740]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.982761]  kasan_report+0x141/0x180
[   11.982783]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.982809]  __asan_report_load1_noabort+0x18/0x20
[   11.982829]  kmalloc_oob_right+0x68a/0x7f0
[   11.982851]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.982873]  ? __schedule+0x10cc/0x2b30
[   11.982894]  ? __pfx_read_tsc+0x10/0x10
[   11.982912]  ? ktime_get_ts64+0x86/0x230
[   11.982936]  kunit_try_run_case+0x1a5/0x480
[   11.982970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.982991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.983013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.983035]  ? __kthread_parkme+0x82/0x180
[   11.983055]  ? preempt_count_sub+0x50/0x80
[   11.983079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.983101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.983122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.983144]  kthread+0x337/0x6f0
[   11.983161]  ? trace_preempt_on+0x20/0xc0
[   11.983183]  ? __pfx_kthread+0x10/0x10
[   11.983200]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.983220]  ? calculate_sigpending+0x7b/0xa0
[   11.983241]  ? __pfx_kthread+0x10/0x10
[   11.983259]  ret_from_fork+0x41/0x80
[   11.983279]  ? __pfx_kthread+0x10/0x10
[   11.983307]  ret_from_fork_asm+0x1a/0x30
[   11.983338]  </TASK>
[   11.983349] 
[   11.989942] Allocated by task 155:
[   11.990067]  kasan_save_stack+0x45/0x70
[   11.990210]  kasan_save_track+0x18/0x40
[   11.990383]  kasan_save_alloc_info+0x3b/0x50
[   11.990593]  __kasan_kmalloc+0xb7/0xc0
[   11.990793]  __kmalloc_cache_noprof+0x189/0x420
[   11.991010]  kmalloc_oob_right+0xa9/0x7f0
[   11.991208]  kunit_try_run_case+0x1a5/0x480
[   11.991430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.991672]  kthread+0x337/0x6f0
[   11.991811]  ret_from_fork+0x41/0x80
[   11.991941]  ret_from_fork_asm+0x1a/0x30
[   11.992079] 
[   11.992149] The buggy address belongs to the object at ffff888102a2d100
[   11.992149]  which belongs to the cache kmalloc-128 of size 128
[   11.992777] The buggy address is located 13 bytes to the right of
[   11.992777]  allocated 115-byte region [ffff888102a2d100, ffff888102a2d173)
[   11.993352] 
[   11.993486] The buggy address belongs to the physical page:
[   11.993749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   11.994086] flags: 0x200000000000000(node=0|zone=2)
[   11.994325] page_type: f5(slab)
[   11.994515] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.994821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.995122] page dumped because: kasan: bad access detected
[   11.995343] 
[   11.995437] Memory state around the buggy address:
[   11.995610]  ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.995900]  ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.996176] >ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.996467]                    ^
[   11.996626]  ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.996877]  ffff888102a2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.997090] ==================================================================
[   11.918091] ==================================================================
[   11.918846] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.919601] Write of size 1 at addr ffff888102a2d173 by task kunit_try_catch/155
[   11.920406] 
[   11.921610] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   11.921924] Tainted: [N]=TEST
[   11.921959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.922179] Call Trace:
[   11.922247]  <TASK>
[   11.922404]  dump_stack_lvl+0x73/0xb0
[   11.922506]  print_report+0xd1/0x650
[   11.922536]  ? __virt_addr_valid+0x1db/0x2d0
[   11.922560]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.922581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.922603]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.922625]  kasan_report+0x141/0x180
[   11.922648]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.922680]  __asan_report_store1_noabort+0x1b/0x30
[   11.922701]  kmalloc_oob_right+0x6f0/0x7f0
[   11.922723]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.922745]  ? __schedule+0x10cc/0x2b30
[   11.922768]  ? __pfx_read_tsc+0x10/0x10
[   11.922788]  ? ktime_get_ts64+0x86/0x230
[   11.922815]  kunit_try_run_case+0x1a5/0x480
[   11.922841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.922862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.922886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.922908]  ? __kthread_parkme+0x82/0x180
[   11.922930]  ? preempt_count_sub+0x50/0x80
[   11.922957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.922979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.923000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.923022]  kthread+0x337/0x6f0
[   11.923039]  ? trace_preempt_on+0x20/0xc0
[   11.923063]  ? __pfx_kthread+0x10/0x10
[   11.923081]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.923101]  ? calculate_sigpending+0x7b/0xa0
[   11.923123]  ? __pfx_kthread+0x10/0x10
[   11.923141]  ret_from_fork+0x41/0x80
[   11.923161]  ? __pfx_kthread+0x10/0x10
[   11.923179]  ret_from_fork_asm+0x1a/0x30
[   11.923230]  </TASK>
[   11.923304] 
[   11.939197] Allocated by task 155:
[   11.939901]  kasan_save_stack+0x45/0x70
[   11.940383]  kasan_save_track+0x18/0x40
[   11.940894]  kasan_save_alloc_info+0x3b/0x50
[   11.941472]  __kasan_kmalloc+0xb7/0xc0
[   11.941966]  __kmalloc_cache_noprof+0x189/0x420
[   11.942523]  kmalloc_oob_right+0xa9/0x7f0
[   11.943078]  kunit_try_run_case+0x1a5/0x480
[   11.943603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.944123]  kthread+0x337/0x6f0
[   11.944250]  ret_from_fork+0x41/0x80
[   11.944394]  ret_from_fork_asm+0x1a/0x30
[   11.945002] 
[   11.945419] The buggy address belongs to the object at ffff888102a2d100
[   11.945419]  which belongs to the cache kmalloc-128 of size 128
[   11.946806] The buggy address is located 0 bytes to the right of
[   11.946806]  allocated 115-byte region [ffff888102a2d100, ffff888102a2d173)
[   11.947887] 
[   11.948057] The buggy address belongs to the physical page:
[   11.949066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   11.950107] flags: 0x200000000000000(node=0|zone=2)
[   11.951076] page_type: f5(slab)
[   11.951908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.952265] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.952623] page dumped because: kasan: bad access detected
[   11.953423] 
[   11.953731] Memory state around the buggy address:
[   11.954671]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.955422]  ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.956127] >ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.956664]                                                              ^
[   11.956926]  ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.957673]  ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.958502] ==================================================================
[   11.960884] ==================================================================
[   11.961586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.961819] Write of size 1 at addr ffff888102a2d178 by task kunit_try_catch/155
[   11.962079] 
[   11.962175] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   11.962220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.962231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.962252] Call Trace:
[   11.962265]  <TASK>
[   11.962281]  dump_stack_lvl+0x73/0xb0
[   11.962321]  print_report+0xd1/0x650
[   11.962343]  ? __virt_addr_valid+0x1db/0x2d0
[   11.962364]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.962384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.962406]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.962610]  kasan_report+0x141/0x180
[   11.962638]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.962670]  __asan_report_store1_noabort+0x1b/0x30
[   11.962756]  kmalloc_oob_right+0x6bd/0x7f0
[   11.962779]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.962802]  ? __schedule+0x10cc/0x2b30
[   11.962824]  ? __pfx_read_tsc+0x10/0x10
[   11.962843]  ? ktime_get_ts64+0x86/0x230
[   11.962868]  kunit_try_run_case+0x1a5/0x480
[   11.962892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.962915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.962937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.962959]  ? __kthread_parkme+0x82/0x180
[   11.962980]  ? preempt_count_sub+0x50/0x80
[   11.963004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.963026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.963047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.963069]  kthread+0x337/0x6f0
[   11.963085]  ? trace_preempt_on+0x20/0xc0
[   11.963108]  ? __pfx_kthread+0x10/0x10
[   11.963126]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.963145]  ? calculate_sigpending+0x7b/0xa0
[   11.963166]  ? __pfx_kthread+0x10/0x10
[   11.963184]  ret_from_fork+0x41/0x80
[   11.963203]  ? __pfx_kthread+0x10/0x10
[   11.963220]  ret_from_fork_asm+0x1a/0x30
[   11.963251]  </TASK>
[   11.963262] 
[   11.972787] Allocated by task 155:
[   11.972970]  kasan_save_stack+0x45/0x70
[   11.973168]  kasan_save_track+0x18/0x40
[   11.973319]  kasan_save_alloc_info+0x3b/0x50
[   11.973658]  __kasan_kmalloc+0xb7/0xc0
[   11.973815]  __kmalloc_cache_noprof+0x189/0x420
[   11.974001]  kmalloc_oob_right+0xa9/0x7f0
[   11.974142]  kunit_try_run_case+0x1a5/0x480
[   11.974358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.974741]  kthread+0x337/0x6f0
[   11.974864]  ret_from_fork+0x41/0x80
[   11.974996]  ret_from_fork_asm+0x1a/0x30
[   11.975239] 
[   11.975346] The buggy address belongs to the object at ffff888102a2d100
[   11.975346]  which belongs to the cache kmalloc-128 of size 128
[   11.976036] The buggy address is located 5 bytes to the right of
[   11.976036]  allocated 115-byte region [ffff888102a2d100, ffff888102a2d173)
[   11.976457] 
[   11.976529] The buggy address belongs to the physical page:
[   11.976700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   11.977147] flags: 0x200000000000000(node=0|zone=2)
[   11.977390] page_type: f5(slab)
[   11.977558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.977978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.978295] page dumped because: kasan: bad access detected
[   11.978508] 
[   11.978607] Memory state around the buggy address:
[   11.978803]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.979020]  ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.979330] >ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.979904]                                                                 ^
[   11.980181]  ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.980408]  ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.980657] ==================================================================