Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   16.764230] ==================================================================
[   16.764662] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.765597] Write of size 1 at addr fff00000c3ef0a73 by task kunit_try_catch/136
[   16.765714] 
[   16.767069] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.767407] Tainted: [N]=TEST
[   16.767480] Hardware name: linux,dummy-virt (DT)
[   16.767803] Call trace:
[   16.767999]  show_stack+0x20/0x38 (C)
[   16.768165]  dump_stack_lvl+0x8c/0xd0
[   16.768248]  print_report+0x118/0x608
[   16.768308]  kasan_report+0xdc/0x128
[   16.768391]  __asan_report_store1_noabort+0x20/0x30
[   16.768458]  kmalloc_oob_right+0x5a4/0x660
[   16.768520]  kunit_try_run_case+0x170/0x3f0
[   16.768583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.768643]  kthread+0x328/0x630
[   16.768695]  ret_from_fork+0x10/0x20
[   16.768870] 
[   16.768913] Allocated by task 136:
[   16.769093]  kasan_save_stack+0x3c/0x68
[   16.769169]  kasan_save_track+0x20/0x40
[   16.769207]  kasan_save_alloc_info+0x40/0x58
[   16.769245]  __kasan_kmalloc+0xd4/0xd8
[   16.769279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.769330]  kmalloc_oob_right+0xb0/0x660
[   16.769369]  kunit_try_run_case+0x170/0x3f0
[   16.769405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.769445]  kthread+0x328/0x630
[   16.769476]  ret_from_fork+0x10/0x20
[   16.769532] 
[   16.769597] The buggy address belongs to the object at fff00000c3ef0a00
[   16.769597]  which belongs to the cache kmalloc-128 of size 128
[   16.769696] The buggy address is located 0 bytes to the right of
[   16.769696]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.769759] 
[   16.769854] The buggy address belongs to the physical page:
[   16.770083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.770403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.770732] page_type: f5(slab)
[   16.771278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.771429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.771625] page dumped because: kasan: bad access detected
[   16.771709] 
[   16.771746] Memory state around the buggy address:
[   16.772007]  fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.772082]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772139] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.772195]                                                              ^
[   16.772283]  fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772351]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.772422] ==================================================================
[   16.786382] ==================================================================
[   16.786479] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.786585] Read of size 1 at addr fff00000c3ef0a80 by task kunit_try_catch/136
[   16.786697] 
[   16.786996] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.787181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.787469] Hardware name: linux,dummy-virt (DT)
[   16.787537] Call trace:
[   16.787586]  show_stack+0x20/0x38 (C)
[   16.787698]  dump_stack_lvl+0x8c/0xd0
[   16.787821]  print_report+0x118/0x608
[   16.787943]  kasan_report+0xdc/0x128
[   16.788046]  __asan_report_load1_noabort+0x20/0x30
[   16.788211]  kmalloc_oob_right+0x5d0/0x660
[   16.788416]  kunit_try_run_case+0x170/0x3f0
[   16.788609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.788741]  kthread+0x328/0x630
[   16.789028]  ret_from_fork+0x10/0x20
[   16.789410] 
[   16.789455] Allocated by task 136:
[   16.789711]  kasan_save_stack+0x3c/0x68
[   16.789891]  kasan_save_track+0x20/0x40
[   16.789977]  kasan_save_alloc_info+0x40/0x58
[   16.790061]  __kasan_kmalloc+0xd4/0xd8
[   16.790456]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.790594]  kmalloc_oob_right+0xb0/0x660
[   16.790682]  kunit_try_run_case+0x170/0x3f0
[   16.790816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.790949]  kthread+0x328/0x630
[   16.791194]  ret_from_fork+0x10/0x20
[   16.791278] 
[   16.791316] The buggy address belongs to the object at fff00000c3ef0a00
[   16.791316]  which belongs to the cache kmalloc-128 of size 128
[   16.791429] The buggy address is located 13 bytes to the right of
[   16.791429]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.791551] 
[   16.791589] The buggy address belongs to the physical page:
[   16.791645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.792001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.792164] page_type: f5(slab)
[   16.792275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.792390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.792532] page dumped because: kasan: bad access detected
[   16.792639] 
[   16.792692] Memory state around the buggy address:
[   16.792760]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.792855]  fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.792947] >fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793031]                    ^
[   16.793092]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793189]  fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793307] ==================================================================
[   16.773787] ==================================================================
[   16.773868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.773971] Write of size 1 at addr fff00000c3ef0a78 by task kunit_try_catch/136
[   16.774076] 
[   16.774142] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   16.774332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.774392] Hardware name: linux,dummy-virt (DT)
[   16.774457] Call trace:
[   16.774508]  show_stack+0x20/0x38 (C)
[   16.774633]  dump_stack_lvl+0x8c/0xd0
[   16.774747]  print_report+0x118/0x608
[   16.774859]  kasan_report+0xdc/0x128
[   16.774971]  __asan_report_store1_noabort+0x20/0x30
[   16.775094]  kmalloc_oob_right+0x538/0x660
[   16.775208]  kunit_try_run_case+0x170/0x3f0
[   16.777881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.778105]  kthread+0x328/0x630
[   16.778616]  ret_from_fork+0x10/0x20
[   16.779103] 
[   16.779154] Allocated by task 136:
[   16.779211]  kasan_save_stack+0x3c/0x68
[   16.779596]  kasan_save_track+0x20/0x40
[   16.779905]  kasan_save_alloc_info+0x40/0x58
[   16.780017]  __kasan_kmalloc+0xd4/0xd8
[   16.780099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   16.780797]  kmalloc_oob_right+0xb0/0x660
[   16.781198]  kunit_try_run_case+0x170/0x3f0
[   16.781288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.781616]  kthread+0x328/0x630
[   16.781878]  ret_from_fork+0x10/0x20
[   16.781957] 
[   16.782423] The buggy address belongs to the object at fff00000c3ef0a00
[   16.782423]  which belongs to the cache kmalloc-128 of size 128
[   16.782575] The buggy address is located 5 bytes to the right of
[   16.782575]  allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73)
[   16.782959] 
[   16.783014] The buggy address belongs to the physical page:
[   16.783413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0
[   16.783544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.783645] page_type: f5(slab)
[   16.784003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.784194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.784566] page dumped because: kasan: bad access detected
[   16.784822] 
[   16.785057] Memory state around the buggy address:
[   16.785368]  fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.785476]  fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785566] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.785654]                                                                 ^
[   16.785743]  fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785839]  fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785924] ==================================================================


[   10.250442] ==================================================================
[   10.251481] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.252609] Write of size 1 at addr ffff888102a7a973 by task kunit_try_catch/154
[   10.253417] 
[   10.254481] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.254831] Tainted: [N]=TEST
[   10.254862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.255092] Call Trace:
[   10.255160]  <TASK>
[   10.255302]  dump_stack_lvl+0x73/0xb0
[   10.255398]  print_report+0xd1/0x650
[   10.255427]  ? __virt_addr_valid+0x1db/0x2d0
[   10.255452]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.255473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.255496]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.255517]  kasan_report+0x141/0x180
[   10.255540]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.255566]  __asan_report_store1_noabort+0x1b/0x30
[   10.255587]  kmalloc_oob_right+0x6f0/0x7f0
[   10.255609]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.255632]  ? __schedule+0x10cc/0x2b60
[   10.255656]  ? __pfx_read_tsc+0x10/0x10
[   10.255677]  ? ktime_get_ts64+0x86/0x230
[   10.255703]  kunit_try_run_case+0x1a5/0x480
[   10.255735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.255754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.255780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.255804]  ? __kthread_parkme+0x82/0x180
[   10.255826]  ? preempt_count_sub+0x50/0x80
[   10.255850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.255871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.255895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.255919]  kthread+0x337/0x6f0
[   10.255938]  ? trace_preempt_on+0x20/0xc0
[   10.255964]  ? __pfx_kthread+0x10/0x10
[   10.255984]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.256016]  ? calculate_sigpending+0x7b/0xa0
[   10.256040]  ? __pfx_kthread+0x10/0x10
[   10.256061]  ret_from_fork+0x116/0x1d0
[   10.256079]  ? __pfx_kthread+0x10/0x10
[   10.256099]  ret_from_fork_asm+0x1a/0x30
[   10.256151]  </TASK>
[   10.256213] 
[   10.267292] Allocated by task 154:
[   10.267689]  kasan_save_stack+0x45/0x70
[   10.268153]  kasan_save_track+0x18/0x40
[   10.268529]  kasan_save_alloc_info+0x3b/0x50
[   10.268755]  __kasan_kmalloc+0xb7/0xc0
[   10.269016]  __kmalloc_cache_noprof+0x189/0x420
[   10.269482]  kmalloc_oob_right+0xa9/0x7f0
[   10.269923]  kunit_try_run_case+0x1a5/0x480
[   10.270101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.270618]  kthread+0x337/0x6f0
[   10.270960]  ret_from_fork+0x116/0x1d0
[   10.271231]  ret_from_fork_asm+0x1a/0x30
[   10.271564] 
[   10.271690] The buggy address belongs to the object at ffff888102a7a900
[   10.271690]  which belongs to the cache kmalloc-128 of size 128
[   10.272347] The buggy address is located 0 bytes to the right of
[   10.272347]  allocated 115-byte region [ffff888102a7a900, ffff888102a7a973)
[   10.273590] 
[   10.273867] The buggy address belongs to the physical page:
[   10.274684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   10.275739] flags: 0x200000000000000(node=0|zone=2)
[   10.276654] page_type: f5(slab)
[   10.277272] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.277532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.277912] page dumped because: kasan: bad access detected
[   10.278561] 
[   10.278733] Memory state around the buggy address:
[   10.279525]  ffff888102a7a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.280281]  ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.281130] >ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.281948]                                                              ^
[   10.282675]  ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.283438]  ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.283957] ==================================================================
[   10.317198] ==================================================================
[   10.318104] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.318776] Read of size 1 at addr ffff888102a7a980 by task kunit_try_catch/154
[   10.319341] 
[   10.319539] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.319585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.319597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.319619] Call Trace:
[   10.319634]  <TASK>
[   10.319650]  dump_stack_lvl+0x73/0xb0
[   10.319674]  print_report+0xd1/0x650
[   10.319695]  ? __virt_addr_valid+0x1db/0x2d0
[   10.319718]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.319738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.319760]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.319783]  kasan_report+0x141/0x180
[   10.319804]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.319830]  __asan_report_load1_noabort+0x18/0x20
[   10.319851]  kmalloc_oob_right+0x68a/0x7f0
[   10.319873]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.319895]  ? __schedule+0x10cc/0x2b60
[   10.319918]  ? __pfx_read_tsc+0x10/0x10
[   10.319938]  ? ktime_get_ts64+0x86/0x230
[   10.319961]  kunit_try_run_case+0x1a5/0x480
[   10.319981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.320000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.320024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.320047]  ? __kthread_parkme+0x82/0x180
[   10.320067]  ? preempt_count_sub+0x50/0x80
[   10.320124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.320145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.320169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.320194]  kthread+0x337/0x6f0
[   10.320213]  ? trace_preempt_on+0x20/0xc0
[   10.320235]  ? __pfx_kthread+0x10/0x10
[   10.320255]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.320278]  ? calculate_sigpending+0x7b/0xa0
[   10.320301]  ? __pfx_kthread+0x10/0x10
[   10.320322]  ret_from_fork+0x116/0x1d0
[   10.320355]  ? __pfx_kthread+0x10/0x10
[   10.320387]  ret_from_fork_asm+0x1a/0x30
[   10.320420]  </TASK>
[   10.320431] 
[   10.330483] Allocated by task 154:
[   10.330703]  kasan_save_stack+0x45/0x70
[   10.330938]  kasan_save_track+0x18/0x40
[   10.331249]  kasan_save_alloc_info+0x3b/0x50
[   10.331484]  __kasan_kmalloc+0xb7/0xc0
[   10.331621]  __kmalloc_cache_noprof+0x189/0x420
[   10.331819]  kmalloc_oob_right+0xa9/0x7f0
[   10.332211]  kunit_try_run_case+0x1a5/0x480
[   10.332437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.332672]  kthread+0x337/0x6f0
[   10.332793]  ret_from_fork+0x116/0x1d0
[   10.332983]  ret_from_fork_asm+0x1a/0x30
[   10.333293] 
[   10.333398] The buggy address belongs to the object at ffff888102a7a900
[   10.333398]  which belongs to the cache kmalloc-128 of size 128
[   10.333983] The buggy address is located 13 bytes to the right of
[   10.333983]  allocated 115-byte region [ffff888102a7a900, ffff888102a7a973)
[   10.334574] 
[   10.334648] The buggy address belongs to the physical page:
[   10.334924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   10.335329] flags: 0x200000000000000(node=0|zone=2)
[   10.335509] page_type: f5(slab)
[   10.335675] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.336205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.336549] page dumped because: kasan: bad access detected
[   10.336798] 
[   10.336889] Memory state around the buggy address:
[   10.337167]  ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.337975]  ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.338567] >ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.339033]                    ^
[   10.339347]  ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.339857]  ffff888102a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.340482] ==================================================================
[   10.285727] ==================================================================
[   10.286320] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.286800] Write of size 1 at addr ffff888102a7a978 by task kunit_try_catch/154
[   10.287026] 
[   10.287113] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   10.287161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.287189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.287213] Call Trace:
[   10.287230]  <TASK>
[   10.287245]  dump_stack_lvl+0x73/0xb0
[   10.287283]  print_report+0xd1/0x650
[   10.287306]  ? __virt_addr_valid+0x1db/0x2d0
[   10.287328]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.287348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.287370]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.287413]  kasan_report+0x141/0x180
[   10.287436]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.287462]  __asan_report_store1_noabort+0x1b/0x30
[   10.287483]  kmalloc_oob_right+0x6bd/0x7f0
[   10.287505]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.287528]  ? __schedule+0x10cc/0x2b60
[   10.287550]  ? __pfx_read_tsc+0x10/0x10
[   10.287570]  ? ktime_get_ts64+0x86/0x230
[   10.287594]  kunit_try_run_case+0x1a5/0x480
[   10.287614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.287647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.287681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.287705]  ? __kthread_parkme+0x82/0x180
[   10.287757]  ? preempt_count_sub+0x50/0x80
[   10.287780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.287800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.287824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.287848]  kthread+0x337/0x6f0
[   10.287867]  ? trace_preempt_on+0x20/0xc0
[   10.287889]  ? __pfx_kthread+0x10/0x10
[   10.287909]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.287930]  ? calculate_sigpending+0x7b/0xa0
[   10.287953]  ? __pfx_kthread+0x10/0x10
[   10.287974]  ret_from_fork+0x116/0x1d0
[   10.287992]  ? __pfx_kthread+0x10/0x10
[   10.288024]  ret_from_fork_asm+0x1a/0x30
[   10.288053]  </TASK>
[   10.288063] 
[   10.302062] Allocated by task 154:
[   10.302426]  kasan_save_stack+0x45/0x70
[   10.302574]  kasan_save_track+0x18/0x40
[   10.302713]  kasan_save_alloc_info+0x3b/0x50
[   10.303170]  __kasan_kmalloc+0xb7/0xc0
[   10.303587]  __kmalloc_cache_noprof+0x189/0x420
[   10.304103]  kmalloc_oob_right+0xa9/0x7f0
[   10.304514]  kunit_try_run_case+0x1a5/0x480
[   10.305088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.305569]  kthread+0x337/0x6f0
[   10.305761]  ret_from_fork+0x116/0x1d0
[   10.306193]  ret_from_fork_asm+0x1a/0x30
[   10.306513] 
[   10.306591] The buggy address belongs to the object at ffff888102a7a900
[   10.306591]  which belongs to the cache kmalloc-128 of size 128
[   10.307603] The buggy address is located 5 bytes to the right of
[   10.307603]  allocated 115-byte region [ffff888102a7a900, ffff888102a7a973)
[   10.308628] 
[   10.308756] The buggy address belongs to the physical page:
[   10.309251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   10.309501] flags: 0x200000000000000(node=0|zone=2)
[   10.309661] page_type: f5(slab)
[   10.309944] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.310867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.311667] page dumped because: kasan: bad access detected
[   10.312309] 
[   10.312482] Memory state around the buggy address:
[   10.313041]  ffff888102a7a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.313734]  ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.313947] >ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.314451]                                                                 ^
[   10.315166]  ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.315892]  ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.316448] ==================================================================