Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   23.113665] ==================================================================
[   23.113756] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   23.113874] Read of size 1 at addr fff00000c3fb3c80 by task kunit_try_catch/138
[   23.114189] 
[   23.114557] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.114755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.114821] Hardware name: linux,dummy-virt (DT)
[   23.114894] Call trace:
[   23.114945]  show_stack+0x20/0x38 (C)
[   23.115063]  dump_stack_lvl+0x8c/0xd0
[   23.115177]  print_report+0x118/0x608
[   23.115284]  kasan_report+0xdc/0x128
[   23.116195]  __asan_report_load1_noabort+0x20/0x30
[   23.116727]  kmalloc_oob_right+0x5d0/0x660
[   23.116889]  kunit_try_run_case+0x170/0x3f0
[   23.117031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.117176]  kthread+0x328/0x630
[   23.117298]  ret_from_fork+0x10/0x20
[   23.117453] 
[   23.117499] Allocated by task 138:
[   23.118471]  kasan_save_stack+0x3c/0x68
[   23.118588]  kasan_save_track+0x20/0x40
[   23.118696]  kasan_save_alloc_info+0x40/0x58
[   23.118878]  __kasan_kmalloc+0xd4/0xd8
[   23.118989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.119369]  kmalloc_oob_right+0xb0/0x660
[   23.119868]  kunit_try_run_case+0x170/0x3f0
[   23.120173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.120579]  kthread+0x328/0x630
[   23.120941]  ret_from_fork+0x10/0x20
[   23.121277] 
[   23.121367] The buggy address belongs to the object at fff00000c3fb3c00
[   23.121367]  which belongs to the cache kmalloc-128 of size 128
[   23.121876] The buggy address is located 13 bytes to the right of
[   23.121876]  allocated 115-byte region [fff00000c3fb3c00, fff00000c3fb3c73)
[   23.122524] 
[   23.122610] The buggy address belongs to the physical page:
[   23.122680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb3
[   23.122803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.122919] page_type: f5(slab)
[   23.124303] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.124978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.125091] page dumped because: kasan: bad access detected
[   23.125168] 
[   23.125209] Memory state around the buggy address:
[   23.125274]  fff00000c3fb3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.125397]  fff00000c3fb3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.125509] >fff00000c3fb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.125672]                    ^
[   23.125879]  fff00000c3fb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.126086]  fff00000c3fb3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.126179] ==================================================================
[   23.097213] ==================================================================
[   23.097987] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   23.098890] Write of size 1 at addr fff00000c3fb3c78 by task kunit_try_catch/138
[   23.099426] 
[   23.099511] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.100253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.100398] Hardware name: linux,dummy-virt (DT)
[   23.100496] Call trace:
[   23.100593]  show_stack+0x20/0x38 (C)
[   23.100729]  dump_stack_lvl+0x8c/0xd0
[   23.101084]  print_report+0x118/0x608
[   23.101207]  kasan_report+0xdc/0x128
[   23.101412]  __asan_report_store1_noabort+0x20/0x30
[   23.101545]  kmalloc_oob_right+0x538/0x660
[   23.101662]  kunit_try_run_case+0x170/0x3f0
[   23.101777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.101910]  kthread+0x328/0x630
[   23.102432]  ret_from_fork+0x10/0x20
[   23.102947] 
[   23.103026] Allocated by task 138:
[   23.103107]  kasan_save_stack+0x3c/0x68
[   23.103317]  kasan_save_track+0x20/0x40
[   23.103458]  kasan_save_alloc_info+0x40/0x58
[   23.103749]  __kasan_kmalloc+0xd4/0xd8
[   23.103913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.104316]  kmalloc_oob_right+0xb0/0x660
[   23.104469]  kunit_try_run_case+0x170/0x3f0
[   23.104582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.105243]  kthread+0x328/0x630
[   23.105358]  ret_from_fork+0x10/0x20
[   23.105483] 
[   23.105533] The buggy address belongs to the object at fff00000c3fb3c00
[   23.105533]  which belongs to the cache kmalloc-128 of size 128
[   23.105671] The buggy address is located 5 bytes to the right of
[   23.105671]  allocated 115-byte region [fff00000c3fb3c00, fff00000c3fb3c73)
[   23.105860] 
[   23.105916] The buggy address belongs to the physical page:
[   23.106243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb3
[   23.106373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.106507] page_type: f5(slab)
[   23.107455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.107601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.108009] page dumped because: kasan: bad access detected
[   23.108834] 
[   23.108920] Memory state around the buggy address:
[   23.109184]  fff00000c3fb3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.109679]  fff00000c3fb3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.109914] >fff00000c3fb3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.110025]                                                                 ^
[   23.110122]  fff00000c3fb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.110228]  fff00000c3fb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.110969] ==================================================================
[   23.087411] ==================================================================
[   23.087816] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   23.089307] Write of size 1 at addr fff00000c3fb3c73 by task kunit_try_catch/138
[   23.089477] 
[   23.090435] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc2 #1 PREEMPT 
[   23.090615] Tainted: [N]=TEST
[   23.090661] Hardware name: linux,dummy-virt (DT)
[   23.090922] Call trace:
[   23.091130]  show_stack+0x20/0x38 (C)
[   23.091297]  dump_stack_lvl+0x8c/0xd0
[   23.091397]  print_report+0x118/0x608
[   23.091462]  kasan_report+0xdc/0x128
[   23.091516]  __asan_report_store1_noabort+0x20/0x30
[   23.091576]  kmalloc_oob_right+0x5a4/0x660
[   23.091633]  kunit_try_run_case+0x170/0x3f0
[   23.091696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.091763]  kthread+0x328/0x630
[   23.091821]  ret_from_fork+0x10/0x20
[   23.092014] 
[   23.092065] Allocated by task 138:
[   23.092345]  kasan_save_stack+0x3c/0x68
[   23.092523]  kasan_save_track+0x20/0x40
[   23.092599]  kasan_save_alloc_info+0x40/0x58
[   23.092647]  __kasan_kmalloc+0xd4/0xd8
[   23.092689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.092738]  kmalloc_oob_right+0xb0/0x660
[   23.092784]  kunit_try_run_case+0x170/0x3f0
[   23.092834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.092888]  kthread+0x328/0x630
[   23.092931]  ret_from_fork+0x10/0x20
[   23.093006] 
[   23.093085] The buggy address belongs to the object at fff00000c3fb3c00
[   23.093085]  which belongs to the cache kmalloc-128 of size 128
[   23.093205] The buggy address is located 0 bytes to the right of
[   23.093205]  allocated 115-byte region [fff00000c3fb3c00, fff00000c3fb3c73)
[   23.093289] 
[   23.093411] The buggy address belongs to the physical page:
[   23.093653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb3
[   23.093973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.094320] page_type: f5(slab)
[   23.094683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.094768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.094905] page dumped because: kasan: bad access detected
[   23.094960] 
[   23.094992] Memory state around the buggy address:
[   23.095245]  fff00000c3fb3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.095335]  fff00000c3fb3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095428] >fff00000c3fb3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.095499]                                                              ^
[   23.095601]  fff00000c3fb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095655]  fff00000c3fb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095737] ==================================================================

[   10.875731] ==================================================================
[   10.876766] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.877855] Read of size 1 at addr ffff8881029d0e80 by task kunit_try_catch/156
[   10.878327] 
[   10.878578] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   10.878717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.878754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.878797] Call Trace:
[   10.878839]  <TASK>
[   10.878878]  dump_stack_lvl+0x73/0xb0
[   10.878943]  print_report+0xd1/0x650
[   10.878973]  ? __virt_addr_valid+0x1db/0x2d0
[   10.878994]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.879014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.879034]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.879054]  kasan_report+0x141/0x180
[   10.879074]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.879105]  __asan_report_load1_noabort+0x18/0x20
[   10.879136]  kmalloc_oob_right+0x68a/0x7f0
[   10.879158]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.879179]  ? __schedule+0x10cc/0x2b60
[   10.879200]  ? __pfx_read_tsc+0x10/0x10
[   10.879219]  ? ktime_get_ts64+0x86/0x230
[   10.879242]  kunit_try_run_case+0x1a5/0x480
[   10.879266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.879285]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.879306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.879326]  ? __kthread_parkme+0x82/0x180
[   10.879346]  ? preempt_count_sub+0x50/0x80
[   10.879370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.879391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.879411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.879431]  kthread+0x337/0x6f0
[   10.879447]  ? trace_preempt_on+0x20/0xc0
[   10.879468]  ? __pfx_kthread+0x10/0x10
[   10.879484]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.879504]  ? calculate_sigpending+0x7b/0xa0
[   10.879523]  ? __pfx_kthread+0x10/0x10
[   10.879543]  ret_from_fork+0x41/0x80
[   10.879570]  ? __pfx_kthread+0x10/0x10
[   10.879587]  ret_from_fork_asm+0x1a/0x30
[   10.879616]  </TASK>
[   10.879642] 
[   10.888027] Allocated by task 156:
[   10.888344]  kasan_save_stack+0x45/0x70
[   10.888778]  kasan_save_track+0x18/0x40
[   10.888989]  kasan_save_alloc_info+0x3b/0x50
[   10.889155]  __kasan_kmalloc+0xb7/0xc0
[   10.889322]  __kmalloc_cache_noprof+0x189/0x420
[   10.889506]  kmalloc_oob_right+0xa9/0x7f0
[   10.889690]  kunit_try_run_case+0x1a5/0x480
[   10.890019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.890451]  kthread+0x337/0x6f0
[   10.890797]  ret_from_fork+0x41/0x80
[   10.891122]  ret_from_fork_asm+0x1a/0x30
[   10.891514] 
[   10.891711] The buggy address belongs to the object at ffff8881029d0e00
[   10.891711]  which belongs to the cache kmalloc-128 of size 128
[   10.892494] The buggy address is located 13 bytes to the right of
[   10.892494]  allocated 115-byte region [ffff8881029d0e00, ffff8881029d0e73)
[   10.892982] 
[   10.893099] The buggy address belongs to the physical page:
[   10.893309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d0
[   10.893991] flags: 0x200000000000000(node=0|zone=2)
[   10.894412] page_type: f5(slab)
[   10.894763] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.895238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.895664] page dumped because: kasan: bad access detected
[   10.895899] 
[   10.896001] Memory state around the buggy address:
[   10.896184]  ffff8881029d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.896419]  ffff8881029d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.896656] >ffff8881029d0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.896898]                    ^
[   10.897218]  ffff8881029d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.897705]  ffff8881029d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.898181] ==================================================================
[   10.820179] ==================================================================
[   10.821128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.822047] Write of size 1 at addr ffff8881029d0e73 by task kunit_try_catch/156
[   10.822503] 
[   10.824116] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   10.824450] Tainted: [N]=TEST
[   10.824486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.824788] Call Trace:
[   10.824866]  <TASK>
[   10.825022]  dump_stack_lvl+0x73/0xb0
[   10.825125]  print_report+0xd1/0x650
[   10.825155]  ? __virt_addr_valid+0x1db/0x2d0
[   10.825179]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.825199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.825220]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.825240]  kasan_report+0x141/0x180
[   10.825260]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.825284]  __asan_report_store1_noabort+0x1b/0x30
[   10.825302]  kmalloc_oob_right+0x6f0/0x7f0
[   10.825323]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.825343]  ? __schedule+0x10cc/0x2b60
[   10.825365]  ? __pfx_read_tsc+0x10/0x10
[   10.825384]  ? ktime_get_ts64+0x86/0x230
[   10.825409]  kunit_try_run_case+0x1a5/0x480
[   10.825434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.825454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.825476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.825496]  ? __kthread_parkme+0x82/0x180
[   10.825518]  ? preempt_count_sub+0x50/0x80
[   10.825545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.825573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.825594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.825614]  kthread+0x337/0x6f0
[   10.825648]  ? trace_preempt_on+0x20/0xc0
[   10.825672]  ? __pfx_kthread+0x10/0x10
[   10.825688]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.825707]  ? calculate_sigpending+0x7b/0xa0
[   10.825727]  ? __pfx_kthread+0x10/0x10
[   10.825744]  ret_from_fork+0x41/0x80
[   10.825762]  ? __pfx_kthread+0x10/0x10
[   10.825779]  ret_from_fork_asm+0x1a/0x30
[   10.825832]  </TASK>
[   10.825900] 
[   10.834083] Allocated by task 156:
[   10.835077]  kasan_save_stack+0x45/0x70
[   10.835525]  kasan_save_track+0x18/0x40
[   10.835874]  kasan_save_alloc_info+0x3b/0x50
[   10.836418]  __kasan_kmalloc+0xb7/0xc0
[   10.836720]  __kmalloc_cache_noprof+0x189/0x420
[   10.837011]  kmalloc_oob_right+0xa9/0x7f0
[   10.837316]  kunit_try_run_case+0x1a5/0x480
[   10.837609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.837971]  kthread+0x337/0x6f0
[   10.838132]  ret_from_fork+0x41/0x80
[   10.838401]  ret_from_fork_asm+0x1a/0x30
[   10.838898] 
[   10.839196] The buggy address belongs to the object at ffff8881029d0e00
[   10.839196]  which belongs to the cache kmalloc-128 of size 128
[   10.840084] The buggy address is located 0 bytes to the right of
[   10.840084]  allocated 115-byte region [ffff8881029d0e00, ffff8881029d0e73)
[   10.840795] 
[   10.841054] The buggy address belongs to the physical page:
[   10.841919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d0
[   10.842635] flags: 0x200000000000000(node=0|zone=2)
[   10.843435] page_type: f5(slab)
[   10.844219] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.844586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.845136] page dumped because: kasan: bad access detected
[   10.845587] 
[   10.845757] Memory state around the buggy address:
[   10.846640]  ffff8881029d0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.847056]  ffff8881029d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.847513] >ffff8881029d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.847977]                                                              ^
[   10.848463]  ffff8881029d0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.848887]  ffff8881029d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.849421] ==================================================================
[   10.851535] ==================================================================
[   10.851748] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.851966] Write of size 1 at addr ffff8881029d0e78 by task kunit_try_catch/156
[   10.852485] 
[   10.852747] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   10.852844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.852868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.852933] Call Trace:
[   10.852977]  <TASK>
[   10.853027]  dump_stack_lvl+0x73/0xb0
[   10.853082]  print_report+0xd1/0x650
[   10.853125]  ? __virt_addr_valid+0x1db/0x2d0
[   10.853186]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.853219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.853260]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.853291]  kasan_report+0x141/0x180
[   10.853323]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.853357]  __asan_report_store1_noabort+0x1b/0x30
[   10.853412]  kmalloc_oob_right+0x6bd/0x7f0
[   10.853452]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.853491]  ? __schedule+0x10cc/0x2b60
[   10.853530]  ? __pfx_read_tsc+0x10/0x10
[   10.853584]  ? ktime_get_ts64+0x86/0x230
[   10.853642]  kunit_try_run_case+0x1a5/0x480
[   10.853688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.853725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.853770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.853810]  ? __kthread_parkme+0x82/0x180
[   10.853895]  ? preempt_count_sub+0x50/0x80
[   10.853954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.854004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.854051]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.854096]  kthread+0x337/0x6f0
[   10.854165]  ? trace_preempt_on+0x20/0xc0
[   10.854202]  ? __pfx_kthread+0x10/0x10
[   10.854244]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.854309]  ? calculate_sigpending+0x7b/0xa0
[   10.854346]  ? __pfx_kthread+0x10/0x10
[   10.854373]  ret_from_fork+0x41/0x80
[   10.854401]  ? __pfx_kthread+0x10/0x10
[   10.854425]  ret_from_fork_asm+0x1a/0x30
[   10.854472]  </TASK>
[   10.854490] 
[   10.863044] Allocated by task 156:
[   10.863433]  kasan_save_stack+0x45/0x70
[   10.863807]  kasan_save_track+0x18/0x40
[   10.864122]  kasan_save_alloc_info+0x3b/0x50
[   10.864335]  __kasan_kmalloc+0xb7/0xc0
[   10.864498]  __kmalloc_cache_noprof+0x189/0x420
[   10.864762]  kmalloc_oob_right+0xa9/0x7f0
[   10.865062]  kunit_try_run_case+0x1a5/0x480
[   10.865388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.865809]  kthread+0x337/0x6f0
[   10.866016]  ret_from_fork+0x41/0x80
[   10.866331]  ret_from_fork_asm+0x1a/0x30
[   10.866518] 
[   10.866733] The buggy address belongs to the object at ffff8881029d0e00
[   10.866733]  which belongs to the cache kmalloc-128 of size 128
[   10.867192] The buggy address is located 5 bytes to the right of
[   10.867192]  allocated 115-byte region [ffff8881029d0e00, ffff8881029d0e73)
[   10.868045] 
[   10.868234] The buggy address belongs to the physical page:
[   10.868503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d0
[   10.868964] flags: 0x200000000000000(node=0|zone=2)
[   10.869339] page_type: f5(slab)
[   10.869644] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.869920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.870248] page dumped because: kasan: bad access detected
[   10.870675] 
[   10.870830] Memory state around the buggy address:
[   10.871183]  ffff8881029d0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.871589]  ffff8881029d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.871959] >ffff8881029d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.872310]                                                                 ^
[   10.872576]  ffff8881029d0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.873065]  ffff8881029d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.873520] ==================================================================