Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.160690] ==================================================================
[   15.160769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   15.161454] Read of size 1 at addr fff00000c3ec5e80 by task kunit_try_catch/139
[   15.161504] 
[   15.161537] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.161616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.161643] Hardware name: linux,dummy-virt (DT)
[   15.162278] Call trace:
[   15.162331]  show_stack+0x20/0x38 (C)
[   15.162382]  dump_stack_lvl+0x8c/0xd0
[   15.162543]  print_report+0x118/0x608
[   15.163340]  kasan_report+0xdc/0x128
[   15.163567]  __asan_report_load1_noabort+0x20/0x30
[   15.163651]  kmalloc_oob_right+0x5d0/0x660
[   15.163698]  kunit_try_run_case+0x170/0x3f0
[   15.163749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.165994]  kthread+0x328/0x630
[   15.166058]  ret_from_fork+0x10/0x20
[   15.166111] 
[   15.166130] Allocated by task 139:
[   15.166167]  kasan_save_stack+0x3c/0x68
[   15.166205]  kasan_save_track+0x20/0x40
[   15.166239]  kasan_save_alloc_info+0x40/0x58
[   15.166278]  __kasan_kmalloc+0xd4/0xd8
[   15.166311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.166347]  kmalloc_oob_right+0xb0/0x660
[   15.166383]  kunit_try_run_case+0x170/0x3f0
[   15.166424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.166466]  kthread+0x328/0x630
[   15.166628]  ret_from_fork+0x10/0x20
[   15.166663] 
[   15.166684] The buggy address belongs to the object at fff00000c3ec5e00
[   15.166684]  which belongs to the cache kmalloc-128 of size 128
[   15.167062] The buggy address is located 13 bytes to the right of
[   15.167062]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.167185] 
[   15.167216] The buggy address belongs to the physical page:
[   15.167255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.167308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.167354] page_type: f5(slab)
[   15.167402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.167460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.167498] page dumped because: kasan: bad access detected
[   15.167536] 
[   15.167553] Memory state around the buggy address:
[   15.167589]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167631]  fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.167672] >fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167708]                    ^
[   15.167734]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167784]  fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167820] ==================================================================
[   15.148518] ==================================================================
[   15.148554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   15.148601] Write of size 1 at addr fff00000c3ec5e78 by task kunit_try_catch/139
[   15.148647] 
[   15.148677] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.149047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.149085] Hardware name: linux,dummy-virt (DT)
[   15.149357] Call trace:
[   15.149384]  show_stack+0x20/0x38 (C)
[   15.149435]  dump_stack_lvl+0x8c/0xd0
[   15.149962]  print_report+0x118/0x608
[   15.150006]  kasan_report+0xdc/0x128
[   15.150087]  __asan_report_store1_noabort+0x20/0x30
[   15.150418]  kmalloc_oob_right+0x538/0x660
[   15.150480]  kunit_try_run_case+0x170/0x3f0
[   15.150530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.150582]  kthread+0x328/0x630
[   15.150626]  ret_from_fork+0x10/0x20
[   15.150735] 
[   15.150842] Allocated by task 139:
[   15.150878]  kasan_save_stack+0x3c/0x68
[   15.150916]  kasan_save_track+0x20/0x40
[   15.150970]  kasan_save_alloc_info+0x40/0x58
[   15.151036]  __kasan_kmalloc+0xd4/0xd8
[   15.151162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.151286]  kmalloc_oob_right+0xb0/0x660
[   15.151404]  kunit_try_run_case+0x170/0x3f0
[   15.151542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.151585]  kthread+0x328/0x630
[   15.151878]  ret_from_fork+0x10/0x20
[   15.151921] 
[   15.151939] The buggy address belongs to the object at fff00000c3ec5e00
[   15.151939]  which belongs to the cache kmalloc-128 of size 128
[   15.152005] The buggy address is located 5 bytes to the right of
[   15.152005]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.152076] 
[   15.152106] The buggy address belongs to the physical page:
[   15.152144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.152203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.152249] page_type: f5(slab)
[   15.152341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.152392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.152447] page dumped because: kasan: bad access detected
[   15.152539] 
[   15.152670] Memory state around the buggy address:
[   15.152935]  fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.153322]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153568] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.153904]                                                                 ^
[   15.154739]  fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154789]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154826] ==================================================================
[   15.141037] ==================================================================
[   15.141379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   15.142248] Write of size 1 at addr fff00000c3ec5e73 by task kunit_try_catch/139
[   15.142381] 
[   15.143138] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc1 #1 PREEMPT 
[   15.143283] Tainted: [N]=TEST
[   15.143315] Hardware name: linux,dummy-virt (DT)
[   15.143533] Call trace:
[   15.143702]  show_stack+0x20/0x38 (C)
[   15.143833]  dump_stack_lvl+0x8c/0xd0
[   15.143894]  print_report+0x118/0x608
[   15.143939]  kasan_report+0xdc/0x128
[   15.143995]  __asan_report_store1_noabort+0x20/0x30
[   15.144044]  kmalloc_oob_right+0x5a4/0x660
[   15.144090]  kunit_try_run_case+0x170/0x3f0
[   15.144147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.144199]  kthread+0x328/0x630
[   15.144245]  ret_from_fork+0x10/0x20
[   15.144401] 
[   15.144439] Allocated by task 139:
[   15.144549]  kasan_save_stack+0x3c/0x68
[   15.144611]  kasan_save_track+0x20/0x40
[   15.144646]  kasan_save_alloc_info+0x40/0x58
[   15.144683]  __kasan_kmalloc+0xd4/0xd8
[   15.144717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.144755]  kmalloc_oob_right+0xb0/0x660
[   15.144792]  kunit_try_run_case+0x170/0x3f0
[   15.144830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.144872]  kthread+0x328/0x630
[   15.144906]  ret_from_fork+0x10/0x20
[   15.144970] 
[   15.145028] The buggy address belongs to the object at fff00000c3ec5e00
[   15.145028]  which belongs to the cache kmalloc-128 of size 128
[   15.145118] The buggy address is located 0 bytes to the right of
[   15.145118]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.145184] 
[   15.145265] The buggy address belongs to the physical page:
[   15.145434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.145694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.145991] page_type: f5(slab)
[   15.146492] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.146558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.146667] page dumped because: kasan: bad access detected
[   15.146706] 
[   15.146732] Memory state around the buggy address:
[   15.146974]  fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.147043]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147097] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.147151]                                                              ^
[   15.147233]  fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147274]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147336] ==================================================================

[   10.462208] ==================================================================
[   10.463028] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.463798] Write of size 1 at addr ffff888102dc0573 by task kunit_try_catch/155
[   10.464211] 
[   10.465148] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   10.465448] Tainted: [N]=TEST
[   10.465481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.465713] Call Trace:
[   10.465779]  <TASK>
[   10.465924]  dump_stack_lvl+0x73/0xb0
[   10.466009]  print_report+0xd1/0x650
[   10.466037]  ? __virt_addr_valid+0x1db/0x2d0
[   10.466062]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.466083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.466106]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.466127]  kasan_report+0x141/0x180
[   10.466150]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.466176]  __asan_report_store1_noabort+0x1b/0x30
[   10.466197]  kmalloc_oob_right+0x6f0/0x7f0
[   10.466219]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.466253]  ? sysvec_call_function_single+0x50/0x90
[   10.466293]  ? trace_hardirqs_on+0x37/0xe0
[   10.466318]  ? __pfx_read_tsc+0x10/0x10
[   10.466338]  ? ktime_get_ts64+0x86/0x230
[   10.466365]  kunit_try_run_case+0x1a5/0x480
[   10.466390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.466414]  ? queued_spin_lock_slowpath+0x116/0xb40
[   10.466439]  ? __kthread_parkme+0x82/0x180
[   10.466462]  ? preempt_count_sub+0x50/0x80
[   10.466488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.466511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.466533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.466556]  kthread+0x337/0x6f0
[   10.466572]  ? trace_preempt_on+0x20/0xc0
[   10.466594]  ? __pfx_kthread+0x10/0x10
[   10.466611]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.466633]  ? calculate_sigpending+0x7b/0xa0
[   10.466655]  ? __pfx_kthread+0x10/0x10
[   10.466673]  ret_from_fork+0x41/0x80
[   10.466693]  ? __pfx_kthread+0x10/0x10
[   10.466711]  ret_from_fork_asm+0x1a/0x30
[   10.466764]  </TASK>
[   10.466827] 
[   10.479173] Allocated by task 155:
[   10.479452]  kasan_save_stack+0x45/0x70
[   10.479654]  kasan_save_track+0x18/0x40
[   10.480135]  kasan_save_alloc_info+0x3b/0x50
[   10.480464]  __kasan_kmalloc+0xb7/0xc0
[   10.480659]  __kmalloc_cache_noprof+0x189/0x420
[   10.481083]  kmalloc_oob_right+0xa9/0x7f0
[   10.481282]  kunit_try_run_case+0x1a5/0x480
[   10.481680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.481995]  kthread+0x337/0x6f0
[   10.482264]  ret_from_fork+0x41/0x80
[   10.482427]  ret_from_fork_asm+0x1a/0x30
[   10.482641] 
[   10.483127] The buggy address belongs to the object at ffff888102dc0500
[   10.483127]  which belongs to the cache kmalloc-128 of size 128
[   10.484027] The buggy address is located 0 bytes to the right of
[   10.484027]  allocated 115-byte region [ffff888102dc0500, ffff888102dc0573)
[   10.484864] 
[   10.485358] The buggy address belongs to the physical page:
[   10.485954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0
[   10.486785] flags: 0x200000000000000(node=0|zone=2)
[   10.487488] page_type: f5(slab)
[   10.488146] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.488617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.489101] page dumped because: kasan: bad access detected
[   10.489368] 
[   10.489476] Memory state around the buggy address:
[   10.490313]  ffff888102dc0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.490623]  ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.491039] >ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.491345]                                                              ^
[   10.491748]  ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.492047]  ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.492746] ==================================================================
[   10.520380] ==================================================================
[   10.520970] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.521349] Read of size 1 at addr ffff888102dc0580 by task kunit_try_catch/155
[   10.522092] 
[   10.522204] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   10.522259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.522271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.522290] Call Trace:
[   10.522301]  <TASK>
[   10.522316]  dump_stack_lvl+0x73/0xb0
[   10.522420]  print_report+0xd1/0x650
[   10.522443]  ? __virt_addr_valid+0x1db/0x2d0
[   10.522463]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.522485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.522507]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.522529]  kasan_report+0x141/0x180
[   10.522551]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.522578]  __asan_report_load1_noabort+0x18/0x20
[   10.522598]  kmalloc_oob_right+0x68a/0x7f0
[   10.522621]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.522642]  ? sysvec_call_function_single+0x50/0x90
[   10.522667]  ? trace_hardirqs_on+0x37/0xe0
[   10.522688]  ? __pfx_read_tsc+0x10/0x10
[   10.522707]  ? ktime_get_ts64+0x86/0x230
[   10.522731]  kunit_try_run_case+0x1a5/0x480
[   10.522755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.522779]  ? queued_spin_lock_slowpath+0x116/0xb40
[   10.522803]  ? __kthread_parkme+0x82/0x180
[   10.522823]  ? preempt_count_sub+0x50/0x80
[   10.522848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.522871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.522894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.522917]  kthread+0x337/0x6f0
[   10.522933]  ? trace_preempt_on+0x20/0xc0
[   10.522955]  ? __pfx_kthread+0x10/0x10
[   10.522973]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.522994]  ? calculate_sigpending+0x7b/0xa0
[   10.523014]  ? __pfx_kthread+0x10/0x10
[   10.523032]  ret_from_fork+0x41/0x80
[   10.523052]  ? __pfx_kthread+0x10/0x10
[   10.523069]  ret_from_fork_asm+0x1a/0x30
[   10.523099]  </TASK>
[   10.523109] 
[   10.532367] Allocated by task 155:
[   10.532540]  kasan_save_stack+0x45/0x70
[   10.532997]  kasan_save_track+0x18/0x40
[   10.533426]  kasan_save_alloc_info+0x3b/0x50
[   10.533737]  __kasan_kmalloc+0xb7/0xc0
[   10.534116]  __kmalloc_cache_noprof+0x189/0x420
[   10.534345]  kmalloc_oob_right+0xa9/0x7f0
[   10.534537]  kunit_try_run_case+0x1a5/0x480
[   10.534926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.535330]  kthread+0x337/0x6f0
[   10.535620]  ret_from_fork+0x41/0x80
[   10.535978]  ret_from_fork_asm+0x1a/0x30
[   10.536172] 
[   10.536270] The buggy address belongs to the object at ffff888102dc0500
[   10.536270]  which belongs to the cache kmalloc-128 of size 128
[   10.537038] The buggy address is located 13 bytes to the right of
[   10.537038]  allocated 115-byte region [ffff888102dc0500, ffff888102dc0573)
[   10.537968] 
[   10.538064] The buggy address belongs to the physical page:
[   10.538488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0
[   10.539199] flags: 0x200000000000000(node=0|zone=2)
[   10.539556] page_type: f5(slab)
[   10.539874] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.540204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.540520] page dumped because: kasan: bad access detected
[   10.540969] 
[   10.541179] Memory state around the buggy address:
[   10.541642]  ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.542109]  ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.542594] >ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.543030]                    ^
[   10.543193]  ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.543496]  ffff888102dc0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.543893] ==================================================================
[   10.494499] ==================================================================
[   10.494981] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.495487] Write of size 1 at addr ffff888102dc0578 by task kunit_try_catch/155
[   10.495835] 
[   10.495949] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   10.495992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.496003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.496281] Call Trace:
[   10.496297]  <TASK>
[   10.496312]  dump_stack_lvl+0x73/0xb0
[   10.496338]  print_report+0xd1/0x650
[   10.496361]  ? __virt_addr_valid+0x1db/0x2d0
[   10.496393]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.496414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.496436]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.496458]  kasan_report+0x141/0x180
[   10.496481]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.496507]  __asan_report_store1_noabort+0x1b/0x30
[   10.496528]  kmalloc_oob_right+0x6bd/0x7f0
[   10.496550]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.496572]  ? sysvec_call_function_single+0x50/0x90
[   10.496596]  ? trace_hardirqs_on+0x37/0xe0
[   10.496618]  ? __pfx_read_tsc+0x10/0x10
[   10.496637]  ? ktime_get_ts64+0x86/0x230
[   10.496814]  kunit_try_run_case+0x1a5/0x480
[   10.496844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.496868]  ? queued_spin_lock_slowpath+0x116/0xb40
[   10.496892]  ? __kthread_parkme+0x82/0x180
[   10.496913]  ? preempt_count_sub+0x50/0x80
[   10.496937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.496961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.496984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.497006]  kthread+0x337/0x6f0
[   10.497022]  ? trace_preempt_on+0x20/0xc0
[   10.497044]  ? __pfx_kthread+0x10/0x10
[   10.497062]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.497083]  ? calculate_sigpending+0x7b/0xa0
[   10.497104]  ? __pfx_kthread+0x10/0x10
[   10.497122]  ret_from_fork+0x41/0x80
[   10.497142]  ? __pfx_kthread+0x10/0x10
[   10.497160]  ret_from_fork_asm+0x1a/0x30
[   10.497189]  </TASK>
[   10.497199] 
[   10.507886] Allocated by task 155:
[   10.508032]  kasan_save_stack+0x45/0x70
[   10.508234]  kasan_save_track+0x18/0x40
[   10.508681]  kasan_save_alloc_info+0x3b/0x50
[   10.508834]  __kasan_kmalloc+0xb7/0xc0
[   10.509155]  __kmalloc_cache_noprof+0x189/0x420
[   10.509546]  kmalloc_oob_right+0xa9/0x7f0
[   10.509771]  kunit_try_run_case+0x1a5/0x480
[   10.510117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.510686]  kthread+0x337/0x6f0
[   10.510832]  ret_from_fork+0x41/0x80
[   10.511010]  ret_from_fork_asm+0x1a/0x30
[   10.511497] 
[   10.511603] The buggy address belongs to the object at ffff888102dc0500
[   10.511603]  which belongs to the cache kmalloc-128 of size 128
[   10.512432] The buggy address is located 5 bytes to the right of
[   10.512432]  allocated 115-byte region [ffff888102dc0500, ffff888102dc0573)
[   10.513133] 
[   10.513219] The buggy address belongs to the physical page:
[   10.513542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0
[   10.514096] flags: 0x200000000000000(node=0|zone=2)
[   10.514554] page_type: f5(slab)
[   10.514690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.515232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.515689] page dumped because: kasan: bad access detected
[   10.516019] 
[   10.516091] Memory state around the buggy address:
[   10.516406]  ffff888102dc0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.517067]  ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.517573] >ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.518050]                                                                 ^
[   10.518425]  ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.518766]  ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.519159] ==================================================================