Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.531419] ==================================================================
[   17.531746] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.531978] Write of size 1 at addr fff00000c5b9de78 by task kunit_try_catch/138
[   17.532028] 
[   17.532057] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.532519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.533134] Hardware name: linux,dummy-virt (DT)
[   17.533170] Call trace:
[   17.533192]  show_stack+0x20/0x38 (C)
[   17.533243]  dump_stack_lvl+0x8c/0xd0
[   17.533290]  print_report+0x118/0x608
[   17.533370]  kasan_report+0xdc/0x128
[   17.533426]  __asan_report_store1_noabort+0x20/0x30
[   17.533475]  kmalloc_oob_right+0x538/0x660
[   17.533522]  kunit_try_run_case+0x170/0x3f0
[   17.533569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.533622]  kthread+0x328/0x630
[   17.533667]  ret_from_fork+0x10/0x20
[   17.533714] 
[   17.533732] Allocated by task 138:
[   17.533759]  kasan_save_stack+0x3c/0x68
[   17.533796]  kasan_save_track+0x20/0x40
[   17.533831]  kasan_save_alloc_info+0x40/0x58
[   17.533868]  __kasan_kmalloc+0xd4/0xd8
[   17.533901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.533938]  kmalloc_oob_right+0xb0/0x660
[   17.533975]  kunit_try_run_case+0x170/0x3f0
[   17.534012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.534054]  kthread+0x328/0x630
[   17.534089]  ret_from_fork+0x10/0x20
[   17.534122] 
[   17.534140] The buggy address belongs to the object at fff00000c5b9de00
[   17.534140]  which belongs to the cache kmalloc-128 of size 128
[   17.534195] The buggy address is located 5 bytes to the right of
[   17.534195]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.534257] 
[   17.534278] The buggy address belongs to the physical page:
[   17.534307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.534368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.534413] page_type: f5(slab)
[   17.534450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.534877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.534940] page dumped because: kasan: bad access detected
[   17.535017] 
[   17.535036] Memory state around the buggy address:
[   17.535211]  fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.535620]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535667] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.535713]                                                                 ^
[   17.535790]  fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535831]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535867] ==================================================================
[   17.523268] ==================================================================
[   17.523637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.524493] Write of size 1 at addr fff00000c5b9de73 by task kunit_try_catch/138
[   17.524601] 
[   17.525360] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.6-rc1 #1 PREEMPT 
[   17.525519] Tainted: [N]=TEST
[   17.525554] Hardware name: linux,dummy-virt (DT)
[   17.525770] Call trace:
[   17.525935]  show_stack+0x20/0x38 (C)
[   17.526066]  dump_stack_lvl+0x8c/0xd0
[   17.526129]  print_report+0x118/0x608
[   17.526175]  kasan_report+0xdc/0x128
[   17.526219]  __asan_report_store1_noabort+0x20/0x30
[   17.526269]  kmalloc_oob_right+0x5a4/0x660
[   17.526317]  kunit_try_run_case+0x170/0x3f0
[   17.526383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.526436]  kthread+0x328/0x630
[   17.526483]  ret_from_fork+0x10/0x20
[   17.526643] 
[   17.526682] Allocated by task 138:
[   17.526818]  kasan_save_stack+0x3c/0x68
[   17.526890]  kasan_save_track+0x20/0x40
[   17.526927]  kasan_save_alloc_info+0x40/0x58
[   17.526965]  __kasan_kmalloc+0xd4/0xd8
[   17.526999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.527038]  kmalloc_oob_right+0xb0/0x660
[   17.527077]  kunit_try_run_case+0x170/0x3f0
[   17.527116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.527161]  kthread+0x328/0x630
[   17.527199]  ret_from_fork+0x10/0x20
[   17.527253] 
[   17.527311] The buggy address belongs to the object at fff00000c5b9de00
[   17.527311]  which belongs to the cache kmalloc-128 of size 128
[   17.527417] The buggy address is located 0 bytes to the right of
[   17.527417]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.527485] 
[   17.527570] The buggy address belongs to the physical page:
[   17.527764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.528030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.528349] page_type: f5(slab)
[   17.528652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.528714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.528821] page dumped because: kasan: bad access detected
[   17.528860] 
[   17.528885] Memory state around the buggy address:
[   17.529097]  fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.529163]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529217] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.529270]                                                              ^
[   17.529361]  fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529402]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529465] ==================================================================
[   17.536660] ==================================================================
[   17.536706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.536753] Read of size 1 at addr fff00000c5b9de80 by task kunit_try_catch/138
[   17.536800] 
[   17.536828] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.536904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.536929] Hardware name: linux,dummy-virt (DT)
[   17.536962] Call trace:
[   17.536982]  show_stack+0x20/0x38 (C)
[   17.537028]  dump_stack_lvl+0x8c/0xd0
[   17.537074]  print_report+0x118/0x608
[   17.537118]  kasan_report+0xdc/0x128
[   17.537161]  __asan_report_load1_noabort+0x20/0x30
[   17.537209]  kmalloc_oob_right+0x5d0/0x660
[   17.537256]  kunit_try_run_case+0x170/0x3f0
[   17.537303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.537402]  kthread+0x328/0x630
[   17.537448]  ret_from_fork+0x10/0x20
[   17.537494] 
[   17.537512] Allocated by task 138:
[   17.537538]  kasan_save_stack+0x3c/0x68
[   17.537575]  kasan_save_track+0x20/0x40
[   17.537610]  kasan_save_alloc_info+0x40/0x58
[   17.537648]  __kasan_kmalloc+0xd4/0xd8
[   17.537681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.537717]  kmalloc_oob_right+0xb0/0x660
[   17.537754]  kunit_try_run_case+0x170/0x3f0
[   17.537792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.537936]  kthread+0x328/0x630
[   17.537991]  ret_from_fork+0x10/0x20
[   17.538370] 
[   17.538424] The buggy address belongs to the object at fff00000c5b9de00
[   17.538424]  which belongs to the cache kmalloc-128 of size 128
[   17.539289] The buggy address is located 13 bytes to the right of
[   17.539289]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.542027] 
[   17.542508] The buggy address belongs to the physical page:
[   17.542575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.542628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.542676] page_type: f5(slab)
[   17.542772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.543027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.543288] page dumped because: kasan: bad access detected
[   17.543322] 
[   17.543351] Memory state around the buggy address:
[   17.543382]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543424]  fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.543465] >fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543502]                    ^
[   17.543529]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.544553]  fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.544596] ==================================================================

[   10.465300] ==================================================================
[   10.466056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.466617] Write of size 1 at addr ffff8881035eba78 by task kunit_try_catch/156
[   10.467084] 
[   10.467199] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   10.467243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.467255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.467276] Call Trace:
[   10.467289]  <TASK>
[   10.467302]  dump_stack_lvl+0x73/0xb0
[   10.467327]  print_report+0xd1/0x650
[   10.467350]  ? __virt_addr_valid+0x1db/0x2d0
[   10.467372]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.467394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.467417]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.467439]  kasan_report+0x141/0x180
[   10.467462]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.467489]  __asan_report_store1_noabort+0x1b/0x30
[   10.467728]  kmalloc_oob_right+0x6bd/0x7f0
[   10.467761]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.467799]  ? __schedule+0x10cc/0x2b60
[   10.467824]  ? __pfx_read_tsc+0x10/0x10
[   10.467843]  ? ktime_get_ts64+0x86/0x230
[   10.467911]  kunit_try_run_case+0x1a5/0x480
[   10.467935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.467954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.467978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.468002]  ? __kthread_parkme+0x82/0x180
[   10.468023]  ? preempt_count_sub+0x50/0x80
[   10.468048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.468068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.468091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.468115]  kthread+0x337/0x6f0
[   10.468132]  ? trace_preempt_on+0x20/0xc0
[   10.468155]  ? __pfx_kthread+0x10/0x10
[   10.468173]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.468195]  ? calculate_sigpending+0x7b/0xa0
[   10.468216]  ? __pfx_kthread+0x10/0x10
[   10.468235]  ret_from_fork+0x41/0x80
[   10.468255]  ? __pfx_kthread+0x10/0x10
[   10.468273]  ret_from_fork_asm+0x1a/0x30
[   10.468303]  </TASK>
[   10.468314] 
[   10.478505] Allocated by task 156:
[   10.478684]  kasan_save_stack+0x45/0x70
[   10.478894]  kasan_save_track+0x18/0x40
[   10.479036]  kasan_save_alloc_info+0x3b/0x50
[   10.479184]  __kasan_kmalloc+0xb7/0xc0
[   10.479351]  __kmalloc_cache_noprof+0x189/0x420
[   10.479635]  kmalloc_oob_right+0xa9/0x7f0
[   10.479843]  kunit_try_run_case+0x1a5/0x480
[   10.480049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.480228]  kthread+0x337/0x6f0
[   10.480349]  ret_from_fork+0x41/0x80
[   10.480534]  ret_from_fork_asm+0x1a/0x30
[   10.480760] 
[   10.480937] The buggy address belongs to the object at ffff8881035eba00
[   10.480937]  which belongs to the cache kmalloc-128 of size 128
[   10.482208] The buggy address is located 5 bytes to the right of
[   10.482208]  allocated 115-byte region [ffff8881035eba00, ffff8881035eba73)
[   10.483000] 
[   10.483108] The buggy address belongs to the physical page:
[   10.483469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   10.483935] flags: 0x200000000000000(node=0|zone=2)
[   10.484274] page_type: f5(slab)
[   10.484440] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.484935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.485336] page dumped because: kasan: bad access detected
[   10.485663] 
[   10.485756] Memory state around the buggy address:
[   10.486152]  ffff8881035eb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.486554]  ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.486888] >ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.487314]                                                                 ^
[   10.487706]  ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.488051]  ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.488353] ==================================================================
[   10.489159] ==================================================================
[   10.489900] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.490329] Read of size 1 at addr ffff8881035eba80 by task kunit_try_catch/156
[   10.490598] 
[   10.490917] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   10.491034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.491061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.491083] Call Trace:
[   10.491097]  <TASK>
[   10.491202]  dump_stack_lvl+0x73/0xb0
[   10.491232]  print_report+0xd1/0x650
[   10.491255]  ? __virt_addr_valid+0x1db/0x2d0
[   10.491278]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.491300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.491323]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.491346]  kasan_report+0x141/0x180
[   10.491368]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.491396]  __asan_report_load1_noabort+0x18/0x20
[   10.491419]  kmalloc_oob_right+0x68a/0x7f0
[   10.491444]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.491467]  ? __schedule+0x10cc/0x2b60
[   10.491491]  ? __pfx_read_tsc+0x10/0x10
[   10.491545]  ? ktime_get_ts64+0x86/0x230
[   10.491581]  kunit_try_run_case+0x1a5/0x480
[   10.491604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.491623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.491647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.491671]  ? __kthread_parkme+0x82/0x180
[   10.491693]  ? preempt_count_sub+0x50/0x80
[   10.491718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.491738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.491761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.491785]  kthread+0x337/0x6f0
[   10.491803]  ? trace_preempt_on+0x20/0xc0
[   10.491825]  ? __pfx_kthread+0x10/0x10
[   10.491843]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.491866]  ? calculate_sigpending+0x7b/0xa0
[   10.491897]  ? __pfx_kthread+0x10/0x10
[   10.491916]  ret_from_fork+0x41/0x80
[   10.491936]  ? __pfx_kthread+0x10/0x10
[   10.491954]  ret_from_fork_asm+0x1a/0x30
[   10.491985]  </TASK>
[   10.491997] 
[   10.501223] Allocated by task 156:
[   10.501487]  kasan_save_stack+0x45/0x70
[   10.501815]  kasan_save_track+0x18/0x40
[   10.502025]  kasan_save_alloc_info+0x3b/0x50
[   10.502210]  __kasan_kmalloc+0xb7/0xc0
[   10.502382]  __kmalloc_cache_noprof+0x189/0x420
[   10.502825]  kmalloc_oob_right+0xa9/0x7f0
[   10.503046]  kunit_try_run_case+0x1a5/0x480
[   10.503319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.503626]  kthread+0x337/0x6f0
[   10.503787]  ret_from_fork+0x41/0x80
[   10.504098]  ret_from_fork_asm+0x1a/0x30
[   10.504363] 
[   10.504458] The buggy address belongs to the object at ffff8881035eba00
[   10.504458]  which belongs to the cache kmalloc-128 of size 128
[   10.505154] The buggy address is located 13 bytes to the right of
[   10.505154]  allocated 115-byte region [ffff8881035eba00, ffff8881035eba73)
[   10.505815] 
[   10.505906] The buggy address belongs to the physical page:
[   10.506140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   10.506479] flags: 0x200000000000000(node=0|zone=2)
[   10.506906] page_type: f5(slab)
[   10.507078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.507548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.507975] page dumped because: kasan: bad access detected
[   10.508228] 
[   10.508300] Memory state around the buggy address:
[   10.508701]  ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.509015]  ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.509366] >ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.509795]                    ^
[   10.509968]  ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.510250]  ffff8881035ebb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.510532] ==================================================================
[   10.441254] ==================================================================
[   10.441957] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.442708] Write of size 1 at addr ffff8881035eba73 by task kunit_try_catch/156
[   10.443089] 
[   10.444050] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G                 N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   10.444330] Tainted: [N]=TEST
[   10.444362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.444597] Call Trace:
[   10.444665]  <TASK>
[   10.444808]  dump_stack_lvl+0x73/0xb0
[   10.444903]  print_report+0xd1/0x650
[   10.444934]  ? __virt_addr_valid+0x1db/0x2d0
[   10.444959]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.444982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.445004]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.445027]  kasan_report+0x141/0x180
[   10.445050]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.445078]  __asan_report_store1_noabort+0x1b/0x30
[   10.445100]  kmalloc_oob_right+0x6f0/0x7f0
[   10.445123]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.445148]  ? __schedule+0x10cc/0x2b60
[   10.445173]  ? __pfx_read_tsc+0x10/0x10
[   10.445196]  ? ktime_get_ts64+0x86/0x230
[   10.445224]  kunit_try_run_case+0x1a5/0x480
[   10.445248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.445267]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.445292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.445316]  ? __kthread_parkme+0x82/0x180
[   10.445340]  ? preempt_count_sub+0x50/0x80
[   10.445367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.445387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.445411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.445435]  kthread+0x337/0x6f0
[   10.445452]  ? trace_preempt_on+0x20/0xc0
[   10.445477]  ? __pfx_kthread+0x10/0x10
[   10.445495]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.445518]  ? calculate_sigpending+0x7b/0xa0
[   10.445541]  ? __pfx_kthread+0x10/0x10
[   10.445559]  ret_from_fork+0x41/0x80
[   10.445580]  ? __pfx_kthread+0x10/0x10
[   10.445598]  ret_from_fork_asm+0x1a/0x30
[   10.445652]  </TASK>
[   10.445717] 
[   10.453764] Allocated by task 156:
[   10.454092]  kasan_save_stack+0x45/0x70
[   10.454280]  kasan_save_track+0x18/0x40
[   10.454515]  kasan_save_alloc_info+0x3b/0x50
[   10.454691]  __kasan_kmalloc+0xb7/0xc0
[   10.454848]  __kmalloc_cache_noprof+0x189/0x420
[   10.455111]  kmalloc_oob_right+0xa9/0x7f0
[   10.455307]  kunit_try_run_case+0x1a5/0x480
[   10.455466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.455733]  kthread+0x337/0x6f0
[   10.455921]  ret_from_fork+0x41/0x80
[   10.456087]  ret_from_fork_asm+0x1a/0x30
[   10.456340] 
[   10.456543] The buggy address belongs to the object at ffff8881035eba00
[   10.456543]  which belongs to the cache kmalloc-128 of size 128
[   10.457159] The buggy address is located 0 bytes to the right of
[   10.457159]  allocated 115-byte region [ffff8881035eba00, ffff8881035eba73)
[   10.457766] 
[   10.457979] The buggy address belongs to the physical page:
[   10.458440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   10.459023] flags: 0x200000000000000(node=0|zone=2)
[   10.459695] page_type: f5(slab)
[   10.460227] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.460585] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.460981] page dumped because: kasan: bad access detected
[   10.461246] 
[   10.461352] Memory state around the buggy address:
[   10.461832]  ffff8881035eb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.462197]  ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.462543] >ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.462887]                                                              ^
[   10.463231]  ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.463518]  ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.463990] ==================================================================