Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.970098] ==================================================================
[   16.970176] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.970415] Write of size 128 at addr fff00000c595ef00 by task kunit_try_catch/170
[   16.970490] 
[   16.970532] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.970623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.970658] Hardware name: linux,dummy-virt (DT)
[   16.970697] Call trace:
[   16.970721]  show_stack+0x20/0x38 (C)
[   16.970773]  dump_stack_lvl+0x8c/0xd0
[   16.970831]  print_report+0x118/0x5d0
[   16.970892]  kasan_report+0xdc/0x128
[   16.970948]  kasan_check_range+0x100/0x1a8
[   16.970998]  __asan_memset+0x34/0x78
[   16.971052]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.971100]  kunit_try_run_case+0x170/0x3f0
[   16.971157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.971209]  kthread+0x328/0x630
[   16.971253]  ret_from_fork+0x10/0x20
[   16.971563] 
[   16.971588] Allocated by task 170:
[   16.971644]  kasan_save_stack+0x3c/0x68
[   16.971692]  kasan_save_track+0x20/0x40
[   16.971730]  kasan_save_alloc_info+0x40/0x58
[   16.971795]  __kasan_kmalloc+0xd4/0xd8
[   16.971873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.971922]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.971959]  kunit_try_run_case+0x170/0x3f0
[   16.972008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.972052]  kthread+0x328/0x630
[   16.972085]  ret_from_fork+0x10/0x20
[   16.973149] 
[   16.973239] The buggy address belongs to the object at fff00000c595ef00
[   16.973239]  which belongs to the cache kmalloc-128 of size 128
[   16.974798] The buggy address is located 0 bytes inside of
[   16.974798]  allocated 120-byte region [fff00000c595ef00, fff00000c595ef78)
[   16.975238] 
[   16.975276] The buggy address belongs to the physical page:
[   16.975364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   16.975810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.975905] page_type: f5(slab)
[   16.976067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.976422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.976487] page dumped because: kasan: bad access detected
[   16.976540] 
[   16.977263] Memory state around the buggy address:
[   16.977327]  fff00000c595ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.977384]  fff00000c595ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.977446] >fff00000c595ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.977512]                                                                 ^
[   16.977563]  fff00000c595ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.977904]  fff00000c595f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.978441] ==================================================================

[   16.639074] ==================================================================
[   16.639146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.639198] Write of size 128 at addr fff00000c5b7d800 by task kunit_try_catch/170
[   16.639359] 
[   16.639398] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.639983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.640313] Hardware name: linux,dummy-virt (DT)
[   16.640366] Call trace:
[   16.640391]  show_stack+0x20/0x38 (C)
[   16.640441]  dump_stack_lvl+0x8c/0xd0
[   16.640487]  print_report+0x118/0x5d0
[   16.640539]  kasan_report+0xdc/0x128
[   16.640615]  kasan_check_range+0x100/0x1a8
[   16.641317]  __asan_memset+0x34/0x78
[   16.641435]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.641484]  kunit_try_run_case+0x170/0x3f0
[   16.641557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.641610]  kthread+0x328/0x630
[   16.641812]  ret_from_fork+0x10/0x20
[   16.642066] 
[   16.642295] Allocated by task 170:
[   16.642507]  kasan_save_stack+0x3c/0x68
[   16.642603]  kasan_save_track+0x20/0x40
[   16.642746]  kasan_save_alloc_info+0x40/0x58
[   16.642907]  __kasan_kmalloc+0xd4/0xd8
[   16.642994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.643102]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.643204]  kunit_try_run_case+0x170/0x3f0
[   16.643247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643445]  kthread+0x328/0x630
[   16.643625]  ret_from_fork+0x10/0x20
[   16.643719] 
[   16.643795] The buggy address belongs to the object at fff00000c5b7d800
[   16.643795]  which belongs to the cache kmalloc-128 of size 128
[   16.644040] The buggy address is located 0 bytes inside of
[   16.644040]  allocated 120-byte region [fff00000c5b7d800, fff00000c5b7d878)
[   16.644254] 
[   16.644379] The buggy address belongs to the physical page:
[   16.644455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.644881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.644937] page_type: f5(slab)
[   16.645259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.645374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.645498] page dumped because: kasan: bad access detected
[   16.645533] 
[   16.645552] Memory state around the buggy address:
[   16.645852]  fff00000c5b7d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.645935]  fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646000] >fff00000c5b7d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.646066]                                                                 ^
[   16.646107]  fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646278]  fff00000c5b7d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646434] ==================================================================

[   16.656698] ==================================================================
[   16.656779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.657021] Write of size 128 at addr fff00000c576cf00 by task kunit_try_catch/170
[   16.657514] 
[   16.657576] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.657856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.658012] Hardware name: linux,dummy-virt (DT)
[   16.658049] Call trace:
[   16.658212]  show_stack+0x20/0x38 (C)
[   16.658538]  dump_stack_lvl+0x8c/0xd0
[   16.658793]  print_report+0x118/0x5d0
[   16.658893]  kasan_report+0xdc/0x128
[   16.658939]  kasan_check_range+0x100/0x1a8
[   16.659224]  __asan_memset+0x34/0x78
[   16.659539]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.659952]  kunit_try_run_case+0x170/0x3f0
[   16.660101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.660365]  kthread+0x328/0x630
[   16.660581]  ret_from_fork+0x10/0x20
[   16.660722] 
[   16.660750] Allocated by task 170:
[   16.660780]  kasan_save_stack+0x3c/0x68
[   16.661189]  kasan_save_track+0x20/0x40
[   16.661311]  kasan_save_alloc_info+0x40/0x58
[   16.661559]  __kasan_kmalloc+0xd4/0xd8
[   16.661864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.662189]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.662287]  kunit_try_run_case+0x170/0x3f0
[   16.662447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.662734]  kthread+0x328/0x630
[   16.662957]  ret_from_fork+0x10/0x20
[   16.663264] 
[   16.663387] The buggy address belongs to the object at fff00000c576cf00
[   16.663387]  which belongs to the cache kmalloc-128 of size 128
[   16.664055] The buggy address is located 0 bytes inside of
[   16.664055]  allocated 120-byte region [fff00000c576cf00, fff00000c576cf78)
[   16.664279] 
[   16.664332] The buggy address belongs to the physical page:
[   16.664590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c
[   16.664825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.665304] page_type: f5(slab)
[   16.665368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.665498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.665547] page dumped because: kasan: bad access detected
[   16.665601] 
[   16.665627] Memory state around the buggy address:
[   16.665660]  fff00000c576ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.665702]  fff00000c576ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.665769] >fff00000c576cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.665806]                                                                 ^
[   16.665846]  fff00000c576cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.665888]  fff00000c576d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.665924] ==================================================================

[   12.302517] ==================================================================
[   12.303025] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   12.303425] Write of size 128 at addr ffff888102e24300 by task kunit_try_catch/187
[   12.303986] 
[   12.304100] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.304147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.304158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.304180] Call Trace:
[   12.304192]  <TASK>
[   12.304209]  dump_stack_lvl+0x73/0xb0
[   12.304243]  print_report+0xd1/0x610
[   12.304265]  ? __virt_addr_valid+0x1db/0x2d0
[   12.304289]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.304310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.304332]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.304354]  kasan_report+0x141/0x180
[   12.304375]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.304403]  kasan_check_range+0x10c/0x1c0
[   12.304426]  __asan_memset+0x27/0x50
[   12.304444]  kmalloc_oob_in_memset+0x15f/0x320
[   12.304467]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   12.304490]  ? __schedule+0x10cc/0x2b60
[   12.304513]  ? __pfx_read_tsc+0x10/0x10
[   12.304598]  ? ktime_get_ts64+0x86/0x230
[   12.304626]  kunit_try_run_case+0x1a5/0x480
[   12.304651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.304673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.304698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.304721]  ? __kthread_parkme+0x82/0x180
[   12.304741]  ? preempt_count_sub+0x50/0x80
[   12.304766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.304790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.304813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.304837]  kthread+0x337/0x6f0
[   12.304855]  ? trace_preempt_on+0x20/0xc0
[   12.304878]  ? __pfx_kthread+0x10/0x10
[   12.304910]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.304931]  ? calculate_sigpending+0x7b/0xa0
[   12.304956]  ? __pfx_kthread+0x10/0x10
[   12.304977]  ret_from_fork+0x116/0x1d0
[   12.305006]  ? __pfx_kthread+0x10/0x10
[   12.305026]  ret_from_fork_asm+0x1a/0x30
[   12.305058]  </TASK>
[   12.305069] 
[   12.314976] Allocated by task 187:
[   12.315170]  kasan_save_stack+0x45/0x70
[   12.315790]  kasan_save_track+0x18/0x40
[   12.316084]  kasan_save_alloc_info+0x3b/0x50
[   12.316296]  __kasan_kmalloc+0xb7/0xc0
[   12.316477]  __kmalloc_cache_noprof+0x189/0x420
[   12.316974]  kmalloc_oob_in_memset+0xac/0x320
[   12.317341]  kunit_try_run_case+0x1a5/0x480
[   12.317583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.318226]  kthread+0x337/0x6f0
[   12.318432]  ret_from_fork+0x116/0x1d0
[   12.318821]  ret_from_fork_asm+0x1a/0x30
[   12.319091] 
[   12.319177] The buggy address belongs to the object at ffff888102e24300
[   12.319177]  which belongs to the cache kmalloc-128 of size 128
[   12.320188] The buggy address is located 0 bytes inside of
[   12.320188]  allocated 120-byte region [ffff888102e24300, ffff888102e24378)
[   12.320803] 
[   12.321082] The buggy address belongs to the physical page:
[   12.321347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24
[   12.321932] flags: 0x200000000000000(node=0|zone=2)
[   12.322363] page_type: f5(slab)
[   12.322610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.323295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.323786] page dumped because: kasan: bad access detected
[   12.324110] 
[   12.324216] Memory state around the buggy address:
[   12.324469]  ffff888102e24200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.324977]  ffff888102e24280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.325501] >ffff888102e24300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.326090]                                                                 ^
[   12.326382]  ffff888102e24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.326750]  ffff888102e24400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.327052] ==================================================================

[   12.053076] ==================================================================
[   12.053705] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   12.054159] Write of size 128 at addr ffff8881026ce800 by task kunit_try_catch/188
[   12.054582] 
[   12.054701] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.054745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.054756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.054841] Call Trace:
[   12.054855]  <TASK>
[   12.054869]  dump_stack_lvl+0x73/0xb0
[   12.054900]  print_report+0xd1/0x610
[   12.054922]  ? __virt_addr_valid+0x1db/0x2d0
[   12.054945]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.054966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.054989]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.055011]  kasan_report+0x141/0x180
[   12.055033]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.055060]  kasan_check_range+0x10c/0x1c0
[   12.055084]  __asan_memset+0x27/0x50
[   12.055125]  kmalloc_oob_in_memset+0x15f/0x320
[   12.055148]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   12.055171]  ? __schedule+0x10cc/0x2b60
[   12.055194]  ? __pfx_read_tsc+0x10/0x10
[   12.055231]  ? ktime_get_ts64+0x86/0x230
[   12.055256]  kunit_try_run_case+0x1a5/0x480
[   12.055281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.055302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.055325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.055348]  ? __kthread_parkme+0x82/0x180
[   12.055368]  ? preempt_count_sub+0x50/0x80
[   12.055392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.055416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.055505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.055529]  kthread+0x337/0x6f0
[   12.055549]  ? trace_preempt_on+0x20/0xc0
[   12.055572]  ? __pfx_kthread+0x10/0x10
[   12.055592]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.055613]  ? calculate_sigpending+0x7b/0xa0
[   12.055637]  ? __pfx_kthread+0x10/0x10
[   12.055658]  ret_from_fork+0x116/0x1d0
[   12.055676]  ? __pfx_kthread+0x10/0x10
[   12.055696]  ret_from_fork_asm+0x1a/0x30
[   12.055728]  </TASK>
[   12.055738] 
[   12.063506] Allocated by task 188:
[   12.063715]  kasan_save_stack+0x45/0x70
[   12.063887]  kasan_save_track+0x18/0x40
[   12.064100]  kasan_save_alloc_info+0x3b/0x50
[   12.064312]  __kasan_kmalloc+0xb7/0xc0
[   12.064553]  __kmalloc_cache_noprof+0x189/0x420
[   12.064767]  kmalloc_oob_in_memset+0xac/0x320
[   12.064993]  kunit_try_run_case+0x1a5/0x480
[   12.065171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.065404]  kthread+0x337/0x6f0
[   12.065665]  ret_from_fork+0x116/0x1d0
[   12.065855]  ret_from_fork_asm+0x1a/0x30
[   12.066068] 
[   12.066180] The buggy address belongs to the object at ffff8881026ce800
[   12.066180]  which belongs to the cache kmalloc-128 of size 128
[   12.066739] The buggy address is located 0 bytes inside of
[   12.066739]  allocated 120-byte region [ffff8881026ce800, ffff8881026ce878)
[   12.067260] 
[   12.067332] The buggy address belongs to the physical page:
[   12.067700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   12.068339] flags: 0x200000000000000(node=0|zone=2)
[   12.068581] page_type: f5(slab)
[   12.068764] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.069108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.069475] page dumped because: kasan: bad access detected
[   12.069800] 
[   12.070053] Memory state around the buggy address:
[   12.070278]  ffff8881026ce700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.070867]  ffff8881026ce780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.071173] >ffff8881026ce800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.071487]                                                                 ^
[   12.071709]  ffff8881026ce880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.071917]  ffff8881026ce900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.072121] ==================================================================

[   12.217239] ==================================================================
[   12.218042] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   12.218719] Write of size 128 at addr ffff8881029a6600 by task kunit_try_catch/187
[   12.219348] 
[   12.219501] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.219551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.219562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.219584] Call Trace:
[   12.219598]  <TASK>
[   12.219617]  dump_stack_lvl+0x73/0xb0
[   12.219650]  print_report+0xd1/0x610
[   12.219674]  ? __virt_addr_valid+0x1db/0x2d0
[   12.219699]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.219720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.219743]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.219765]  kasan_report+0x141/0x180
[   12.219786]  ? kmalloc_oob_in_memset+0x15f/0x320
[   12.219812]  kasan_check_range+0x10c/0x1c0
[   12.219836]  __asan_memset+0x27/0x50
[   12.219855]  kmalloc_oob_in_memset+0x15f/0x320
[   12.219876]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   12.219899]  ? __schedule+0x10cc/0x2b60
[   12.219921]  ? __pfx_read_tsc+0x10/0x10
[   12.219941]  ? ktime_get_ts64+0x86/0x230
[   12.219967]  kunit_try_run_case+0x1a5/0x480
[   12.219991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.220023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.220197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.220222]  ? __kthread_parkme+0x82/0x180
[   12.220244]  ? preempt_count_sub+0x50/0x80
[   12.220268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.220328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.220353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.220377]  kthread+0x337/0x6f0
[   12.220396]  ? trace_preempt_on+0x20/0xc0
[   12.220419]  ? __pfx_kthread+0x10/0x10
[   12.220438]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.220459]  ? calculate_sigpending+0x7b/0xa0
[   12.220483]  ? __pfx_kthread+0x10/0x10
[   12.220503]  ret_from_fork+0x116/0x1d0
[   12.220521]  ? __pfx_kthread+0x10/0x10
[   12.220540]  ret_from_fork_asm+0x1a/0x30
[   12.220572]  </TASK>
[   12.220581] 
[   12.233999] Allocated by task 187:
[   12.234284]  kasan_save_stack+0x45/0x70
[   12.234729]  kasan_save_track+0x18/0x40
[   12.234939]  kasan_save_alloc_info+0x3b/0x50
[   12.235546]  __kasan_kmalloc+0xb7/0xc0
[   12.236075]  __kmalloc_cache_noprof+0x189/0x420
[   12.236294]  kmalloc_oob_in_memset+0xac/0x320
[   12.236669]  kunit_try_run_case+0x1a5/0x480
[   12.237081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.237335]  kthread+0x337/0x6f0
[   12.237690]  ret_from_fork+0x116/0x1d0
[   12.237888]  ret_from_fork_asm+0x1a/0x30
[   12.238383] 
[   12.238541] The buggy address belongs to the object at ffff8881029a6600
[   12.238541]  which belongs to the cache kmalloc-128 of size 128
[   12.239360] The buggy address is located 0 bytes inside of
[   12.239360]  allocated 120-byte region [ffff8881029a6600, ffff8881029a6678)
[   12.240539] 
[   12.240797] The buggy address belongs to the physical page:
[   12.241129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.241506] flags: 0x200000000000000(node=0|zone=2)
[   12.241727] page_type: f5(slab)
[   12.241883] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.242844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.243569] page dumped because: kasan: bad access detected
[   12.243812] 
[   12.243901] Memory state around the buggy address:
[   12.244414]  ffff8881029a6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.244912]  ffff8881029a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.245745] >ffff8881029a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.246341]                                                                 ^
[   12.246673]  ffff8881029a6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.246968]  ffff8881029a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.247329] ==================================================================