Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.060368] ==================================================================
[   17.060457] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   17.060525] Write of size 16 at addr fff00000c7892369 by task kunit_try_catch/178
[   17.060576] 
[   17.060619] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.060702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.060728] Hardware name: linux,dummy-virt (DT)
[   17.060760] Call trace:
[   17.060783]  show_stack+0x20/0x38 (C)
[   17.061688]  dump_stack_lvl+0x8c/0xd0
[   17.062082]  print_report+0x118/0x5d0
[   17.062659]  kasan_report+0xdc/0x128
[   17.062852]  kasan_check_range+0x100/0x1a8
[   17.062901]  __asan_memset+0x34/0x78
[   17.062943]  kmalloc_oob_memset_16+0x150/0x2f8
[   17.062988]  kunit_try_run_case+0x170/0x3f0
[   17.063459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.063582]  kthread+0x328/0x630
[   17.063626]  ret_from_fork+0x10/0x20
[   17.063818] 
[   17.063869] Allocated by task 178:
[   17.063903]  kasan_save_stack+0x3c/0x68
[   17.064208]  kasan_save_track+0x20/0x40
[   17.064269]  kasan_save_alloc_info+0x40/0x58
[   17.064849]  __kasan_kmalloc+0xd4/0xd8
[   17.064974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.065135]  kmalloc_oob_memset_16+0xb0/0x2f8
[   17.065449]  kunit_try_run_case+0x170/0x3f0
[   17.065521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.065565]  kthread+0x328/0x630
[   17.066149]  ret_from_fork+0x10/0x20
[   17.066431] 
[   17.066523] The buggy address belongs to the object at fff00000c7892300
[   17.066523]  which belongs to the cache kmalloc-128 of size 128
[   17.066583] The buggy address is located 105 bytes inside of
[   17.066583]  allocated 120-byte region [fff00000c7892300, fff00000c7892378)
[   17.067022] 
[   17.067049] The buggy address belongs to the physical page:
[   17.067367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.067430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.067482] page_type: f5(slab)
[   17.067862] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.067939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.067978] page dumped because: kasan: bad access detected
[   17.068009] 
[   17.068028] Memory state around the buggy address:
[   17.068062]  fff00000c7892200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.068103]  fff00000c7892280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.068144] >fff00000c7892300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.068181]                                                                 ^
[   17.068220]  fff00000c7892380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.068261]  fff00000c7892400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.068960] ==================================================================

[   16.709031] ==================================================================
[   16.709147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.709396] Write of size 16 at addr fff00000c5b7dc69 by task kunit_try_catch/178
[   16.709513] 
[   16.709591] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.709694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.710063] Hardware name: linux,dummy-virt (DT)
[   16.710218] Call trace:
[   16.710385]  show_stack+0x20/0x38 (C)
[   16.710530]  dump_stack_lvl+0x8c/0xd0
[   16.710648]  print_report+0x118/0x5d0
[   16.711002]  kasan_report+0xdc/0x128
[   16.711096]  kasan_check_range+0x100/0x1a8
[   16.711244]  __asan_memset+0x34/0x78
[   16.711299]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.711357]  kunit_try_run_case+0x170/0x3f0
[   16.711410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.711498]  kthread+0x328/0x630
[   16.711539]  ret_from_fork+0x10/0x20
[   16.711598] 
[   16.711628] Allocated by task 178:
[   16.711665]  kasan_save_stack+0x3c/0x68
[   16.711707]  kasan_save_track+0x20/0x40
[   16.711753]  kasan_save_alloc_info+0x40/0x58
[   16.711806]  __kasan_kmalloc+0xd4/0xd8
[   16.711842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.711881]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.711917]  kunit_try_run_case+0x170/0x3f0
[   16.711954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.711996]  kthread+0x328/0x630
[   16.712027]  ret_from_fork+0x10/0x20
[   16.712063] 
[   16.712083] The buggy address belongs to the object at fff00000c5b7dc00
[   16.712083]  which belongs to the cache kmalloc-128 of size 128
[   16.712138] The buggy address is located 105 bytes inside of
[   16.712138]  allocated 120-byte region [fff00000c5b7dc00, fff00000c5b7dc78)
[   16.712213] 
[   16.712240] The buggy address belongs to the physical page:
[   16.712281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.712903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.713004] page_type: f5(slab)
[   16.713067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.713168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.713254] page dumped because: kasan: bad access detected
[   16.713284] 
[   16.713310] Memory state around the buggy address:
[   16.713716]  fff00000c5b7db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.713788]  fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.713861] >fff00000c5b7dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.713939]                                                                 ^
[   16.714066]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714159]  fff00000c5b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714298] ==================================================================

[   16.749487] ==================================================================
[   16.749548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.749602] Write of size 16 at addr fff00000c771d369 by task kunit_try_catch/178
[   16.749649] 
[   16.749685] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.750923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.751330] Hardware name: linux,dummy-virt (DT)
[   16.751369] Call trace:
[   16.751393]  show_stack+0x20/0x38 (C)
[   16.751772]  dump_stack_lvl+0x8c/0xd0
[   16.752141]  print_report+0x118/0x5d0
[   16.752310]  kasan_report+0xdc/0x128
[   16.752678]  kasan_check_range+0x100/0x1a8
[   16.752917]  __asan_memset+0x34/0x78
[   16.753189]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.753463]  kunit_try_run_case+0x170/0x3f0
[   16.753598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.753794]  kthread+0x328/0x630
[   16.753891]  ret_from_fork+0x10/0x20
[   16.754176] 
[   16.754380] Allocated by task 178:
[   16.754443]  kasan_save_stack+0x3c/0x68
[   16.754620]  kasan_save_track+0x20/0x40
[   16.754801]  kasan_save_alloc_info+0x40/0x58
[   16.754939]  __kasan_kmalloc+0xd4/0xd8
[   16.754986]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.755369]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.755660]  kunit_try_run_case+0x170/0x3f0
[   16.755838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.755997]  kthread+0x328/0x630
[   16.756034]  ret_from_fork+0x10/0x20
[   16.756117] 
[   16.756188] The buggy address belongs to the object at fff00000c771d300
[   16.756188]  which belongs to the cache kmalloc-128 of size 128
[   16.756425] The buggy address is located 105 bytes inside of
[   16.756425]  allocated 120-byte region [fff00000c771d300, fff00000c771d378)
[   16.756593] 
[   16.756815] The buggy address belongs to the physical page:
[   16.756985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.757446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.757630] page_type: f5(slab)
[   16.757909] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.758396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.758512] page dumped because: kasan: bad access detected
[   16.758665] 
[   16.758816] Memory state around the buggy address:
[   16.758880]  fff00000c771d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.759324]  fff00000c771d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759366] >fff00000c771d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.759404]                                                                 ^
[   16.759445]  fff00000c771d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759485]  fff00000c771d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759522] ==================================================================

[   12.408949] ==================================================================
[   12.410076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   12.410912] Write of size 16 at addr ffff888102e24669 by task kunit_try_catch/195
[   12.411757] 
[   12.411969] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.412020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.412031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.412053] Call Trace:
[   12.412064]  <TASK>
[   12.412082]  dump_stack_lvl+0x73/0xb0
[   12.412114]  print_report+0xd1/0x610
[   12.412155]  ? __virt_addr_valid+0x1db/0x2d0
[   12.412178]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.412200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.412222]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.412244]  kasan_report+0x141/0x180
[   12.412266]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.412294]  kasan_check_range+0x10c/0x1c0
[   12.412317]  __asan_memset+0x27/0x50
[   12.412336]  kmalloc_oob_memset_16+0x166/0x330
[   12.412358]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   12.412380]  ? __schedule+0x10cc/0x2b60
[   12.412403]  ? __pfx_read_tsc+0x10/0x10
[   12.412423]  ? ktime_get_ts64+0x86/0x230
[   12.412448]  kunit_try_run_case+0x1a5/0x480
[   12.412473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.412518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.412541]  ? __kthread_parkme+0x82/0x180
[   12.412561]  ? preempt_count_sub+0x50/0x80
[   12.412586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.412632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.412655]  kthread+0x337/0x6f0
[   12.412674]  ? trace_preempt_on+0x20/0xc0
[   12.412697]  ? __pfx_kthread+0x10/0x10
[   12.412717]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.412738]  ? calculate_sigpending+0x7b/0xa0
[   12.412762]  ? __pfx_kthread+0x10/0x10
[   12.412783]  ret_from_fork+0x116/0x1d0
[   12.412800]  ? __pfx_kthread+0x10/0x10
[   12.412820]  ret_from_fork_asm+0x1a/0x30
[   12.412852]  </TASK>
[   12.412864] 
[   12.424799] Allocated by task 195:
[   12.425233]  kasan_save_stack+0x45/0x70
[   12.425620]  kasan_save_track+0x18/0x40
[   12.425971]  kasan_save_alloc_info+0x3b/0x50
[   12.426378]  __kasan_kmalloc+0xb7/0xc0
[   12.426790]  __kmalloc_cache_noprof+0x189/0x420
[   12.427269]  kmalloc_oob_memset_16+0xac/0x330
[   12.427680]  kunit_try_run_case+0x1a5/0x480
[   12.428110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.428592]  kthread+0x337/0x6f0
[   12.428804]  ret_from_fork+0x116/0x1d0
[   12.428949]  ret_from_fork_asm+0x1a/0x30
[   12.429185] 
[   12.429258] The buggy address belongs to the object at ffff888102e24600
[   12.429258]  which belongs to the cache kmalloc-128 of size 128
[   12.429622] The buggy address is located 105 bytes inside of
[   12.429622]  allocated 120-byte region [ffff888102e24600, ffff888102e24678)
[   12.430000] 
[   12.430075] The buggy address belongs to the physical page:
[   12.430324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24
[   12.430680] flags: 0x200000000000000(node=0|zone=2)
[   12.430935] page_type: f5(slab)
[   12.431170] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.431463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.431736] page dumped because: kasan: bad access detected
[   12.431932] 
[   12.432021] Memory state around the buggy address:
[   12.432251]  ffff888102e24500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.432660]  ffff888102e24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.432935] >ffff888102e24600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.433161]                                                                 ^
[   12.433480]  ffff888102e24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.433804]  ffff888102e24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.434252] ==================================================================

[   12.150694] ==================================================================
[   12.151163] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   12.151930] Write of size 16 at addr ffff888102ae1269 by task kunit_try_catch/196
[   12.152265] 
[   12.153014] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.153064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.153076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.153097] Call Trace:
[   12.153108]  <TASK>
[   12.153122]  dump_stack_lvl+0x73/0xb0
[   12.153158]  print_report+0xd1/0x610
[   12.153182]  ? __virt_addr_valid+0x1db/0x2d0
[   12.153204]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.153225]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.153247]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.153269]  kasan_report+0x141/0x180
[   12.153290]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.153318]  kasan_check_range+0x10c/0x1c0
[   12.153341]  __asan_memset+0x27/0x50
[   12.153360]  kmalloc_oob_memset_16+0x166/0x330
[   12.153382]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   12.153486]  ? __schedule+0x10cc/0x2b60
[   12.153512]  ? __pfx_read_tsc+0x10/0x10
[   12.153533]  ? ktime_get_ts64+0x86/0x230
[   12.153563]  kunit_try_run_case+0x1a5/0x480
[   12.153587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.153608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.153633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.153656]  ? __kthread_parkme+0x82/0x180
[   12.153676]  ? preempt_count_sub+0x50/0x80
[   12.153701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.153724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.153747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.153770]  kthread+0x337/0x6f0
[   12.153788]  ? trace_preempt_on+0x20/0xc0
[   12.153811]  ? __pfx_kthread+0x10/0x10
[   12.153831]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.153851]  ? calculate_sigpending+0x7b/0xa0
[   12.153875]  ? __pfx_kthread+0x10/0x10
[   12.153895]  ret_from_fork+0x116/0x1d0
[   12.153913]  ? __pfx_kthread+0x10/0x10
[   12.153932]  ret_from_fork_asm+0x1a/0x30
[   12.153964]  </TASK>
[   12.153974] 
[   12.165313] Allocated by task 196:
[   12.165627]  kasan_save_stack+0x45/0x70
[   12.166081]  kasan_save_track+0x18/0x40
[   12.166296]  kasan_save_alloc_info+0x3b/0x50
[   12.166805]  __kasan_kmalloc+0xb7/0xc0
[   12.166973]  __kmalloc_cache_noprof+0x189/0x420
[   12.167321]  kmalloc_oob_memset_16+0xac/0x330
[   12.167718]  kunit_try_run_case+0x1a5/0x480
[   12.168094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.168347]  kthread+0x337/0x6f0
[   12.168843]  ret_from_fork+0x116/0x1d0
[   12.169026]  ret_from_fork_asm+0x1a/0x30
[   12.169427] 
[   12.169748] The buggy address belongs to the object at ffff888102ae1200
[   12.169748]  which belongs to the cache kmalloc-128 of size 128
[   12.170395] The buggy address is located 105 bytes inside of
[   12.170395]  allocated 120-byte region [ffff888102ae1200, ffff888102ae1278)
[   12.171071] 
[   12.171176] The buggy address belongs to the physical page:
[   12.171715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   12.172149] flags: 0x200000000000000(node=0|zone=2)
[   12.172398] page_type: f5(slab)
[   12.172924] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.173348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.173813] page dumped because: kasan: bad access detected
[   12.174050] 
[   12.174128] Memory state around the buggy address:
[   12.174349]  ffff888102ae1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.175032]  ffff888102ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.175430] >ffff888102ae1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.175789]                                                                 ^
[   12.176252]  ffff888102ae1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.176869]  ffff888102ae1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.177311] ==================================================================

[   12.343001] ==================================================================
[   12.343483] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   12.343784] Write of size 16 at addr ffff8881029a6869 by task kunit_try_catch/195
[   12.344441] 
[   12.344573] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.344624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.344636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.344659] Call Trace:
[   12.344672]  <TASK>
[   12.344691]  dump_stack_lvl+0x73/0xb0
[   12.344724]  print_report+0xd1/0x610
[   12.344747]  ? __virt_addr_valid+0x1db/0x2d0
[   12.344772]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.344793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.344816]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.344839]  kasan_report+0x141/0x180
[   12.344869]  ? kmalloc_oob_memset_16+0x166/0x330
[   12.344895]  kasan_check_range+0x10c/0x1c0
[   12.344918]  __asan_memset+0x27/0x50
[   12.344937]  kmalloc_oob_memset_16+0x166/0x330
[   12.344959]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   12.344982]  ? __schedule+0x10cc/0x2b60
[   12.345005]  ? __pfx_read_tsc+0x10/0x10
[   12.345051]  ? ktime_get_ts64+0x86/0x230
[   12.345076]  kunit_try_run_case+0x1a5/0x480
[   12.345102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.345148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.345171]  ? __kthread_parkme+0x82/0x180
[   12.345193]  ? preempt_count_sub+0x50/0x80
[   12.345217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.345264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.345288]  kthread+0x337/0x6f0
[   12.345307]  ? trace_preempt_on+0x20/0xc0
[   12.345330]  ? __pfx_kthread+0x10/0x10
[   12.345349]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.345370]  ? calculate_sigpending+0x7b/0xa0
[   12.345395]  ? __pfx_kthread+0x10/0x10
[   12.345415]  ret_from_fork+0x116/0x1d0
[   12.345446]  ? __pfx_kthread+0x10/0x10
[   12.345466]  ret_from_fork_asm+0x1a/0x30
[   12.345498]  </TASK>
[   12.345508] 
[   12.353734] Allocated by task 195:
[   12.353943]  kasan_save_stack+0x45/0x70
[   12.354321]  kasan_save_track+0x18/0x40
[   12.354530]  kasan_save_alloc_info+0x3b/0x50
[   12.354736]  __kasan_kmalloc+0xb7/0xc0
[   12.354896]  __kmalloc_cache_noprof+0x189/0x420
[   12.355420]  kmalloc_oob_memset_16+0xac/0x330
[   12.355622]  kunit_try_run_case+0x1a5/0x480
[   12.355829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.356110]  kthread+0x337/0x6f0
[   12.356270]  ret_from_fork+0x116/0x1d0
[   12.356406]  ret_from_fork_asm+0x1a/0x30
[   12.356588] 
[   12.356681] The buggy address belongs to the object at ffff8881029a6800
[   12.356681]  which belongs to the cache kmalloc-128 of size 128
[   12.357758] The buggy address is located 105 bytes inside of
[   12.357758]  allocated 120-byte region [ffff8881029a6800, ffff8881029a6878)
[   12.358331] 
[   12.358410] The buggy address belongs to the physical page:
[   12.358583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.358829] flags: 0x200000000000000(node=0|zone=2)
[   12.358999] page_type: f5(slab)
[   12.359181] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.359759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.360135] page dumped because: kasan: bad access detected
[   12.360434] 
[   12.360526] Memory state around the buggy address:
[   12.360714]  ffff8881029a6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.360939]  ffff8881029a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.361226] >ffff8881029a6800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.361964]                                                                 ^
[   12.362315]  ffff8881029a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.362680]  ffff8881029a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.362964] ==================================================================