Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.990109] ==================================================================
[   16.990188] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.990254] Write of size 2 at addr fff00000c7892077 by task kunit_try_catch/172
[   16.990304] 
[   16.990346] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.990430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.990456] Hardware name: linux,dummy-virt (DT)
[   16.990487] Call trace:
[   16.990511]  show_stack+0x20/0x38 (C)
[   16.990562]  dump_stack_lvl+0x8c/0xd0
[   16.990611]  print_report+0x118/0x5d0
[   16.990660]  kasan_report+0xdc/0x128
[   16.990707]  kasan_check_range+0x100/0x1a8
[   16.990757]  __asan_memset+0x34/0x78
[   16.990800]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.991183]  kunit_try_run_case+0x170/0x3f0
[   16.991277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.991596]  kthread+0x328/0x630
[   16.991894]  ret_from_fork+0x10/0x20
[   16.992240] 
[   16.992260] Allocated by task 172:
[   16.992292]  kasan_save_stack+0x3c/0x68
[   16.992388]  kasan_save_track+0x20/0x40
[   16.992428]  kasan_save_alloc_info+0x40/0x58
[   16.992970]  __kasan_kmalloc+0xd4/0xd8
[   16.993099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.993169]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.993282]  kunit_try_run_case+0x170/0x3f0
[   16.993324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.993378]  kthread+0x328/0x630
[   16.993440]  ret_from_fork+0x10/0x20
[   16.993752] 
[   16.993816] The buggy address belongs to the object at fff00000c7892000
[   16.993816]  which belongs to the cache kmalloc-128 of size 128
[   16.994006] The buggy address is located 119 bytes inside of
[   16.994006]  allocated 120-byte region [fff00000c7892000, fff00000c7892078)
[   16.994249] 
[   16.994444] The buggy address belongs to the physical page:
[   16.994591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   16.994714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.994935] page_type: f5(slab)
[   16.995311] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.995509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.995585] page dumped because: kasan: bad access detected
[   16.995706] 
[   16.995744] Memory state around the buggy address:
[   16.995778]  fff00000c7891f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.995827]  fff00000c7891f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.996421] >fff00000c7892000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.996557]                                                                 ^
[   16.996645]  fff00000c7892080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.996809]  fff00000c7892100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.996907] ==================================================================

[   16.654416] ==================================================================
[   16.654546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.654601] Write of size 2 at addr fff00000c5b7d977 by task kunit_try_catch/172
[   16.655127] 
[   16.655235] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.655336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.655363] Hardware name: linux,dummy-virt (DT)
[   16.655666] Call trace:
[   16.655738]  show_stack+0x20/0x38 (C)
[   16.655793]  dump_stack_lvl+0x8c/0xd0
[   16.655839]  print_report+0x118/0x5d0
[   16.656239]  kasan_report+0xdc/0x128
[   16.656332]  kasan_check_range+0x100/0x1a8
[   16.656548]  __asan_memset+0x34/0x78
[   16.656610]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.656656]  kunit_try_run_case+0x170/0x3f0
[   16.656932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.657169]  kthread+0x328/0x630
[   16.657366]  ret_from_fork+0x10/0x20
[   16.657481] 
[   16.657818] Allocated by task 172:
[   16.657948]  kasan_save_stack+0x3c/0x68
[   16.658092]  kasan_save_track+0x20/0x40
[   16.658172]  kasan_save_alloc_info+0x40/0x58
[   16.658419]  __kasan_kmalloc+0xd4/0xd8
[   16.658619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.658697]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.658771]  kunit_try_run_case+0x170/0x3f0
[   16.658959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.659075]  kthread+0x328/0x630
[   16.659382]  ret_from_fork+0x10/0x20
[   16.659620] 
[   16.659663] The buggy address belongs to the object at fff00000c5b7d900
[   16.659663]  which belongs to the cache kmalloc-128 of size 128
[   16.659799] The buggy address is located 119 bytes inside of
[   16.659799]  allocated 120-byte region [fff00000c5b7d900, fff00000c5b7d978)
[   16.659929] 
[   16.660075] The buggy address belongs to the physical page:
[   16.660108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.660466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.660833] page_type: f5(slab)
[   16.660895] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.661058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.661125] page dumped because: kasan: bad access detected
[   16.661164] 
[   16.661182] Memory state around the buggy address:
[   16.661556]  fff00000c5b7d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.661634]  fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.661782] >fff00000c5b7d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.661956]                                                                 ^
[   16.662030]  fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662085]  fff00000c5b7da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662177] ==================================================================

[   16.678180] ==================================================================
[   16.678241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.678295] Write of size 2 at addr fff00000c771d077 by task kunit_try_catch/172
[   16.678667] 
[   16.679185] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.679469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.679612] Hardware name: linux,dummy-virt (DT)
[   16.679654] Call trace:
[   16.679679]  show_stack+0x20/0x38 (C)
[   16.679742]  dump_stack_lvl+0x8c/0xd0
[   16.680449]  print_report+0x118/0x5d0
[   16.680668]  kasan_report+0xdc/0x128
[   16.680764]  kasan_check_range+0x100/0x1a8
[   16.680835]  __asan_memset+0x34/0x78
[   16.681225]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.681369]  kunit_try_run_case+0x170/0x3f0
[   16.681554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.681731]  kthread+0x328/0x630
[   16.681798]  ret_from_fork+0x10/0x20
[   16.682040] 
[   16.682066] Allocated by task 172:
[   16.682099]  kasan_save_stack+0x3c/0x68
[   16.682187]  kasan_save_track+0x20/0x40
[   16.682349]  kasan_save_alloc_info+0x40/0x58
[   16.682396]  __kasan_kmalloc+0xd4/0xd8
[   16.682443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.682482]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.682518]  kunit_try_run_case+0x170/0x3f0
[   16.682555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.682596]  kthread+0x328/0x630
[   16.682628]  ret_from_fork+0x10/0x20
[   16.682672] 
[   16.682692] The buggy address belongs to the object at fff00000c771d000
[   16.682692]  which belongs to the cache kmalloc-128 of size 128
[   16.682769] The buggy address is located 119 bytes inside of
[   16.682769]  allocated 120-byte region [fff00000c771d000, fff00000c771d078)
[   16.683269] 
[   16.683494] The buggy address belongs to the physical page:
[   16.683533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.683783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.683966] page_type: f5(slab)
[   16.684160] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.684252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.684443] page dumped because: kasan: bad access detected
[   16.684477] 
[   16.684518] Memory state around the buggy address:
[   16.684852]  fff00000c771cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.685019]  fff00000c771cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.685124] >fff00000c771d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.685219]                                                                 ^
[   16.685343]  fff00000c771d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.685459]  fff00000c771d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.685947] ==================================================================

[   12.331887] ==================================================================
[   12.332389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   12.333001] Write of size 2 at addr ffff888102e24477 by task kunit_try_catch/189
[   12.333293] 
[   12.333426] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.333472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.333483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.333504] Call Trace:
[   12.333516]  <TASK>
[   12.333575]  dump_stack_lvl+0x73/0xb0
[   12.333609]  print_report+0xd1/0x610
[   12.333631]  ? __virt_addr_valid+0x1db/0x2d0
[   12.333654]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.333697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.333719]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.333756]  kasan_report+0x141/0x180
[   12.333778]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.333805]  kasan_check_range+0x10c/0x1c0
[   12.333829]  __asan_memset+0x27/0x50
[   12.333848]  kmalloc_oob_memset_2+0x166/0x330
[   12.333870]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   12.333903]  ? __schedule+0x10cc/0x2b60
[   12.333926]  ? __pfx_read_tsc+0x10/0x10
[   12.333947]  ? ktime_get_ts64+0x86/0x230
[   12.333972]  kunit_try_run_case+0x1a5/0x480
[   12.334008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.334029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.334053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.334077]  ? __kthread_parkme+0x82/0x180
[   12.334097]  ? preempt_count_sub+0x50/0x80
[   12.334121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.334145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.334168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.334192]  kthread+0x337/0x6f0
[   12.334210]  ? trace_preempt_on+0x20/0xc0
[   12.334234]  ? __pfx_kthread+0x10/0x10
[   12.334254]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.334274]  ? calculate_sigpending+0x7b/0xa0
[   12.334298]  ? __pfx_kthread+0x10/0x10
[   12.334319]  ret_from_fork+0x116/0x1d0
[   12.334337]  ? __pfx_kthread+0x10/0x10
[   12.334357]  ret_from_fork_asm+0x1a/0x30
[   12.334388]  </TASK>
[   12.334399] 
[   12.342413] Allocated by task 189:
[   12.342600]  kasan_save_stack+0x45/0x70
[   12.342751]  kasan_save_track+0x18/0x40
[   12.342889]  kasan_save_alloc_info+0x3b/0x50
[   12.343044]  __kasan_kmalloc+0xb7/0xc0
[   12.343475]  __kmalloc_cache_noprof+0x189/0x420
[   12.343967]  kmalloc_oob_memset_2+0xac/0x330
[   12.344211]  kunit_try_run_case+0x1a5/0x480
[   12.344372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.344557]  kthread+0x337/0x6f0
[   12.344720]  ret_from_fork+0x116/0x1d0
[   12.344921]  ret_from_fork_asm+0x1a/0x30
[   12.345327] 
[   12.345425] The buggy address belongs to the object at ffff888102e24400
[   12.345425]  which belongs to the cache kmalloc-128 of size 128
[   12.345875] The buggy address is located 119 bytes inside of
[   12.345875]  allocated 120-byte region [ffff888102e24400, ffff888102e24478)
[   12.346682] 
[   12.346787] The buggy address belongs to the physical page:
[   12.347031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24
[   12.347375] flags: 0x200000000000000(node=0|zone=2)
[   12.347615] page_type: f5(slab)
[   12.347817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.348169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.348484] page dumped because: kasan: bad access detected
[   12.348812] 
[   12.348990] Memory state around the buggy address:
[   12.349469]  ffff888102e24300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.350156]  ffff888102e24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.350463] >ffff888102e24400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.350727]                                                                 ^
[   12.350951]  ffff888102e24480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.351593]  ffff888102e24500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.351830] ==================================================================

[   12.080572] ==================================================================
[   12.081249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   12.081502] Write of size 2 at addr ffff888102ae1177 by task kunit_try_catch/190
[   12.081726] 
[   12.081812] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.081853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.082091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.082119] Call Trace:
[   12.082130]  <TASK>
[   12.082145]  dump_stack_lvl+0x73/0xb0
[   12.082175]  print_report+0xd1/0x610
[   12.082197]  ? __virt_addr_valid+0x1db/0x2d0
[   12.082218]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.082240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.082262]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.082284]  kasan_report+0x141/0x180
[   12.082388]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.082482]  kasan_check_range+0x10c/0x1c0
[   12.082509]  __asan_memset+0x27/0x50
[   12.082528]  kmalloc_oob_memset_2+0x166/0x330
[   12.082558]  ? __kasan_check_write+0x18/0x20
[   12.082602]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   12.082623]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.082648]  ? trace_hardirqs_on+0x37/0xe0
[   12.082672]  ? __pfx_read_tsc+0x10/0x10
[   12.082692]  ? ktime_get_ts64+0x86/0x230
[   12.082716]  kunit_try_run_case+0x1a5/0x480
[   12.082740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.082764]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.082806]  ? __kthread_parkme+0x82/0x180
[   12.082825]  ? preempt_count_sub+0x50/0x80
[   12.082849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.082872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.082895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.082918]  kthread+0x337/0x6f0
[   12.082937]  ? trace_preempt_on+0x20/0xc0
[   12.082958]  ? __pfx_kthread+0x10/0x10
[   12.082978]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.083010]  ? calculate_sigpending+0x7b/0xa0
[   12.083034]  ? __pfx_kthread+0x10/0x10
[   12.083055]  ret_from_fork+0x116/0x1d0
[   12.083091]  ? __pfx_kthread+0x10/0x10
[   12.083111]  ret_from_fork_asm+0x1a/0x30
[   12.083144]  </TASK>
[   12.083153] 
[   12.093118] Allocated by task 190:
[   12.093315]  kasan_save_stack+0x45/0x70
[   12.093937]  kasan_save_track+0x18/0x40
[   12.094199]  kasan_save_alloc_info+0x3b/0x50
[   12.094366]  __kasan_kmalloc+0xb7/0xc0
[   12.094687]  __kmalloc_cache_noprof+0x189/0x420
[   12.095130]  kmalloc_oob_memset_2+0xac/0x330
[   12.095385]  kunit_try_run_case+0x1a5/0x480
[   12.095737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.096046]  kthread+0x337/0x6f0
[   12.096192]  ret_from_fork+0x116/0x1d0
[   12.096382]  ret_from_fork_asm+0x1a/0x30
[   12.096694] 
[   12.096778] The buggy address belongs to the object at ffff888102ae1100
[   12.096778]  which belongs to the cache kmalloc-128 of size 128
[   12.097708] The buggy address is located 119 bytes inside of
[   12.097708]  allocated 120-byte region [ffff888102ae1100, ffff888102ae1178)
[   12.098231] 
[   12.098325] The buggy address belongs to the physical page:
[   12.098533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   12.099330] flags: 0x200000000000000(node=0|zone=2)
[   12.099761] page_type: f5(slab)
[   12.099937] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.100361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.100857] page dumped because: kasan: bad access detected
[   12.101266] 
[   12.101371] Memory state around the buggy address:
[   12.101763]  ffff888102ae1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.102127]  ffff888102ae1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.102549] >ffff888102ae1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.102959]                                                                 ^
[   12.103218]  ffff888102ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.103810]  ffff888102ae1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.104203] ==================================================================

[   12.252931] ==================================================================
[   12.253519] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   12.253952] Write of size 2 at addr ffff8881029a6777 by task kunit_try_catch/189
[   12.254241] 
[   12.254336] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.254384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.254395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.254417] Call Trace:
[   12.254429]  <TASK>
[   12.254447]  dump_stack_lvl+0x73/0xb0
[   12.254531]  print_report+0xd1/0x610
[   12.254554]  ? __virt_addr_valid+0x1db/0x2d0
[   12.254577]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.254598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.254620]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.254642]  kasan_report+0x141/0x180
[   12.254664]  ? kmalloc_oob_memset_2+0x166/0x330
[   12.254691]  kasan_check_range+0x10c/0x1c0
[   12.254714]  __asan_memset+0x27/0x50
[   12.254732]  kmalloc_oob_memset_2+0x166/0x330
[   12.254754]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   12.254776]  ? __schedule+0x10cc/0x2b60
[   12.254833]  ? __pfx_read_tsc+0x10/0x10
[   12.254854]  ? ktime_get_ts64+0x86/0x230
[   12.254903]  kunit_try_run_case+0x1a5/0x480
[   12.254928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.254950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.254973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.254996]  ? __kthread_parkme+0x82/0x180
[   12.255026]  ? preempt_count_sub+0x50/0x80
[   12.255051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.255073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.255096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.255119]  kthread+0x337/0x6f0
[   12.255138]  ? trace_preempt_on+0x20/0xc0
[   12.255161]  ? __pfx_kthread+0x10/0x10
[   12.255180]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.255201]  ? calculate_sigpending+0x7b/0xa0
[   12.255256]  ? __pfx_kthread+0x10/0x10
[   12.255301]  ret_from_fork+0x116/0x1d0
[   12.255320]  ? __pfx_kthread+0x10/0x10
[   12.255339]  ret_from_fork_asm+0x1a/0x30
[   12.255370]  </TASK>
[   12.255380] 
[   12.268637] Allocated by task 189:
[   12.268828]  kasan_save_stack+0x45/0x70
[   12.269395]  kasan_save_track+0x18/0x40
[   12.269761]  kasan_save_alloc_info+0x3b/0x50
[   12.269966]  __kasan_kmalloc+0xb7/0xc0
[   12.270610]  __kmalloc_cache_noprof+0x189/0x420
[   12.270932]  kmalloc_oob_memset_2+0xac/0x330
[   12.271201]  kunit_try_run_case+0x1a5/0x480
[   12.271383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.271869]  kthread+0x337/0x6f0
[   12.272341]  ret_from_fork+0x116/0x1d0
[   12.272609]  ret_from_fork_asm+0x1a/0x30
[   12.272795] 
[   12.272894] The buggy address belongs to the object at ffff8881029a6700
[   12.272894]  which belongs to the cache kmalloc-128 of size 128
[   12.274270] The buggy address is located 119 bytes inside of
[   12.274270]  allocated 120-byte region [ffff8881029a6700, ffff8881029a6778)
[   12.275234] 
[   12.275477] The buggy address belongs to the physical page:
[   12.275723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.276365] flags: 0x200000000000000(node=0|zone=2)
[   12.276829] page_type: f5(slab)
[   12.277223] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.277890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.278560] page dumped because: kasan: bad access detected
[   12.278934] 
[   12.279265] Memory state around the buggy address:
[   12.279693]  ffff8881029a6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.280001]  ffff8881029a6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.280295] >ffff8881029a6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.281081]                                                                 ^
[   12.281649]  ffff8881029a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.282120]  ffff8881029a6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.283113] ==================================================================