Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.037289] ==================================================================
[   17.037370] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   17.037444] Write of size 8 at addr fff00000c7892271 by task kunit_try_catch/176
[   17.037500] 
[   17.037866] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.038072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.038149] Hardware name: linux,dummy-virt (DT)
[   17.038183] Call trace:
[   17.038298]  show_stack+0x20/0x38 (C)
[   17.038362]  dump_stack_lvl+0x8c/0xd0
[   17.038413]  print_report+0x118/0x5d0
[   17.038822]  kasan_report+0xdc/0x128
[   17.038907]  kasan_check_range+0x100/0x1a8
[   17.038980]  __asan_memset+0x34/0x78
[   17.039026]  kmalloc_oob_memset_8+0x150/0x2f8
[   17.039072]  kunit_try_run_case+0x170/0x3f0
[   17.039452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.039664]  kthread+0x328/0x630
[   17.039743]  ret_from_fork+0x10/0x20
[   17.039954] 
[   17.040016] Allocated by task 176:
[   17.040144]  kasan_save_stack+0x3c/0x68
[   17.040258]  kasan_save_track+0x20/0x40
[   17.040395]  kasan_save_alloc_info+0x40/0x58
[   17.040455]  __kasan_kmalloc+0xd4/0xd8
[   17.040499]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.040828]  kmalloc_oob_memset_8+0xb0/0x2f8
[   17.040971]  kunit_try_run_case+0x170/0x3f0
[   17.041100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.041275]  kthread+0x328/0x630
[   17.041457]  ret_from_fork+0x10/0x20
[   17.041515] 
[   17.041536] The buggy address belongs to the object at fff00000c7892200
[   17.041536]  which belongs to the cache kmalloc-128 of size 128
[   17.041623] The buggy address is located 113 bytes inside of
[   17.041623]  allocated 120-byte region [fff00000c7892200, fff00000c7892278)
[   17.042021] 
[   17.042066] The buggy address belongs to the physical page:
[   17.042151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.042227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.042304] page_type: f5(slab)
[   17.042349] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.042460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.042515] page dumped because: kasan: bad access detected
[   17.042560] 
[   17.042578] Memory state around the buggy address:
[   17.042611]  fff00000c7892100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.042653]  fff00000c7892180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042694] >fff00000c7892200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.042740]                                                                 ^
[   17.042787]  fff00000c7892280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042830]  fff00000c7892300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042876] ==================================================================

[   16.688912] ==================================================================
[   16.689261] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.689396] Write of size 8 at addr fff00000c5b7db71 by task kunit_try_catch/176
[   16.689445] 
[   16.689754] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.689857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.689965] Hardware name: linux,dummy-virt (DT)
[   16.690046] Call trace:
[   16.690215]  show_stack+0x20/0x38 (C)
[   16.690428]  dump_stack_lvl+0x8c/0xd0
[   16.690535]  print_report+0x118/0x5d0
[   16.690590]  kasan_report+0xdc/0x128
[   16.690691]  kasan_check_range+0x100/0x1a8
[   16.691302]  __asan_memset+0x34/0x78
[   16.691380]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.691459]  kunit_try_run_case+0x170/0x3f0
[   16.691699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.691855]  kthread+0x328/0x630
[   16.691903]  ret_from_fork+0x10/0x20
[   16.692337] 
[   16.692381] Allocated by task 176:
[   16.692584]  kasan_save_stack+0x3c/0x68
[   16.692784]  kasan_save_track+0x20/0x40
[   16.692910]  kasan_save_alloc_info+0x40/0x58
[   16.693053]  __kasan_kmalloc+0xd4/0xd8
[   16.693096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.693136]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.693174]  kunit_try_run_case+0x170/0x3f0
[   16.693506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.693669]  kthread+0x328/0x630
[   16.693730]  ret_from_fork+0x10/0x20
[   16.693989] 
[   16.694244] The buggy address belongs to the object at fff00000c5b7db00
[   16.694244]  which belongs to the cache kmalloc-128 of size 128
[   16.694639] The buggy address is located 113 bytes inside of
[   16.694639]  allocated 120-byte region [fff00000c5b7db00, fff00000c5b7db78)
[   16.694804] 
[   16.694885] The buggy address belongs to the physical page:
[   16.695043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.695140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.695371] page_type: f5(slab)
[   16.695434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.695597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.695641] page dumped because: kasan: bad access detected
[   16.695848] 
[   16.695989] Memory state around the buggy address:
[   16.696047]  fff00000c5b7da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.696211]  fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696255] >fff00000c5b7db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.696529]                                                                 ^
[   16.696742]  fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696853]  fff00000c5b7dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696938] ==================================================================

[   16.731940] ==================================================================
[   16.732011] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.732072] Write of size 8 at addr fff00000c771d271 by task kunit_try_catch/176
[   16.732460] 
[   16.732577] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.732969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.733027] Hardware name: linux,dummy-virt (DT)
[   16.733062] Call trace:
[   16.733163]  show_stack+0x20/0x38 (C)
[   16.733496]  dump_stack_lvl+0x8c/0xd0
[   16.733567]  print_report+0x118/0x5d0
[   16.733738]  kasan_report+0xdc/0x128
[   16.733797]  kasan_check_range+0x100/0x1a8
[   16.733844]  __asan_memset+0x34/0x78
[   16.733895]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.733953]  kunit_try_run_case+0x170/0x3f0
[   16.734012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.734064]  kthread+0x328/0x630
[   16.734105]  ret_from_fork+0x10/0x20
[   16.734167] 
[   16.734186] Allocated by task 176:
[   16.734216]  kasan_save_stack+0x3c/0x68
[   16.734257]  kasan_save_track+0x20/0x40
[   16.734293]  kasan_save_alloc_info+0x40/0x58
[   16.734339]  __kasan_kmalloc+0xd4/0xd8
[   16.734376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.734419]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.734455]  kunit_try_run_case+0x170/0x3f0
[   16.734491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.734532]  kthread+0x328/0x630
[   16.734563]  ret_from_fork+0x10/0x20
[   16.734598] 
[   16.734617] The buggy address belongs to the object at fff00000c771d200
[   16.734617]  which belongs to the cache kmalloc-128 of size 128
[   16.734682] The buggy address is located 113 bytes inside of
[   16.734682]  allocated 120-byte region [fff00000c771d200, fff00000c771d278)
[   16.734753] 
[   16.734859] The buggy address belongs to the physical page:
[   16.735388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.735461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.735531] page_type: f5(slab)
[   16.735881] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.735966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.736335] page dumped because: kasan: bad access detected
[   16.736662] 
[   16.736779] Memory state around the buggy address:
[   16.736948]  fff00000c771d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.737002]  fff00000c771d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.737408] >fff00000c771d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.737470]                                                                 ^
[   16.737612]  fff00000c771d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.737662]  fff00000c771d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.737864] ==================================================================

[   12.383151] ==================================================================
[   12.383808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   12.384321] Write of size 8 at addr ffff888102e24571 by task kunit_try_catch/193
[   12.384768] 
[   12.384903] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.385076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.385087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.385111] Call Trace:
[   12.385122]  <TASK>
[   12.385139]  dump_stack_lvl+0x73/0xb0
[   12.385172]  print_report+0xd1/0x610
[   12.385194]  ? __virt_addr_valid+0x1db/0x2d0
[   12.385218]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.385239]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.385262]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.385283]  kasan_report+0x141/0x180
[   12.385305]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.385332]  kasan_check_range+0x10c/0x1c0
[   12.385355]  __asan_memset+0x27/0x50
[   12.385374]  kmalloc_oob_memset_8+0x166/0x330
[   12.385395]  ? __kasan_check_write+0x18/0x20
[   12.385437]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   12.385459]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.385485]  ? trace_hardirqs_on+0x37/0xe0
[   12.385509]  ? __pfx_read_tsc+0x10/0x10
[   12.385531]  ? ktime_get_ts64+0x86/0x230
[   12.385603]  kunit_try_run_case+0x1a5/0x480
[   12.385629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.385653]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.385678]  ? __kthread_parkme+0x82/0x180
[   12.385699]  ? preempt_count_sub+0x50/0x80
[   12.385724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.385747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.385771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.385795]  kthread+0x337/0x6f0
[   12.385813]  ? trace_preempt_on+0x20/0xc0
[   12.385835]  ? __pfx_kthread+0x10/0x10
[   12.385855]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.385876]  ? calculate_sigpending+0x7b/0xa0
[   12.385912]  ? __pfx_kthread+0x10/0x10
[   12.385933]  ret_from_fork+0x116/0x1d0
[   12.385952]  ? __pfx_kthread+0x10/0x10
[   12.385972]  ret_from_fork_asm+0x1a/0x30
[   12.386016]  </TASK>
[   12.386027] 
[   12.394118] Allocated by task 193:
[   12.394301]  kasan_save_stack+0x45/0x70
[   12.394527]  kasan_save_track+0x18/0x40
[   12.394725]  kasan_save_alloc_info+0x3b/0x50
[   12.394971]  __kasan_kmalloc+0xb7/0xc0
[   12.395162]  __kmalloc_cache_noprof+0x189/0x420
[   12.395357]  kmalloc_oob_memset_8+0xac/0x330
[   12.395710]  kunit_try_run_case+0x1a5/0x480
[   12.396087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.396350]  kthread+0x337/0x6f0
[   12.396499]  ret_from_fork+0x116/0x1d0
[   12.396682]  ret_from_fork_asm+0x1a/0x30
[   12.396838] 
[   12.396934] The buggy address belongs to the object at ffff888102e24500
[   12.396934]  which belongs to the cache kmalloc-128 of size 128
[   12.397284] The buggy address is located 113 bytes inside of
[   12.397284]  allocated 120-byte region [ffff888102e24500, ffff888102e24578)
[   12.397631] 
[   12.397702] The buggy address belongs to the physical page:
[   12.398081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24
[   12.398439] flags: 0x200000000000000(node=0|zone=2)
[   12.398797] page_type: f5(slab)
[   12.399080] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.399404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.399716] page dumped because: kasan: bad access detected
[   12.399974] 
[   12.400065] Memory state around the buggy address:
[   12.400419]  ffff888102e24400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.400689]  ffff888102e24480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.400942] >ffff888102e24500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.401416]                                                                 ^
[   12.401866]  ffff888102e24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.402883]  ffff888102e24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.403958] ==================================================================

[   12.124370] ==================================================================
[   12.125001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   12.125257] Write of size 8 at addr ffff8881026ce971 by task kunit_try_catch/194
[   12.125497] 
[   12.125583] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.125627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.125638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.125658] Call Trace:
[   12.125670]  <TASK>
[   12.125689]  dump_stack_lvl+0x73/0xb0
[   12.125719]  print_report+0xd1/0x610
[   12.125741]  ? __virt_addr_valid+0x1db/0x2d0
[   12.125765]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.125786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.125808]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.125830]  kasan_report+0x141/0x180
[   12.125851]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.125878]  kasan_check_range+0x10c/0x1c0
[   12.125902]  __asan_memset+0x27/0x50
[   12.125920]  kmalloc_oob_memset_8+0x166/0x330
[   12.125943]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   12.125965]  ? __schedule+0x10cc/0x2b60
[   12.125988]  ? __pfx_read_tsc+0x10/0x10
[   12.126009]  ? ktime_get_ts64+0x86/0x230
[   12.126035]  kunit_try_run_case+0x1a5/0x480
[   12.126061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.126085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.126111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.126134]  ? __kthread_parkme+0x82/0x180
[   12.126154]  ? preempt_count_sub+0x50/0x80
[   12.126179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.126203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.126227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.126250]  kthread+0x337/0x6f0
[   12.126278]  ? trace_preempt_on+0x20/0xc0
[   12.126301]  ? __pfx_kthread+0x10/0x10
[   12.126325]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.126368]  ? calculate_sigpending+0x7b/0xa0
[   12.126393]  ? __pfx_kthread+0x10/0x10
[   12.126413]  ret_from_fork+0x116/0x1d0
[   12.126432]  ? __pfx_kthread+0x10/0x10
[   12.126460]  ret_from_fork_asm+0x1a/0x30
[   12.126493]  </TASK>
[   12.126876] 
[   12.135224] Allocated by task 194:
[   12.135477]  kasan_save_stack+0x45/0x70
[   12.135724]  kasan_save_track+0x18/0x40
[   12.135913]  kasan_save_alloc_info+0x3b/0x50
[   12.136135]  __kasan_kmalloc+0xb7/0xc0
[   12.136264]  __kmalloc_cache_noprof+0x189/0x420
[   12.136477]  kmalloc_oob_memset_8+0xac/0x330
[   12.137429]  kunit_try_run_case+0x1a5/0x480
[   12.137710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.138281]  kthread+0x337/0x6f0
[   12.138627]  ret_from_fork+0x116/0x1d0
[   12.138830]  ret_from_fork_asm+0x1a/0x30
[   12.139046] 
[   12.139327] The buggy address belongs to the object at ffff8881026ce900
[   12.139327]  which belongs to the cache kmalloc-128 of size 128
[   12.140082] The buggy address is located 113 bytes inside of
[   12.140082]  allocated 120-byte region [ffff8881026ce900, ffff8881026ce978)
[   12.140677] 
[   12.140781] The buggy address belongs to the physical page:
[   12.141201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   12.141861] flags: 0x200000000000000(node=0|zone=2)
[   12.142035] page_type: f5(slab)
[   12.142155] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.142378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.142626] page dumped because: kasan: bad access detected
[   12.143152] 
[   12.143256] Memory state around the buggy address:
[   12.143494]  ffff8881026ce800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.144099]  ffff8881026ce880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.144491] >ffff8881026ce900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.145009]                                                                 ^
[   12.145368]  ffff8881026ce980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.145872]  ffff8881026cea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.146151] ==================================================================

[   12.315224] ==================================================================
[   12.316881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   12.318364] Write of size 8 at addr ffff888102b7d471 by task kunit_try_catch/193
[   12.319521] 
[   12.319638] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.319689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.319701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.319722] Call Trace:
[   12.319738]  <TASK>
[   12.319758]  dump_stack_lvl+0x73/0xb0
[   12.319794]  print_report+0xd1/0x610
[   12.320488]  ? __virt_addr_valid+0x1db/0x2d0
[   12.320520]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.320544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.320567]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.320589]  kasan_report+0x141/0x180
[   12.320610]  ? kmalloc_oob_memset_8+0x166/0x330
[   12.320637]  kasan_check_range+0x10c/0x1c0
[   12.320660]  __asan_memset+0x27/0x50
[   12.320679]  kmalloc_oob_memset_8+0x166/0x330
[   12.320701]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   12.320723]  ? __schedule+0x10cc/0x2b60
[   12.320746]  ? __pfx_read_tsc+0x10/0x10
[   12.320766]  ? ktime_get_ts64+0x86/0x230
[   12.320791]  kunit_try_run_case+0x1a5/0x480
[   12.320816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.320837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.320868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.320891]  ? __kthread_parkme+0x82/0x180
[   12.320912]  ? preempt_count_sub+0x50/0x80
[   12.320937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.320960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.320984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.321019]  kthread+0x337/0x6f0
[   12.321038]  ? trace_preempt_on+0x20/0xc0
[   12.321061]  ? __pfx_kthread+0x10/0x10
[   12.321080]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.321101]  ? calculate_sigpending+0x7b/0xa0
[   12.321126]  ? __pfx_kthread+0x10/0x10
[   12.321147]  ret_from_fork+0x116/0x1d0
[   12.321166]  ? __pfx_kthread+0x10/0x10
[   12.321185]  ret_from_fork_asm+0x1a/0x30
[   12.321217]  </TASK>
[   12.321227] 
[   12.331098] Allocated by task 193:
[   12.331459]  kasan_save_stack+0x45/0x70
[   12.331658]  kasan_save_track+0x18/0x40
[   12.331825]  kasan_save_alloc_info+0x3b/0x50
[   12.332111]  __kasan_kmalloc+0xb7/0xc0
[   12.332257]  __kmalloc_cache_noprof+0x189/0x420
[   12.332416]  kmalloc_oob_memset_8+0xac/0x330
[   12.332626]  kunit_try_run_case+0x1a5/0x480
[   12.332834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.333190]  kthread+0x337/0x6f0
[   12.333379]  ret_from_fork+0x116/0x1d0
[   12.333548]  ret_from_fork_asm+0x1a/0x30
[   12.333691] 
[   12.333766] The buggy address belongs to the object at ffff888102b7d400
[   12.333766]  which belongs to the cache kmalloc-128 of size 128
[   12.334224] The buggy address is located 113 bytes inside of
[   12.334224]  allocated 120-byte region [ffff888102b7d400, ffff888102b7d478)
[   12.334766] 
[   12.334868] The buggy address belongs to the physical page:
[   12.335167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   12.335413] flags: 0x200000000000000(node=0|zone=2)
[   12.335666] page_type: f5(slab)
[   12.335840] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.336567] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.336803] page dumped because: kasan: bad access detected
[   12.337076] 
[   12.337191] Memory state around the buggy address:
[   12.337416]  ffff888102b7d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.337661]  ffff888102b7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.337877] >ffff888102b7d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.338248]                                                                 ^
[   12.338747]  ffff888102b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.339080]  ffff888102b7d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.339385] ==================================================================