Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.626410] ==================================================================
[   17.626508] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.626580] Read of size 1 at addr fff00000c78840c8 by task kunit_try_catch/207
[   17.626632] 
[   17.626676] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.626760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.626788] Hardware name: linux,dummy-virt (DT)
[   17.626821] Call trace:
[   17.626861]  show_stack+0x20/0x38 (C)
[   17.627101]  dump_stack_lvl+0x8c/0xd0
[   17.627152]  print_report+0x118/0x5d0
[   17.627557]  kasan_report+0xdc/0x128
[   17.627893]  __asan_report_load1_noabort+0x20/0x30
[   17.628161]  kmem_cache_oob+0x344/0x430
[   17.628878]  kunit_try_run_case+0x170/0x3f0
[   17.628965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.629043]  kthread+0x328/0x630
[   17.629255]  ret_from_fork+0x10/0x20
[   17.629537] 
[   17.629583] Allocated by task 207:
[   17.629663]  kasan_save_stack+0x3c/0x68
[   17.630143]  kasan_save_track+0x20/0x40
[   17.630245]  kasan_save_alloc_info+0x40/0x58
[   17.630317]  __kasan_slab_alloc+0xa8/0xb0
[   17.630354]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.630642]  kmem_cache_oob+0x12c/0x430
[   17.630779]  kunit_try_run_case+0x170/0x3f0
[   17.630908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.631044]  kthread+0x328/0x630
[   17.631357]  ret_from_fork+0x10/0x20
[   17.631498] 
[   17.631588] The buggy address belongs to the object at fff00000c7884000
[   17.631588]  which belongs to the cache test_cache of size 200
[   17.631673] The buggy address is located 0 bytes to the right of
[   17.631673]  allocated 200-byte region [fff00000c7884000, fff00000c78840c8)
[   17.631857] 
[   17.632003] The buggy address belongs to the physical page:
[   17.632040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.632106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.632433] page_type: f5(slab)
[   17.632508] raw: 0bfffe0000000000 fff00000c4557b40 dead000000000122 0000000000000000
[   17.632584] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.632656] page dumped because: kasan: bad access detected
[   17.633009] 
[   17.633083] Memory state around the buggy address:
[   17.633181]  fff00000c7883f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.633408]  fff00000c7884000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.633467] >fff00000c7884080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.633657]                                               ^
[   17.633783]  fff00000c7884100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.633963]  fff00000c7884180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.634038] ==================================================================

[   17.015542] ==================================================================
[   17.015600] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.015681] Read of size 1 at addr fff00000c79900c8 by task kunit_try_catch/207
[   17.015741] 
[   17.015776] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.015877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.015920] Hardware name: linux,dummy-virt (DT)
[   17.015969] Call trace:
[   17.016027]  show_stack+0x20/0x38 (C)
[   17.016080]  dump_stack_lvl+0x8c/0xd0
[   17.016181]  print_report+0x118/0x5d0
[   17.016236]  kasan_report+0xdc/0x128
[   17.016283]  __asan_report_load1_noabort+0x20/0x30
[   17.016348]  kmem_cache_oob+0x344/0x430
[   17.016393]  kunit_try_run_case+0x170/0x3f0
[   17.016439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.016492]  kthread+0x328/0x630
[   17.016533]  ret_from_fork+0x10/0x20
[   17.016609] 
[   17.016627] Allocated by task 207:
[   17.016813]  kasan_save_stack+0x3c/0x68
[   17.016945]  kasan_save_track+0x20/0x40
[   17.017044]  kasan_save_alloc_info+0x40/0x58
[   17.017098]  __kasan_slab_alloc+0xa8/0xb0
[   17.017204]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.017265]  kmem_cache_oob+0x12c/0x430
[   17.017391]  kunit_try_run_case+0x170/0x3f0
[   17.017455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.017552]  kthread+0x328/0x630
[   17.017675]  ret_from_fork+0x10/0x20
[   17.017761] 
[   17.017781] The buggy address belongs to the object at fff00000c7990000
[   17.017781]  which belongs to the cache test_cache of size 200
[   17.017890] The buggy address is located 0 bytes to the right of
[   17.017890]  allocated 200-byte region [fff00000c7990000, fff00000c79900c8)
[   17.017966] 
[   17.017986] The buggy address belongs to the physical page:
[   17.018016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107990
[   17.018094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.018143] page_type: f5(slab)
[   17.018183] raw: 0bfffe0000000000 fff00000c598d140 dead000000000122 0000000000000000
[   17.018233] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.018273] page dumped because: kasan: bad access detected
[   17.018304] 
[   17.018357] Memory state around the buggy address:
[   17.018391]  fff00000c798ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018436]  fff00000c7990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.018479] >fff00000c7990080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.018562]                                               ^
[   17.018676]  fff00000c7990100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018718]  fff00000c7990180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018780] ==================================================================

[   17.061941] ==================================================================
[   17.062073] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.062394] Read of size 1 at addr fff00000c775a0c8 by task kunit_try_catch/207
[   17.062446] 
[   17.062488] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.063117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.063150] Hardware name: linux,dummy-virt (DT)
[   17.063185] Call trace:
[   17.063210]  show_stack+0x20/0x38 (C)
[   17.063263]  dump_stack_lvl+0x8c/0xd0
[   17.063313]  print_report+0x118/0x5d0
[   17.063361]  kasan_report+0xdc/0x128
[   17.063409]  __asan_report_load1_noabort+0x20/0x30
[   17.064088]  kmem_cache_oob+0x344/0x430
[   17.064145]  kunit_try_run_case+0x170/0x3f0
[   17.064197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.064248]  kthread+0x328/0x630
[   17.064291]  ret_from_fork+0x10/0x20
[   17.064341] 
[   17.064360] Allocated by task 207:
[   17.064400]  kasan_save_stack+0x3c/0x68
[   17.064442]  kasan_save_track+0x20/0x40
[   17.064480]  kasan_save_alloc_info+0x40/0x58
[   17.064872]  __kasan_slab_alloc+0xa8/0xb0
[   17.065039]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.065080]  kmem_cache_oob+0x12c/0x430
[   17.065116]  kunit_try_run_case+0x170/0x3f0
[   17.065532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.065644]  kthread+0x328/0x630
[   17.065696]  ret_from_fork+0x10/0x20
[   17.065816] 
[   17.065836] The buggy address belongs to the object at fff00000c775a000
[   17.065836]  which belongs to the cache test_cache of size 200
[   17.065894] The buggy address is located 0 bytes to the right of
[   17.065894]  allocated 200-byte region [fff00000c775a000, fff00000c775a0c8)
[   17.065957] 
[   17.065979] The buggy address belongs to the physical page:
[   17.066011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a
[   17.066079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.066130] page_type: f5(slab)
[   17.066588] raw: 0bfffe0000000000 fff00000c56bd500 dead000000000122 0000000000000000
[   17.066644] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.066686] page dumped because: kasan: bad access detected
[   17.066731] 
[   17.066759] Memory state around the buggy address:
[   17.066791]  fff00000c7759f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.066842]  fff00000c775a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.067268] >fff00000c775a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.067374]                                               ^
[   17.067439]  fff00000c775a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.067542]  fff00000c775a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.067581] ==================================================================

[   12.882502] ==================================================================
[   12.882998] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   12.883355] Read of size 1 at addr ffff8881029a20c8 by task kunit_try_catch/224
[   12.883664] 
[   12.883807] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.883853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.883863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.883884] Call Trace:
[   12.883906]  <TASK>
[   12.883923]  dump_stack_lvl+0x73/0xb0
[   12.883954]  print_report+0xd1/0x610
[   12.883975]  ? __virt_addr_valid+0x1db/0x2d0
[   12.884008]  ? kmem_cache_oob+0x402/0x530
[   12.884029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.884052]  ? kmem_cache_oob+0x402/0x530
[   12.884076]  kasan_report+0x141/0x180
[   12.884097]  ? kmem_cache_oob+0x402/0x530
[   12.884125]  __asan_report_load1_noabort+0x18/0x20
[   12.884149]  kmem_cache_oob+0x402/0x530
[   12.884169]  ? trace_hardirqs_on+0x37/0xe0
[   12.884193]  ? __pfx_kmem_cache_oob+0x10/0x10
[   12.884217]  ? __kasan_check_write+0x18/0x20
[   12.884235]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.884259]  ? irqentry_exit+0x2a/0x60
[   12.884282]  ? trace_hardirqs_on+0x37/0xe0
[   12.884303]  ? __pfx_read_tsc+0x10/0x10
[   12.884323]  ? ktime_get_ts64+0x86/0x230
[   12.884348]  kunit_try_run_case+0x1a5/0x480
[   12.884372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.884396]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.884419]  ? __kthread_parkme+0x82/0x180
[   12.884438]  ? preempt_count_sub+0x50/0x80
[   12.884462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.884485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.884508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.884544]  kthread+0x337/0x6f0
[   12.884563]  ? trace_preempt_on+0x20/0xc0
[   12.884584]  ? __pfx_kthread+0x10/0x10
[   12.884604]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.884624]  ? calculate_sigpending+0x7b/0xa0
[   12.884648]  ? __pfx_kthread+0x10/0x10
[   12.884668]  ret_from_fork+0x116/0x1d0
[   12.884687]  ? __pfx_kthread+0x10/0x10
[   12.884706]  ret_from_fork_asm+0x1a/0x30
[   12.884738]  </TASK>
[   12.884749] 
[   12.892843] Allocated by task 224:
[   12.893040]  kasan_save_stack+0x45/0x70
[   12.893260]  kasan_save_track+0x18/0x40
[   12.893424]  kasan_save_alloc_info+0x3b/0x50
[   12.893574]  __kasan_slab_alloc+0x91/0xa0
[   12.893713]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.893951]  kmem_cache_oob+0x157/0x530
[   12.894313]  kunit_try_run_case+0x1a5/0x480
[   12.894523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.895006]  kthread+0x337/0x6f0
[   12.895180]  ret_from_fork+0x116/0x1d0
[   12.895337]  ret_from_fork_asm+0x1a/0x30
[   12.895582] 
[   12.895666] The buggy address belongs to the object at ffff8881029a2000
[   12.895666]  which belongs to the cache test_cache of size 200
[   12.896218] The buggy address is located 0 bytes to the right of
[   12.896218]  allocated 200-byte region [ffff8881029a2000, ffff8881029a20c8)
[   12.896754] 
[   12.896847] The buggy address belongs to the physical page:
[   12.897109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a2
[   12.897382] flags: 0x200000000000000(node=0|zone=2)
[   12.897652] page_type: f5(slab)
[   12.897824] raw: 0200000000000000 ffff888100fb8780 dead000000000122 0000000000000000
[   12.898203] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.898441] page dumped because: kasan: bad access detected
[   12.898617] 
[   12.898693] Memory state around the buggy address:
[   12.898856]  ffff8881029a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.899087]  ffff8881029a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.899403] >ffff8881029a2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.899717]                                               ^
[   12.899977]  ffff8881029a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.900344]  ffff8881029a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.900832] ==================================================================

[   12.690458] ==================================================================
[   12.690928] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   12.691230] Read of size 1 at addr ffff8881026e70c8 by task kunit_try_catch/225
[   12.691527] 
[   12.691657] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.691704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.691715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.691737] Call Trace:
[   12.691749]  <TASK>
[   12.691765]  dump_stack_lvl+0x73/0xb0
[   12.691796]  print_report+0xd1/0x610
[   12.691818]  ? __virt_addr_valid+0x1db/0x2d0
[   12.691841]  ? kmem_cache_oob+0x402/0x530
[   12.691862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.691884]  ? kmem_cache_oob+0x402/0x530
[   12.691907]  kasan_report+0x141/0x180
[   12.691928]  ? kmem_cache_oob+0x402/0x530
[   12.691955]  __asan_report_load1_noabort+0x18/0x20
[   12.691979]  kmem_cache_oob+0x402/0x530
[   12.692000]  ? trace_hardirqs_on+0x37/0xe0
[   12.692023]  ? __pfx_kmem_cache_oob+0x10/0x10
[   12.692047]  ? __kasan_check_write+0x18/0x20
[   12.692067]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.692092]  ? irqentry_exit+0x2a/0x60
[   12.692125]  ? trace_hardirqs_on+0x37/0xe0
[   12.692146]  ? __pfx_read_tsc+0x10/0x10
[   12.692167]  ? ktime_get_ts64+0x86/0x230
[   12.692191]  kunit_try_run_case+0x1a5/0x480
[   12.692215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.692240]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.692262]  ? __kthread_parkme+0x82/0x180
[   12.692283]  ? preempt_count_sub+0x50/0x80
[   12.692309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.692332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.692357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.692380]  kthread+0x337/0x6f0
[   12.692399]  ? trace_preempt_on+0x20/0xc0
[   12.692442]  ? __pfx_kthread+0x10/0x10
[   12.692462]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.692483]  ? calculate_sigpending+0x7b/0xa0
[   12.692506]  ? __pfx_kthread+0x10/0x10
[   12.692527]  ret_from_fork+0x116/0x1d0
[   12.692545]  ? __pfx_kthread+0x10/0x10
[   12.692564]  ret_from_fork_asm+0x1a/0x30
[   12.692605]  </TASK>
[   12.692614] 
[   12.700471] Allocated by task 225:
[   12.700804]  kasan_save_stack+0x45/0x70
[   12.701011]  kasan_save_track+0x18/0x40
[   12.701212]  kasan_save_alloc_info+0x3b/0x50
[   12.701472]  __kasan_slab_alloc+0x91/0xa0
[   12.701883]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.702118]  kmem_cache_oob+0x157/0x530
[   12.702298]  kunit_try_run_case+0x1a5/0x480
[   12.702627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.702861]  kthread+0x337/0x6f0
[   12.703015]  ret_from_fork+0x116/0x1d0
[   12.703170]  ret_from_fork_asm+0x1a/0x30
[   12.703346] 
[   12.703505] The buggy address belongs to the object at ffff8881026e7000
[   12.703505]  which belongs to the cache test_cache of size 200
[   12.703983] The buggy address is located 0 bytes to the right of
[   12.703983]  allocated 200-byte region [ffff8881026e7000, ffff8881026e70c8)
[   12.704673] 
[   12.704778] The buggy address belongs to the physical page:
[   12.704987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026e7
[   12.705276] flags: 0x200000000000000(node=0|zone=2)
[   12.705596] page_type: f5(slab)
[   12.705776] raw: 0200000000000000 ffff8881015ea500 dead000000000122 0000000000000000
[   12.706059] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.706378] page dumped because: kasan: bad access detected
[   12.706706] 
[   12.706803] Memory state around the buggy address:
[   12.706986]  ffff8881026e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.707245]  ffff8881026e7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.707472] >ffff8881026e7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.707686]                                               ^
[   12.707858]  ffff8881026e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.708072]  ffff8881026e7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.708384] ==================================================================

[   12.888585] ==================================================================
[   12.889085] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   12.889734] Read of size 1 at addr ffff8881034190c8 by task kunit_try_catch/224
[   12.890423] 
[   12.890726] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.890795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.890808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.890830] Call Trace:
[   12.890843]  <TASK>
[   12.890860]  dump_stack_lvl+0x73/0xb0
[   12.890904]  print_report+0xd1/0x610
[   12.890927]  ? __virt_addr_valid+0x1db/0x2d0
[   12.890950]  ? kmem_cache_oob+0x402/0x530
[   12.890983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.891006]  ? kmem_cache_oob+0x402/0x530
[   12.891037]  kasan_report+0x141/0x180
[   12.891058]  ? kmem_cache_oob+0x402/0x530
[   12.891094]  __asan_report_load1_noabort+0x18/0x20
[   12.891133]  kmem_cache_oob+0x402/0x530
[   12.891208]  ? trace_hardirqs_on+0x37/0xe0
[   12.891236]  ? __pfx_kmem_cache_oob+0x10/0x10
[   12.891259]  ? finish_task_switch.isra.0+0x153/0x700
[   12.891281]  ? __switch_to+0x47/0xf50
[   12.891309]  ? __pfx_read_tsc+0x10/0x10
[   12.891330]  ? ktime_get_ts64+0x86/0x230
[   12.891354]  kunit_try_run_case+0x1a5/0x480
[   12.891381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.891403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.891428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.891451]  ? __kthread_parkme+0x82/0x180
[   12.891472]  ? preempt_count_sub+0x50/0x80
[   12.891495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.891519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.891543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.891566]  kthread+0x337/0x6f0
[   12.891585]  ? trace_preempt_on+0x20/0xc0
[   12.891606]  ? __pfx_kthread+0x10/0x10
[   12.891626]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.891647]  ? calculate_sigpending+0x7b/0xa0
[   12.891671]  ? __pfx_kthread+0x10/0x10
[   12.891693]  ret_from_fork+0x116/0x1d0
[   12.891711]  ? __pfx_kthread+0x10/0x10
[   12.891730]  ret_from_fork_asm+0x1a/0x30
[   12.891761]  </TASK>
[   12.891772] 
[   12.904591] Allocated by task 224:
[   12.904978]  kasan_save_stack+0x45/0x70
[   12.905464]  kasan_save_track+0x18/0x40
[   12.905740]  kasan_save_alloc_info+0x3b/0x50
[   12.905893]  __kasan_slab_alloc+0x91/0xa0
[   12.906121]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.906575]  kmem_cache_oob+0x157/0x530
[   12.907037]  kunit_try_run_case+0x1a5/0x480
[   12.907473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.908052]  kthread+0x337/0x6f0
[   12.908339]  ret_from_fork+0x116/0x1d0
[   12.908706]  ret_from_fork_asm+0x1a/0x30
[   12.909190] 
[   12.909354] The buggy address belongs to the object at ffff888103419000
[   12.909354]  which belongs to the cache test_cache of size 200
[   12.910121] The buggy address is located 0 bytes to the right of
[   12.910121]  allocated 200-byte region [ffff888103419000, ffff8881034190c8)
[   12.910835] 
[   12.910909] The buggy address belongs to the physical page:
[   12.911215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103419
[   12.911992] flags: 0x200000000000000(node=0|zone=2)
[   12.912650] page_type: f5(slab)
[   12.913088] raw: 0200000000000000 ffff888100fa1a00 dead000000000122 0000000000000000
[   12.913765] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.913996] page dumped because: kasan: bad access detected
[   12.914633] 
[   12.914826] Memory state around the buggy address:
[   12.915337]  ffff888103418f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.915852]  ffff888103419000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.916474] >ffff888103419080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.917149]                                               ^
[   12.917708]  ffff888103419100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.917934]  ffff888103419180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.918459] ==================================================================