Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   27.020407] ==================================================================
[   27.029650] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   27.036937] Write of size 128 at addr ffff000801e28100 by task kunit_try_catch/217
[   27.044488] 
[   27.045973] CPU: 7 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.046025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.046041] Hardware name: WinLink E850-96 board (DT)
[   27.046062] Call trace:
[   27.046077]  show_stack+0x20/0x38 (C)
[   27.046118]  dump_stack_lvl+0x8c/0xd0
[   27.046156]  print_report+0x118/0x608
[   27.046192]  kasan_report+0xdc/0x128
[   27.046226]  kasan_check_range+0x100/0x1a8
[   27.046264]  __asan_memset+0x34/0x78
[   27.046291]  kmalloc_oob_in_memset+0x144/0x2d0
[   27.046322]  kunit_try_run_case+0x170/0x3f0
[   27.046359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.046395]  kthread+0x328/0x630
[   27.046426]  ret_from_fork+0x10/0x20
[   27.046462] 
[   27.111935] Allocated by task 217:
[   27.115323]  kasan_save_stack+0x3c/0x68
[   27.119139]  kasan_save_track+0x20/0x40
[   27.122959]  kasan_save_alloc_info+0x40/0x58
[   27.127212]  __kasan_kmalloc+0xd4/0xd8
[   27.130946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.135458]  kmalloc_oob_in_memset+0xb0/0x2d0
[   27.139799]  kunit_try_run_case+0x170/0x3f0
[   27.143965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.149434]  kthread+0x328/0x630
[   27.152646]  ret_from_fork+0x10/0x20
[   27.156207] 
[   27.157682] The buggy address belongs to the object at ffff000801e28100
[   27.157682]  which belongs to the cache kmalloc-128 of size 128
[   27.170182] The buggy address is located 0 bytes inside of
[   27.170182]  allocated 120-byte region [ffff000801e28100, ffff000801e28178)
[   27.182593] 
[   27.184072] The buggy address belongs to the physical page:
[   27.189628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   27.197613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.205251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.212196] page_type: f5(slab)
[   27.215333] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.223051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.230781] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.238589] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.246402] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   27.254214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.262020] page dumped because: kasan: bad access detected
[   27.267575] 
[   27.269050] Memory state around the buggy address:
[   27.273832]  ffff000801e28000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.281033]  ffff000801e28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.288238] >ffff000801e28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.295439]                                                                 ^
[   27.302561]  ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.309767]  ffff000801e28200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.316968] ==================================================================

[   25.280167] ==================================================================
[   25.280293] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   25.280424] Write of size 128 at addr fff00000c6507400 by task kunit_try_catch/170
[   25.280550] 
[   25.280638] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.281445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.281862] Hardware name: linux,dummy-virt (DT)
[   25.282125] Call trace:
[   25.282191]  show_stack+0x20/0x38 (C)
[   25.282454]  dump_stack_lvl+0x8c/0xd0
[   25.282600]  print_report+0x118/0x608
[   25.282826]  kasan_report+0xdc/0x128
[   25.283074]  kasan_check_range+0x100/0x1a8
[   25.283242]  __asan_memset+0x34/0x78
[   25.283358]  kmalloc_oob_in_memset+0x144/0x2d0
[   25.283773]  kunit_try_run_case+0x170/0x3f0
[   25.284218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.284465]  kthread+0x328/0x630
[   25.284987]  ret_from_fork+0x10/0x20
[   25.285439] 
[   25.285521] Allocated by task 170:
[   25.285609]  kasan_save_stack+0x3c/0x68
[   25.285916]  kasan_save_track+0x20/0x40
[   25.286079]  kasan_save_alloc_info+0x40/0x58
[   25.286213]  __kasan_kmalloc+0xd4/0xd8
[   25.286343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.286449]  kmalloc_oob_in_memset+0xb0/0x2d0
[   25.286728]  kunit_try_run_case+0x170/0x3f0
[   25.286853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.286994]  kthread+0x328/0x630
[   25.287083]  ret_from_fork+0x10/0x20
[   25.287771] 
[   25.287844] The buggy address belongs to the object at fff00000c6507400
[   25.287844]  which belongs to the cache kmalloc-128 of size 128
[   25.288011] The buggy address is located 0 bytes inside of
[   25.288011]  allocated 120-byte region [fff00000c6507400, fff00000c6507478)
[   25.288223] 
[   25.288293] The buggy address belongs to the physical page:
[   25.288493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.288750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.288948] page_type: f5(slab)
[   25.289114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.289239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.289429] page dumped because: kasan: bad access detected
[   25.289709] 
[   25.289997] Memory state around the buggy address:
[   25.290166]  fff00000c6507300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.290402]  fff00000c6507380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.290683] >fff00000c6507400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.290778]                                                                 ^
[   25.291533]  fff00000c6507480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.291643]  fff00000c6507500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.291737] ==================================================================

[   25.512240] ==================================================================
[   25.512380] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   25.512508] Write of size 128 at addr fff00000c7747200 by task kunit_try_catch/170
[   25.512627] 
[   25.512706] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.514320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.514398] Hardware name: linux,dummy-virt (DT)
[   25.514483] Call trace:
[   25.514542]  show_stack+0x20/0x38 (C)
[   25.516176]  dump_stack_lvl+0x8c/0xd0
[   25.516288]  print_report+0x118/0x608
[   25.516413]  kasan_report+0xdc/0x128
[   25.517179]  kasan_check_range+0x100/0x1a8
[   25.517346]  __asan_memset+0x34/0x78
[   25.517551]  kmalloc_oob_in_memset+0x144/0x2d0
[   25.517809]  kunit_try_run_case+0x170/0x3f0
[   25.517962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.518113]  kthread+0x328/0x630
[   25.518256]  ret_from_fork+0x10/0x20
[   25.518862] 
[   25.519184] Allocated by task 170:
[   25.519260]  kasan_save_stack+0x3c/0x68
[   25.519360]  kasan_save_track+0x20/0x40
[   25.519461]  kasan_save_alloc_info+0x40/0x58
[   25.519617]  __kasan_kmalloc+0xd4/0xd8
[   25.519820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.519966]  kmalloc_oob_in_memset+0xb0/0x2d0
[   25.520534]  kunit_try_run_case+0x170/0x3f0
[   25.521022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.521489]  kthread+0x328/0x630
[   25.521717]  ret_from_fork+0x10/0x20
[   25.521871] 
[   25.521922] The buggy address belongs to the object at fff00000c7747200
[   25.521922]  which belongs to the cache kmalloc-128 of size 128
[   25.522075] The buggy address is located 0 bytes inside of
[   25.522075]  allocated 120-byte region [fff00000c7747200, fff00000c7747278)
[   25.522344] 
[   25.522406] The buggy address belongs to the physical page:
[   25.522490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   25.522680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.522883] page_type: f5(slab)
[   25.523003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.523122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.523313] page dumped because: kasan: bad access detected
[   25.523776] 
[   25.523855] Memory state around the buggy address:
[   25.523998]  fff00000c7747100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.524104]  fff00000c7747180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.524628] >fff00000c7747200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.524720]                                                                 ^
[   25.524980]  fff00000c7747280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525188]  fff00000c7747300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525413] ==================================================================

[   18.862799] ==================================================================
[   18.864143] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   18.865347] Write of size 128 at addr ffff888101b20800 by task kunit_try_catch/188
[   18.866372] 
[   18.867051] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.867263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.867303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.867351] Call Trace:
[   18.867375]  <TASK>
[   18.867399]  dump_stack_lvl+0x73/0xb0
[   18.867455]  print_report+0xd1/0x650
[   18.867490]  ? __virt_addr_valid+0x1db/0x2d0
[   18.867653]  ? kmalloc_oob_in_memset+0x15f/0x320
[   18.867696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.867729]  ? kmalloc_oob_in_memset+0x15f/0x320
[   18.867763]  kasan_report+0x141/0x180
[   18.867796]  ? kmalloc_oob_in_memset+0x15f/0x320
[   18.867836]  kasan_check_range+0x10c/0x1c0
[   18.867869]  __asan_memset+0x27/0x50
[   18.867896]  kmalloc_oob_in_memset+0x15f/0x320
[   18.867928]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   18.867961]  ? __schedule+0x10cc/0x2b60
[   18.867997]  ? __pfx_read_tsc+0x10/0x10
[   18.868027]  ? ktime_get_ts64+0x86/0x230
[   18.868060]  kunit_try_run_case+0x1a5/0x480
[   18.868099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.868134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.868167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.868199]  ? __kthread_parkme+0x82/0x180
[   18.868238]  ? preempt_count_sub+0x50/0x80
[   18.868294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.868332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.868366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.868401]  kthread+0x337/0x6f0
[   18.868428]  ? trace_preempt_on+0x20/0xc0
[   18.868463]  ? __pfx_kthread+0x10/0x10
[   18.868492]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.868599]  ? calculate_sigpending+0x7b/0xa0
[   18.868678]  ? __pfx_kthread+0x10/0x10
[   18.868735]  ret_from_fork+0x116/0x1d0
[   18.868783]  ? __pfx_kthread+0x10/0x10
[   18.868837]  ret_from_fork_asm+0x1a/0x30
[   18.868909]  </TASK>
[   18.868937] 
[   18.887961] Allocated by task 188:
[   18.888515]  kasan_save_stack+0x45/0x70
[   18.889867]  kasan_save_track+0x18/0x40
[   18.890257]  kasan_save_alloc_info+0x3b/0x50
[   18.890910]  __kasan_kmalloc+0xb7/0xc0
[   18.891664]  __kmalloc_cache_noprof+0x189/0x420
[   18.892376]  kmalloc_oob_in_memset+0xac/0x320
[   18.892761]  kunit_try_run_case+0x1a5/0x480
[   18.893496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.895065]  kthread+0x337/0x6f0
[   18.895335]  ret_from_fork+0x116/0x1d0
[   18.895748]  ret_from_fork_asm+0x1a/0x30
[   18.896551] 
[   18.897083] The buggy address belongs to the object at ffff888101b20800
[   18.897083]  which belongs to the cache kmalloc-128 of size 128
[   18.899353] The buggy address is located 0 bytes inside of
[   18.899353]  allocated 120-byte region [ffff888101b20800, ffff888101b20878)
[   18.900604] 
[   18.901157] The buggy address belongs to the physical page:
[   18.902703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   18.903267] flags: 0x200000000000000(node=0|zone=2)
[   18.903730] page_type: f5(slab)
[   18.904106] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.905478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.906155] page dumped because: kasan: bad access detected
[   18.906600] 
[   18.906836] Memory state around the buggy address:
[   18.907233]  ffff888101b20700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.908534]  ffff888101b20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.909302] >ffff888101b20800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.910201]                                                                 ^
[   18.910602]  ffff888101b20880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.911834]  ffff888101b20900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.912370] ==================================================================

[   17.931767] ==================================================================
[   17.932559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   17.933471] Write of size 128 at addr ffff8881032f7500 by task kunit_try_catch/188
[   17.934009] 
[   17.934391] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.934512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.934550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.934744] Call Trace:
[   17.934784]  <TASK>
[   17.934827]  dump_stack_lvl+0x73/0xb0
[   17.934929]  print_report+0xd1/0x650
[   17.935006]  ? __virt_addr_valid+0x1db/0x2d0
[   17.935079]  ? kmalloc_oob_in_memset+0x15f/0x320
[   17.935151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.935224]  ? kmalloc_oob_in_memset+0x15f/0x320
[   17.935299]  kasan_report+0x141/0x180
[   17.935345]  ? kmalloc_oob_in_memset+0x15f/0x320
[   17.935387]  kasan_check_range+0x10c/0x1c0
[   17.935423]  __asan_memset+0x27/0x50
[   17.935449]  kmalloc_oob_in_memset+0x15f/0x320
[   17.935480]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   17.935520]  ? __schedule+0x10cc/0x2b60
[   17.935645]  ? __pfx_read_tsc+0x10/0x10
[   17.935679]  ? ktime_get_ts64+0x86/0x230
[   17.935712]  kunit_try_run_case+0x1a5/0x480
[   17.935748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.935781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.935813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.935846]  ? __kthread_parkme+0x82/0x180
[   17.935873]  ? preempt_count_sub+0x50/0x80
[   17.935934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.935970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.936004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.936037]  kthread+0x337/0x6f0
[   17.936063]  ? trace_preempt_on+0x20/0xc0
[   17.936095]  ? __pfx_kthread+0x10/0x10
[   17.936151]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.936187]  ? calculate_sigpending+0x7b/0xa0
[   17.936222]  ? __pfx_kthread+0x10/0x10
[   17.936252]  ret_from_fork+0x116/0x1d0
[   17.936277]  ? __pfx_kthread+0x10/0x10
[   17.936304]  ret_from_fork_asm+0x1a/0x30
[   17.936345]  </TASK>
[   17.936361] 
[   17.955386] Allocated by task 188:
[   17.956631]  kasan_save_stack+0x45/0x70
[   17.957302]  kasan_save_track+0x18/0x40
[   17.958018]  kasan_save_alloc_info+0x3b/0x50
[   17.958778]  __kasan_kmalloc+0xb7/0xc0
[   17.959319]  __kmalloc_cache_noprof+0x189/0x420
[   17.959756]  kmalloc_oob_in_memset+0xac/0x320
[   17.960124]  kunit_try_run_case+0x1a5/0x480
[   17.960610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.961164]  kthread+0x337/0x6f0
[   17.961593]  ret_from_fork+0x116/0x1d0
[   17.962166]  ret_from_fork_asm+0x1a/0x30
[   17.962579] 
[   17.962826] The buggy address belongs to the object at ffff8881032f7500
[   17.962826]  which belongs to the cache kmalloc-128 of size 128
[   17.964630] The buggy address is located 0 bytes inside of
[   17.964630]  allocated 120-byte region [ffff8881032f7500, ffff8881032f7578)
[   17.965537] 
[   17.965711] The buggy address belongs to the physical page:
[   17.966276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   17.967583] flags: 0x200000000000000(node=0|zone=2)
[   17.968384] page_type: f5(slab)
[   17.968907] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.969589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.970414] page dumped because: kasan: bad access detected
[   17.971197] 
[   17.971423] Memory state around the buggy address:
[   17.971813]  ffff8881032f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.972695]  ffff8881032f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.973806] >ffff8881032f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.974525]                                                                 ^
[   17.975197]  ffff8881032f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.976081]  ffff8881032f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.976718] ==================================================================

[   20.505181] ==================================================================
[   20.506213] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   20.506907] Write of size 128 at addr ffff00000ba33e00 by task kunit_try_catch/223
[   20.507606] 
[   20.507770] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.507820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.507833] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.507850] Call trace:
[   20.507860]  show_stack+0x20/0x38 (C)
[   20.507895]  dump_stack_lvl+0x8c/0xd0
[   20.507930]  print_report+0x118/0x608
[   20.507963]  kasan_report+0xdc/0x128
[   20.507995]  kasan_check_range+0x100/0x1a8
[   20.508028]  __asan_memset+0x34/0x78
[   20.508053]  kmalloc_oob_in_memset+0x144/0x2d0
[   20.508083]  kunit_try_run_case+0x170/0x3f0
[   20.508116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.508154]  kthread+0x328/0x630
[   20.508180]  ret_from_fork+0x10/0x20
[   20.508211] 
[   20.514071] Allocated by task 223:
[   20.514395]  kasan_save_stack+0x3c/0x68
[   20.514772]  kasan_save_track+0x20/0x40
[   20.515147]  kasan_save_alloc_info+0x40/0x58
[   20.515562]  __kasan_kmalloc+0xd4/0xd8
[   20.515928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.516365]  kmalloc_oob_in_memset+0xb0/0x2d0
[   20.516782]  kunit_try_run_case+0x170/0x3f0
[   20.517188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.517710]  kthread+0x328/0x630
[   20.518025]  ret_from_fork+0x10/0x20
[   20.518374] 
[   20.518526] The buggy address belongs to the object at ffff00000ba33e00
[   20.518526]  which belongs to the cache kmalloc-128 of size 128
[   20.519657] The buggy address is located 0 bytes inside of
[   20.519657]  allocated 120-byte region [ffff00000ba33e00, ffff00000ba33e78)
[   20.520783] 
[   20.520937] The buggy address belongs to the physical page:
[   20.521451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xba33
[   20.522174] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.522784] page_type: f5(slab)
[   20.523097] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.523810] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.524516] page dumped because: kasan: bad access detected
[   20.525030] 
[   20.525181] Memory state around the buggy address:
[   20.525629]  ffff00000ba33d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.526294]  ffff00000ba33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.526959] >ffff00000ba33e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.527619]                                                                 ^
[   20.528274]  ffff00000ba33e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.528938]  ffff00000ba33f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.529598] ==================================================================