Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   28.242649] ==================================================================
[   28.252201] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   28.259489] Write of size 16 at addr ffff000801e28369 by task kunit_try_catch/225
[   28.266954] 
[   28.268440] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.268498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.268515] Hardware name: WinLink E850-96 board (DT)
[   28.268535] Call trace:
[   28.268550]  show_stack+0x20/0x38 (C)
[   28.268584]  dump_stack_lvl+0x8c/0xd0
[   28.268623]  print_report+0x118/0x608
[   28.268658]  kasan_report+0xdc/0x128
[   28.268690]  kasan_check_range+0x100/0x1a8
[   28.268729]  __asan_memset+0x34/0x78
[   28.268759]  kmalloc_oob_memset_16+0x150/0x2f8
[   28.268792]  kunit_try_run_case+0x170/0x3f0
[   28.268827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.268864]  kthread+0x328/0x630
[   28.268892]  ret_from_fork+0x10/0x20
[   28.268927] 
[   28.334399] Allocated by task 225:
[   28.337788]  kasan_save_stack+0x3c/0x68
[   28.341605]  kasan_save_track+0x20/0x40
[   28.345423]  kasan_save_alloc_info+0x40/0x58
[   28.349678]  __kasan_kmalloc+0xd4/0xd8
[   28.353410]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.357923]  kmalloc_oob_memset_16+0xb0/0x2f8
[   28.362263]  kunit_try_run_case+0x170/0x3f0
[   28.366430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.371900]  kthread+0x328/0x630
[   28.375112]  ret_from_fork+0x10/0x20
[   28.378669] 
[   28.380146] The buggy address belongs to the object at ffff000801e28300
[   28.380146]  which belongs to the cache kmalloc-128 of size 128
[   28.392647] The buggy address is located 105 bytes inside of
[   28.392647]  allocated 120-byte region [ffff000801e28300, ffff000801e28378)
[   28.405231] 
[   28.406711] The buggy address belongs to the physical page:
[   28.412266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   28.420250] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.427889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.434836] page_type: f5(slab)
[   28.437970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.445689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.453417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.461227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.469040] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   28.476852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.484657] page dumped because: kasan: bad access detected
[   28.490213] 
[   28.491688] Memory state around the buggy address:
[   28.496470]  ffff000801e28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.503671]  ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.510876] >ffff000801e28300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.518077]                                                                 ^
[   28.525199]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.532405]  ffff000801e28400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.539607] ==================================================================

[   25.431239] ==================================================================
[   25.432065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   25.432414] Write of size 16 at addr fff00000c6507869 by task kunit_try_catch/178
[   25.432760] 
[   25.432844] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.433067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.433142] Hardware name: linux,dummy-virt (DT)
[   25.433681] Call trace:
[   25.433748]  show_stack+0x20/0x38 (C)
[   25.433869]  dump_stack_lvl+0x8c/0xd0
[   25.434034]  print_report+0x118/0x608
[   25.434165]  kasan_report+0xdc/0x128
[   25.434277]  kasan_check_range+0x100/0x1a8
[   25.434408]  __asan_memset+0x34/0x78
[   25.435107]  kmalloc_oob_memset_16+0x150/0x2f8
[   25.435244]  kunit_try_run_case+0x170/0x3f0
[   25.435391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.435619]  kthread+0x328/0x630
[   25.435831]  ret_from_fork+0x10/0x20
[   25.435972] 
[   25.436211] Allocated by task 178:
[   25.436316]  kasan_save_stack+0x3c/0x68
[   25.436417]  kasan_save_track+0x20/0x40
[   25.436798]  kasan_save_alloc_info+0x40/0x58
[   25.436911]  __kasan_kmalloc+0xd4/0xd8
[   25.437817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.438708]  kmalloc_oob_memset_16+0xb0/0x2f8
[   25.438826]  kunit_try_run_case+0x170/0x3f0
[   25.439209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.440093]  kthread+0x328/0x630
[   25.440371]  ret_from_fork+0x10/0x20
[   25.440544] 
[   25.440593] The buggy address belongs to the object at fff00000c6507800
[   25.440593]  which belongs to the cache kmalloc-128 of size 128
[   25.440725] The buggy address is located 105 bytes inside of
[   25.440725]  allocated 120-byte region [fff00000c6507800, fff00000c6507878)
[   25.440872] 
[   25.440923] The buggy address belongs to the physical page:
[   25.441017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.443141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.443382] page_type: f5(slab)
[   25.443488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.444627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.444735] page dumped because: kasan: bad access detected
[   25.445568] 
[   25.446270] Memory state around the buggy address:
[   25.446640]  fff00000c6507700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.446749]  fff00000c6507780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.446852] >fff00000c6507800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.446969]                                                                 ^
[   25.447064]  fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.447169]  fff00000c6507900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.448075] ==================================================================

[   25.682338] ==================================================================
[   25.682457] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   25.682578] Write of size 16 at addr fff00000c7747669 by task kunit_try_catch/178
[   25.682711] 
[   25.682876] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.683261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.683477] Hardware name: linux,dummy-virt (DT)
[   25.683576] Call trace:
[   25.683633]  show_stack+0x20/0x38 (C)
[   25.684020]  dump_stack_lvl+0x8c/0xd0
[   25.684152]  print_report+0x118/0x608
[   25.684368]  kasan_report+0xdc/0x128
[   25.684595]  kasan_check_range+0x100/0x1a8
[   25.684795]  __asan_memset+0x34/0x78
[   25.684921]  kmalloc_oob_memset_16+0x150/0x2f8
[   25.685035]  kunit_try_run_case+0x170/0x3f0
[   25.685260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.685473]  kthread+0x328/0x630
[   25.685602]  ret_from_fork+0x10/0x20
[   25.685747] 
[   25.685801] Allocated by task 178:
[   25.685897]  kasan_save_stack+0x3c/0x68
[   25.686026]  kasan_save_track+0x20/0x40
[   25.686148]  kasan_save_alloc_info+0x40/0x58
[   25.686290]  __kasan_kmalloc+0xd4/0xd8
[   25.686481]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.686677]  kmalloc_oob_memset_16+0xb0/0x2f8
[   25.686884]  kunit_try_run_case+0x170/0x3f0
[   25.687028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.687155]  kthread+0x328/0x630
[   25.687256]  ret_from_fork+0x10/0x20
[   25.687353] 
[   25.687400] The buggy address belongs to the object at fff00000c7747600
[   25.687400]  which belongs to the cache kmalloc-128 of size 128
[   25.687655] The buggy address is located 105 bytes inside of
[   25.687655]  allocated 120-byte region [fff00000c7747600, fff00000c7747678)
[   25.688045] 
[   25.688477] The buggy address belongs to the physical page:
[   25.688566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   25.689075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.689261] page_type: f5(slab)
[   25.689369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.689492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.690233] page dumped because: kasan: bad access detected
[   25.690338] 
[   25.690392] Memory state around the buggy address:
[   25.690478]  fff00000c7747500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.691109]  fff00000c7747580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.691264] >fff00000c7747600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.691676]                                                                 ^
[   25.692027]  fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.692133]  fff00000c7747700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.692224] ==================================================================

[   19.091218] ==================================================================
[   19.092115] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   19.092810] Write of size 16 at addr ffff888101b20b69 by task kunit_try_catch/196
[   19.093264] 
[   19.093745] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.093867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.093902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.093960] Call Trace:
[   19.093998]  <TASK>
[   19.094048]  dump_stack_lvl+0x73/0xb0
[   19.094141]  print_report+0xd1/0x650
[   19.094219]  ? __virt_addr_valid+0x1db/0x2d0
[   19.094324]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.094397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.094469]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.094567]  kasan_report+0x141/0x180
[   19.094643]  ? kmalloc_oob_memset_16+0x166/0x330
[   19.094724]  kasan_check_range+0x10c/0x1c0
[   19.094805]  __asan_memset+0x27/0x50
[   19.094869]  kmalloc_oob_memset_16+0x166/0x330
[   19.094942]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   19.095016]  ? __schedule+0x10cc/0x2b60
[   19.095096]  ? __pfx_read_tsc+0x10/0x10
[   19.095165]  ? ktime_get_ts64+0x86/0x230
[   19.095243]  kunit_try_run_case+0x1a5/0x480
[   19.095350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.095426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.095494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.095590]  ? __kthread_parkme+0x82/0x180
[   19.095659]  ? preempt_count_sub+0x50/0x80
[   19.095718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.095756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.095791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.095825]  kthread+0x337/0x6f0
[   19.095853]  ? trace_preempt_on+0x20/0xc0
[   19.095886]  ? __pfx_kthread+0x10/0x10
[   19.095914]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.095944]  ? calculate_sigpending+0x7b/0xa0
[   19.095979]  ? __pfx_kthread+0x10/0x10
[   19.096007]  ret_from_fork+0x116/0x1d0
[   19.096031]  ? __pfx_kthread+0x10/0x10
[   19.096059]  ret_from_fork_asm+0x1a/0x30
[   19.096100]  </TASK>
[   19.096116] 
[   19.111136] Allocated by task 196:
[   19.111672]  kasan_save_stack+0x45/0x70
[   19.112151]  kasan_save_track+0x18/0x40
[   19.113576]  kasan_save_alloc_info+0x3b/0x50
[   19.114056]  __kasan_kmalloc+0xb7/0xc0
[   19.114421]  __kmalloc_cache_noprof+0x189/0x420
[   19.114831]  kmalloc_oob_memset_16+0xac/0x330
[   19.115367]  kunit_try_run_case+0x1a5/0x480
[   19.115870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.116278]  kthread+0x337/0x6f0
[   19.116849]  ret_from_fork+0x116/0x1d0
[   19.117354]  ret_from_fork_asm+0x1a/0x30
[   19.117853] 
[   19.118107] The buggy address belongs to the object at ffff888101b20b00
[   19.118107]  which belongs to the cache kmalloc-128 of size 128
[   19.118974] The buggy address is located 105 bytes inside of
[   19.118974]  allocated 120-byte region [ffff888101b20b00, ffff888101b20b78)
[   19.120223] 
[   19.120676] The buggy address belongs to the physical page:
[   19.121489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   19.122231] flags: 0x200000000000000(node=0|zone=2)
[   19.123665] page_type: f5(slab)
[   19.124107] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.124823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.125515] page dumped because: kasan: bad access detected
[   19.125979] 
[   19.126530] Memory state around the buggy address:
[   19.126919]  ffff888101b20a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.127470]  ffff888101b20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.128134] >ffff888101b20b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.128764]                                                                 ^
[   19.129390]  ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129968]  ffff888101b20c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.130640] ==================================================================

[   18.142381] ==================================================================
[   18.143690] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   18.144571] Write of size 16 at addr ffff8881038d5369 by task kunit_try_catch/196
[   18.145437] 
[   18.145735] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.145951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.145990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.146047] Call Trace:
[   18.146080]  <TASK>
[   18.146121]  dump_stack_lvl+0x73/0xb0
[   18.146205]  print_report+0xd1/0x650
[   18.146241]  ? __virt_addr_valid+0x1db/0x2d0
[   18.146294]  ? kmalloc_oob_memset_16+0x166/0x330
[   18.146366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.146438]  ? kmalloc_oob_memset_16+0x166/0x330
[   18.146539]  kasan_report+0x141/0x180
[   18.146644]  ? kmalloc_oob_memset_16+0x166/0x330
[   18.146837]  kasan_check_range+0x10c/0x1c0
[   18.146940]  __asan_memset+0x27/0x50
[   18.147009]  kmalloc_oob_memset_16+0x166/0x330
[   18.147088]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   18.147170]  ? __schedule+0x10cc/0x2b60
[   18.147251]  ? __pfx_read_tsc+0x10/0x10
[   18.147319]  ? ktime_get_ts64+0x86/0x230
[   18.147357]  kunit_try_run_case+0x1a5/0x480
[   18.147396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.147463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.147496]  ? __kthread_parkme+0x82/0x180
[   18.147575]  ? preempt_count_sub+0x50/0x80
[   18.147648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.147725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.147759]  kthread+0x337/0x6f0
[   18.147786]  ? trace_preempt_on+0x20/0xc0
[   18.147819]  ? __pfx_kthread+0x10/0x10
[   18.147848]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.147904]  ? calculate_sigpending+0x7b/0xa0
[   18.147943]  ? __pfx_kthread+0x10/0x10
[   18.147973]  ret_from_fork+0x116/0x1d0
[   18.147998]  ? __pfx_kthread+0x10/0x10
[   18.148026]  ret_from_fork_asm+0x1a/0x30
[   18.148067]  </TASK>
[   18.148081] 
[   18.162866] Allocated by task 196:
[   18.163319]  kasan_save_stack+0x45/0x70
[   18.166232]  kasan_save_track+0x18/0x40
[   18.166734]  kasan_save_alloc_info+0x3b/0x50
[   18.167378]  __kasan_kmalloc+0xb7/0xc0
[   18.167988]  __kmalloc_cache_noprof+0x189/0x420
[   18.168622]  kmalloc_oob_memset_16+0xac/0x330
[   18.169148]  kunit_try_run_case+0x1a5/0x480
[   18.170074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.170468]  kthread+0x337/0x6f0
[   18.170759]  ret_from_fork+0x116/0x1d0
[   18.171155]  ret_from_fork_asm+0x1a/0x30
[   18.171479] 
[   18.171664] The buggy address belongs to the object at ffff8881038d5300
[   18.171664]  which belongs to the cache kmalloc-128 of size 128
[   18.172311] The buggy address is located 105 bytes inside of
[   18.172311]  allocated 120-byte region [ffff8881038d5300, ffff8881038d5378)
[   18.174815] 
[   18.175623] The buggy address belongs to the physical page:
[   18.176391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5
[   18.176911] flags: 0x200000000000000(node=0|zone=2)
[   18.177149] page_type: f5(slab)
[   18.177296] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.177547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.177790] page dumped because: kasan: bad access detected
[   18.178693] 
[   18.179312] Memory state around the buggy address:
[   18.179860]  ffff8881038d5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.181636]  ffff8881038d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.182616] >ffff8881038d5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.183284]                                                                 ^
[   18.184443]  ffff8881038d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.184990]  ffff8881038d5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.186294] ==================================================================

[   20.619116] ==================================================================
[   20.620194] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   20.620888] Write of size 16 at addr ffff00000e1a3069 by task kunit_try_catch/231
[   20.621586] 
[   20.621749] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.621800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.621815] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.621832] Call trace:
[   20.621843]  show_stack+0x20/0x38 (C)
[   20.621879]  dump_stack_lvl+0x8c/0xd0
[   20.621915]  print_report+0x118/0x608
[   20.621948]  kasan_report+0xdc/0x128
[   20.621979]  kasan_check_range+0x100/0x1a8
[   20.622014]  __asan_memset+0x34/0x78
[   20.622040]  kmalloc_oob_memset_16+0x150/0x2f8
[   20.622070]  kunit_try_run_case+0x170/0x3f0
[   20.622104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.622142]  kthread+0x328/0x630
[   20.622168]  ret_from_fork+0x10/0x20
[   20.622200] 
[   20.628059] Allocated by task 231:
[   20.628383]  kasan_save_stack+0x3c/0x68
[   20.628761]  kasan_save_track+0x20/0x40
[   20.629137]  kasan_save_alloc_info+0x40/0x58
[   20.629554]  __kasan_kmalloc+0xd4/0xd8
[   20.629920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.630358]  kmalloc_oob_memset_16+0xb0/0x2f8
[   20.630775]  kunit_try_run_case+0x170/0x3f0
[   20.631181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.631705]  kthread+0x328/0x630
[   20.632020]  ret_from_fork+0x10/0x20
[   20.632369] 
[   20.632522] The buggy address belongs to the object at ffff00000e1a3000
[   20.632522]  which belongs to the cache kmalloc-128 of size 128
[   20.633654] The buggy address is located 105 bytes inside of
[   20.633654]  allocated 120-byte region [ffff00000e1a3000, ffff00000e1a3078)
[   20.634798] 
[   20.634952] The buggy address belongs to the physical page:
[   20.635467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3
[   20.636191] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.636802] page_type: f5(slab)
[   20.637114] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.637829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.638536] page dumped because: kasan: bad access detected
[   20.639050] 
[   20.639202] Memory state around the buggy address:
[   20.639650]  ffff00000e1a2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.640316]  ffff00000e1a2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.640982] >ffff00000e1a3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.641642]                                                                 ^
[   20.642299]  ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.642964]  ffff00000e1a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.643627] ==================================================================