Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   27.937127] ==================================================================
[   27.946649] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   27.953855] Write of size 8 at addr ffff000801dea571 by task kunit_try_catch/223
[   27.961228] 
[   27.962714] CPU: 5 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.962769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.962787] Hardware name: WinLink E850-96 board (DT)
[   27.962808] Call trace:
[   27.962822]  show_stack+0x20/0x38 (C)
[   27.962860]  dump_stack_lvl+0x8c/0xd0
[   27.962896]  print_report+0x118/0x608
[   27.962929]  kasan_report+0xdc/0x128
[   27.962963]  kasan_check_range+0x100/0x1a8
[   27.962999]  __asan_memset+0x34/0x78
[   27.963026]  kmalloc_oob_memset_8+0x150/0x2f8
[   27.963061]  kunit_try_run_case+0x170/0x3f0
[   27.963095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.963130]  kthread+0x328/0x630
[   27.963159]  ret_from_fork+0x10/0x20
[   27.963194] 
[   28.028587] Allocated by task 223:
[   28.031978]  kasan_save_stack+0x3c/0x68
[   28.035794]  kasan_save_track+0x20/0x40
[   28.039612]  kasan_save_alloc_info+0x40/0x58
[   28.043865]  __kasan_kmalloc+0xd4/0xd8
[   28.047598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.052112]  kmalloc_oob_memset_8+0xb0/0x2f8
[   28.056365]  kunit_try_run_case+0x170/0x3f0
[   28.060533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.066000]  kthread+0x328/0x630
[   28.069212]  ret_from_fork+0x10/0x20
[   28.072771] 
[   28.074248] The buggy address belongs to the object at ffff000801dea500
[   28.074248]  which belongs to the cache kmalloc-128 of size 128
[   28.086748] The buggy address is located 113 bytes inside of
[   28.086748]  allocated 120-byte region [ffff000801dea500, ffff000801dea578)
[   28.099333] 
[   28.100813] The buggy address belongs to the physical page:
[   28.106369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea
[   28.114352] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.121991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.128935] page_type: f5(slab)
[   28.132072] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.139791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.147519] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.155329] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.163142] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff
[   28.170954] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.178759] page dumped because: kasan: bad access detected
[   28.184314] 
[   28.185790] Memory state around the buggy address:
[   28.190570]  ffff000801dea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.197773]  ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.204978] >ffff000801dea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.212179]                                                                 ^
[   28.219300]  ffff000801dea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.226506]  ffff000801dea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.233707] ==================================================================

[   25.391047] ==================================================================
[   25.391226] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   25.391545] Write of size 8 at addr fff00000c6507771 by task kunit_try_catch/176
[   25.391679] 
[   25.391765] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.392101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.392177] Hardware name: linux,dummy-virt (DT)
[   25.392260] Call trace:
[   25.392324]  show_stack+0x20/0x38 (C)
[   25.392481]  dump_stack_lvl+0x8c/0xd0
[   25.392608]  print_report+0x118/0x608
[   25.392724]  kasan_report+0xdc/0x128
[   25.392861]  kasan_check_range+0x100/0x1a8
[   25.393007]  __asan_memset+0x34/0x78
[   25.393284]  kmalloc_oob_memset_8+0x150/0x2f8
[   25.393475]  kunit_try_run_case+0x170/0x3f0
[   25.393605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.393735]  kthread+0x328/0x630
[   25.393896]  ret_from_fork+0x10/0x20
[   25.394362] 
[   25.394414] Allocated by task 176:
[   25.394498]  kasan_save_stack+0x3c/0x68
[   25.394613]  kasan_save_track+0x20/0x40
[   25.394722]  kasan_save_alloc_info+0x40/0x58
[   25.394960]  __kasan_kmalloc+0xd4/0xd8
[   25.395227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.395338]  kmalloc_oob_memset_8+0xb0/0x2f8
[   25.395436]  kunit_try_run_case+0x170/0x3f0
[   25.395528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.395630]  kthread+0x328/0x630
[   25.395713]  ret_from_fork+0x10/0x20
[   25.395799] 
[   25.395876] The buggy address belongs to the object at fff00000c6507700
[   25.395876]  which belongs to the cache kmalloc-128 of size 128
[   25.396059] The buggy address is located 113 bytes inside of
[   25.396059]  allocated 120-byte region [fff00000c6507700, fff00000c6507778)
[   25.396228] 
[   25.396286] The buggy address belongs to the physical page:
[   25.396494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.396680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.396980] page_type: f5(slab)
[   25.397090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.397229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.397340] page dumped because: kasan: bad access detected
[   25.397990] 
[   25.398188] Memory state around the buggy address:
[   25.398271]  fff00000c6507600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.398381]  fff00000c6507680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.399043] >fff00000c6507700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.399215]                                                                 ^
[   25.399360]  fff00000c6507780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.399552]  fff00000c6507800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.399644] ==================================================================

[   25.639544] ==================================================================
[   25.639665] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   25.639806] Write of size 8 at addr fff00000c7747571 by task kunit_try_catch/176
[   25.640157] 
[   25.640381] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.641090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.641171] Hardware name: linux,dummy-virt (DT)
[   25.641259] Call trace:
[   25.641342]  show_stack+0x20/0x38 (C)
[   25.641486]  dump_stack_lvl+0x8c/0xd0
[   25.641625]  print_report+0x118/0x608
[   25.641879]  kasan_report+0xdc/0x128
[   25.642018]  kasan_check_range+0x100/0x1a8
[   25.642223]  __asan_memset+0x34/0x78
[   25.642634]  kmalloc_oob_memset_8+0x150/0x2f8
[   25.642794]  kunit_try_run_case+0x170/0x3f0
[   25.642948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.643481]  kthread+0x328/0x630
[   25.643771]  ret_from_fork+0x10/0x20
[   25.644302] 
[   25.644348] Allocated by task 176:
[   25.644414]  kasan_save_stack+0x3c/0x68
[   25.644510]  kasan_save_track+0x20/0x40
[   25.644603]  kasan_save_alloc_info+0x40/0x58
[   25.645154]  __kasan_kmalloc+0xd4/0xd8
[   25.645434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.646161]  kmalloc_oob_memset_8+0xb0/0x2f8
[   25.646267]  kunit_try_run_case+0x170/0x3f0
[   25.646371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.647272]  kthread+0x328/0x630
[   25.647525]  ret_from_fork+0x10/0x20
[   25.648006] 
[   25.648130] The buggy address belongs to the object at fff00000c7747500
[   25.648130]  which belongs to the cache kmalloc-128 of size 128
[   25.648382] The buggy address is located 113 bytes inside of
[   25.648382]  allocated 120-byte region [fff00000c7747500, fff00000c7747578)
[   25.649077] 
[   25.649153] The buggy address belongs to the physical page:
[   25.649277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   25.649442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.649631] page_type: f5(slab)
[   25.649748] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.650733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.650873] page dumped because: kasan: bad access detected
[   25.650953] 
[   25.650998] Memory state around the buggy address:
[   25.651074]  fff00000c7747400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.651176]  fff00000c7747480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651437] >fff00000c7747500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.651557]                                                                 ^
[   25.651655]  fff00000c7747580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651756]  fff00000c7747600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651893] ==================================================================

[   19.038060] ==================================================================
[   19.038849] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   19.039902] Write of size 8 at addr ffff888101b20a71 by task kunit_try_catch/194
[   19.041050] 
[   19.041328] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.041459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.041518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.041653] Call Trace:
[   19.041694]  <TASK>
[   19.041741]  dump_stack_lvl+0x73/0xb0
[   19.041840]  print_report+0xd1/0x650
[   19.041914]  ? __virt_addr_valid+0x1db/0x2d0
[   19.041989]  ? kmalloc_oob_memset_8+0x166/0x330
[   19.042056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.042126]  ? kmalloc_oob_memset_8+0x166/0x330
[   19.042196]  kasan_report+0x141/0x180
[   19.042320]  ? kmalloc_oob_memset_8+0x166/0x330
[   19.042368]  kasan_check_range+0x10c/0x1c0
[   19.042405]  __asan_memset+0x27/0x50
[   19.042434]  kmalloc_oob_memset_8+0x166/0x330
[   19.042468]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   19.042524]  ? __schedule+0x10cc/0x2b60
[   19.042633]  ? __pfx_read_tsc+0x10/0x10
[   19.042704]  ? ktime_get_ts64+0x86/0x230
[   19.042766]  kunit_try_run_case+0x1a5/0x480
[   19.042836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.042871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.042906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.042938]  ? __kthread_parkme+0x82/0x180
[   19.042966]  ? preempt_count_sub+0x50/0x80
[   19.042997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.043032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.043064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.043097]  kthread+0x337/0x6f0
[   19.043123]  ? trace_preempt_on+0x20/0xc0
[   19.043156]  ? __pfx_kthread+0x10/0x10
[   19.043184]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.043213]  ? calculate_sigpending+0x7b/0xa0
[   19.043283]  ? __pfx_kthread+0x10/0x10
[   19.043316]  ret_from_fork+0x116/0x1d0
[   19.043342]  ? __pfx_kthread+0x10/0x10
[   19.043371]  ret_from_fork_asm+0x1a/0x30
[   19.043414]  </TASK>
[   19.043429] 
[   19.063030] Allocated by task 194:
[   19.063826]  kasan_save_stack+0x45/0x70
[   19.064331]  kasan_save_track+0x18/0x40
[   19.064736]  kasan_save_alloc_info+0x3b/0x50
[   19.065021]  __kasan_kmalloc+0xb7/0xc0
[   19.065384]  __kmalloc_cache_noprof+0x189/0x420
[   19.065901]  kmalloc_oob_memset_8+0xac/0x330
[   19.066254]  kunit_try_run_case+0x1a5/0x480
[   19.066935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.067517]  kthread+0x337/0x6f0
[   19.068021]  ret_from_fork+0x116/0x1d0
[   19.068518]  ret_from_fork_asm+0x1a/0x30
[   19.069105] 
[   19.069428] The buggy address belongs to the object at ffff888101b20a00
[   19.069428]  which belongs to the cache kmalloc-128 of size 128
[   19.070581] The buggy address is located 113 bytes inside of
[   19.070581]  allocated 120-byte region [ffff888101b20a00, ffff888101b20a78)
[   19.072700] 
[   19.073129] The buggy address belongs to the physical page:
[   19.073894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   19.074779] flags: 0x200000000000000(node=0|zone=2)
[   19.075325] page_type: f5(slab)
[   19.075939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.076859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.077817] page dumped because: kasan: bad access detected
[   19.078391] 
[   19.078829] Memory state around the buggy address:
[   19.079172]  ffff888101b20900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.080077]  ffff888101b20980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.081005] >ffff888101b20a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.082150]                                                                 ^
[   19.082883]  ffff888101b20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.083556]  ffff888101b20b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.084435] ==================================================================

[   18.089906] ==================================================================
[   18.090954] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   18.091970] Write of size 8 at addr ffff8881032f7771 by task kunit_try_catch/194
[   18.093123] 
[   18.093722] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.093786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.093803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.093834] Call Trace:
[   18.093851]  <TASK>
[   18.093870]  dump_stack_lvl+0x73/0xb0
[   18.093979]  print_report+0xd1/0x650
[   18.094094]  ? __virt_addr_valid+0x1db/0x2d0
[   18.094169]  ? kmalloc_oob_memset_8+0x166/0x330
[   18.094213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.094288]  ? kmalloc_oob_memset_8+0x166/0x330
[   18.094324]  kasan_report+0x141/0x180
[   18.094357]  ? kmalloc_oob_memset_8+0x166/0x330
[   18.094394]  kasan_check_range+0x10c/0x1c0
[   18.094427]  __asan_memset+0x27/0x50
[   18.094456]  kmalloc_oob_memset_8+0x166/0x330
[   18.094489]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   18.094712]  ? __schedule+0x10cc/0x2b60
[   18.094760]  ? __pfx_read_tsc+0x10/0x10
[   18.094793]  ? ktime_get_ts64+0x86/0x230
[   18.094827]  kunit_try_run_case+0x1a5/0x480
[   18.094865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.094926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.094963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.094997]  ? __kthread_parkme+0x82/0x180
[   18.095025]  ? preempt_count_sub+0x50/0x80
[   18.095057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.095093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.095154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.095192]  kthread+0x337/0x6f0
[   18.095221]  ? trace_preempt_on+0x20/0xc0
[   18.095255]  ? __pfx_kthread+0x10/0x10
[   18.095284]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.095315]  ? calculate_sigpending+0x7b/0xa0
[   18.095350]  ? __pfx_kthread+0x10/0x10
[   18.095379]  ret_from_fork+0x116/0x1d0
[   18.095405]  ? __pfx_kthread+0x10/0x10
[   18.095434]  ret_from_fork_asm+0x1a/0x30
[   18.095476]  </TASK>
[   18.095493] 
[   18.116446] Allocated by task 194:
[   18.117095]  kasan_save_stack+0x45/0x70
[   18.117931]  kasan_save_track+0x18/0x40
[   18.118552]  kasan_save_alloc_info+0x3b/0x50
[   18.119084]  __kasan_kmalloc+0xb7/0xc0
[   18.119502]  __kmalloc_cache_noprof+0x189/0x420
[   18.119910]  kmalloc_oob_memset_8+0xac/0x330
[   18.120866]  kunit_try_run_case+0x1a5/0x480
[   18.121364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.121956]  kthread+0x337/0x6f0
[   18.122636]  ret_from_fork+0x116/0x1d0
[   18.123065]  ret_from_fork_asm+0x1a/0x30
[   18.123567] 
[   18.123810] The buggy address belongs to the object at ffff8881032f7700
[   18.123810]  which belongs to the cache kmalloc-128 of size 128
[   18.125006] The buggy address is located 113 bytes inside of
[   18.125006]  allocated 120-byte region [ffff8881032f7700, ffff8881032f7778)
[   18.126458] 
[   18.126702] The buggy address belongs to the physical page:
[   18.127169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.128035] flags: 0x200000000000000(node=0|zone=2)
[   18.128562] page_type: f5(slab)
[   18.129256] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.129982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.130555] page dumped because: kasan: bad access detected
[   18.131332] 
[   18.131692] Memory state around the buggy address:
[   18.132160]  ffff8881032f7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.132981]  ffff8881032f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.133594] >ffff8881032f7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.134378]                                                                 ^
[   18.135002]  ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.136046]  ffff8881032f7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.136691] ==================================================================

[   20.589720] ==================================================================
[   20.590800] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   20.591487] Write of size 8 at addr ffff00000ba33f71 by task kunit_try_catch/229
[   20.592170] 
[   20.592338] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.592389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.592403] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.592421] Call trace:
[   20.592432]  show_stack+0x20/0x38 (C)
[   20.592468]  dump_stack_lvl+0x8c/0xd0
[   20.592504]  print_report+0x118/0x608
[   20.592539]  kasan_report+0xdc/0x128
[   20.592571]  kasan_check_range+0x100/0x1a8
[   20.592605]  __asan_memset+0x34/0x78
[   20.592631]  kmalloc_oob_memset_8+0x150/0x2f8
[   20.592661]  kunit_try_run_case+0x170/0x3f0
[   20.592695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.592734]  kthread+0x328/0x630
[   20.592760]  ret_from_fork+0x10/0x20
[   20.592792] 
[   20.598648] Allocated by task 229:
[   20.598973]  kasan_save_stack+0x3c/0x68
[   20.599351]  kasan_save_track+0x20/0x40
[   20.599725]  kasan_save_alloc_info+0x40/0x58
[   20.600141]  __kasan_kmalloc+0xd4/0xd8
[   20.600506]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.600943]  kmalloc_oob_memset_8+0xb0/0x2f8
[   20.601354]  kunit_try_run_case+0x170/0x3f0
[   20.601760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.602284]  kthread+0x328/0x630
[   20.602599]  ret_from_fork+0x10/0x20
[   20.602949] 
[   20.603102] The buggy address belongs to the object at ffff00000ba33f00
[   20.603102]  which belongs to the cache kmalloc-128 of size 128
[   20.604235] The buggy address is located 113 bytes inside of
[   20.604235]  allocated 120-byte region [ffff00000ba33f00, ffff00000ba33f78)
[   20.605376] 
[   20.605531] The buggy address belongs to the physical page:
[   20.606044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xba33
[   20.606767] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.607379] page_type: f5(slab)
[   20.607690] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.608405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.609112] page dumped because: kasan: bad access detected
[   20.609626] 
[   20.609778] Memory state around the buggy address:
[   20.610226]  ffff00000ba33e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.610892]  ffff00000ba33e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.611558] >ffff00000ba33f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.612218]                                                                 ^
[   20.612874]  ffff00000ba33f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.613539]  ffff00000ba34000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.614200] ==================================================================