Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   27.631526] ==================================================================
[   27.641098] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   27.648299] Write of size 4 at addr ffff000801e28275 by task kunit_try_catch/221
[   27.655677] 
[   27.657164] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.657222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.657238] Hardware name: WinLink E850-96 board (DT)
[   27.657261] Call trace:
[   27.657276]  show_stack+0x20/0x38 (C)
[   27.657313]  dump_stack_lvl+0x8c/0xd0
[   27.657352]  print_report+0x118/0x608
[   27.657387]  kasan_report+0xdc/0x128
[   27.657421]  kasan_check_range+0x100/0x1a8
[   27.657457]  __asan_memset+0x34/0x78
[   27.657483]  kmalloc_oob_memset_4+0x150/0x300
[   27.657515]  kunit_try_run_case+0x170/0x3f0
[   27.657552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.657588]  kthread+0x328/0x630
[   27.657620]  ret_from_fork+0x10/0x20
[   27.657655] 
[   27.723037] Allocated by task 221:
[   27.726427]  kasan_save_stack+0x3c/0x68
[   27.730243]  kasan_save_track+0x20/0x40
[   27.734063]  kasan_save_alloc_info+0x40/0x58
[   27.738316]  __kasan_kmalloc+0xd4/0xd8
[   27.742047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.746560]  kmalloc_oob_memset_4+0xb0/0x300
[   27.750814]  kunit_try_run_case+0x170/0x3f0
[   27.754981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.760450]  kthread+0x328/0x630
[   27.763661]  ret_from_fork+0x10/0x20
[   27.767220] 
[   27.768697] The buggy address belongs to the object at ffff000801e28200
[   27.768697]  which belongs to the cache kmalloc-128 of size 128
[   27.781197] The buggy address is located 117 bytes inside of
[   27.781197]  allocated 120-byte region [ffff000801e28200, ffff000801e28278)
[   27.793782] 
[   27.795261] The buggy address belongs to the physical page:
[   27.800817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   27.808801] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.816440] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.823384] page_type: f5(slab)
[   27.826522] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.834240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.841966] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.849778] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.857591] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   27.865403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.873208] page dumped because: kasan: bad access detected
[   27.878763] 
[   27.880239] Memory state around the buggy address:
[   27.885018]  ffff000801e28100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.892222]  ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899428] >ffff000801e28200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.906628]                                                                 ^
[   27.913749]  ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.920954]  ffff000801e28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.928158] ==================================================================

[   25.354136] ==================================================================
[   25.354817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.355155] Write of size 4 at addr fff00000c6507675 by task kunit_try_catch/174
[   25.355615] 
[   25.355721] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.355925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.356104] Hardware name: linux,dummy-virt (DT)
[   25.356315] Call trace:
[   25.356642]  show_stack+0x20/0x38 (C)
[   25.357214]  dump_stack_lvl+0x8c/0xd0
[   25.357569]  print_report+0x118/0x608
[   25.358314]  kasan_report+0xdc/0x128
[   25.358631]  kasan_check_range+0x100/0x1a8
[   25.358824]  __asan_memset+0x34/0x78
[   25.358976]  kmalloc_oob_memset_4+0x150/0x300
[   25.359139]  kunit_try_run_case+0x170/0x3f0
[   25.359275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.359589]  kthread+0x328/0x630
[   25.359762]  ret_from_fork+0x10/0x20
[   25.359984] 
[   25.360029] Allocated by task 174:
[   25.360110]  kasan_save_stack+0x3c/0x68
[   25.360226]  kasan_save_track+0x20/0x40
[   25.360371]  kasan_save_alloc_info+0x40/0x58
[   25.360490]  __kasan_kmalloc+0xd4/0xd8
[   25.360596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.360702]  kmalloc_oob_memset_4+0xb0/0x300
[   25.360804]  kunit_try_run_case+0x170/0x3f0
[   25.360969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.361124]  kthread+0x328/0x630
[   25.361267]  ret_from_fork+0x10/0x20
[   25.361379] 
[   25.361436] The buggy address belongs to the object at fff00000c6507600
[   25.361436]  which belongs to the cache kmalloc-128 of size 128
[   25.361583] The buggy address is located 117 bytes inside of
[   25.361583]  allocated 120-byte region [fff00000c6507600, fff00000c6507678)
[   25.361775] 
[   25.361836] The buggy address belongs to the physical page:
[   25.361920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.362075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.362199] page_type: f5(slab)
[   25.362297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.362532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.362732] page dumped because: kasan: bad access detected
[   25.362953] 
[   25.363065] Memory state around the buggy address:
[   25.363868]  fff00000c6507500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.364104]  fff00000c6507580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.364331] >fff00000c6507600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.364809]                                                                 ^
[   25.365314]  fff00000c6507680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.365449]  fff00000c6507700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.367018] ==================================================================

[   25.610094] ==================================================================
[   25.610217] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.610336] Write of size 4 at addr fff00000c7747475 by task kunit_try_catch/174
[   25.610450] 
[   25.610529] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.610722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.610783] Hardware name: linux,dummy-virt (DT)
[   25.610875] Call trace:
[   25.614078]  show_stack+0x20/0x38 (C)
[   25.614471]  dump_stack_lvl+0x8c/0xd0
[   25.614732]  print_report+0x118/0x608
[   25.615919]  kasan_report+0xdc/0x128
[   25.616627]  kasan_check_range+0x100/0x1a8
[   25.616763]  __asan_memset+0x34/0x78
[   25.616950]  kmalloc_oob_memset_4+0x150/0x300
[   25.617193]  kunit_try_run_case+0x170/0x3f0
[   25.617689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.617872]  kthread+0x328/0x630
[   25.618165]  ret_from_fork+0x10/0x20
[   25.618344] 
[   25.618653] Allocated by task 174:
[   25.618745]  kasan_save_stack+0x3c/0x68
[   25.618876]  kasan_save_track+0x20/0x40
[   25.619104]  kasan_save_alloc_info+0x40/0x58
[   25.619219]  __kasan_kmalloc+0xd4/0xd8
[   25.619485]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.619770]  kmalloc_oob_memset_4+0xb0/0x300
[   25.619896]  kunit_try_run_case+0x170/0x3f0
[   25.619994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.620160]  kthread+0x328/0x630
[   25.620302]  ret_from_fork+0x10/0x20
[   25.620443] 
[   25.620531] The buggy address belongs to the object at fff00000c7747400
[   25.620531]  which belongs to the cache kmalloc-128 of size 128
[   25.620721] The buggy address is located 117 bytes inside of
[   25.620721]  allocated 120-byte region [fff00000c7747400, fff00000c7747478)
[   25.621212] 
[   25.621276] The buggy address belongs to the physical page:
[   25.621361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   25.621507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.621762] page_type: f5(slab)
[   25.621902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.622061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.622272] page dumped because: kasan: bad access detected
[   25.622349] 
[   25.622409] Memory state around the buggy address:
[   25.622578]  fff00000c7747300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.622681]  fff00000c7747380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.622778] >fff00000c7747400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.622888]                                                                 ^
[   25.622986]  fff00000c7747480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.623088]  fff00000c7747500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.623374] ==================================================================

[   18.969030] ==================================================================
[   18.969970] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   18.970668] Write of size 4 at addr ffff8881039c8075 by task kunit_try_catch/192
[   18.973096] 
[   18.973880] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.974008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.974046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.974104] Call Trace:
[   18.974152]  <TASK>
[   18.974199]  dump_stack_lvl+0x73/0xb0
[   18.974299]  print_report+0xd1/0x650
[   18.974362]  ? __virt_addr_valid+0x1db/0x2d0
[   18.974423]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.974481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.975110]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.975209]  kasan_report+0x141/0x180
[   18.975281]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.975362]  kasan_check_range+0x10c/0x1c0
[   18.975439]  __asan_memset+0x27/0x50
[   18.975521]  kmalloc_oob_memset_4+0x166/0x330
[   18.975595]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   18.975661]  ? __schedule+0x10cc/0x2b60
[   18.975733]  ? __pfx_read_tsc+0x10/0x10
[   18.975795]  ? ktime_get_ts64+0x86/0x230
[   18.975861]  kunit_try_run_case+0x1a5/0x480
[   18.975931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.975993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.976567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.976635]  ? __kthread_parkme+0x82/0x180
[   18.976694]  ? preempt_count_sub+0x50/0x80
[   18.976761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.976847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.976923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.976983]  kthread+0x337/0x6f0
[   18.977031]  ? trace_preempt_on+0x20/0xc0
[   18.977089]  ? __pfx_kthread+0x10/0x10
[   18.977137]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.977186]  ? calculate_sigpending+0x7b/0xa0
[   18.977246]  ? __pfx_kthread+0x10/0x10
[   18.977299]  ret_from_fork+0x116/0x1d0
[   18.977344]  ? __pfx_kthread+0x10/0x10
[   18.977392]  ret_from_fork_asm+0x1a/0x30
[   18.977464]  </TASK>
[   18.977491] 
[   19.005338] Allocated by task 192:
[   19.006558]  kasan_save_stack+0x45/0x70
[   19.007673]  kasan_save_track+0x18/0x40
[   19.008320]  kasan_save_alloc_info+0x3b/0x50
[   19.009064]  __kasan_kmalloc+0xb7/0xc0
[   19.009775]  __kmalloc_cache_noprof+0x189/0x420
[   19.010146]  kmalloc_oob_memset_4+0xac/0x330
[   19.010845]  kunit_try_run_case+0x1a5/0x480
[   19.011251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.012361]  kthread+0x337/0x6f0
[   19.012840]  ret_from_fork+0x116/0x1d0
[   19.013904]  ret_from_fork_asm+0x1a/0x30
[   19.014748] 
[   19.014989] The buggy address belongs to the object at ffff8881039c8000
[   19.014989]  which belongs to the cache kmalloc-128 of size 128
[   19.016366] The buggy address is located 117 bytes inside of
[   19.016366]  allocated 120-byte region [ffff8881039c8000, ffff8881039c8078)
[   19.017352] 
[   19.017742] The buggy address belongs to the physical page:
[   19.018942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   19.019809] flags: 0x200000000000000(node=0|zone=2)
[   19.020695] page_type: f5(slab)
[   19.021080] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.021858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.023213] page dumped because: kasan: bad access detected
[   19.023857] 
[   19.024012] Memory state around the buggy address:
[   19.024340]  ffff8881039c7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.025816]  ffff8881039c7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.026943] >ffff8881039c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.028232]                                                                 ^
[   19.029477]  ffff8881039c8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.030229]  ffff8881039c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.031070] ==================================================================

[   18.039461] ==================================================================
[   18.040478] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   18.041033] Write of size 4 at addr ffff8881032f7675 by task kunit_try_catch/192
[   18.041559] 
[   18.041744] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.041806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.041822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.041852] Call Trace:
[   18.041868]  <TASK>
[   18.042634]  dump_stack_lvl+0x73/0xb0
[   18.042769]  print_report+0xd1/0x650
[   18.042901]  ? __virt_addr_valid+0x1db/0x2d0
[   18.042987]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.043058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.043173]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.043249]  kasan_report+0x141/0x180
[   18.043322]  ? kmalloc_oob_memset_4+0x166/0x330
[   18.043406]  kasan_check_range+0x10c/0x1c0
[   18.043483]  __asan_memset+0x27/0x50
[   18.043682]  kmalloc_oob_memset_4+0x166/0x330
[   18.043759]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   18.043796]  ? __schedule+0x10cc/0x2b60
[   18.043832]  ? __pfx_read_tsc+0x10/0x10
[   18.043862]  ? ktime_get_ts64+0x86/0x230
[   18.043928]  kunit_try_run_case+0x1a5/0x480
[   18.043969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.044003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.044037]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.044071]  ? __kthread_parkme+0x82/0x180
[   18.044123]  ? preempt_count_sub+0x50/0x80
[   18.044176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.044213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.044246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.044280]  kthread+0x337/0x6f0
[   18.044309]  ? trace_preempt_on+0x20/0xc0
[   18.044343]  ? __pfx_kthread+0x10/0x10
[   18.044371]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.044401]  ? calculate_sigpending+0x7b/0xa0
[   18.044435]  ? __pfx_kthread+0x10/0x10
[   18.044464]  ret_from_fork+0x116/0x1d0
[   18.044490]  ? __pfx_kthread+0x10/0x10
[   18.044536]  ret_from_fork_asm+0x1a/0x30
[   18.044650]  </TASK>
[   18.044669] 
[   18.062522] Allocated by task 192:
[   18.062811]  kasan_save_stack+0x45/0x70
[   18.063257]  kasan_save_track+0x18/0x40
[   18.063684]  kasan_save_alloc_info+0x3b/0x50
[   18.064429]  __kasan_kmalloc+0xb7/0xc0
[   18.065156]  __kmalloc_cache_noprof+0x189/0x420
[   18.065572]  kmalloc_oob_memset_4+0xac/0x330
[   18.065932]  kunit_try_run_case+0x1a5/0x480
[   18.066378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.067442]  kthread+0x337/0x6f0
[   18.067845]  ret_from_fork+0x116/0x1d0
[   18.068253]  ret_from_fork_asm+0x1a/0x30
[   18.069066] 
[   18.069321] The buggy address belongs to the object at ffff8881032f7600
[   18.069321]  which belongs to the cache kmalloc-128 of size 128
[   18.070448] The buggy address is located 117 bytes inside of
[   18.070448]  allocated 120-byte region [ffff8881032f7600, ffff8881032f7678)
[   18.071180] 
[   18.071420] The buggy address belongs to the physical page:
[   18.072015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.073212] flags: 0x200000000000000(node=0|zone=2)
[   18.073725] page_type: f5(slab)
[   18.074093] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.074604] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.075611] page dumped because: kasan: bad access detected
[   18.076527] 
[   18.077025] Memory state around the buggy address:
[   18.078589]  ffff8881032f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.079747]  ffff8881032f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.080546] >ffff8881032f7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.081565]                                                                 ^
[   18.082404]  ffff8881032f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.083127]  ffff8881032f7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.084032] ==================================================================

[   20.561416] ==================================================================
[   20.562493] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   20.563178] Write of size 4 at addr ffff00000e2f8375 by task kunit_try_catch/227
[   20.563861] 
[   20.564025] CPU: 2 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.564074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.564088] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.564105] Call trace:
[   20.564116]  show_stack+0x20/0x38 (C)
[   20.564148]  dump_stack_lvl+0x8c/0xd0
[   20.564183]  print_report+0x118/0x608
[   20.564216]  kasan_report+0xdc/0x128
[   20.564247]  kasan_check_range+0x100/0x1a8
[   20.564280]  __asan_memset+0x34/0x78
[   20.564306]  kmalloc_oob_memset_4+0x150/0x300
[   20.564335]  kunit_try_run_case+0x170/0x3f0
[   20.564369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.564406]  kthread+0x328/0x630
[   20.564433]  ret_from_fork+0x10/0x20
[   20.564467] 
[   20.570324] Allocated by task 227:
[   20.570653]  kasan_save_stack+0x3c/0x68
[   20.571032]  kasan_save_track+0x20/0x40
[   20.571406]  kasan_save_alloc_info+0x40/0x58
[   20.571822]  __kasan_kmalloc+0xd4/0xd8
[   20.572189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.572626]  kmalloc_oob_memset_4+0xb0/0x300
[   20.573039]  kunit_try_run_case+0x170/0x3f0
[   20.573445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.573969]  kthread+0x328/0x630
[   20.574285]  ret_from_fork+0x10/0x20
[   20.574635] 
[   20.574787] The buggy address belongs to the object at ffff00000e2f8300
[   20.574787]  which belongs to the cache kmalloc-128 of size 128
[   20.575920] The buggy address is located 117 bytes inside of
[   20.575920]  allocated 120-byte region [ffff00000e2f8300, ffff00000e2f8378)
[   20.577064] 
[   20.577218] The buggy address belongs to the physical page:
[   20.577734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe2f8
[   20.578457] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.579068] page_type: f5(slab)
[   20.579381] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.580096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.580803] page dumped because: kasan: bad access detected
[   20.581319] 
[   20.581471] Memory state around the buggy address:
[   20.581920]  ffff00000e2f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.582585]  ffff00000e2f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.583252] >ffff00000e2f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.583913]                                                                 ^
[   20.584568]  ffff00000e2f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.585233]  ffff00000e2f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.585896] ==================================================================