Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   21.510388] ==================================================================
[   21.510600] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.510947] Read of size 8 at addr fff00000c42a5278 by task kunit_try_catch/283
[   21.511095] 
[   21.511440] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.511853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.512081] Hardware name: linux,dummy-virt (DT)
[   21.512219] Call trace:
[   21.512489]  show_stack+0x20/0x38 (C)
[   21.512660]  dump_stack_lvl+0x8c/0xd0
[   21.512768]  print_report+0x118/0x608
[   21.513041]  kasan_report+0xdc/0x128
[   21.513168]  __asan_report_load8_noabort+0x20/0x30
[   21.513298]  copy_to_kernel_nofault+0x204/0x250
[   21.513422]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.513574]  kunit_try_run_case+0x170/0x3f0
[   21.513705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.513848]  kthread+0x328/0x630
[   21.513966]  ret_from_fork+0x10/0x20
[   21.514088] 
[   21.514140] Allocated by task 283:
[   21.514214]  kasan_save_stack+0x3c/0x68
[   21.514313]  kasan_save_track+0x20/0x40
[   21.514403]  kasan_save_alloc_info+0x40/0x58
[   21.514497]  __kasan_kmalloc+0xd4/0xd8
[   21.515154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.515388]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.515492]  kunit_try_run_case+0x170/0x3f0
[   21.515782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.515904]  kthread+0x328/0x630
[   21.515994]  ret_from_fork+0x10/0x20
[   21.516080] 
[   21.516255] The buggy address belongs to the object at fff00000c42a5200
[   21.516255]  which belongs to the cache kmalloc-128 of size 128
[   21.516714] The buggy address is located 0 bytes to the right of
[   21.516714]  allocated 120-byte region [fff00000c42a5200, fff00000c42a5278)
[   21.517461] 
[   21.517553] The buggy address belongs to the physical page:
[   21.517628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.517755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.517884] page_type: f5(slab)
[   21.517982] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.518439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.518608] page dumped because: kasan: bad access detected
[   21.519013] 
[   21.519096] Memory state around the buggy address:
[   21.519228]  fff00000c42a5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.519341]  fff00000c42a5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.519438] >fff00000c42a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.519512]                                                                 ^
[   21.519614]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.519713]  fff00000c42a5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.519813] ==================================================================
[   21.523388] ==================================================================
[   21.523642] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.523770] Write of size 8 at addr fff00000c42a5278 by task kunit_try_catch/283
[   21.523872] 
[   21.523954] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.524146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.524214] Hardware name: linux,dummy-virt (DT)
[   21.524749] Call trace:
[   21.524821]  show_stack+0x20/0x38 (C)
[   21.525004]  dump_stack_lvl+0x8c/0xd0
[   21.525345]  print_report+0x118/0x608
[   21.525610]  kasan_report+0xdc/0x128
[   21.525734]  kasan_check_range+0x100/0x1a8
[   21.525845]  __kasan_check_write+0x20/0x30
[   21.525960]  copy_to_kernel_nofault+0x8c/0x250
[   21.526076]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.526197]  kunit_try_run_case+0x170/0x3f0
[   21.526319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.526455]  kthread+0x328/0x630
[   21.527006]  ret_from_fork+0x10/0x20
[   21.527224] 
[   21.527270] Allocated by task 283:
[   21.527376]  kasan_save_stack+0x3c/0x68
[   21.527562]  kasan_save_track+0x20/0x40
[   21.527654]  kasan_save_alloc_info+0x40/0x58
[   21.527961]  __kasan_kmalloc+0xd4/0xd8
[   21.528112]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.528205]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.528290]  kunit_try_run_case+0x170/0x3f0
[   21.528454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.528580]  kthread+0x328/0x630
[   21.528711]  ret_from_fork+0x10/0x20
[   21.528796] 
[   21.528840] The buggy address belongs to the object at fff00000c42a5200
[   21.528840]  which belongs to the cache kmalloc-128 of size 128
[   21.529167] The buggy address is located 0 bytes to the right of
[   21.529167]  allocated 120-byte region [fff00000c42a5200, fff00000c42a5278)
[   21.529326] 
[   21.529378] The buggy address belongs to the physical page:
[   21.529450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.529608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.530498] page_type: f5(slab)
[   21.530618] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.531127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.531679] page dumped because: kasan: bad access detected
[   21.531792] 
[   21.531894] Memory state around the buggy address:
[   21.531988]  fff00000c42a5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.532257]  fff00000c42a5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.532356] >fff00000c42a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.532638]                                                                 ^
[   21.532757]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.532861]  fff00000c42a5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.532952] ==================================================================

[   25.245038] ==================================================================
[   25.246066] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   25.246916] Read of size 8 at addr ffff888103c6f278 by task kunit_try_catch/301
[   25.247790] 
[   25.248028] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.248748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.248771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.248804] Call Trace:
[   25.248823]  <TASK>
[   25.248847]  dump_stack_lvl+0x73/0xb0
[   25.248892]  print_report+0xd1/0x650
[   25.248932]  ? __virt_addr_valid+0x1db/0x2d0
[   25.248967]  ? copy_to_kernel_nofault+0x225/0x260
[   25.249005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.249040]  ? copy_to_kernel_nofault+0x225/0x260
[   25.249079]  kasan_report+0x141/0x180
[   25.249113]  ? copy_to_kernel_nofault+0x225/0x260
[   25.249159]  __asan_report_load8_noabort+0x18/0x20
[   25.249192]  copy_to_kernel_nofault+0x225/0x260
[   25.249232]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   25.249272]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.249310]  ? finish_task_switch.isra.0+0x153/0x700
[   25.249349]  ? __schedule+0x10cc/0x2b30
[   25.249386]  ? trace_hardirqs_on+0x37/0xe0
[   25.249497]  ? __pfx_read_tsc+0x10/0x10
[   25.249539]  ? ktime_get_ts64+0x86/0x230
[   25.249593]  kunit_try_run_case+0x1a5/0x480
[   25.249632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.249666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.249703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.249740]  ? __kthread_parkme+0x82/0x180
[   25.249774]  ? preempt_count_sub+0x50/0x80
[   25.249811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.249846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.249880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.249915]  kthread+0x337/0x6f0
[   25.249948]  ? trace_preempt_on+0x20/0xc0
[   25.249983]  ? __pfx_kthread+0x10/0x10
[   25.250017]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.250051]  ? calculate_sigpending+0x7b/0xa0
[   25.250084]  ? __pfx_kthread+0x10/0x10
[   25.250118]  ret_from_fork+0x41/0x80
[   25.250151]  ? __pfx_kthread+0x10/0x10
[   25.250185]  ret_from_fork_asm+0x1a/0x30
[   25.250233]  </TASK>
[   25.250249] 
[   25.273345] Allocated by task 301:
[   25.273842]  kasan_save_stack+0x45/0x70
[   25.274261]  kasan_save_track+0x18/0x40
[   25.274738]  kasan_save_alloc_info+0x3b/0x50
[   25.275147]  __kasan_kmalloc+0xb7/0xc0
[   25.275558]  __kmalloc_cache_noprof+0x189/0x420
[   25.275910]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.276460]  kunit_try_run_case+0x1a5/0x480
[   25.276953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.277542]  kthread+0x337/0x6f0
[   25.277951]  ret_from_fork+0x41/0x80
[   25.278296]  ret_from_fork_asm+0x1a/0x30
[   25.278781] 
[   25.278970] The buggy address belongs to the object at ffff888103c6f200
[   25.278970]  which belongs to the cache kmalloc-128 of size 128
[   25.280029] The buggy address is located 0 bytes to the right of
[   25.280029]  allocated 120-byte region [ffff888103c6f200, ffff888103c6f278)
[   25.281007] 
[   25.281240] The buggy address belongs to the physical page:
[   25.281730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.282235] flags: 0x200000000000000(node=0|zone=2)
[   25.282783] page_type: f5(slab)
[   25.283175] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.283935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.284582] page dumped because: kasan: bad access detected
[   25.285050] 
[   25.285231] Memory state around the buggy address:
[   25.285696]  ffff888103c6f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.286310]  ffff888103c6f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.286992] >ffff888103c6f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.287619]                                                                 ^
[   25.288164]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.288754]  ffff888103c6f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.289260] ==================================================================
[   25.291729] ==================================================================
[   25.292244] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   25.293583] Write of size 8 at addr ffff888103c6f278 by task kunit_try_catch/301
[   25.294872] 
[   25.295250] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.295374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.295434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.295508] Call Trace:
[   25.295546]  <TASK>
[   25.295589]  dump_stack_lvl+0x73/0xb0
[   25.295674]  print_report+0xd1/0x650
[   25.295760]  ? __virt_addr_valid+0x1db/0x2d0
[   25.295833]  ? copy_to_kernel_nofault+0x99/0x260
[   25.295909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.295975]  ? copy_to_kernel_nofault+0x99/0x260
[   25.296058]  kasan_report+0x141/0x180
[   25.296143]  ? copy_to_kernel_nofault+0x99/0x260
[   25.296242]  kasan_check_range+0x10c/0x1c0
[   25.296326]  __kasan_check_write+0x18/0x20
[   25.296406]  copy_to_kernel_nofault+0x99/0x260
[   25.296540]  copy_to_kernel_nofault_oob+0x288/0x560
[   25.296631]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   25.296693]  ? finish_task_switch.isra.0+0x153/0x700
[   25.296730]  ? __schedule+0x10cc/0x2b30
[   25.296764]  ? trace_hardirqs_on+0x37/0xe0
[   25.296811]  ? __pfx_read_tsc+0x10/0x10
[   25.296839]  ? ktime_get_ts64+0x86/0x230
[   25.296875]  kunit_try_run_case+0x1a5/0x480
[   25.296908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.296940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.296976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.297011]  ? __kthread_parkme+0x82/0x180
[   25.297044]  ? preempt_count_sub+0x50/0x80
[   25.297080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.297115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.297147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.297181]  kthread+0x337/0x6f0
[   25.297212]  ? trace_preempt_on+0x20/0xc0
[   25.297244]  ? __pfx_kthread+0x10/0x10
[   25.297276]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.297308]  ? calculate_sigpending+0x7b/0xa0
[   25.297339]  ? __pfx_kthread+0x10/0x10
[   25.297371]  ret_from_fork+0x41/0x80
[   25.297422]  ? __pfx_kthread+0x10/0x10
[   25.297502]  ret_from_fork_asm+0x1a/0x30
[   25.297553]  </TASK>
[   25.297576] 
[   25.318460] Allocated by task 301:
[   25.318896]  kasan_save_stack+0x45/0x70
[   25.319349]  kasan_save_track+0x18/0x40
[   25.320166]  kasan_save_alloc_info+0x3b/0x50
[   25.320393]  __kasan_kmalloc+0xb7/0xc0
[   25.320709]  __kmalloc_cache_noprof+0x189/0x420
[   25.321665]  copy_to_kernel_nofault_oob+0x12f/0x560
[   25.322151]  kunit_try_run_case+0x1a5/0x480
[   25.322726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.323379]  kthread+0x337/0x6f0
[   25.323855]  ret_from_fork+0x41/0x80
[   25.324157]  ret_from_fork_asm+0x1a/0x30
[   25.325303] 
[   25.325508] The buggy address belongs to the object at ffff888103c6f200
[   25.325508]  which belongs to the cache kmalloc-128 of size 128
[   25.326767] The buggy address is located 0 bytes to the right of
[   25.326767]  allocated 120-byte region [ffff888103c6f200, ffff888103c6f278)
[   25.328218] 
[   25.328456] The buggy address belongs to the physical page:
[   25.329008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.329714] flags: 0x200000000000000(node=0|zone=2)
[   25.330122] page_type: f5(slab)
[   25.331085] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.331717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.331972] page dumped because: kasan: bad access detected
[   25.332163] 
[   25.332250] Memory state around the buggy address:
[   25.332503]  ffff888103c6f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.333564]  ffff888103c6f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.334431] >ffff888103c6f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.335574]                                                                 ^
[   25.336246]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.337662]  ffff888103c6f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.338414] ==================================================================

[   24.026331] ==================================================================
[   24.027007] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   24.027699] Write of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339
[   24.028373] 
[   24.028531] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.028568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.028579] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.028593] Call trace:
[   24.028602]  show_stack+0x20/0x38 (C)
[   24.028627]  dump_stack_lvl+0x8c/0xd0
[   24.028651]  print_report+0x118/0x608
[   24.028674]  kasan_report+0xdc/0x128
[   24.028695]  kasan_check_range+0x100/0x1a8
[   24.028718]  __kasan_check_write+0x20/0x30
[   24.028742]  copy_to_kernel_nofault+0x8c/0x250
[   24.028763]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   24.028790]  kunit_try_run_case+0x170/0x3f0
[   24.028816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.028845]  kthread+0x328/0x630
[   24.028870]  ret_from_fork+0x10/0x20
[   24.028895] 
[   24.035188] Allocated by task 339:
[   24.035509]  kasan_save_stack+0x3c/0x68
[   24.035873]  kasan_save_track+0x20/0x40
[   24.036234]  kasan_save_alloc_info+0x40/0x58
[   24.036637]  __kasan_kmalloc+0xd4/0xd8
[   24.036989]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.037418]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.037867]  kunit_try_run_case+0x170/0x3f0
[   24.038262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.038773]  kthread+0x328/0x630
[   24.039084]  ret_from_fork+0x10/0x20
[   24.039425] 
[   24.039573] The buggy address belongs to the object at ffff00000c992d00
[   24.039573]  which belongs to the cache kmalloc-128 of size 128
[   24.040692] The buggy address is located 0 bytes to the right of
[   24.040692]  allocated 120-byte region [ffff00000c992d00, ffff00000c992d78)
[   24.041851] 
[   24.041999] The buggy address belongs to the physical page:
[   24.042507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   24.043220] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.043819] page_type: f5(slab)
[   24.044120] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.044823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.045522] page dumped because: kasan: bad access detected
[   24.046029] 
[   24.046175] Memory state around the buggy address:
[   24.046615]  ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.047271]  ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.047926] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.048578]                                                                 ^
[   24.049224]  ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.049879]  ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.050533] ==================================================================
[   24.000387] ==================================================================
[   24.001759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   24.002463] Read of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339
[   24.003142] 
[   24.003309] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.003360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.003376] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.003395] Call trace:
[   24.003408]  show_stack+0x20/0x38 (C)
[   24.003442]  dump_stack_lvl+0x8c/0xd0
[   24.003475]  print_report+0x118/0x608
[   24.003508]  kasan_report+0xdc/0x128
[   24.003537]  __asan_report_load8_noabort+0x20/0x30
[   24.003572]  copy_to_kernel_nofault+0x204/0x250
[   24.003603]  copy_to_kernel_nofault_oob+0x158/0x418
[   24.003640]  kunit_try_run_case+0x170/0x3f0
[   24.003677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.003717]  kthread+0x328/0x630
[   24.003752]  ret_from_fork+0x10/0x20
[   24.003786] 
[   24.009829] Allocated by task 339:
[   24.010165]  kasan_save_stack+0x3c/0x68
[   24.010544]  kasan_save_track+0x20/0x40
[   24.010919]  kasan_save_alloc_info+0x40/0x58
[   24.011333]  __kasan_kmalloc+0xd4/0xd8
[   24.011698]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.012141]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.012604]  kunit_try_run_case+0x170/0x3f0
[   24.013013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.013539]  kthread+0x328/0x630
[   24.013867]  ret_from_fork+0x10/0x20
[   24.014218] 
[   24.014372] The buggy address belongs to the object at ffff00000c992d00
[   24.014372]  which belongs to the cache kmalloc-128 of size 128
[   24.015507] The buggy address is located 0 bytes to the right of
[   24.015507]  allocated 120-byte region [ffff00000c992d00, ffff00000c992d78)
[   24.016683] 
[   24.016839] The buggy address belongs to the physical page:
[   24.017357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   24.018081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.018697] page_type: f5(slab)
[   24.019012] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.019729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.020438] page dumped because: kasan: bad access detected
[   24.020955] 
[   24.021108] Memory state around the buggy address:
[   24.021559]  ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.022227]  ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.022896] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.023560]                                                                 ^
[   24.024216]  ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.024884]  ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.025547] ==================================================================