Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   79.909051] ==================================================================
[   79.923314] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   79.930690] Read of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365
[   79.937981] 
[   79.939469] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.939525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.939542] Hardware name: WinLink E850-96 board (DT)
[   79.939567] Call trace:
[   79.939581]  show_stack+0x20/0x38 (C)
[   79.939620]  dump_stack_lvl+0x8c/0xd0
[   79.939656]  print_report+0x118/0x5d0
[   79.939686]  kasan_report+0xdc/0x128
[   79.939715]  __asan_report_load8_noabort+0x20/0x30
[   79.939753]  copy_to_kernel_nofault+0x204/0x250
[   79.939789]  copy_to_kernel_nofault_oob+0x158/0x418
[   79.939824]  kunit_try_run_case+0x170/0x3f0
[   79.939864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.939898]  kthread+0x328/0x630
[   79.939930]  ret_from_fork+0x10/0x20
[   79.939969] 
[   80.008727] Allocated by task 365:
[   80.012113]  kasan_save_stack+0x3c/0x68
[   80.015930]  kasan_save_track+0x20/0x40
[   80.019750]  kasan_save_alloc_info+0x40/0x58
[   80.024003]  __kasan_kmalloc+0xd4/0xd8
[   80.027736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.032250]  copy_to_kernel_nofault_oob+0xc8/0x418
[   80.037024]  kunit_try_run_case+0x170/0x3f0
[   80.041190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.046659]  kthread+0x328/0x630
[   80.049871]  ret_from_fork+0x10/0x20
[   80.053430] 
[   80.054907] The buggy address belongs to the object at ffff000801e0bf00
[   80.054907]  which belongs to the cache kmalloc-128 of size 128
[   80.067409] The buggy address is located 0 bytes to the right of
[   80.067409]  allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78)
[   80.080340] 
[   80.081819] The buggy address belongs to the physical page:
[   80.087376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   80.095359] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   80.102998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   80.109941] page_type: f5(slab)
[   80.113078] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.120797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.128525] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.136334] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.144147] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   80.151960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   80.159767] page dumped because: kasan: bad access detected
[   80.165321] 
[   80.166798] Memory state around the buggy address:
[   80.171578]  ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   80.178779]  ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.185985] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   80.193185]                                                                 ^
[   80.200306]  ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.207512]  ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.214714] ==================================================================
[   80.222149] ==================================================================
[   80.229126] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   80.236413] Write of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365
[   80.243792] 
[   80.245278] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   80.245335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.245350] Hardware name: WinLink E850-96 board (DT)
[   80.245372] Call trace:
[   80.245387]  show_stack+0x20/0x38 (C)
[   80.245422]  dump_stack_lvl+0x8c/0xd0
[   80.245456]  print_report+0x118/0x5d0
[   80.245486]  kasan_report+0xdc/0x128
[   80.245516]  kasan_check_range+0x100/0x1a8
[   80.245548]  __kasan_check_write+0x20/0x30
[   80.245581]  copy_to_kernel_nofault+0x8c/0x250
[   80.245616]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   80.245650]  kunit_try_run_case+0x170/0x3f0
[   80.245686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.245718]  kthread+0x328/0x630
[   80.245747]  ret_from_fork+0x10/0x20
[   80.245781] 
[   80.317836] Allocated by task 365:
[   80.321223]  kasan_save_stack+0x3c/0x68
[   80.325040]  kasan_save_track+0x20/0x40
[   80.328860]  kasan_save_alloc_info+0x40/0x58
[   80.333113]  __kasan_kmalloc+0xd4/0xd8
[   80.336846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.341360]  copy_to_kernel_nofault_oob+0xc8/0x418
[   80.346134]  kunit_try_run_case+0x170/0x3f0
[   80.350301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.355769]  kthread+0x328/0x630
[   80.358981]  ret_from_fork+0x10/0x20
[   80.362540] 
[   80.364017] The buggy address belongs to the object at ffff000801e0bf00
[   80.364017]  which belongs to the cache kmalloc-128 of size 128
[   80.376517] The buggy address is located 0 bytes to the right of
[   80.376517]  allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78)
[   80.389449] 
[   80.390928] The buggy address belongs to the physical page:
[   80.396485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   80.404467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   80.412106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   80.419050] page_type: f5(slab)
[   80.422186] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.429907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.437633] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.445445] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.453258] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   80.461070] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   80.468877] page dumped because: kasan: bad access detected
[   80.474431] 
[   80.475908] Memory state around the buggy address:
[   80.480686]  ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   80.487889]  ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.495094] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   80.502295]                                                                 ^
[   80.509418]  ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.516623]  ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.523822] ==================================================================

[   32.791457] ==================================================================
[   32.791584] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   32.791656] Read of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312
[   32.791708] 
[   32.791942] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.792228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.792317] Hardware name: linux,dummy-virt (DT)
[   32.792401] Call trace:
[   32.792504]  show_stack+0x20/0x38 (C)
[   32.792585]  dump_stack_lvl+0x8c/0xd0
[   32.792899]  print_report+0x118/0x5d0
[   32.793007]  kasan_report+0xdc/0x128
[   32.793460]  __asan_report_load8_noabort+0x20/0x30
[   32.793594]  copy_to_kernel_nofault+0x204/0x250
[   32.794000]  copy_to_kernel_nofault_oob+0x158/0x418
[   32.794108]  kunit_try_run_case+0x170/0x3f0
[   32.794246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.794389]  kthread+0x328/0x630
[   32.794498]  ret_from_fork+0x10/0x20
[   32.794566] 
[   32.794587] Allocated by task 312:
[   32.794890]  kasan_save_stack+0x3c/0x68
[   32.794958]  kasan_save_track+0x20/0x40
[   32.795085]  kasan_save_alloc_info+0x40/0x58
[   32.795184]  __kasan_kmalloc+0xd4/0xd8
[   32.795380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.795462]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.795660]  kunit_try_run_case+0x170/0x3f0
[   32.795965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.796038]  kthread+0x328/0x630
[   32.796813]  ret_from_fork+0x10/0x20
[   32.796945] 
[   32.797021] The buggy address belongs to the object at fff00000c85fce00
[   32.797021]  which belongs to the cache kmalloc-128 of size 128
[   32.797219] The buggy address is located 0 bytes to the right of
[   32.797219]  allocated 120-byte region [fff00000c85fce00, fff00000c85fce78)
[   32.797310] 
[   32.797334] The buggy address belongs to the physical page:
[   32.797394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.797750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.797973] page_type: f5(slab)
[   32.798154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.798259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.798375] page dumped because: kasan: bad access detected
[   32.798658] 
[   32.798774] Memory state around the buggy address:
[   32.798916]  fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.799077]  fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799183] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.799307]                                                                 ^
[   32.799378]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799475]  fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799904] ==================================================================
[   32.801680] ==================================================================
[   32.802385] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   32.802474] Write of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312
[   32.802531] 
[   32.802567] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.802770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.802837] Hardware name: linux,dummy-virt (DT)
[   32.802881] Call trace:
[   32.803000]  show_stack+0x20/0x38 (C)
[   32.803393]  dump_stack_lvl+0x8c/0xd0
[   32.803475]  print_report+0x118/0x5d0
[   32.803522]  kasan_report+0xdc/0x128
[   32.803752]  kasan_check_range+0x100/0x1a8
[   32.803810]  __kasan_check_write+0x20/0x30
[   32.803858]  copy_to_kernel_nofault+0x8c/0x250
[   32.804110]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   32.804416]  kunit_try_run_case+0x170/0x3f0
[   32.804565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.804749]  kthread+0x328/0x630
[   32.804886]  ret_from_fork+0x10/0x20
[   32.805093] 
[   32.805161] Allocated by task 312:
[   32.805262]  kasan_save_stack+0x3c/0x68
[   32.805311]  kasan_save_track+0x20/0x40
[   32.805373]  kasan_save_alloc_info+0x40/0x58
[   32.805544]  __kasan_kmalloc+0xd4/0xd8
[   32.805766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.805952]  copy_to_kernel_nofault_oob+0xc8/0x418
[   32.806013]  kunit_try_run_case+0x170/0x3f0
[   32.806473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.806568]  kthread+0x328/0x630
[   32.806664]  ret_from_fork+0x10/0x20
[   32.806734] 
[   32.806998] The buggy address belongs to the object at fff00000c85fce00
[   32.806998]  which belongs to the cache kmalloc-128 of size 128
[   32.807131] The buggy address is located 0 bytes to the right of
[   32.807131]  allocated 120-byte region [fff00000c85fce00, fff00000c85fce78)
[   32.807434] 
[   32.807568] The buggy address belongs to the physical page:
[   32.807646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.807814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.807894] page_type: f5(slab)
[   32.807945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.808008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.808063] page dumped because: kasan: bad access detected
[   32.808097] 
[   32.808130] Memory state around the buggy address:
[   32.808191]  fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.808239]  fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.808654] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.808743]                                                                 ^
[   32.809260]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.809325]  fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.809534] ==================================================================

[   28.290834] ==================================================================
[   28.292803] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   28.294016] Read of size 8 at addr ffff888105919d78 by task kunit_try_catch/330
[   28.294670] 
[   28.294903] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.294967] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.294992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.295020] Call Trace:
[   28.295040]  <TASK>
[   28.295063]  dump_stack_lvl+0x73/0xb0
[   28.295107]  print_report+0xd1/0x610
[   28.295135]  ? __virt_addr_valid+0x1db/0x2d0
[   28.295163]  ? copy_to_kernel_nofault+0x225/0x260
[   28.295188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.295215]  ? copy_to_kernel_nofault+0x225/0x260
[   28.295239]  kasan_report+0x141/0x180
[   28.295262]  ? copy_to_kernel_nofault+0x225/0x260
[   28.295290]  __asan_report_load8_noabort+0x18/0x20
[   28.295315]  copy_to_kernel_nofault+0x225/0x260
[   28.295340]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   28.295364]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   28.295391]  ? finish_task_switch.isra.0+0x153/0x700
[   28.295416]  ? __schedule+0x10cc/0x2b60
[   28.295440]  ? trace_hardirqs_on+0x37/0xe0
[   28.295472]  ? __pfx_read_tsc+0x10/0x10
[   28.295496]  ? ktime_get_ts64+0x86/0x230
[   28.295524]  kunit_try_run_case+0x1a5/0x480
[   28.295550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.295572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.295596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.295620]  ? __kthread_parkme+0x82/0x180
[   28.295642]  ? preempt_count_sub+0x50/0x80
[   28.295677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.295699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.295725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.295751]  kthread+0x337/0x6f0
[   28.295772]  ? trace_preempt_on+0x20/0xc0
[   28.295797]  ? __pfx_kthread+0x10/0x10
[   28.295819]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.295880]  ? calculate_sigpending+0x7b/0xa0
[   28.295906]  ? __pfx_kthread+0x10/0x10
[   28.295929]  ret_from_fork+0x116/0x1d0
[   28.295951]  ? __pfx_kthread+0x10/0x10
[   28.295972]  ret_from_fork_asm+0x1a/0x30
[   28.296006]  </TASK>
[   28.296020] 
[   28.310054] Allocated by task 330:
[   28.310492]  kasan_save_stack+0x45/0x70
[   28.310840]  kasan_save_track+0x18/0x40
[   28.310972]  kasan_save_alloc_info+0x3b/0x50
[   28.311129]  __kasan_kmalloc+0xb7/0xc0
[   28.311256]  __kmalloc_cache_noprof+0x189/0x420
[   28.311402]  copy_to_kernel_nofault_oob+0x12f/0x560
[   28.311588]  kunit_try_run_case+0x1a5/0x480
[   28.311918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.312411]  kthread+0x337/0x6f0
[   28.312805]  ret_from_fork+0x116/0x1d0
[   28.313215]  ret_from_fork_asm+0x1a/0x30
[   28.313731] 
[   28.313901] The buggy address belongs to the object at ffff888105919d00
[   28.313901]  which belongs to the cache kmalloc-128 of size 128
[   28.315113] The buggy address is located 0 bytes to the right of
[   28.315113]  allocated 120-byte region [ffff888105919d00, ffff888105919d78)
[   28.316282] 
[   28.316453] The buggy address belongs to the physical page:
[   28.317013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   28.317440] flags: 0x200000000000000(node=0|zone=2)
[   28.317603] page_type: f5(slab)
[   28.317748] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.318317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.319089] page dumped because: kasan: bad access detected
[   28.319675] 
[   28.319854] Memory state around the buggy address:
[   28.320117]  ffff888105919c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.320702]  ffff888105919c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.321416] >ffff888105919d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.321724]                                                                 ^
[   28.321942]  ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.322153]  ffff888105919e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.322355] ==================================================================
[   28.323492] ==================================================================
[   28.323787] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   28.324117] Write of size 8 at addr ffff888105919d78 by task kunit_try_catch/330
[   28.324419] 
[   28.324515] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.324571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.324587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.324614] Call Trace:
[   28.324629]  <TASK>
[   28.324650]  dump_stack_lvl+0x73/0xb0
[   28.324694]  print_report+0xd1/0x610
[   28.324719]  ? __virt_addr_valid+0x1db/0x2d0
[   28.324743]  ? copy_to_kernel_nofault+0x99/0x260
[   28.324766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.324793]  ? copy_to_kernel_nofault+0x99/0x260
[   28.324817]  kasan_report+0x141/0x180
[   28.324840]  ? copy_to_kernel_nofault+0x99/0x260
[   28.324868]  kasan_check_range+0x10c/0x1c0
[   28.324893]  __kasan_check_write+0x18/0x20
[   28.324916]  copy_to_kernel_nofault+0x99/0x260
[   28.324941]  copy_to_kernel_nofault_oob+0x288/0x560
[   28.324979]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   28.325003]  ? finish_task_switch.isra.0+0x153/0x700
[   28.325027]  ? __schedule+0x10cc/0x2b60
[   28.325051]  ? trace_hardirqs_on+0x37/0xe0
[   28.325082]  ? __pfx_read_tsc+0x10/0x10
[   28.325105]  ? ktime_get_ts64+0x86/0x230
[   28.325130]  kunit_try_run_case+0x1a5/0x480
[   28.325154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.325175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.325199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.325223]  ? __kthread_parkme+0x82/0x180
[   28.325245]  ? preempt_count_sub+0x50/0x80
[   28.325269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.325293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.325319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.325346]  kthread+0x337/0x6f0
[   28.325367]  ? trace_preempt_on+0x20/0xc0
[   28.325390]  ? __pfx_kthread+0x10/0x10
[   28.325411]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.325434]  ? calculate_sigpending+0x7b/0xa0
[   28.325461]  ? __pfx_kthread+0x10/0x10
[   28.325483]  ret_from_fork+0x116/0x1d0
[   28.325503]  ? __pfx_kthread+0x10/0x10
[   28.325525]  ret_from_fork_asm+0x1a/0x30
[   28.325558]  </TASK>
[   28.325569] 
[   28.333519] Allocated by task 330:
[   28.333708]  kasan_save_stack+0x45/0x70
[   28.333908]  kasan_save_track+0x18/0x40
[   28.334196]  kasan_save_alloc_info+0x3b/0x50
[   28.334373]  __kasan_kmalloc+0xb7/0xc0
[   28.334500]  __kmalloc_cache_noprof+0x189/0x420
[   28.334662]  copy_to_kernel_nofault_oob+0x12f/0x560
[   28.335081]  kunit_try_run_case+0x1a5/0x480
[   28.335268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.335488]  kthread+0x337/0x6f0
[   28.335669]  ret_from_fork+0x116/0x1d0
[   28.335889]  ret_from_fork_asm+0x1a/0x30
[   28.336057] 
[   28.336156] The buggy address belongs to the object at ffff888105919d00
[   28.336156]  which belongs to the cache kmalloc-128 of size 128
[   28.336535] The buggy address is located 0 bytes to the right of
[   28.336535]  allocated 120-byte region [ffff888105919d00, ffff888105919d78)
[   28.337239] 
[   28.337308] The buggy address belongs to the physical page:
[   28.337715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   28.338088] flags: 0x200000000000000(node=0|zone=2)
[   28.338409] page_type: f5(slab)
[   28.338579] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.338817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.339036] page dumped because: kasan: bad access detected
[   28.339202] 
[   28.339264] Memory state around the buggy address:
[   28.339414]  ffff888105919c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.339707]  ffff888105919c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.340025] >ffff888105919d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.340334]                                                                 ^
[   28.340644]  ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.341003]  ffff888105919e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.341370] ==================================================================