Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   61.895894] ==================================================================
[   61.910055] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   61.917429] Read of size 8 at addr ffff000802408b78 by task kunit_try_catch/328
[   61.924720] 
[   61.926205] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.926261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.926277] Hardware name: WinLink E850-96 board (DT)
[   61.926298] Call trace:
[   61.926315]  show_stack+0x20/0x38 (C)
[   61.926353]  dump_stack_lvl+0x8c/0xd0
[   61.926390]  print_report+0x118/0x608
[   61.926425]  kasan_report+0xdc/0x128
[   61.926454]  __asan_report_load8_noabort+0x20/0x30
[   61.926492]  copy_to_kernel_nofault+0x204/0x250
[   61.926524]  copy_to_kernel_nofault_oob+0x158/0x418
[   61.926563]  kunit_try_run_case+0x170/0x3f0
[   61.926601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.926639]  kthread+0x328/0x630
[   61.926675]  ret_from_fork+0x10/0x20
[   61.926708] 
[   61.994248] Allocated by task 328:
[   61.997638]  kasan_save_stack+0x3c/0x68
[   62.001453]  kasan_save_track+0x20/0x40
[   62.005273]  kasan_save_alloc_info+0x40/0x58
[   62.009526]  __kasan_kmalloc+0xd4/0xd8
[   62.013259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.017772]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.022548]  kunit_try_run_case+0x170/0x3f0
[   62.026713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.032182]  kthread+0x328/0x630
[   62.035394]  ret_from_fork+0x10/0x20
[   62.038953] 
[   62.040430] The buggy address belongs to the object at ffff000802408b00
[   62.040430]  which belongs to the cache kmalloc-128 of size 128
[   62.052930] The buggy address is located 0 bytes to the right of
[   62.052930]  allocated 120-byte region [ffff000802408b00, ffff000802408b78)
[   62.065862] 
[   62.067340] The buggy address belongs to the physical page:
[   62.072898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   62.080883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.088522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.095464] page_type: f5(slab)
[   62.098601] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.106320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.114046] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.121857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.129670] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   62.137482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.145288] page dumped because: kasan: bad access detected
[   62.150843] 
[   62.152319] Memory state around the buggy address:
[   62.157100]  ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.164302]  ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.171506] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.178707]                                                                 ^
[   62.185829]  ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.193035]  ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.200237] ==================================================================
[   62.207663] ==================================================================
[   62.214648] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   62.221936] Write of size 8 at addr ffff000802408b78 by task kunit_try_catch/328
[   62.229314] 
[   62.230799] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   62.230855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.230873] Hardware name: WinLink E850-96 board (DT)
[   62.230894] Call trace:
[   62.230910]  show_stack+0x20/0x38 (C)
[   62.230942]  dump_stack_lvl+0x8c/0xd0
[   62.230978]  print_report+0x118/0x608
[   62.231011]  kasan_report+0xdc/0x128
[   62.231039]  kasan_check_range+0x100/0x1a8
[   62.231073]  __kasan_check_write+0x20/0x30
[   62.231105]  copy_to_kernel_nofault+0x8c/0x250
[   62.231137]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   62.231174]  kunit_try_run_case+0x170/0x3f0
[   62.231210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.231250]  kthread+0x328/0x630
[   62.231285]  ret_from_fork+0x10/0x20
[   62.231319] 
[   62.302143] Allocated by task 328:
[   62.305530]  kasan_save_stack+0x3c/0x68
[   62.309348]  kasan_save_track+0x20/0x40
[   62.313167]  kasan_save_alloc_info+0x40/0x58
[   62.317421]  __kasan_kmalloc+0xd4/0xd8
[   62.321153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.325667]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.330441]  kunit_try_run_case+0x170/0x3f0
[   62.334608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.340077]  kthread+0x328/0x630
[   62.343288]  ret_from_fork+0x10/0x20
[   62.346848] 
[   62.348324] The buggy address belongs to the object at ffff000802408b00
[   62.348324]  which belongs to the cache kmalloc-128 of size 128
[   62.360825] The buggy address is located 0 bytes to the right of
[   62.360825]  allocated 120-byte region [ffff000802408b00, ffff000802408b78)
[   62.373757] 
[   62.375236] The buggy address belongs to the physical page:
[   62.380793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   62.388776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.396415] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.403358] page_type: f5(slab)
[   62.406494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.414214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.421941] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.429752] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.437565] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   62.445377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.453183] page dumped because: kasan: bad access detected
[   62.458738] 
[   62.460213] Memory state around the buggy address:
[   62.464995]  ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.472196]  ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.479401] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.486602]                                                                 ^
[   62.493724]  ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.500930]  ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.508130] ==================================================================

[   21.307616] ==================================================================
[   21.307686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.307759] Read of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284
[   21.309517] 
[   21.309727] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.309847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.309879] Hardware name: linux,dummy-virt (DT)
[   21.310322] Call trace:
[   21.310475]  show_stack+0x20/0x38 (C)
[   21.310748]  dump_stack_lvl+0x8c/0xd0
[   21.310822]  print_report+0x118/0x608
[   21.311383]  kasan_report+0xdc/0x128
[   21.311470]  __asan_report_load8_noabort+0x20/0x30
[   21.311955]  copy_to_kernel_nofault+0x204/0x250
[   21.312227]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.312590]  kunit_try_run_case+0x170/0x3f0
[   21.313110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.313689]  kthread+0x328/0x630
[   21.314003]  ret_from_fork+0x10/0x20
[   21.314064] 
[   21.314087] Allocated by task 284:
[   21.314445]  kasan_save_stack+0x3c/0x68
[   21.314688]  kasan_save_track+0x20/0x40
[   21.314797]  kasan_save_alloc_info+0x40/0x58
[   21.314842]  __kasan_kmalloc+0xd4/0xd8
[   21.314880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.315506]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.315616]  kunit_try_run_case+0x170/0x3f0
[   21.315833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.316034]  kthread+0x328/0x630
[   21.316077]  ret_from_fork+0x10/0x20
[   21.316117] 
[   21.316576] The buggy address belongs to the object at fff00000c3f9e700
[   21.316576]  which belongs to the cache kmalloc-128 of size 128
[   21.316690] The buggy address is located 0 bytes to the right of
[   21.316690]  allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778)
[   21.316758] 
[   21.317310] The buggy address belongs to the physical page:
[   21.317365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.317810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.317934] page_type: f5(slab)
[   21.318707] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.319075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.319164] page dumped because: kasan: bad access detected
[   21.319277] 
[   21.319311] Memory state around the buggy address:
[   21.319715]  fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.319781]  fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.319830] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.319873]                                                                 ^
[   21.319920]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.319967]  fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320009] ==================================================================
[   21.323411] ==================================================================
[   21.323472] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.323530] Write of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284
[   21.324672] 
[   21.324733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.324826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.325430] Hardware name: linux,dummy-virt (DT)
[   21.325898] Call trace:
[   21.326141]  show_stack+0x20/0x38 (C)
[   21.326217]  dump_stack_lvl+0x8c/0xd0
[   21.326362]  print_report+0x118/0x608
[   21.326647]  kasan_report+0xdc/0x128
[   21.327286]  kasan_check_range+0x100/0x1a8
[   21.327396]  __kasan_check_write+0x20/0x30
[   21.327457]  copy_to_kernel_nofault+0x8c/0x250
[   21.327768]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.328443]  kunit_try_run_case+0x170/0x3f0
[   21.328538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.328847]  kthread+0x328/0x630
[   21.328913]  ret_from_fork+0x10/0x20
[   21.329470] 
[   21.329518] Allocated by task 284:
[   21.329555]  kasan_save_stack+0x3c/0x68
[   21.329761]  kasan_save_track+0x20/0x40
[   21.330075]  kasan_save_alloc_info+0x40/0x58
[   21.330447]  __kasan_kmalloc+0xd4/0xd8
[   21.330521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.331013]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.331336]  kunit_try_run_case+0x170/0x3f0
[   21.331399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.331449]  kthread+0x328/0x630
[   21.331488]  ret_from_fork+0x10/0x20
[   21.331528] 
[   21.331550] The buggy address belongs to the object at fff00000c3f9e700
[   21.331550]  which belongs to the cache kmalloc-128 of size 128
[   21.332164] The buggy address is located 0 bytes to the right of
[   21.332164]  allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778)
[   21.332276] 
[   21.332323] The buggy address belongs to the physical page:
[   21.332367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.332804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.333047] page_type: f5(slab)
[   21.333097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.333154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.333202] page dumped because: kasan: bad access detected
[   21.333680] 
[   21.333706] Memory state around the buggy address:
[   21.333820]  fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.333872]  fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334063] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.334133]                                                                 ^
[   21.334282]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334682]  fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334819] ==================================================================

[   21.940775] ==================================================================
[   21.941272] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   21.941548] Write of size 8 at addr ffff888102b31b78 by task kunit_try_catch/302
[   21.941784] 
[   21.942571] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.942709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.942741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.942805] Call Trace:
[   21.942850]  <TASK>
[   21.942899]  dump_stack_lvl+0x73/0xb0
[   21.942983]  print_report+0xd1/0x650
[   21.943045]  ? __virt_addr_valid+0x1db/0x2d0
[   21.943139]  ? copy_to_kernel_nofault+0x99/0x260
[   21.943186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.943256]  ? copy_to_kernel_nofault+0x99/0x260
[   21.943310]  kasan_report+0x141/0x180
[   21.943373]  ? copy_to_kernel_nofault+0x99/0x260
[   21.943438]  kasan_check_range+0x10c/0x1c0
[   21.943490]  __kasan_check_write+0x18/0x20
[   21.943531]  copy_to_kernel_nofault+0x99/0x260
[   21.943568]  copy_to_kernel_nofault_oob+0x288/0x560
[   21.943599]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   21.943638]  ? finish_task_switch.isra.0+0x153/0x700
[   21.943674]  ? __schedule+0x10cc/0x2b30
[   21.943701]  ? trace_hardirqs_on+0x37/0xe0
[   21.943739]  ? __pfx_read_tsc+0x10/0x10
[   21.943792]  ? ktime_get_ts64+0x86/0x230
[   21.943825]  kunit_try_run_case+0x1a5/0x480
[   21.943858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.943885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.943914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.943942]  ? __kthread_parkme+0x82/0x180
[   21.943968]  ? preempt_count_sub+0x50/0x80
[   21.943996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.944025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.944052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.944080]  kthread+0x337/0x6f0
[   21.944103]  ? trace_preempt_on+0x20/0xc0
[   21.944146]  ? __pfx_kthread+0x10/0x10
[   21.944168]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.944192]  ? calculate_sigpending+0x7b/0xa0
[   21.944219]  ? __pfx_kthread+0x10/0x10
[   21.944241]  ret_from_fork+0x41/0x80
[   21.944276]  ? __pfx_kthread+0x10/0x10
[   21.944311]  ret_from_fork_asm+0x1a/0x30
[   21.944366]  </TASK>
[   21.944392] 
[   21.958346] Allocated by task 302:
[   21.958666]  kasan_save_stack+0x45/0x70
[   21.959075]  kasan_save_track+0x18/0x40
[   21.959327]  kasan_save_alloc_info+0x3b/0x50
[   21.959547]  __kasan_kmalloc+0xb7/0xc0
[   21.959901]  __kmalloc_cache_noprof+0x189/0x420
[   21.960293]  copy_to_kernel_nofault_oob+0x12f/0x560
[   21.960577]  kunit_try_run_case+0x1a5/0x480
[   21.960934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.961307]  kthread+0x337/0x6f0
[   21.961510]  ret_from_fork+0x41/0x80
[   21.961866]  ret_from_fork_asm+0x1a/0x30
[   21.962256] 
[   21.962444] The buggy address belongs to the object at ffff888102b31b00
[   21.962444]  which belongs to the cache kmalloc-128 of size 128
[   21.963061] The buggy address is located 0 bytes to the right of
[   21.963061]  allocated 120-byte region [ffff888102b31b00, ffff888102b31b78)
[   21.963895] 
[   21.964042] The buggy address belongs to the physical page:
[   21.964342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   21.964832] flags: 0x200000000000000(node=0|zone=2)
[   21.965261] page_type: f5(slab)
[   21.965569] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.965991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.966306] page dumped because: kasan: bad access detected
[   21.966720] 
[   21.966940] Memory state around the buggy address:
[   21.967247]  ffff888102b31a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.967542]  ffff888102b31a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.968155] >ffff888102b31b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.968698]                                                                 ^
[   21.969079]  ffff888102b31b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.969595]  ffff888102b31c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.969889] ==================================================================
[   21.906864] ==================================================================
[   21.907634] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   21.908474] Read of size 8 at addr ffff888102b31b78 by task kunit_try_catch/302
[   21.909165] 
[   21.909467] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.909589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.909623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.909685] Call Trace:
[   21.909721]  <TASK>
[   21.909792]  dump_stack_lvl+0x73/0xb0
[   21.909915]  print_report+0xd1/0x650
[   21.909995]  ? __virt_addr_valid+0x1db/0x2d0
[   21.910044]  ? copy_to_kernel_nofault+0x225/0x260
[   21.910071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.910103]  ? copy_to_kernel_nofault+0x225/0x260
[   21.910160]  kasan_report+0x141/0x180
[   21.910193]  ? copy_to_kernel_nofault+0x225/0x260
[   21.910223]  __asan_report_load8_noabort+0x18/0x20
[   21.910250]  copy_to_kernel_nofault+0x225/0x260
[   21.910278]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   21.910307]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   21.910335]  ? finish_task_switch.isra.0+0x153/0x700
[   21.910367]  ? __schedule+0x10cc/0x2b30
[   21.910393]  ? trace_hardirqs_on+0x37/0xe0
[   21.910431]  ? __pfx_read_tsc+0x10/0x10
[   21.910457]  ? ktime_get_ts64+0x86/0x230
[   21.910489]  kunit_try_run_case+0x1a5/0x480
[   21.910522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.910548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.910578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.910604]  ? __kthread_parkme+0x82/0x180
[   21.910631]  ? preempt_count_sub+0x50/0x80
[   21.910660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.910688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.910715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.910758]  kthread+0x337/0x6f0
[   21.910788]  ? trace_preempt_on+0x20/0xc0
[   21.910815]  ? __pfx_kthread+0x10/0x10
[   21.910838]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.910864]  ? calculate_sigpending+0x7b/0xa0
[   21.910891]  ? __pfx_kthread+0x10/0x10
[   21.910914]  ret_from_fork+0x41/0x80
[   21.910939]  ? __pfx_kthread+0x10/0x10
[   21.910961]  ret_from_fork_asm+0x1a/0x30
[   21.910998]  </TASK>
[   21.911017] 
[   21.924434] Allocated by task 302:
[   21.924891]  kasan_save_stack+0x45/0x70
[   21.925494]  kasan_save_track+0x18/0x40
[   21.926400]  kasan_save_alloc_info+0x3b/0x50
[   21.926814]  __kasan_kmalloc+0xb7/0xc0
[   21.927071]  __kmalloc_cache_noprof+0x189/0x420
[   21.927613]  copy_to_kernel_nofault_oob+0x12f/0x560
[   21.928015]  kunit_try_run_case+0x1a5/0x480
[   21.928334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.928863]  kthread+0x337/0x6f0
[   21.929133]  ret_from_fork+0x41/0x80
[   21.929757]  ret_from_fork_asm+0x1a/0x30
[   21.930074] 
[   21.930373] The buggy address belongs to the object at ffff888102b31b00
[   21.930373]  which belongs to the cache kmalloc-128 of size 128
[   21.931198] The buggy address is located 0 bytes to the right of
[   21.931198]  allocated 120-byte region [ffff888102b31b00, ffff888102b31b78)
[   21.932023] 
[   21.932247] The buggy address belongs to the physical page:
[   21.932580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   21.932974] flags: 0x200000000000000(node=0|zone=2)
[   21.933219] page_type: f5(slab)
[   21.933421] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.934143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.935220] page dumped because: kasan: bad access detected
[   21.935656] 
[   21.935861] Memory state around the buggy address:
[   21.936182]  ffff888102b31a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.936663]  ffff888102b31a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.937062] >ffff888102b31b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.937557]                                                                 ^
[   21.938017]  ffff888102b31b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.938490]  ffff888102b31c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.938893] ==================================================================