Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   61.917552] ==================================================================
[   61.931759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   61.939136] Read of size 8 at addr ffff000802678c78 by task kunit_try_catch/330
[   61.946427] 
[   61.947912] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.947969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.947987] Hardware name: WinLink E850-96 board (DT)
[   61.948010] Call trace:
[   61.948026]  show_stack+0x20/0x38 (C)
[   61.948062]  dump_stack_lvl+0x8c/0xd0
[   61.948103]  print_report+0x118/0x608
[   61.948136]  kasan_report+0xdc/0x128
[   61.948167]  __asan_report_load8_noabort+0x20/0x30
[   61.948202]  copy_to_kernel_nofault+0x204/0x250
[   61.948232]  copy_to_kernel_nofault_oob+0x158/0x418
[   61.948271]  kunit_try_run_case+0x170/0x3f0
[   61.948307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.948346]  kthread+0x328/0x630
[   61.948380]  ret_from_fork+0x10/0x20
[   61.948416] 
[   62.015956] Allocated by task 330:
[   62.019342]  kasan_save_stack+0x3c/0x68
[   62.023159]  kasan_save_track+0x20/0x40
[   62.026978]  kasan_save_alloc_info+0x40/0x58
[   62.031232]  __kasan_kmalloc+0xd4/0xd8
[   62.034964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.039478]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.044252]  kunit_try_run_case+0x170/0x3f0
[   62.048419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.053888]  kthread+0x328/0x630
[   62.057099]  ret_from_fork+0x10/0x20
[   62.060658] 
[   62.062136] The buggy address belongs to the object at ffff000802678c00
[   62.062136]  which belongs to the cache kmalloc-128 of size 128
[   62.074638] The buggy address is located 0 bytes to the right of
[   62.074638]  allocated 120-byte region [ffff000802678c00, ffff000802678c78)
[   62.087568] 
[   62.089047] The buggy address belongs to the physical page:
[   62.094605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   62.102587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.110225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.117168] page_type: f5(slab)
[   62.120308] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.128025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.135753] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.143563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.151376] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   62.159188] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.166993] page dumped because: kasan: bad access detected
[   62.172549] 
[   62.174024] Memory state around the buggy address:
[   62.178807]  ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.186008]  ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.193215] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.200413]                                                                 ^
[   62.207535]  ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.214740]  ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.221942] ==================================================================
[   62.229672] ==================================================================
[   62.236357] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   62.243643] Write of size 8 at addr ffff000802678c78 by task kunit_try_catch/330
[   62.251020] 
[   62.252507] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.252560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.252579] Hardware name: WinLink E850-96 board (DT)
[   62.252601] Call trace:
[   62.252615]  show_stack+0x20/0x38 (C)
[   62.252651]  dump_stack_lvl+0x8c/0xd0
[   62.252690]  print_report+0x118/0x608
[   62.252719]  kasan_report+0xdc/0x128
[   62.252748]  kasan_check_range+0x100/0x1a8
[   62.252784]  __kasan_check_write+0x20/0x30
[   62.252817]  copy_to_kernel_nofault+0x8c/0x250
[   62.252847]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   62.252885]  kunit_try_run_case+0x170/0x3f0
[   62.252923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.252962]  kthread+0x328/0x630
[   62.252995]  ret_from_fork+0x10/0x20
[   62.253030] 
[   62.323849] Allocated by task 330:
[   62.327238]  kasan_save_stack+0x3c/0x68
[   62.331054]  kasan_save_track+0x20/0x40
[   62.334873]  kasan_save_alloc_info+0x40/0x58
[   62.339126]  __kasan_kmalloc+0xd4/0xd8
[   62.342859]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.347373]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.352148]  kunit_try_run_case+0x170/0x3f0
[   62.356314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.361782]  kthread+0x328/0x630
[   62.364994]  ret_from_fork+0x10/0x20
[   62.368553] 
[   62.370028] The buggy address belongs to the object at ffff000802678c00
[   62.370028]  which belongs to the cache kmalloc-128 of size 128
[   62.382530] The buggy address is located 0 bytes to the right of
[   62.382530]  allocated 120-byte region [ffff000802678c00, ffff000802678c78)
[   62.395462] 
[   62.396940] The buggy address belongs to the physical page:
[   62.402498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   62.410481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.418120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.425064] page_type: f5(slab)
[   62.428201] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.435920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.443648] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.451458] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.459271] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   62.467083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.474888] page dumped because: kasan: bad access detected
[   62.480444] 
[   62.481919] Memory state around the buggy address:
[   62.486701]  ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.493902]  ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.501109] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.508308]                                                                 ^
[   62.515430]  ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.522636]  ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.529837] ==================================================================

[   18.627995] ==================================================================
[   18.629125] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   18.629247] Read of size 8 at addr fff00000c793a478 by task kunit_try_catch/286
[   18.629399] 
[   18.629581] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.629791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.629839] Hardware name: linux,dummy-virt (DT)
[   18.629874] Call trace:
[   18.630455]  show_stack+0x20/0x38 (C)
[   18.630576]  dump_stack_lvl+0x8c/0xd0
[   18.630680]  print_report+0x118/0x608
[   18.630852]  kasan_report+0xdc/0x128
[   18.630972]  __asan_report_load8_noabort+0x20/0x30
[   18.631110]  copy_to_kernel_nofault+0x204/0x250
[   18.631246]  copy_to_kernel_nofault_oob+0x158/0x418
[   18.631320]  kunit_try_run_case+0x170/0x3f0
[   18.631660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.631897]  kthread+0x328/0x630
[   18.632354]  ret_from_fork+0x10/0x20
[   18.632535] 
[   18.632578] Allocated by task 286:
[   18.632608]  kasan_save_stack+0x3c/0x68
[   18.632665]  kasan_save_track+0x20/0x40
[   18.632703]  kasan_save_alloc_info+0x40/0x58
[   18.632985]  __kasan_kmalloc+0xd4/0xd8
[   18.633035]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.633372]  copy_to_kernel_nofault_oob+0xc8/0x418
[   18.633788]  kunit_try_run_case+0x170/0x3f0
[   18.633910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.634125]  kthread+0x328/0x630
[   18.634309]  ret_from_fork+0x10/0x20
[   18.634420] 
[   18.634510] The buggy address belongs to the object at fff00000c793a400
[   18.634510]  which belongs to the cache kmalloc-128 of size 128
[   18.634842] The buggy address is located 0 bytes to the right of
[   18.634842]  allocated 120-byte region [fff00000c793a400, fff00000c793a478)
[   18.634996] 
[   18.635024] The buggy address belongs to the physical page:
[   18.635081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.635501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.635855] page_type: f5(slab)
[   18.636004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.636188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.636413] page dumped because: kasan: bad access detected
[   18.636543] 
[   18.636571] Memory state around the buggy address:
[   18.636606]  fff00000c793a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.636666]  fff00000c793a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.636722] >fff00000c793a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.636770]                                                                 ^
[   18.636815]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.636868]  fff00000c793a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.636909] ==================================================================
[   18.641536] ==================================================================
[   18.641674] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   18.641735] Write of size 8 at addr fff00000c793a478 by task kunit_try_catch/286
[   18.641947] 
[   18.642113] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.642200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.642229] Hardware name: linux,dummy-virt (DT)
[   18.642309] Call trace:
[   18.642339]  show_stack+0x20/0x38 (C)
[   18.642390]  dump_stack_lvl+0x8c/0xd0
[   18.642450]  print_report+0x118/0x608
[   18.642497]  kasan_report+0xdc/0x128
[   18.642544]  kasan_check_range+0x100/0x1a8
[   18.642590]  __kasan_check_write+0x20/0x30
[   18.642986]  copy_to_kernel_nofault+0x8c/0x250
[   18.643438]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   18.643683]  kunit_try_run_case+0x170/0x3f0
[   18.643746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.643820]  kthread+0x328/0x630
[   18.643872]  ret_from_fork+0x10/0x20
[   18.643920] 
[   18.643942] Allocated by task 286:
[   18.644373]  kasan_save_stack+0x3c/0x68
[   18.644425]  kasan_save_track+0x20/0x40
[   18.644490]  kasan_save_alloc_info+0x40/0x58
[   18.644552]  __kasan_kmalloc+0xd4/0xd8
[   18.644886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.644988]  copy_to_kernel_nofault_oob+0xc8/0x418
[   18.645035]  kunit_try_run_case+0x170/0x3f0
[   18.645642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.645804]  kthread+0x328/0x630
[   18.645965]  ret_from_fork+0x10/0x20
[   18.646092] 
[   18.646350] The buggy address belongs to the object at fff00000c793a400
[   18.646350]  which belongs to the cache kmalloc-128 of size 128
[   18.646548] The buggy address is located 0 bytes to the right of
[   18.646548]  allocated 120-byte region [fff00000c793a400, fff00000c793a478)
[   18.646785] 
[   18.646829] The buggy address belongs to the physical page:
[   18.646881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.647068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.647262] page_type: f5(slab)
[   18.647344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.647478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.647988] page dumped because: kasan: bad access detected
[   18.648104] 
[   18.648253] Memory state around the buggy address:
[   18.648403]  fff00000c793a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.648455]  fff00000c793a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.648501] >fff00000c793a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.648559]                                                                 ^
[   18.648752]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.648948]  fff00000c793a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.649042] ==================================================================

[   19.633732] ==================================================================
[   19.634789] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   19.637381] Write of size 8 at addr ffff8881025faa78 by task kunit_try_catch/302
[   19.638002] 
[   19.638409] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.638675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.638706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.638736] Call Trace:
[   19.638760]  <TASK>
[   19.638790]  dump_stack_lvl+0x73/0xb0
[   19.638836]  print_report+0xd1/0x650
[   19.638866]  ? __virt_addr_valid+0x1db/0x2d0
[   19.638894]  ? copy_to_kernel_nofault+0x99/0x260
[   19.638919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.638946]  ? copy_to_kernel_nofault+0x99/0x260
[   19.638970]  kasan_report+0x141/0x180
[   19.638998]  ? copy_to_kernel_nofault+0x99/0x260
[   19.639026]  kasan_check_range+0x10c/0x1c0
[   19.639051]  __kasan_check_write+0x18/0x20
[   19.639097]  copy_to_kernel_nofault+0x99/0x260
[   19.639123]  copy_to_kernel_nofault_oob+0x288/0x560
[   19.639152]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.639179]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.639210]  ? trace_hardirqs_on+0x37/0xe0
[   19.639246]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.639278]  kunit_try_run_case+0x1a5/0x480
[   19.639309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.639353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.639387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.639416]  ? __kthread_parkme+0x82/0x180
[   19.639443]  ? preempt_count_sub+0x50/0x80
[   19.639474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.639502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.639530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.639571]  kthread+0x337/0x6f0
[   19.639594]  ? trace_preempt_on+0x20/0xc0
[   19.639621]  ? __pfx_kthread+0x10/0x10
[   19.639644]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.639670]  ? calculate_sigpending+0x7b/0xa0
[   19.639696]  ? __pfx_kthread+0x10/0x10
[   19.639718]  ret_from_fork+0x41/0x80
[   19.639744]  ? __pfx_kthread+0x10/0x10
[   19.639766]  ret_from_fork_asm+0x1a/0x30
[   19.639802]  </TASK>
[   19.639816] 
[   19.652719] Allocated by task 302:
[   19.653376]  kasan_save_stack+0x45/0x70
[   19.653869]  kasan_save_track+0x18/0x40
[   19.654099]  kasan_save_alloc_info+0x3b/0x50
[   19.654666]  __kasan_kmalloc+0xb7/0xc0
[   19.654990]  __kmalloc_cache_noprof+0x189/0x420
[   19.655290]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.655588]  kunit_try_run_case+0x1a5/0x480
[   19.655896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.656684]  kthread+0x337/0x6f0
[   19.656868]  ret_from_fork+0x41/0x80
[   19.657230]  ret_from_fork_asm+0x1a/0x30
[   19.657813] 
[   19.658145] The buggy address belongs to the object at ffff8881025faa00
[   19.658145]  which belongs to the cache kmalloc-128 of size 128
[   19.658799] The buggy address is located 0 bytes to the right of
[   19.658799]  allocated 120-byte region [ffff8881025faa00, ffff8881025faa78)
[   19.659905] 
[   19.660029] The buggy address belongs to the physical page:
[   19.660492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   19.661377] flags: 0x200000000000000(node=0|zone=2)
[   19.661850] page_type: f5(slab)
[   19.662194] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.662807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.663275] page dumped because: kasan: bad access detected
[   19.663694] 
[   19.663878] Memory state around the buggy address:
[   19.664523]  ffff8881025fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.664900]  ffff8881025fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665525] >ffff8881025faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.665866]                                                                 ^
[   19.666218]  ffff8881025faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.666706]  ffff8881025fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.666998] ==================================================================
[   19.605796] ==================================================================
[   19.606523] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   19.606941] Read of size 8 at addr ffff8881025faa78 by task kunit_try_catch/302
[   19.607934] 
[   19.608603] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.608739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.608771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.608837] Call Trace:
[   19.608875]  <TASK>
[   19.608916]  dump_stack_lvl+0x73/0xb0
[   19.608977]  print_report+0xd1/0x650
[   19.609028]  ? __virt_addr_valid+0x1db/0x2d0
[   19.609106]  ? copy_to_kernel_nofault+0x225/0x260
[   19.609136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.609166]  ? copy_to_kernel_nofault+0x225/0x260
[   19.609191]  kasan_report+0x141/0x180
[   19.609219]  ? copy_to_kernel_nofault+0x225/0x260
[   19.609250]  __asan_report_load8_noabort+0x18/0x20
[   19.609275]  copy_to_kernel_nofault+0x225/0x260
[   19.609302]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   19.609331]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.609381]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.609414]  ? trace_hardirqs_on+0x37/0xe0
[   19.609452]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   19.609485]  kunit_try_run_case+0x1a5/0x480
[   19.609518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.609544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.609575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.609605]  ? __kthread_parkme+0x82/0x180
[   19.609635]  ? preempt_count_sub+0x50/0x80
[   19.609667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.609695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.609723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.609751]  kthread+0x337/0x6f0
[   19.609772]  ? trace_preempt_on+0x20/0xc0
[   19.609799]  ? __pfx_kthread+0x10/0x10
[   19.609821]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.609849]  ? calculate_sigpending+0x7b/0xa0
[   19.609876]  ? __pfx_kthread+0x10/0x10
[   19.609899]  ret_from_fork+0x41/0x80
[   19.609925]  ? __pfx_kthread+0x10/0x10
[   19.609947]  ret_from_fork_asm+0x1a/0x30
[   19.609985]  </TASK>
[   19.610001] 
[   19.619946] Allocated by task 302:
[   19.620297]  kasan_save_stack+0x45/0x70
[   19.620660]  kasan_save_track+0x18/0x40
[   19.620899]  kasan_save_alloc_info+0x3b/0x50
[   19.621245]  __kasan_kmalloc+0xb7/0xc0
[   19.621530]  __kmalloc_cache_noprof+0x189/0x420
[   19.621825]  copy_to_kernel_nofault_oob+0x12f/0x560
[   19.622058]  kunit_try_run_case+0x1a5/0x480
[   19.622267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.622757]  kthread+0x337/0x6f0
[   19.623066]  ret_from_fork+0x41/0x80
[   19.623490]  ret_from_fork_asm+0x1a/0x30
[   19.623731] 
[   19.623855] The buggy address belongs to the object at ffff8881025faa00
[   19.623855]  which belongs to the cache kmalloc-128 of size 128
[   19.624940] The buggy address is located 0 bytes to the right of
[   19.624940]  allocated 120-byte region [ffff8881025faa00, ffff8881025faa78)
[   19.625462] 
[   19.625681] The buggy address belongs to the physical page:
[   19.626024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   19.626567] flags: 0x200000000000000(node=0|zone=2)
[   19.626903] page_type: f5(slab)
[   19.627265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.627618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.628030] page dumped because: kasan: bad access detected
[   19.628255] 
[   19.628397] Memory state around the buggy address:
[   19.628615]  ffff8881025fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.628888]  ffff8881025fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.629176] >ffff8881025faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.629584]                                                                 ^
[   19.630173]  ffff8881025faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630754]  ffff8881025fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.631425] ==================================================================