Date
June 24, 2025, 11:37 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 77.551244] ================================================================== [ 77.558555] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 77.565528] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 77.573192] [ 77.574718] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.574746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.574754] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.574765] Call trace: [ 77.574771] show_stack+0x20/0x38 (C) [ 77.574788] dump_stack_lvl+0x8c/0xd0 [ 77.574806] print_report+0x118/0x608 [ 77.574825] kasan_report+0xdc/0x128 [ 77.574844] kasan_check_range+0x100/0x1a8 [ 77.574864] __kasan_check_write+0x20/0x30 [ 77.574880] strncpy_from_user+0x3c/0x2a0 [ 77.574896] copy_user_test_oob+0x5c0/0xec8 [ 77.574914] kunit_try_run_case+0x170/0x3f0 [ 77.574933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.574954] kthread+0x328/0x630 [ 77.574968] ret_from_fork+0x10/0x20 [ 77.574985] [ 77.648151] Allocated by task 383: [ 77.651607] kasan_save_stack+0x3c/0x68 [ 77.655506] kasan_save_track+0x20/0x40 [ 77.659404] kasan_save_alloc_info+0x40/0x58 [ 77.663742] __kasan_kmalloc+0xd4/0xd8 [ 77.667552] __kmalloc_noprof+0x198/0x4c8 [ 77.671622] kunit_kmalloc_array+0x34/0x88 [ 77.675789] copy_user_test_oob+0xac/0xec8 [ 77.679955] kunit_try_run_case+0x170/0x3f0 [ 77.684210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.689778] kthread+0x328/0x630 [ 77.693064] ret_from_fork+0x10/0x20 [ 77.696699] [ 77.698223] The buggy address belongs to the object at ffff0000947c2c00 [ 77.698223] which belongs to the cache kmalloc-128 of size 128 [ 77.710875] The buggy address is located 0 bytes inside of [ 77.710875] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.723445] [ 77.724969] The buggy address belongs to the physical page: [ 77.730614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.738720] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.746467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.753521] page_type: f5(slab) [ 77.756720] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.764557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.772392] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.780314] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.788237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.796159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.804076] page dumped because: kasan: bad access detected [ 77.809723] [ 77.811246] Memory state around the buggy address: [ 77.816101] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.823415] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.830727] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.838037] ^ [ 77.845261] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.852574] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.859884] ================================================================== [ 77.867256] ================================================================== [ 77.874567] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 77.881624] Write of size 1 at addr ffff0000947c2c78 by task kunit_try_catch/383 [ 77.889113] [ 77.890648] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.890678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.890686] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.890697] Call trace: [ 77.890702] show_stack+0x20/0x38 (C) [ 77.890719] dump_stack_lvl+0x8c/0xd0 [ 77.890738] print_report+0x118/0x608 [ 77.890757] kasan_report+0xdc/0x128 [ 77.890776] __asan_report_store1_noabort+0x20/0x30 [ 77.890793] strncpy_from_user+0x270/0x2a0 [ 77.890810] copy_user_test_oob+0x5c0/0xec8 [ 77.890829] kunit_try_run_case+0x170/0x3f0 [ 77.890846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.890866] kthread+0x328/0x630 [ 77.890881] ret_from_fork+0x10/0x20 [ 77.890897] [ 77.960792] Allocated by task 383: [ 77.964248] kasan_save_stack+0x3c/0x68 [ 77.968146] kasan_save_track+0x20/0x40 [ 77.972044] kasan_save_alloc_info+0x40/0x58 [ 77.976382] __kasan_kmalloc+0xd4/0xd8 [ 77.980191] __kmalloc_noprof+0x198/0x4c8 [ 77.984261] kunit_kmalloc_array+0x34/0x88 [ 77.988417] copy_user_test_oob+0xac/0xec8 [ 77.992585] kunit_try_run_case+0x170/0x3f0 [ 77.996837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.002404] kthread+0x328/0x630 [ 78.005691] ret_from_fork+0x10/0x20 [ 78.009325] [ 78.010848] The buggy address belongs to the object at ffff0000947c2c00 [ 78.010848] which belongs to the cache kmalloc-128 of size 128 [ 78.023500] The buggy address is located 0 bytes to the right of [ 78.023500] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 78.036589] [ 78.038112] The buggy address belongs to the physical page: [ 78.043758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 78.051864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 78.059611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 78.066664] page_type: f5(slab) [ 78.069862] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 78.077699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.085536] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 78.093459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.101382] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 78.109303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 78.117222] page dumped because: kasan: bad access detected [ 78.122867] [ 78.124390] Memory state around the buggy address: [ 78.129246] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.136558] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.143870] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.151180] ^ [ 78.158403] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.165714] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.173024] ==================================================================
[ 37.944956] ================================================================== [ 37.945083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 37.945213] Write of size 1 at addr fff00000c77e6a78 by task kunit_try_catch/296 [ 37.945341] [ 37.945442] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.945662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.945753] Hardware name: linux,dummy-virt (DT) [ 37.945844] Call trace: [ 37.945923] show_stack+0x20/0x38 (C) [ 37.946066] dump_stack_lvl+0x8c/0xd0 [ 37.946289] print_report+0x118/0x608 [ 37.946431] kasan_report+0xdc/0x128 [ 37.946618] __asan_report_store1_noabort+0x20/0x30 [ 37.946762] strncpy_from_user+0x270/0x2a0 [ 37.946901] copy_user_test_oob+0x5c0/0xec8 [ 37.947024] kunit_try_run_case+0x170/0x3f0 [ 37.947160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.947292] kthread+0x328/0x630 [ 37.947397] ret_from_fork+0x10/0x20 [ 37.947517] [ 37.947570] Allocated by task 296: [ 37.947639] kasan_save_stack+0x3c/0x68 [ 37.947737] kasan_save_track+0x20/0x40 [ 37.947838] kasan_save_alloc_info+0x40/0x58 [ 37.947960] __kasan_kmalloc+0xd4/0xd8 [ 37.948133] __kmalloc_noprof+0x198/0x4c8 [ 37.948337] kunit_kmalloc_array+0x34/0x88 [ 37.948461] copy_user_test_oob+0xac/0xec8 [ 37.948578] kunit_try_run_case+0x170/0x3f0 [ 37.948715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.948939] kthread+0x328/0x630 [ 37.949141] ret_from_fork+0x10/0x20 [ 37.949260] [ 37.949318] The buggy address belongs to the object at fff00000c77e6a00 [ 37.949318] which belongs to the cache kmalloc-128 of size 128 [ 37.949460] The buggy address is located 0 bytes to the right of [ 37.949460] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.949614] [ 37.949692] The buggy address belongs to the physical page: [ 37.949785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.949991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.950268] page_type: f5(slab) [ 37.950457] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.950590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.950693] page dumped because: kasan: bad access detected [ 37.950834] [ 37.950962] Memory state around the buggy address: [ 37.951081] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.951271] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.951382] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.951480] ^ [ 37.951609] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.951944] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.952226] ================================================================== [ 37.918764] ================================================================== [ 37.918866] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 37.919368] Write of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.920429] [ 37.920591] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.921423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.921503] Hardware name: linux,dummy-virt (DT) [ 37.921966] Call trace: [ 37.922496] show_stack+0x20/0x38 (C) [ 37.923288] dump_stack_lvl+0x8c/0xd0 [ 37.924059] print_report+0x118/0x608 [ 37.924236] kasan_report+0xdc/0x128 [ 37.924809] kasan_check_range+0x100/0x1a8 [ 37.925394] __kasan_check_write+0x20/0x30 [ 37.925783] strncpy_from_user+0x3c/0x2a0 [ 37.925930] copy_user_test_oob+0x5c0/0xec8 [ 37.926057] kunit_try_run_case+0x170/0x3f0 [ 37.927052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.927971] kthread+0x328/0x630 [ 37.928096] ret_from_fork+0x10/0x20 [ 37.928824] [ 37.928919] Allocated by task 296: [ 37.929009] kasan_save_stack+0x3c/0x68 [ 37.929118] kasan_save_track+0x20/0x40 [ 37.930093] kasan_save_alloc_info+0x40/0x58 [ 37.930564] __kasan_kmalloc+0xd4/0xd8 [ 37.931067] __kmalloc_noprof+0x198/0x4c8 [ 37.931236] kunit_kmalloc_array+0x34/0x88 [ 37.931350] copy_user_test_oob+0xac/0xec8 [ 37.931462] kunit_try_run_case+0x170/0x3f0 [ 37.931948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.932698] kthread+0x328/0x630 [ 37.933388] ret_from_fork+0x10/0x20 [ 37.933510] [ 37.933800] The buggy address belongs to the object at fff00000c77e6a00 [ 37.933800] which belongs to the cache kmalloc-128 of size 128 [ 37.934275] The buggy address is located 0 bytes inside of [ 37.934275] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.934815] [ 37.934878] The buggy address belongs to the physical page: [ 37.934980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.935115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.935245] page_type: f5(slab) [ 37.935925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.936142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.936254] page dumped because: kasan: bad access detected [ 37.936337] [ 37.936388] Memory state around the buggy address: [ 37.936926] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.937744] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.938112] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.938223] ^ [ 37.939130] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.939285] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.939604] ==================================================================
[ 35.270338] ================================================================== [ 35.271302] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 35.272001] Write of size 1 at addr ffff888102df6578 by task kunit_try_catch/315 [ 35.272580] [ 35.272826] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.272943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.272980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.273034] Call Trace: [ 35.273079] <TASK> [ 35.273124] dump_stack_lvl+0x73/0xb0 [ 35.273201] print_report+0xd1/0x650 [ 35.273261] ? __virt_addr_valid+0x1db/0x2d0 [ 35.273328] ? strncpy_from_user+0x1a5/0x1d0 [ 35.273390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.273462] ? strncpy_from_user+0x1a5/0x1d0 [ 35.273526] kasan_report+0x141/0x180 [ 35.273607] ? strncpy_from_user+0x1a5/0x1d0 [ 35.273719] __asan_report_store1_noabort+0x1b/0x30 [ 35.273786] strncpy_from_user+0x1a5/0x1d0 [ 35.273858] copy_user_test_oob+0x760/0x10f0 [ 35.273924] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.273983] ? finish_task_switch.isra.0+0x153/0x700 [ 35.274043] ? __switch_to+0x47/0xf50 [ 35.274109] ? __schedule+0x10cc/0x2b60 [ 35.274178] ? __pfx_read_tsc+0x10/0x10 [ 35.274242] ? ktime_get_ts64+0x86/0x230 [ 35.274303] kunit_try_run_case+0x1a5/0x480 [ 35.274375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.274414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.274451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.274486] ? __kthread_parkme+0x82/0x180 [ 35.274515] ? preempt_count_sub+0x50/0x80 [ 35.274569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.274606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.274664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.274699] kthread+0x337/0x6f0 [ 35.274728] ? trace_preempt_on+0x20/0xc0 [ 35.274761] ? __pfx_kthread+0x10/0x10 [ 35.274790] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.274821] ? calculate_sigpending+0x7b/0xa0 [ 35.274854] ? __pfx_kthread+0x10/0x10 [ 35.274884] ret_from_fork+0x116/0x1d0 [ 35.274910] ? __pfx_kthread+0x10/0x10 [ 35.274939] ret_from_fork_asm+0x1a/0x30 [ 35.274980] </TASK> [ 35.274996] [ 35.289498] Allocated by task 315: [ 35.289887] kasan_save_stack+0x45/0x70 [ 35.290307] kasan_save_track+0x18/0x40 [ 35.290571] kasan_save_alloc_info+0x3b/0x50 [ 35.291028] __kasan_kmalloc+0xb7/0xc0 [ 35.291424] __kmalloc_noprof+0x1c9/0x500 [ 35.291953] kunit_kmalloc_array+0x25/0x60 [ 35.292301] copy_user_test_oob+0xab/0x10f0 [ 35.292827] kunit_try_run_case+0x1a5/0x480 [ 35.293105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.293405] kthread+0x337/0x6f0 [ 35.293742] ret_from_fork+0x116/0x1d0 [ 35.294151] ret_from_fork_asm+0x1a/0x30 [ 35.294652] [ 35.294960] The buggy address belongs to the object at ffff888102df6500 [ 35.294960] which belongs to the cache kmalloc-128 of size 128 [ 35.296085] The buggy address is located 0 bytes to the right of [ 35.296085] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.297049] [ 35.297202] The buggy address belongs to the physical page: [ 35.297477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.298227] flags: 0x200000000000000(node=0|zone=2) [ 35.298850] page_type: f5(slab) [ 35.299200] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.299968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.300576] page dumped because: kasan: bad access detected [ 35.300899] [ 35.301030] Memory state around the buggy address: [ 35.301313] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.302035] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.302792] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.303507] ^ [ 35.304215] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.304718] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.305422] ================================================================== [ 35.231756] ================================================================== [ 35.232461] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 35.233140] Write of size 121 at addr ffff888102df6500 by task kunit_try_catch/315 [ 35.233802] [ 35.233996] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.234114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.234147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.234197] Call Trace: [ 35.234239] <TASK> [ 35.234280] dump_stack_lvl+0x73/0xb0 [ 35.234349] print_report+0xd1/0x650 [ 35.234401] ? __virt_addr_valid+0x1db/0x2d0 [ 35.234461] ? strncpy_from_user+0x2e/0x1d0 [ 35.234526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.234617] ? strncpy_from_user+0x2e/0x1d0 [ 35.234724] kasan_report+0x141/0x180 [ 35.234791] ? strncpy_from_user+0x2e/0x1d0 [ 35.234870] kasan_check_range+0x10c/0x1c0 [ 35.234939] __kasan_check_write+0x18/0x20 [ 35.235005] strncpy_from_user+0x2e/0x1d0 [ 35.235070] ? __kasan_check_read+0x15/0x20 [ 35.235140] copy_user_test_oob+0x760/0x10f0 [ 35.235211] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.235275] ? finish_task_switch.isra.0+0x153/0x700 [ 35.235341] ? __switch_to+0x47/0xf50 [ 35.235413] ? __schedule+0x10cc/0x2b60 [ 35.235483] ? __pfx_read_tsc+0x10/0x10 [ 35.235562] ? ktime_get_ts64+0x86/0x230 [ 35.235669] kunit_try_run_case+0x1a5/0x480 [ 35.235747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.235813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.235893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.235962] ? __kthread_parkme+0x82/0x180 [ 35.236024] ? preempt_count_sub+0x50/0x80 [ 35.236092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.236162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.236228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.236291] kthread+0x337/0x6f0 [ 35.236345] ? trace_preempt_on+0x20/0xc0 [ 35.236410] ? __pfx_kthread+0x10/0x10 [ 35.236472] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.236550] ? calculate_sigpending+0x7b/0xa0 [ 35.236611] ? __pfx_kthread+0x10/0x10 [ 35.236713] ret_from_fork+0x116/0x1d0 [ 35.236774] ? __pfx_kthread+0x10/0x10 [ 35.236836] ret_from_fork_asm+0x1a/0x30 [ 35.236922] </TASK> [ 35.236955] [ 35.249362] Allocated by task 315: [ 35.249789] kasan_save_stack+0x45/0x70 [ 35.250231] kasan_save_track+0x18/0x40 [ 35.250683] kasan_save_alloc_info+0x3b/0x50 [ 35.251085] __kasan_kmalloc+0xb7/0xc0 [ 35.251396] __kmalloc_noprof+0x1c9/0x500 [ 35.251712] kunit_kmalloc_array+0x25/0x60 [ 35.252005] copy_user_test_oob+0xab/0x10f0 [ 35.252415] kunit_try_run_case+0x1a5/0x480 [ 35.253673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.254220] kthread+0x337/0x6f0 [ 35.254521] ret_from_fork+0x116/0x1d0 [ 35.255990] ret_from_fork_asm+0x1a/0x30 [ 35.257002] [ 35.257533] The buggy address belongs to the object at ffff888102df6500 [ 35.257533] which belongs to the cache kmalloc-128 of size 128 [ 35.259743] The buggy address is located 0 bytes inside of [ 35.259743] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.261184] [ 35.261339] The buggy address belongs to the physical page: [ 35.261958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.262427] flags: 0x200000000000000(node=0|zone=2) [ 35.262938] page_type: f5(slab) [ 35.263466] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.264217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.264926] page dumped because: kasan: bad access detected [ 35.265300] [ 35.265508] Memory state around the buggy address: [ 35.265898] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.266364] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.266871] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.267316] ^ [ 35.267895] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.268498] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.268969] ==================================================================