Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 81.189699] ================================================================== [ 81.203873] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 81.211250] Read of size 8 at addr ffff000800de6578 by task kunit_try_catch/365 [ 81.218539] [ 81.220024] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 81.220085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.220104] Hardware name: WinLink E850-96 board (DT) [ 81.220128] Call trace: [ 81.220144] show_stack+0x20/0x38 (C) [ 81.220183] dump_stack_lvl+0x8c/0xd0 [ 81.220217] print_report+0x118/0x5d0 [ 81.220249] kasan_report+0xdc/0x128 [ 81.220279] __asan_report_load8_noabort+0x20/0x30 [ 81.220317] copy_to_kernel_nofault+0x204/0x250 [ 81.220356] copy_to_kernel_nofault_oob+0x158/0x418 [ 81.220393] kunit_try_run_case+0x170/0x3f0 [ 81.220435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.220470] kthread+0x328/0x630 [ 81.220499] ret_from_fork+0x10/0x20 [ 81.220536] [ 81.289285] Allocated by task 365: [ 81.292673] kasan_save_stack+0x3c/0x68 [ 81.296488] kasan_save_track+0x20/0x40 [ 81.300307] kasan_save_alloc_info+0x40/0x58 [ 81.304561] __kasan_kmalloc+0xd4/0xd8 [ 81.308293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.312807] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.317581] kunit_try_run_case+0x170/0x3f0 [ 81.321749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.327218] kthread+0x328/0x630 [ 81.330428] ret_from_fork+0x10/0x20 [ 81.333987] [ 81.335465] The buggy address belongs to the object at ffff000800de6500 [ 81.335465] which belongs to the cache kmalloc-128 of size 128 [ 81.347965] The buggy address is located 0 bytes to the right of [ 81.347965] allocated 120-byte region [ffff000800de6500, ffff000800de6578) [ 81.360896] [ 81.362375] The buggy address belongs to the physical page: [ 81.367932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6 [ 81.375917] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.383555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.390500] page_type: f5(slab) [ 81.393635] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.401354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.409083] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.416891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.424705] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff [ 81.432516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.440322] page dumped because: kasan: bad access detected [ 81.445878] [ 81.447353] Memory state around the buggy address: [ 81.452133] ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.459336] ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.466542] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.473742] ^ [ 81.480864] ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.488070] ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.495271] ================================================================== [ 81.502708] ================================================================== [ 81.509686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 81.516971] Write of size 8 at addr ffff000800de6578 by task kunit_try_catch/365 [ 81.524349] [ 81.525835] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 81.525891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.525911] Hardware name: WinLink E850-96 board (DT) [ 81.525934] Call trace: [ 81.525948] show_stack+0x20/0x38 (C) [ 81.525983] dump_stack_lvl+0x8c/0xd0 [ 81.526016] print_report+0x118/0x5d0 [ 81.526049] kasan_report+0xdc/0x128 [ 81.526077] kasan_check_range+0x100/0x1a8 [ 81.526110] __kasan_check_write+0x20/0x30 [ 81.526143] copy_to_kernel_nofault+0x8c/0x250 [ 81.526179] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 81.526217] kunit_try_run_case+0x170/0x3f0 [ 81.526253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.526288] kthread+0x328/0x630 [ 81.526320] ret_from_fork+0x10/0x20 [ 81.526355] [ 81.598393] Allocated by task 365: [ 81.601781] kasan_save_stack+0x3c/0x68 [ 81.605599] kasan_save_track+0x20/0x40 [ 81.609417] kasan_save_alloc_info+0x40/0x58 [ 81.613671] __kasan_kmalloc+0xd4/0xd8 [ 81.617403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.621917] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.626691] kunit_try_run_case+0x170/0x3f0 [ 81.630858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.636326] kthread+0x328/0x630 [ 81.639538] ret_from_fork+0x10/0x20 [ 81.643097] [ 81.644574] The buggy address belongs to the object at ffff000800de6500 [ 81.644574] which belongs to the cache kmalloc-128 of size 128 [ 81.657074] The buggy address is located 0 bytes to the right of [ 81.657074] allocated 120-byte region [ffff000800de6500, ffff000800de6578) [ 81.670007] [ 81.671485] The buggy address belongs to the physical page: [ 81.677042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6 [ 81.685025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.692664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.699606] page_type: f5(slab) [ 81.702743] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.710464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.718191] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.726002] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.733815] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff [ 81.741626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.749434] page dumped because: kasan: bad access detected [ 81.754988] [ 81.756463] Memory state around the buggy address: [ 81.761241] ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.768446] ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.775652] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.782852] ^ [ 81.789973] ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.797180] ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.804379] ==================================================================
[ 33.416820] ================================================================== [ 33.416882] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.417875] Write of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312 [ 33.417968] [ 33.418320] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.418809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.418894] Hardware name: linux,dummy-virt (DT) [ 33.419172] Call trace: [ 33.419252] show_stack+0x20/0x38 (C) [ 33.419373] dump_stack_lvl+0x8c/0xd0 [ 33.419478] print_report+0x118/0x5d0 [ 33.419565] kasan_report+0xdc/0x128 [ 33.419680] kasan_check_range+0x100/0x1a8 [ 33.419755] __kasan_check_write+0x20/0x30 [ 33.420061] copy_to_kernel_nofault+0x8c/0x250 [ 33.420399] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.420519] kunit_try_run_case+0x170/0x3f0 [ 33.420625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.420787] kthread+0x328/0x630 [ 33.420903] ret_from_fork+0x10/0x20 [ 33.420990] [ 33.421079] Allocated by task 312: [ 33.421150] kasan_save_stack+0x3c/0x68 [ 33.421268] kasan_save_track+0x20/0x40 [ 33.421334] kasan_save_alloc_info+0x40/0x58 [ 33.421374] __kasan_kmalloc+0xd4/0xd8 [ 33.421573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.421824] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.421898] kunit_try_run_case+0x170/0x3f0 [ 33.421950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.422162] kthread+0x328/0x630 [ 33.422363] ret_from_fork+0x10/0x20 [ 33.422505] [ 33.422575] The buggy address belongs to the object at fff00000c91a7500 [ 33.422575] which belongs to the cache kmalloc-128 of size 128 [ 33.422886] The buggy address is located 0 bytes to the right of [ 33.422886] allocated 120-byte region [fff00000c91a7500, fff00000c91a7578) [ 33.422997] [ 33.423349] The buggy address belongs to the physical page: [ 33.423483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.423588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.423799] page_type: f5(slab) [ 33.424004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.424207] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.424337] page dumped because: kasan: bad access detected [ 33.424475] [ 33.424851] Memory state around the buggy address: [ 33.424944] fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.425013] fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425276] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.425467] ^ [ 33.425519] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425750] fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425841] ================================================================== [ 33.408048] ================================================================== [ 33.408131] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.408286] Read of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312 [ 33.408367] [ 33.408437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.408583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.408612] Hardware name: linux,dummy-virt (DT) [ 33.408666] Call trace: [ 33.408704] show_stack+0x20/0x38 (C) [ 33.409068] dump_stack_lvl+0x8c/0xd0 [ 33.409147] print_report+0x118/0x5d0 [ 33.409290] kasan_report+0xdc/0x128 [ 33.409386] __asan_report_load8_noabort+0x20/0x30 [ 33.409637] copy_to_kernel_nofault+0x204/0x250 [ 33.409693] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.409745] kunit_try_run_case+0x170/0x3f0 [ 33.410199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.410358] kthread+0x328/0x630 [ 33.410414] ret_from_fork+0x10/0x20 [ 33.410499] [ 33.410851] Allocated by task 312: [ 33.410952] kasan_save_stack+0x3c/0x68 [ 33.411046] kasan_save_track+0x20/0x40 [ 33.411180] kasan_save_alloc_info+0x40/0x58 [ 33.411269] __kasan_kmalloc+0xd4/0xd8 [ 33.411344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.411544] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.411752] kunit_try_run_case+0x170/0x3f0 [ 33.411840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.411984] kthread+0x328/0x630 [ 33.412061] ret_from_fork+0x10/0x20 [ 33.412142] [ 33.412349] The buggy address belongs to the object at fff00000c91a7500 [ 33.412349] which belongs to the cache kmalloc-128 of size 128 [ 33.412529] The buggy address is located 0 bytes to the right of [ 33.412529] allocated 120-byte region [fff00000c91a7500, fff00000c91a7578) [ 33.412688] [ 33.412770] The buggy address belongs to the physical page: [ 33.412915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.413018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.413372] page_type: f5(slab) [ 33.413468] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.413577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.413715] page dumped because: kasan: bad access detected [ 33.413777] [ 33.413954] Memory state around the buggy address: [ 33.414142] fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.414227] fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414431] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.414510] ^ [ 33.414674] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414748] fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414891] ==================================================================
[ 27.939681] ================================================================== [ 27.940036] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 27.940381] Write of size 8 at addr ffff88810622c178 by task kunit_try_catch/331 [ 27.940720] [ 27.940837] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.940887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.940901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.940924] Call Trace: [ 27.940941] <TASK> [ 27.940959] dump_stack_lvl+0x73/0xb0 [ 27.940989] print_report+0xd1/0x610 [ 27.941012] ? __virt_addr_valid+0x1db/0x2d0 [ 27.941037] ? copy_to_kernel_nofault+0x99/0x260 [ 27.941062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.941097] ? copy_to_kernel_nofault+0x99/0x260 [ 27.941121] kasan_report+0x141/0x180 [ 27.941145] ? copy_to_kernel_nofault+0x99/0x260 [ 27.941174] kasan_check_range+0x10c/0x1c0 [ 27.941199] __kasan_check_write+0x18/0x20 [ 27.941223] copy_to_kernel_nofault+0x99/0x260 [ 27.941248] copy_to_kernel_nofault_oob+0x288/0x560 [ 27.941274] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.941298] ? finish_task_switch.isra.0+0x153/0x700 [ 27.941336] ? __schedule+0x10cc/0x2b60 [ 27.941361] ? trace_hardirqs_on+0x37/0xe0 [ 27.941392] ? __pfx_read_tsc+0x10/0x10 [ 27.941428] ? ktime_get_ts64+0x86/0x230 [ 27.941454] kunit_try_run_case+0x1a5/0x480 [ 27.941478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.941499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.941523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.941548] ? __kthread_parkme+0x82/0x180 [ 27.941569] ? preempt_count_sub+0x50/0x80 [ 27.941593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.941615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.941641] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.941668] kthread+0x337/0x6f0 [ 27.941689] ? trace_preempt_on+0x20/0xc0 [ 27.941712] ? __pfx_kthread+0x10/0x10 [ 27.941743] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.941767] ? calculate_sigpending+0x7b/0xa0 [ 27.941792] ? __pfx_kthread+0x10/0x10 [ 27.941814] ret_from_fork+0x116/0x1d0 [ 27.941835] ? __pfx_kthread+0x10/0x10 [ 27.941857] ret_from_fork_asm+0x1a/0x30 [ 27.941889] </TASK> [ 27.941900] [ 27.950549] Allocated by task 331: [ 27.950669] kasan_save_stack+0x45/0x70 [ 27.950815] kasan_save_track+0x18/0x40 [ 27.950946] kasan_save_alloc_info+0x3b/0x50 [ 27.951087] __kasan_kmalloc+0xb7/0xc0 [ 27.951213] __kmalloc_cache_noprof+0x189/0x420 [ 27.951362] copy_to_kernel_nofault_oob+0x12f/0x560 [ 27.951692] kunit_try_run_case+0x1a5/0x480 [ 27.951897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.952145] kthread+0x337/0x6f0 [ 27.952375] ret_from_fork+0x116/0x1d0 [ 27.952527] ret_from_fork_asm+0x1a/0x30 [ 27.952661] [ 27.952726] The buggy address belongs to the object at ffff88810622c100 [ 27.952726] which belongs to the cache kmalloc-128 of size 128 [ 27.953267] The buggy address is located 0 bytes to the right of [ 27.953267] allocated 120-byte region [ffff88810622c100, ffff88810622c178) [ 27.953800] [ 27.953871] The buggy address belongs to the physical page: [ 27.954038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c [ 27.954315] flags: 0x200000000000000(node=0|zone=2) [ 27.954546] page_type: f5(slab) [ 27.954710] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.955397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.955854] page dumped because: kasan: bad access detected [ 27.956072] [ 27.956136] Memory state around the buggy address: [ 27.956285] ffff88810622c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.956505] ffff88810622c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.956765] >ffff88810622c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.957404] ^ [ 27.957725] ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.957952] ffff88810622c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.958160] ================================================================== [ 27.920697] ================================================================== [ 27.921359] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 27.921770] Read of size 8 at addr ffff88810622c178 by task kunit_try_catch/331 [ 27.922105] [ 27.922285] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.922344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.922358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.922383] Call Trace: [ 27.922398] <TASK> [ 27.922422] dump_stack_lvl+0x73/0xb0 [ 27.922459] print_report+0xd1/0x610 [ 27.922486] ? __virt_addr_valid+0x1db/0x2d0 [ 27.922514] ? copy_to_kernel_nofault+0x225/0x260 [ 27.922539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.922567] ? copy_to_kernel_nofault+0x225/0x260 [ 27.922591] kasan_report+0x141/0x180 [ 27.922614] ? copy_to_kernel_nofault+0x225/0x260 [ 27.922644] __asan_report_load8_noabort+0x18/0x20 [ 27.922684] copy_to_kernel_nofault+0x225/0x260 [ 27.922710] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 27.922746] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.922770] ? finish_task_switch.isra.0+0x153/0x700 [ 27.922795] ? __schedule+0x10cc/0x2b60 [ 27.922820] ? trace_hardirqs_on+0x37/0xe0 [ 27.922854] ? __pfx_read_tsc+0x10/0x10 [ 27.922878] ? ktime_get_ts64+0x86/0x230 [ 27.922906] kunit_try_run_case+0x1a5/0x480 [ 27.922932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.922955] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.922979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.923003] ? __kthread_parkme+0x82/0x180 [ 27.923026] ? preempt_count_sub+0x50/0x80 [ 27.923049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.923072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.923098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.923125] kthread+0x337/0x6f0 [ 27.923146] ? trace_preempt_on+0x20/0xc0 [ 27.923169] ? __pfx_kthread+0x10/0x10 [ 27.923191] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.923214] ? calculate_sigpending+0x7b/0xa0 [ 27.923240] ? __pfx_kthread+0x10/0x10 [ 27.923263] ret_from_fork+0x116/0x1d0 [ 27.923283] ? __pfx_kthread+0x10/0x10 [ 27.923305] ret_from_fork_asm+0x1a/0x30 [ 27.923338] </TASK> [ 27.923352] [ 27.931377] Allocated by task 331: [ 27.931532] kasan_save_stack+0x45/0x70 [ 27.931673] kasan_save_track+0x18/0x40 [ 27.931920] kasan_save_alloc_info+0x3b/0x50 [ 27.932141] __kasan_kmalloc+0xb7/0xc0 [ 27.932364] __kmalloc_cache_noprof+0x189/0x420 [ 27.932750] copy_to_kernel_nofault_oob+0x12f/0x560 [ 27.932912] kunit_try_run_case+0x1a5/0x480 [ 27.933067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.933322] kthread+0x337/0x6f0 [ 27.933548] ret_from_fork+0x116/0x1d0 [ 27.933800] ret_from_fork_asm+0x1a/0x30 [ 27.933944] [ 27.934082] The buggy address belongs to the object at ffff88810622c100 [ 27.934082] which belongs to the cache kmalloc-128 of size 128 [ 27.934533] The buggy address is located 0 bytes to the right of [ 27.934533] allocated 120-byte region [ffff88810622c100, ffff88810622c178) [ 27.935073] [ 27.935157] The buggy address belongs to the physical page: [ 27.935380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c [ 27.935902] flags: 0x200000000000000(node=0|zone=2) [ 27.936062] page_type: f5(slab) [ 27.936179] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.936407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.936626] page dumped because: kasan: bad access detected [ 27.936944] [ 27.937113] Memory state around the buggy address: [ 27.937607] ffff88810622c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.937937] ffff88810622c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.938237] >ffff88810622c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.938576] ^ [ 27.938832] ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.939040] ffff88810622c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.939247] ==================================================================