Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   83.659405] ==================================================================
[   83.666423] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   83.673275] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.680827] 
[   83.682309] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.682364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.682378] Hardware name: WinLink E850-96 board (DT)
[   83.682400] Call trace:
[   83.682415]  show_stack+0x20/0x38 (C)
[   83.682451]  dump_stack_lvl+0x8c/0xd0
[   83.682485]  print_report+0x118/0x5d0
[   83.682514]  kasan_report+0xdc/0x128
[   83.682542]  kasan_check_range+0x100/0x1a8
[   83.682574]  __kasan_check_write+0x20/0x30
[   83.682606]  strncpy_from_user+0x3c/0x2a0
[   83.682643]  copy_user_test_oob+0x5c0/0xec8
[   83.682680]  kunit_try_run_case+0x170/0x3f0
[   83.682717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.682754]  kthread+0x328/0x630
[   83.682787]  ret_from_fork+0x10/0x20
[   83.682823] 
[   83.753742] Allocated by task 369:
[   83.757131]  kasan_save_stack+0x3c/0x68
[   83.760947]  kasan_save_track+0x20/0x40
[   83.764767]  kasan_save_alloc_info+0x40/0x58
[   83.769020]  __kasan_kmalloc+0xd4/0xd8
[   83.772753]  __kmalloc_noprof+0x198/0x4c8
[   83.776745]  kunit_kmalloc_array+0x34/0x88
[   83.780827]  copy_user_test_oob+0xac/0xec8
[   83.784904]  kunit_try_run_case+0x170/0x3f0
[   83.789072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.794540]  kthread+0x328/0x630
[   83.797752]  ret_from_fork+0x10/0x20
[   83.801311] 
[   83.802788] The buggy address belongs to the object at ffff000803b98000
[   83.802788]  which belongs to the cache kmalloc-128 of size 128
[   83.815287] The buggy address is located 0 bytes inside of
[   83.815287]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.827699] 
[   83.829177] The buggy address belongs to the physical page:
[   83.834736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.842719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.850358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.857301] page_type: f5(slab)
[   83.860435] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.868157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.875883] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.883695] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.891508] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.899320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.907127] page dumped because: kasan: bad access detected
[   83.912681] 
[   83.914156] Memory state around the buggy address:
[   83.918936]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.926139]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.933346] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.940545]                                                                 ^
[   83.947667]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.954872]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.962073] ==================================================================
[   83.969472] ==================================================================
[   83.976490] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   83.983427] Write of size 1 at addr ffff000803b98078 by task kunit_try_catch/369
[   83.990805] 
[   83.992290] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.992344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.992360] Hardware name: WinLink E850-96 board (DT)
[   83.992382] Call trace:
[   83.992397]  show_stack+0x20/0x38 (C)
[   83.992429]  dump_stack_lvl+0x8c/0xd0
[   83.992465]  print_report+0x118/0x5d0
[   83.992497]  kasan_report+0xdc/0x128
[   83.992523]  __asan_report_store1_noabort+0x20/0x30
[   83.992559]  strncpy_from_user+0x270/0x2a0
[   83.992598]  copy_user_test_oob+0x5c0/0xec8
[   83.992634]  kunit_try_run_case+0x170/0x3f0
[   83.992671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.992707]  kthread+0x328/0x630
[   83.992739]  ret_from_fork+0x10/0x20
[   83.992776] 
[   84.060509] Allocated by task 369:
[   84.063897]  kasan_save_stack+0x3c/0x68
[   84.067713]  kasan_save_track+0x20/0x40
[   84.071533]  kasan_save_alloc_info+0x40/0x58
[   84.075786]  __kasan_kmalloc+0xd4/0xd8
[   84.079519]  __kmalloc_noprof+0x198/0x4c8
[   84.083512]  kunit_kmalloc_array+0x34/0x88
[   84.087593]  copy_user_test_oob+0xac/0xec8
[   84.091672]  kunit_try_run_case+0x170/0x3f0
[   84.095838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.101307]  kthread+0x328/0x630
[   84.104519]  ret_from_fork+0x10/0x20
[   84.108077] 
[   84.109555] The buggy address belongs to the object at ffff000803b98000
[   84.109555]  which belongs to the cache kmalloc-128 of size 128
[   84.122055] The buggy address is located 0 bytes to the right of
[   84.122055]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   84.134987] 
[   84.136465] The buggy address belongs to the physical page:
[   84.142022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   84.150005] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   84.157645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   84.164588] page_type: f5(slab)
[   84.167725] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   84.175444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.183171] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   84.190982] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.198795] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   84.206607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   84.214413] page dumped because: kasan: bad access detected
[   84.219968] 
[   84.221444] Memory state around the buggy address:
[   84.226222]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.233426]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.240633] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.247832]                                                                 ^
[   84.254954]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.262159]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.269360] ==================================================================

[   33.527222] ==================================================================
[   33.527293] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.527433] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316
[   33.527506] 
[   33.527574] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.527737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.527770] Hardware name: linux,dummy-virt (DT)
[   33.527804] Call trace:
[   33.527845]  show_stack+0x20/0x38 (C)
[   33.528046]  dump_stack_lvl+0x8c/0xd0
[   33.528398]  print_report+0x118/0x5d0
[   33.528639]  kasan_report+0xdc/0x128
[   33.528744]  kasan_check_range+0x100/0x1a8
[   33.528930]  __kasan_check_write+0x20/0x30
[   33.529003]  strncpy_from_user+0x3c/0x2a0
[   33.529190]  copy_user_test_oob+0x5c0/0xec8
[   33.529336]  kunit_try_run_case+0x170/0x3f0
[   33.529518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.529853]  kthread+0x328/0x630
[   33.529911]  ret_from_fork+0x10/0x20
[   33.529979] 
[   33.530022] Allocated by task 316:
[   33.530076]  kasan_save_stack+0x3c/0x68
[   33.530121]  kasan_save_track+0x20/0x40
[   33.530163]  kasan_save_alloc_info+0x40/0x58
[   33.530511]  __kasan_kmalloc+0xd4/0xd8
[   33.530848]  __kmalloc_noprof+0x198/0x4c8
[   33.531106]  kunit_kmalloc_array+0x34/0x88
[   33.531408]  copy_user_test_oob+0xac/0xec8
[   33.531573]  kunit_try_run_case+0x170/0x3f0
[   33.531710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.531785]  kthread+0x328/0x630
[   33.531822]  ret_from_fork+0x10/0x20
[   33.531888] 
[   33.532190] The buggy address belongs to the object at fff00000c91a7600
[   33.532190]  which belongs to the cache kmalloc-128 of size 128
[   33.532608] The buggy address is located 0 bytes inside of
[   33.532608]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.532698] 
[   33.532857] The buggy address belongs to the physical page:
[   33.532902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.533127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.533410] page_type: f5(slab)
[   33.533467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.533610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.533654] page dumped because: kasan: bad access detected
[   33.533946] 
[   33.533998] Memory state around the buggy address:
[   33.534109]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.534186]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534275] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.534514]                                                                 ^
[   33.534713]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534840]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.534883] ==================================================================
[   33.536419] ==================================================================
[   33.536764] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.537138] Write of size 1 at addr fff00000c91a7678 by task kunit_try_catch/316
[   33.537209] 
[   33.537245] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.537389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.537420] Hardware name: linux,dummy-virt (DT)
[   33.537453] Call trace:
[   33.537476]  show_stack+0x20/0x38 (C)
[   33.537529]  dump_stack_lvl+0x8c/0xd0
[   33.537886]  print_report+0x118/0x5d0
[   33.538221]  kasan_report+0xdc/0x128
[   33.538388]  __asan_report_store1_noabort+0x20/0x30
[   33.538676]  strncpy_from_user+0x270/0x2a0
[   33.538877]  copy_user_test_oob+0x5c0/0xec8
[   33.539219]  kunit_try_run_case+0x170/0x3f0
[   33.539346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.539444]  kthread+0x328/0x630
[   33.539523]  ret_from_fork+0x10/0x20
[   33.539707] 
[   33.539770] Allocated by task 316:
[   33.539827]  kasan_save_stack+0x3c/0x68
[   33.540021]  kasan_save_track+0x20/0x40
[   33.540239]  kasan_save_alloc_info+0x40/0x58
[   33.540317]  __kasan_kmalloc+0xd4/0xd8
[   33.540539]  __kmalloc_noprof+0x198/0x4c8
[   33.540750]  kunit_kmalloc_array+0x34/0x88
[   33.540869]  copy_user_test_oob+0xac/0xec8
[   33.541023]  kunit_try_run_case+0x170/0x3f0
[   33.541104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.541150]  kthread+0x328/0x630
[   33.541207]  ret_from_fork+0x10/0x20
[   33.541509] 
[   33.541775] The buggy address belongs to the object at fff00000c91a7600
[   33.541775]  which belongs to the cache kmalloc-128 of size 128
[   33.542006] The buggy address is located 0 bytes to the right of
[   33.542006]  allocated 120-byte region [fff00000c91a7600, fff00000c91a7678)
[   33.542083] 
[   33.542108] The buggy address belongs to the physical page:
[   33.542149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   33.542522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.542669] page_type: f5(slab)
[   33.542725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.542779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.542822] page dumped because: kasan: bad access detected
[   33.542943] 
[   33.542974] Memory state around the buggy address:
[   33.543037]  fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.543087]  fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543130] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.543177]                                                                 ^
[   33.543221]  fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543265]  fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.543304] ==================================================================

[   28.130581] ==================================================================
[   28.131150] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   28.131903] Write of size 1 at addr ffff88810622c278 by task kunit_try_catch/335
[   28.132688] 
[   28.133106] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.133168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.133184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.133210] Call Trace:
[   28.133231]  <TASK>
[   28.133285]  dump_stack_lvl+0x73/0xb0
[   28.133320]  print_report+0xd1/0x610
[   28.133344]  ? __virt_addr_valid+0x1db/0x2d0
[   28.133369]  ? strncpy_from_user+0x1a5/0x1d0
[   28.133393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.133435]  ? strncpy_from_user+0x1a5/0x1d0
[   28.133459]  kasan_report+0x141/0x180
[   28.133483]  ? strncpy_from_user+0x1a5/0x1d0
[   28.133512]  __asan_report_store1_noabort+0x1b/0x30
[   28.133538]  strncpy_from_user+0x1a5/0x1d0
[   28.133564]  copy_user_test_oob+0x760/0x10f0
[   28.133590]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.133613]  ? finish_task_switch.isra.0+0x153/0x700
[   28.133636]  ? __switch_to+0x47/0xf80
[   28.133662]  ? __schedule+0x10cc/0x2b60
[   28.133688]  ? __pfx_read_tsc+0x10/0x10
[   28.133710]  ? ktime_get_ts64+0x86/0x230
[   28.133749]  kunit_try_run_case+0x1a5/0x480
[   28.133772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.133794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.133819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.133843]  ? __kthread_parkme+0x82/0x180
[   28.133865]  ? preempt_count_sub+0x50/0x80
[   28.133889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.133912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.133939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.133965]  kthread+0x337/0x6f0
[   28.133986]  ? trace_preempt_on+0x20/0xc0
[   28.134011]  ? __pfx_kthread+0x10/0x10
[   28.134034]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.134059]  ? calculate_sigpending+0x7b/0xa0
[   28.134086]  ? __pfx_kthread+0x10/0x10
[   28.134110]  ret_from_fork+0x116/0x1d0
[   28.134129]  ? __pfx_kthread+0x10/0x10
[   28.134152]  ret_from_fork_asm+0x1a/0x30
[   28.134183]  </TASK>
[   28.134195] 
[   28.144839] Allocated by task 335:
[   28.145013]  kasan_save_stack+0x45/0x70
[   28.145206]  kasan_save_track+0x18/0x40
[   28.145383]  kasan_save_alloc_info+0x3b/0x50
[   28.145852]  __kasan_kmalloc+0xb7/0xc0
[   28.146148]  __kmalloc_noprof+0x1c9/0x500
[   28.146459]  kunit_kmalloc_array+0x25/0x60
[   28.146850]  copy_user_test_oob+0xab/0x10f0
[   28.147058]  kunit_try_run_case+0x1a5/0x480
[   28.147243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.147759]  kthread+0x337/0x6f0
[   28.148021]  ret_from_fork+0x116/0x1d0
[   28.148280]  ret_from_fork_asm+0x1a/0x30
[   28.148587] 
[   28.148846] The buggy address belongs to the object at ffff88810622c200
[   28.148846]  which belongs to the cache kmalloc-128 of size 128
[   28.149355] The buggy address is located 0 bytes to the right of
[   28.149355]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.150195] 
[   28.150413] The buggy address belongs to the physical page:
[   28.150663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.150999] flags: 0x200000000000000(node=0|zone=2)
[   28.151211] page_type: f5(slab)
[   28.151363] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.152018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.152608] page dumped because: kasan: bad access detected
[   28.152979] 
[   28.153212] Memory state around the buggy address:
[   28.153572]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.153876]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.154158] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.154710]                                                                 ^
[   28.155181]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.155693]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.156193] ==================================================================
[   28.104490] ==================================================================
[   28.104832] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   28.105129] Write of size 121 at addr ffff88810622c200 by task kunit_try_catch/335
[   28.105743] 
[   28.105992] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   28.106054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.106069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.106094] Call Trace:
[   28.106115]  <TASK>
[   28.106167]  dump_stack_lvl+0x73/0xb0
[   28.106202]  print_report+0xd1/0x610
[   28.106225]  ? __virt_addr_valid+0x1db/0x2d0
[   28.106250]  ? strncpy_from_user+0x2e/0x1d0
[   28.106277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.106305]  ? strncpy_from_user+0x2e/0x1d0
[   28.106329]  kasan_report+0x141/0x180
[   28.106352]  ? strncpy_from_user+0x2e/0x1d0
[   28.106380]  kasan_check_range+0x10c/0x1c0
[   28.106404]  __kasan_check_write+0x18/0x20
[   28.106438]  strncpy_from_user+0x2e/0x1d0
[   28.106461]  ? __kasan_check_read+0x15/0x20
[   28.106488]  copy_user_test_oob+0x760/0x10f0
[   28.106513]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.106537]  ? finish_task_switch.isra.0+0x153/0x700
[   28.106559]  ? __switch_to+0x47/0xf80
[   28.106586]  ? __schedule+0x10cc/0x2b60
[   28.106610]  ? __pfx_read_tsc+0x10/0x10
[   28.106633]  ? ktime_get_ts64+0x86/0x230
[   28.106660]  kunit_try_run_case+0x1a5/0x480
[   28.106682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.106704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.106728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.106766]  ? __kthread_parkme+0x82/0x180
[   28.106789]  ? preempt_count_sub+0x50/0x80
[   28.106812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.106835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.106861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.106887]  kthread+0x337/0x6f0
[   28.106908]  ? trace_preempt_on+0x20/0xc0
[   28.106932]  ? __pfx_kthread+0x10/0x10
[   28.106954]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.106976]  ? calculate_sigpending+0x7b/0xa0
[   28.107002]  ? __pfx_kthread+0x10/0x10
[   28.107026]  ret_from_fork+0x116/0x1d0
[   28.107047]  ? __pfx_kthread+0x10/0x10
[   28.107068]  ret_from_fork_asm+0x1a/0x30
[   28.107100]  </TASK>
[   28.107112] 
[   28.118235] Allocated by task 335:
[   28.118635]  kasan_save_stack+0x45/0x70
[   28.118949]  kasan_save_track+0x18/0x40
[   28.119261]  kasan_save_alloc_info+0x3b/0x50
[   28.119571]  __kasan_kmalloc+0xb7/0xc0
[   28.119861]  __kmalloc_noprof+0x1c9/0x500
[   28.120071]  kunit_kmalloc_array+0x25/0x60
[   28.120254]  copy_user_test_oob+0xab/0x10f0
[   28.120627]  kunit_try_run_case+0x1a5/0x480
[   28.120952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.121379]  kthread+0x337/0x6f0
[   28.121561]  ret_from_fork+0x116/0x1d0
[   28.121745]  ret_from_fork_asm+0x1a/0x30
[   28.121921] 
[   28.122005] The buggy address belongs to the object at ffff88810622c200
[   28.122005]  which belongs to the cache kmalloc-128 of size 128
[   28.122891] The buggy address is located 0 bytes inside of
[   28.122891]  allocated 120-byte region [ffff88810622c200, ffff88810622c278)
[   28.123654] 
[   28.123890] The buggy address belongs to the physical page:
[   28.124343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c
[   28.124826] flags: 0x200000000000000(node=0|zone=2)
[   28.125167] page_type: f5(slab)
[   28.125334] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.125877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.126311] page dumped because: kasan: bad access detected
[   28.126653] 
[   28.126884] Memory state around the buggy address:
[   28.127106]  ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.127399]  ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.127927] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.128404]                                                                 ^
[   28.128720]  ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.129022]  ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.129306] ==================================================================