Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 83.659405] ================================================================== [ 83.666423] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 83.673275] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 83.680827] [ 83.682309] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.682364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.682378] Hardware name: WinLink E850-96 board (DT) [ 83.682400] Call trace: [ 83.682415] show_stack+0x20/0x38 (C) [ 83.682451] dump_stack_lvl+0x8c/0xd0 [ 83.682485] print_report+0x118/0x5d0 [ 83.682514] kasan_report+0xdc/0x128 [ 83.682542] kasan_check_range+0x100/0x1a8 [ 83.682574] __kasan_check_write+0x20/0x30 [ 83.682606] strncpy_from_user+0x3c/0x2a0 [ 83.682643] copy_user_test_oob+0x5c0/0xec8 [ 83.682680] kunit_try_run_case+0x170/0x3f0 [ 83.682717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.682754] kthread+0x328/0x630 [ 83.682787] ret_from_fork+0x10/0x20 [ 83.682823] [ 83.753742] Allocated by task 369: [ 83.757131] kasan_save_stack+0x3c/0x68 [ 83.760947] kasan_save_track+0x20/0x40 [ 83.764767] kasan_save_alloc_info+0x40/0x58 [ 83.769020] __kasan_kmalloc+0xd4/0xd8 [ 83.772753] __kmalloc_noprof+0x198/0x4c8 [ 83.776745] kunit_kmalloc_array+0x34/0x88 [ 83.780827] copy_user_test_oob+0xac/0xec8 [ 83.784904] kunit_try_run_case+0x170/0x3f0 [ 83.789072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.794540] kthread+0x328/0x630 [ 83.797752] ret_from_fork+0x10/0x20 [ 83.801311] [ 83.802788] The buggy address belongs to the object at ffff000803b98000 [ 83.802788] which belongs to the cache kmalloc-128 of size 128 [ 83.815287] The buggy address is located 0 bytes inside of [ 83.815287] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 83.827699] [ 83.829177] The buggy address belongs to the physical page: [ 83.834736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 83.842719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.850358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.857301] page_type: f5(slab) [ 83.860435] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.868157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.875883] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.883695] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.891508] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 83.899320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.907127] page dumped because: kasan: bad access detected [ 83.912681] [ 83.914156] Memory state around the buggy address: [ 83.918936] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.926139] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.933346] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.940545] ^ [ 83.947667] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.954872] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.962073] ================================================================== [ 83.969472] ================================================================== [ 83.976490] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 83.983427] Write of size 1 at addr ffff000803b98078 by task kunit_try_catch/369 [ 83.990805] [ 83.992290] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.992344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.992360] Hardware name: WinLink E850-96 board (DT) [ 83.992382] Call trace: [ 83.992397] show_stack+0x20/0x38 (C) [ 83.992429] dump_stack_lvl+0x8c/0xd0 [ 83.992465] print_report+0x118/0x5d0 [ 83.992497] kasan_report+0xdc/0x128 [ 83.992523] __asan_report_store1_noabort+0x20/0x30 [ 83.992559] strncpy_from_user+0x270/0x2a0 [ 83.992598] copy_user_test_oob+0x5c0/0xec8 [ 83.992634] kunit_try_run_case+0x170/0x3f0 [ 83.992671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.992707] kthread+0x328/0x630 [ 83.992739] ret_from_fork+0x10/0x20 [ 83.992776] [ 84.060509] Allocated by task 369: [ 84.063897] kasan_save_stack+0x3c/0x68 [ 84.067713] kasan_save_track+0x20/0x40 [ 84.071533] kasan_save_alloc_info+0x40/0x58 [ 84.075786] __kasan_kmalloc+0xd4/0xd8 [ 84.079519] __kmalloc_noprof+0x198/0x4c8 [ 84.083512] kunit_kmalloc_array+0x34/0x88 [ 84.087593] copy_user_test_oob+0xac/0xec8 [ 84.091672] kunit_try_run_case+0x170/0x3f0 [ 84.095838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.101307] kthread+0x328/0x630 [ 84.104519] ret_from_fork+0x10/0x20 [ 84.108077] [ 84.109555] The buggy address belongs to the object at ffff000803b98000 [ 84.109555] which belongs to the cache kmalloc-128 of size 128 [ 84.122055] The buggy address is located 0 bytes to the right of [ 84.122055] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 84.134987] [ 84.136465] The buggy address belongs to the physical page: [ 84.142022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 84.150005] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 84.157645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 84.164588] page_type: f5(slab) [ 84.167725] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 84.175444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.183171] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 84.190982] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.198795] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 84.206607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 84.214413] page dumped because: kasan: bad access detected [ 84.219968] [ 84.221444] Memory state around the buggy address: [ 84.226222] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.233426] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.240633] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 84.247832] ^ [ 84.254954] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.262159] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.269360] ==================================================================
[ 33.527222] ================================================================== [ 33.527293] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.527433] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.527506] [ 33.527574] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.527737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.527770] Hardware name: linux,dummy-virt (DT) [ 33.527804] Call trace: [ 33.527845] show_stack+0x20/0x38 (C) [ 33.528046] dump_stack_lvl+0x8c/0xd0 [ 33.528398] print_report+0x118/0x5d0 [ 33.528639] kasan_report+0xdc/0x128 [ 33.528744] kasan_check_range+0x100/0x1a8 [ 33.528930] __kasan_check_write+0x20/0x30 [ 33.529003] strncpy_from_user+0x3c/0x2a0 [ 33.529190] copy_user_test_oob+0x5c0/0xec8 [ 33.529336] kunit_try_run_case+0x170/0x3f0 [ 33.529518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.529853] kthread+0x328/0x630 [ 33.529911] ret_from_fork+0x10/0x20 [ 33.529979] [ 33.530022] Allocated by task 316: [ 33.530076] kasan_save_stack+0x3c/0x68 [ 33.530121] kasan_save_track+0x20/0x40 [ 33.530163] kasan_save_alloc_info+0x40/0x58 [ 33.530511] __kasan_kmalloc+0xd4/0xd8 [ 33.530848] __kmalloc_noprof+0x198/0x4c8 [ 33.531106] kunit_kmalloc_array+0x34/0x88 [ 33.531408] copy_user_test_oob+0xac/0xec8 [ 33.531573] kunit_try_run_case+0x170/0x3f0 [ 33.531710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.531785] kthread+0x328/0x630 [ 33.531822] ret_from_fork+0x10/0x20 [ 33.531888] [ 33.532190] The buggy address belongs to the object at fff00000c91a7600 [ 33.532190] which belongs to the cache kmalloc-128 of size 128 [ 33.532608] The buggy address is located 0 bytes inside of [ 33.532608] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.532698] [ 33.532857] The buggy address belongs to the physical page: [ 33.532902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.533127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.533410] page_type: f5(slab) [ 33.533467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.533610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.533654] page dumped because: kasan: bad access detected [ 33.533946] [ 33.533998] Memory state around the buggy address: [ 33.534109] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.534186] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534275] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.534514] ^ [ 33.534713] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534840] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534883] ================================================================== [ 33.536419] ================================================================== [ 33.536764] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.537138] Write of size 1 at addr fff00000c91a7678 by task kunit_try_catch/316 [ 33.537209] [ 33.537245] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.537389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.537420] Hardware name: linux,dummy-virt (DT) [ 33.537453] Call trace: [ 33.537476] show_stack+0x20/0x38 (C) [ 33.537529] dump_stack_lvl+0x8c/0xd0 [ 33.537886] print_report+0x118/0x5d0 [ 33.538221] kasan_report+0xdc/0x128 [ 33.538388] __asan_report_store1_noabort+0x20/0x30 [ 33.538676] strncpy_from_user+0x270/0x2a0 [ 33.538877] copy_user_test_oob+0x5c0/0xec8 [ 33.539219] kunit_try_run_case+0x170/0x3f0 [ 33.539346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.539444] kthread+0x328/0x630 [ 33.539523] ret_from_fork+0x10/0x20 [ 33.539707] [ 33.539770] Allocated by task 316: [ 33.539827] kasan_save_stack+0x3c/0x68 [ 33.540021] kasan_save_track+0x20/0x40 [ 33.540239] kasan_save_alloc_info+0x40/0x58 [ 33.540317] __kasan_kmalloc+0xd4/0xd8 [ 33.540539] __kmalloc_noprof+0x198/0x4c8 [ 33.540750] kunit_kmalloc_array+0x34/0x88 [ 33.540869] copy_user_test_oob+0xac/0xec8 [ 33.541023] kunit_try_run_case+0x170/0x3f0 [ 33.541104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.541150] kthread+0x328/0x630 [ 33.541207] ret_from_fork+0x10/0x20 [ 33.541509] [ 33.541775] The buggy address belongs to the object at fff00000c91a7600 [ 33.541775] which belongs to the cache kmalloc-128 of size 128 [ 33.542006] The buggy address is located 0 bytes to the right of [ 33.542006] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.542083] [ 33.542108] The buggy address belongs to the physical page: [ 33.542149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.542522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.542669] page_type: f5(slab) [ 33.542725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.542779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.542822] page dumped because: kasan: bad access detected [ 33.542943] [ 33.542974] Memory state around the buggy address: [ 33.543037] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.543087] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543130] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.543177] ^ [ 33.543221] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543265] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543304] ==================================================================
[ 28.130581] ================================================================== [ 28.131150] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 28.131903] Write of size 1 at addr ffff88810622c278 by task kunit_try_catch/335 [ 28.132688] [ 28.133106] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 28.133168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.133184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.133210] Call Trace: [ 28.133231] <TASK> [ 28.133285] dump_stack_lvl+0x73/0xb0 [ 28.133320] print_report+0xd1/0x610 [ 28.133344] ? __virt_addr_valid+0x1db/0x2d0 [ 28.133369] ? strncpy_from_user+0x1a5/0x1d0 [ 28.133393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.133435] ? strncpy_from_user+0x1a5/0x1d0 [ 28.133459] kasan_report+0x141/0x180 [ 28.133483] ? strncpy_from_user+0x1a5/0x1d0 [ 28.133512] __asan_report_store1_noabort+0x1b/0x30 [ 28.133538] strncpy_from_user+0x1a5/0x1d0 [ 28.133564] copy_user_test_oob+0x760/0x10f0 [ 28.133590] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.133613] ? finish_task_switch.isra.0+0x153/0x700 [ 28.133636] ? __switch_to+0x47/0xf80 [ 28.133662] ? __schedule+0x10cc/0x2b60 [ 28.133688] ? __pfx_read_tsc+0x10/0x10 [ 28.133710] ? ktime_get_ts64+0x86/0x230 [ 28.133749] kunit_try_run_case+0x1a5/0x480 [ 28.133772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.133794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.133819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.133843] ? __kthread_parkme+0x82/0x180 [ 28.133865] ? preempt_count_sub+0x50/0x80 [ 28.133889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.133912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.133939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.133965] kthread+0x337/0x6f0 [ 28.133986] ? trace_preempt_on+0x20/0xc0 [ 28.134011] ? __pfx_kthread+0x10/0x10 [ 28.134034] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.134059] ? calculate_sigpending+0x7b/0xa0 [ 28.134086] ? __pfx_kthread+0x10/0x10 [ 28.134110] ret_from_fork+0x116/0x1d0 [ 28.134129] ? __pfx_kthread+0x10/0x10 [ 28.134152] ret_from_fork_asm+0x1a/0x30 [ 28.134183] </TASK> [ 28.134195] [ 28.144839] Allocated by task 335: [ 28.145013] kasan_save_stack+0x45/0x70 [ 28.145206] kasan_save_track+0x18/0x40 [ 28.145383] kasan_save_alloc_info+0x3b/0x50 [ 28.145852] __kasan_kmalloc+0xb7/0xc0 [ 28.146148] __kmalloc_noprof+0x1c9/0x500 [ 28.146459] kunit_kmalloc_array+0x25/0x60 [ 28.146850] copy_user_test_oob+0xab/0x10f0 [ 28.147058] kunit_try_run_case+0x1a5/0x480 [ 28.147243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.147759] kthread+0x337/0x6f0 [ 28.148021] ret_from_fork+0x116/0x1d0 [ 28.148280] ret_from_fork_asm+0x1a/0x30 [ 28.148587] [ 28.148846] The buggy address belongs to the object at ffff88810622c200 [ 28.148846] which belongs to the cache kmalloc-128 of size 128 [ 28.149355] The buggy address is located 0 bytes to the right of [ 28.149355] allocated 120-byte region [ffff88810622c200, ffff88810622c278) [ 28.150195] [ 28.150413] The buggy address belongs to the physical page: [ 28.150663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c [ 28.150999] flags: 0x200000000000000(node=0|zone=2) [ 28.151211] page_type: f5(slab) [ 28.151363] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.152018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.152608] page dumped because: kasan: bad access detected [ 28.152979] [ 28.153212] Memory state around the buggy address: [ 28.153572] ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.153876] ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.154158] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.154710] ^ [ 28.155181] ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.155693] ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.156193] ================================================================== [ 28.104490] ================================================================== [ 28.104832] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 28.105129] Write of size 121 at addr ffff88810622c200 by task kunit_try_catch/335 [ 28.105743] [ 28.105992] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 28.106054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.106069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.106094] Call Trace: [ 28.106115] <TASK> [ 28.106167] dump_stack_lvl+0x73/0xb0 [ 28.106202] print_report+0xd1/0x610 [ 28.106225] ? __virt_addr_valid+0x1db/0x2d0 [ 28.106250] ? strncpy_from_user+0x2e/0x1d0 [ 28.106277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.106305] ? strncpy_from_user+0x2e/0x1d0 [ 28.106329] kasan_report+0x141/0x180 [ 28.106352] ? strncpy_from_user+0x2e/0x1d0 [ 28.106380] kasan_check_range+0x10c/0x1c0 [ 28.106404] __kasan_check_write+0x18/0x20 [ 28.106438] strncpy_from_user+0x2e/0x1d0 [ 28.106461] ? __kasan_check_read+0x15/0x20 [ 28.106488] copy_user_test_oob+0x760/0x10f0 [ 28.106513] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.106537] ? finish_task_switch.isra.0+0x153/0x700 [ 28.106559] ? __switch_to+0x47/0xf80 [ 28.106586] ? __schedule+0x10cc/0x2b60 [ 28.106610] ? __pfx_read_tsc+0x10/0x10 [ 28.106633] ? ktime_get_ts64+0x86/0x230 [ 28.106660] kunit_try_run_case+0x1a5/0x480 [ 28.106682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.106704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.106728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.106766] ? __kthread_parkme+0x82/0x180 [ 28.106789] ? preempt_count_sub+0x50/0x80 [ 28.106812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.106835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.106861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.106887] kthread+0x337/0x6f0 [ 28.106908] ? trace_preempt_on+0x20/0xc0 [ 28.106932] ? __pfx_kthread+0x10/0x10 [ 28.106954] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.106976] ? calculate_sigpending+0x7b/0xa0 [ 28.107002] ? __pfx_kthread+0x10/0x10 [ 28.107026] ret_from_fork+0x116/0x1d0 [ 28.107047] ? __pfx_kthread+0x10/0x10 [ 28.107068] ret_from_fork_asm+0x1a/0x30 [ 28.107100] </TASK> [ 28.107112] [ 28.118235] Allocated by task 335: [ 28.118635] kasan_save_stack+0x45/0x70 [ 28.118949] kasan_save_track+0x18/0x40 [ 28.119261] kasan_save_alloc_info+0x3b/0x50 [ 28.119571] __kasan_kmalloc+0xb7/0xc0 [ 28.119861] __kmalloc_noprof+0x1c9/0x500 [ 28.120071] kunit_kmalloc_array+0x25/0x60 [ 28.120254] copy_user_test_oob+0xab/0x10f0 [ 28.120627] kunit_try_run_case+0x1a5/0x480 [ 28.120952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.121379] kthread+0x337/0x6f0 [ 28.121561] ret_from_fork+0x116/0x1d0 [ 28.121745] ret_from_fork_asm+0x1a/0x30 [ 28.121921] [ 28.122005] The buggy address belongs to the object at ffff88810622c200 [ 28.122005] which belongs to the cache kmalloc-128 of size 128 [ 28.122891] The buggy address is located 0 bytes inside of [ 28.122891] allocated 120-byte region [ffff88810622c200, ffff88810622c278) [ 28.123654] [ 28.123890] The buggy address belongs to the physical page: [ 28.124343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10622c [ 28.124826] flags: 0x200000000000000(node=0|zone=2) [ 28.125167] page_type: f5(slab) [ 28.125334] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.125877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.126311] page dumped because: kasan: bad access detected [ 28.126653] [ 28.126884] Memory state around the buggy address: [ 28.127106] ffff88810622c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.127399] ffff88810622c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.127927] >ffff88810622c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.128404] ^ [ 28.128720] ffff88810622c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.129022] ffff88810622c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.129306] ==================================================================