Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   82.688843] ==================================================================
[   82.695926] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   82.702870] Write of size 1 at addr ffff0008074f9378 by task kunit_try_catch/369
[   82.710248] 
[   82.711732] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   82.711783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.711800] Hardware name: WinLink E850-96 board (DT)
[   82.711820] Call trace:
[   82.711831]  show_stack+0x20/0x38 (C)
[   82.711862]  dump_stack_lvl+0x8c/0xd0
[   82.711894]  print_report+0x118/0x5d0
[   82.711921]  kasan_report+0xdc/0x128
[   82.711948]  __asan_report_store1_noabort+0x20/0x30
[   82.711982]  strncpy_from_user+0x270/0x2a0
[   82.712017]  copy_user_test_oob+0x5c0/0xec8
[   82.712051]  kunit_try_run_case+0x170/0x3f0
[   82.712086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.712120]  kthread+0x328/0x630
[   82.712151]  ret_from_fork+0x10/0x20
[   82.712181] 
[   82.779951] Allocated by task 369:
[   82.783337]  kasan_save_stack+0x3c/0x68
[   82.787156]  kasan_save_track+0x20/0x40
[   82.790976]  kasan_save_alloc_info+0x40/0x58
[   82.795229]  __kasan_kmalloc+0xd4/0xd8
[   82.798962]  __kmalloc_noprof+0x198/0x4c8
[   82.802955]  kunit_kmalloc_array+0x34/0x88
[   82.807034]  copy_user_test_oob+0xac/0xec8
[   82.811114]  kunit_try_run_case+0x170/0x3f0
[   82.815281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.820750]  kthread+0x328/0x630
[   82.823961]  ret_from_fork+0x10/0x20
[   82.827520] 
[   82.828996] The buggy address belongs to the object at ffff0008074f9300
[   82.828996]  which belongs to the cache kmalloc-128 of size 128
[   82.841498] The buggy address is located 0 bytes to the right of
[   82.841498]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   82.854430] 
[   82.855907] The buggy address belongs to the physical page:
[   82.861462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   82.869447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.877085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.884030] page_type: f5(slab)
[   82.887163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.894887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.902614] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.910425] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.918238] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.926050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.933856] page dumped because: kasan: bad access detected
[   82.939411] 
[   82.940887] Memory state around the buggy address:
[   82.945665]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.952869]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.960074] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.967275]                                                                 ^
[   82.974397]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.981602]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.988803] ==================================================================
[   82.378794] ==================================================================
[   82.385862] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   82.392718] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   82.400270] 
[   82.401754] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   82.401804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.401820] Hardware name: WinLink E850-96 board (DT)
[   82.401841] Call trace:
[   82.401855]  show_stack+0x20/0x38 (C)
[   82.401887]  dump_stack_lvl+0x8c/0xd0
[   82.401920]  print_report+0x118/0x5d0
[   82.401948]  kasan_report+0xdc/0x128
[   82.401975]  kasan_check_range+0x100/0x1a8
[   82.402005]  __kasan_check_write+0x20/0x30
[   82.402036]  strncpy_from_user+0x3c/0x2a0
[   82.402073]  copy_user_test_oob+0x5c0/0xec8
[   82.402108]  kunit_try_run_case+0x170/0x3f0
[   82.402144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.402178]  kthread+0x328/0x630
[   82.402207]  ret_from_fork+0x10/0x20
[   82.402239] 
[   82.473185] Allocated by task 369:
[   82.476572]  kasan_save_stack+0x3c/0x68
[   82.480390]  kasan_save_track+0x20/0x40
[   82.484209]  kasan_save_alloc_info+0x40/0x58
[   82.488463]  __kasan_kmalloc+0xd4/0xd8
[   82.492196]  __kmalloc_noprof+0x198/0x4c8
[   82.496189]  kunit_kmalloc_array+0x34/0x88
[   82.500268]  copy_user_test_oob+0xac/0xec8
[   82.504348]  kunit_try_run_case+0x170/0x3f0
[   82.508515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.513983]  kthread+0x328/0x630
[   82.517195]  ret_from_fork+0x10/0x20
[   82.520754] 
[   82.522229] The buggy address belongs to the object at ffff0008074f9300
[   82.522229]  which belongs to the cache kmalloc-128 of size 128
[   82.534732] The buggy address is located 0 bytes inside of
[   82.534732]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   82.547143] 
[   82.548620] The buggy address belongs to the physical page:
[   82.554176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   82.562160] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.569798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.576743] page_type: f5(slab)
[   82.579878] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.595326] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.603138] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.610951] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.618762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.626569] page dumped because: kasan: bad access detected
[   82.632124] 
[   82.633600] Memory state around the buggy address:
[   82.638379]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.645582]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.652787] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.659988]                                                                 ^
[   82.667110]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.674314]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.681516] ==================================================================

[   32.921256] ==================================================================
[   32.921757] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   32.921881] Write of size 1 at addr fff00000c85fcf78 by task kunit_try_catch/316
[   32.921956] 
[   32.921990] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.922166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.922193] Hardware name: linux,dummy-virt (DT)
[   32.922754] Call trace:
[   32.922902]  show_stack+0x20/0x38 (C)
[   32.923039]  dump_stack_lvl+0x8c/0xd0
[   32.923159]  print_report+0x118/0x5d0
[   32.923329]  kasan_report+0xdc/0x128
[   32.923395]  __asan_report_store1_noabort+0x20/0x30
[   32.923447]  strncpy_from_user+0x270/0x2a0
[   32.923795]  copy_user_test_oob+0x5c0/0xec8
[   32.923875]  kunit_try_run_case+0x170/0x3f0
[   32.924298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.924510]  kthread+0x328/0x630
[   32.924617]  ret_from_fork+0x10/0x20
[   32.924786] 
[   32.924806] Allocated by task 316:
[   32.924835]  kasan_save_stack+0x3c/0x68
[   32.925178]  kasan_save_track+0x20/0x40
[   32.925435]  kasan_save_alloc_info+0x40/0x58
[   32.925509]  __kasan_kmalloc+0xd4/0xd8
[   32.925660]  __kmalloc_noprof+0x198/0x4c8
[   32.925930]  kunit_kmalloc_array+0x34/0x88
[   32.926130]  copy_user_test_oob+0xac/0xec8
[   32.926234]  kunit_try_run_case+0x170/0x3f0
[   32.926277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.926627]  kthread+0x328/0x630
[   32.926714]  ret_from_fork+0x10/0x20
[   32.926782] 
[   32.926977] The buggy address belongs to the object at fff00000c85fcf00
[   32.926977]  which belongs to the cache kmalloc-128 of size 128
[   32.927454] The buggy address is located 0 bytes to the right of
[   32.927454]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.927565] 
[   32.927599] The buggy address belongs to the physical page:
[   32.927861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.928105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.928228] page_type: f5(slab)
[   32.928527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.928605] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.929038] page dumped because: kasan: bad access detected
[   32.929115] 
[   32.929249] Memory state around the buggy address:
[   32.929708]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.929813]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.929864] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.930201]                                                                 ^
[   32.930290]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.930661]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.930803] ==================================================================
[   32.911269] ==================================================================
[   32.911338] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   32.911399] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316
[   32.911452] 
[   32.911489] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.911585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.911616] Hardware name: linux,dummy-virt (DT)
[   32.911659] Call trace:
[   32.911684]  show_stack+0x20/0x38 (C)
[   32.911732]  dump_stack_lvl+0x8c/0xd0
[   32.911780]  print_report+0x118/0x5d0
[   32.911835]  kasan_report+0xdc/0x128
[   32.911880]  kasan_check_range+0x100/0x1a8
[   32.911926]  __kasan_check_write+0x20/0x30
[   32.911982]  strncpy_from_user+0x3c/0x2a0
[   32.912032]  copy_user_test_oob+0x5c0/0xec8
[   32.912096]  kunit_try_run_case+0x170/0x3f0
[   32.912147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.912982]  kthread+0x328/0x630
[   32.913108]  ret_from_fork+0x10/0x20
[   32.913192] 
[   32.913247] Allocated by task 316:
[   32.913317]  kasan_save_stack+0x3c/0x68
[   32.913401]  kasan_save_track+0x20/0x40
[   32.913481]  kasan_save_alloc_info+0x40/0x58
[   32.913535]  __kasan_kmalloc+0xd4/0xd8
[   32.913576]  __kmalloc_noprof+0x198/0x4c8
[   32.913907]  kunit_kmalloc_array+0x34/0x88
[   32.914442]  copy_user_test_oob+0xac/0xec8
[   32.914525]  kunit_try_run_case+0x170/0x3f0
[   32.914643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.914701]  kthread+0x328/0x630
[   32.914736]  ret_from_fork+0x10/0x20
[   32.915342] 
[   32.915423] The buggy address belongs to the object at fff00000c85fcf00
[   32.915423]  which belongs to the cache kmalloc-128 of size 128
[   32.915568] The buggy address is located 0 bytes inside of
[   32.915568]  allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78)
[   32.915919] 
[   32.916092] The buggy address belongs to the physical page:
[   32.916378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   32.916469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.916659] page_type: f5(slab)
[   32.916730] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.916923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.917299] page dumped because: kasan: bad access detected
[   32.917381] 
[   32.917713] Memory state around the buggy address:
[   32.917776]  fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.918075]  fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.918209] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.918776]                                                                 ^
[   32.918959]  fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.919125]  fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.919461] ==================================================================

[   28.494178] ==================================================================
[   28.494427] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   28.494993] Write of size 121 at addr ffff888105919e00 by task kunit_try_catch/334
[   28.495333] 
[   28.495446] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.495499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.495513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.495537] Call Trace:
[   28.495557]  <TASK>
[   28.495577]  dump_stack_lvl+0x73/0xb0
[   28.495608]  print_report+0xd1/0x610
[   28.495632]  ? __virt_addr_valid+0x1db/0x2d0
[   28.495670]  ? strncpy_from_user+0x2e/0x1d0
[   28.495694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.495721]  ? strncpy_from_user+0x2e/0x1d0
[   28.495744]  kasan_report+0x141/0x180
[   28.495778]  ? strncpy_from_user+0x2e/0x1d0
[   28.495806]  kasan_check_range+0x10c/0x1c0
[   28.495829]  __kasan_check_write+0x18/0x20
[   28.495853]  strncpy_from_user+0x2e/0x1d0
[   28.495877]  ? __kasan_check_read+0x15/0x20
[   28.495903]  copy_user_test_oob+0x760/0x10f0
[   28.495930]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.495953]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.495985]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.496013]  kunit_try_run_case+0x1a5/0x480
[   28.496036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.496057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.496083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.496107]  ? __kthread_parkme+0x82/0x180
[   28.496130]  ? preempt_count_sub+0x50/0x80
[   28.496155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.496178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.496205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.496231]  kthread+0x337/0x6f0
[   28.496252]  ? trace_preempt_on+0x20/0xc0
[   28.496277]  ? __pfx_kthread+0x10/0x10
[   28.496299]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.496322]  ? calculate_sigpending+0x7b/0xa0
[   28.496347]  ? __pfx_kthread+0x10/0x10
[   28.496370]  ret_from_fork+0x116/0x1d0
[   28.496391]  ? __pfx_kthread+0x10/0x10
[   28.496413]  ret_from_fork_asm+0x1a/0x30
[   28.496445]  </TASK>
[   28.496457] 
[   28.503497] Allocated by task 334:
[   28.503632]  kasan_save_stack+0x45/0x70
[   28.503847]  kasan_save_track+0x18/0x40
[   28.504035]  kasan_save_alloc_info+0x3b/0x50
[   28.504243]  __kasan_kmalloc+0xb7/0xc0
[   28.504431]  __kmalloc_noprof+0x1c9/0x500
[   28.504765]  kunit_kmalloc_array+0x25/0x60
[   28.504979]  copy_user_test_oob+0xab/0x10f0
[   28.505182]  kunit_try_run_case+0x1a5/0x480
[   28.505383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.505645]  kthread+0x337/0x6f0
[   28.505802]  ret_from_fork+0x116/0x1d0
[   28.505929]  ret_from_fork_asm+0x1a/0x30
[   28.506068] 
[   28.506134] The buggy address belongs to the object at ffff888105919e00
[   28.506134]  which belongs to the cache kmalloc-128 of size 128
[   28.506977] The buggy address is located 0 bytes inside of
[   28.506977]  allocated 120-byte region [ffff888105919e00, ffff888105919e78)
[   28.507409] 
[   28.507510] The buggy address belongs to the physical page:
[   28.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   28.508127] flags: 0x200000000000000(node=0|zone=2)
[   28.508341] page_type: f5(slab)
[   28.508474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.508736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.509088] page dumped because: kasan: bad access detected
[   28.509310] 
[   28.509397] Memory state around the buggy address:
[   28.509594]  ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.509937]  ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.510174] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.510412]                                                                 ^
[   28.510731]  ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.511020]  ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.511227] ==================================================================
[   28.513094] ==================================================================
[   28.513882] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   28.514674] Write of size 1 at addr ffff888105919e78 by task kunit_try_catch/334
[   28.515569] 
[   28.515900] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.515964] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.515980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.516005] Call Trace:
[   28.516025]  <TASK>
[   28.516048]  dump_stack_lvl+0x73/0xb0
[   28.516089]  print_report+0xd1/0x610
[   28.516116]  ? __virt_addr_valid+0x1db/0x2d0
[   28.516141]  ? strncpy_from_user+0x1a5/0x1d0
[   28.516167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.516194]  ? strncpy_from_user+0x1a5/0x1d0
[   28.516217]  kasan_report+0x141/0x180
[   28.516240]  ? strncpy_from_user+0x1a5/0x1d0
[   28.516268]  __asan_report_store1_noabort+0x1b/0x30
[   28.516292]  strncpy_from_user+0x1a5/0x1d0
[   28.516318]  copy_user_test_oob+0x760/0x10f0
[   28.516345]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.516368]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.516399]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.516427]  kunit_try_run_case+0x1a5/0x480
[   28.516450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.516471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.516496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.516521]  ? __kthread_parkme+0x82/0x180
[   28.516544]  ? preempt_count_sub+0x50/0x80
[   28.516568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.516591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.516617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.516643]  kthread+0x337/0x6f0
[   28.516674]  ? trace_preempt_on+0x20/0xc0
[   28.516700]  ? __pfx_kthread+0x10/0x10
[   28.516721]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.516744]  ? calculate_sigpending+0x7b/0xa0
[   28.516769]  ? __pfx_kthread+0x10/0x10
[   28.516792]  ret_from_fork+0x116/0x1d0
[   28.516822]  ? __pfx_kthread+0x10/0x10
[   28.516845]  ret_from_fork_asm+0x1a/0x30
[   28.516877]  </TASK>
[   28.516889] 
[   28.525708] Allocated by task 334:
[   28.525886]  kasan_save_stack+0x45/0x70
[   28.526072]  kasan_save_track+0x18/0x40
[   28.526245]  kasan_save_alloc_info+0x3b/0x50
[   28.526389]  __kasan_kmalloc+0xb7/0xc0
[   28.526547]  __kmalloc_noprof+0x1c9/0x500
[   28.526759]  kunit_kmalloc_array+0x25/0x60
[   28.526960]  copy_user_test_oob+0xab/0x10f0
[   28.527165]  kunit_try_run_case+0x1a5/0x480
[   28.527312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.527482]  kthread+0x337/0x6f0
[   28.527599]  ret_from_fork+0x116/0x1d0
[   28.527769]  ret_from_fork_asm+0x1a/0x30
[   28.527961] 
[   28.528054] The buggy address belongs to the object at ffff888105919e00
[   28.528054]  which belongs to the cache kmalloc-128 of size 128
[   28.528511] The buggy address is located 0 bytes to the right of
[   28.528511]  allocated 120-byte region [ffff888105919e00, ffff888105919e78)
[   28.529244] 
[   28.529358] The buggy address belongs to the physical page:
[   28.529585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   28.529941] flags: 0x200000000000000(node=0|zone=2)
[   28.530109] page_type: f5(slab)
[   28.530228] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.530563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.530917] page dumped because: kasan: bad access detected
[   28.531108] 
[   28.531208] Memory state around the buggy address:
[   28.531416]  ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.531635]  ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.532170] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.532455]                                                                 ^
[   28.532732]  ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.533001]  ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.533208] ==================================================================