Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 82.688843] ================================================================== [ 82.695926] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 82.702870] Write of size 1 at addr ffff0008074f9378 by task kunit_try_catch/369 [ 82.710248] [ 82.711732] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.711783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.711800] Hardware name: WinLink E850-96 board (DT) [ 82.711820] Call trace: [ 82.711831] show_stack+0x20/0x38 (C) [ 82.711862] dump_stack_lvl+0x8c/0xd0 [ 82.711894] print_report+0x118/0x5d0 [ 82.711921] kasan_report+0xdc/0x128 [ 82.711948] __asan_report_store1_noabort+0x20/0x30 [ 82.711982] strncpy_from_user+0x270/0x2a0 [ 82.712017] copy_user_test_oob+0x5c0/0xec8 [ 82.712051] kunit_try_run_case+0x170/0x3f0 [ 82.712086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.712120] kthread+0x328/0x630 [ 82.712151] ret_from_fork+0x10/0x20 [ 82.712181] [ 82.779951] Allocated by task 369: [ 82.783337] kasan_save_stack+0x3c/0x68 [ 82.787156] kasan_save_track+0x20/0x40 [ 82.790976] kasan_save_alloc_info+0x40/0x58 [ 82.795229] __kasan_kmalloc+0xd4/0xd8 [ 82.798962] __kmalloc_noprof+0x198/0x4c8 [ 82.802955] kunit_kmalloc_array+0x34/0x88 [ 82.807034] copy_user_test_oob+0xac/0xec8 [ 82.811114] kunit_try_run_case+0x170/0x3f0 [ 82.815281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.820750] kthread+0x328/0x630 [ 82.823961] ret_from_fork+0x10/0x20 [ 82.827520] [ 82.828996] The buggy address belongs to the object at ffff0008074f9300 [ 82.828996] which belongs to the cache kmalloc-128 of size 128 [ 82.841498] The buggy address is located 0 bytes to the right of [ 82.841498] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.854430] [ 82.855907] The buggy address belongs to the physical page: [ 82.861462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.869447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.877085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.884030] page_type: f5(slab) [ 82.887163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.894887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.902614] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.910425] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.918238] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.926050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.933856] page dumped because: kasan: bad access detected [ 82.939411] [ 82.940887] Memory state around the buggy address: [ 82.945665] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.952869] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.960074] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.967275] ^ [ 82.974397] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.981602] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.988803] ================================================================== [ 82.378794] ================================================================== [ 82.385862] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 82.392718] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 82.400270] [ 82.401754] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.401804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.401820] Hardware name: WinLink E850-96 board (DT) [ 82.401841] Call trace: [ 82.401855] show_stack+0x20/0x38 (C) [ 82.401887] dump_stack_lvl+0x8c/0xd0 [ 82.401920] print_report+0x118/0x5d0 [ 82.401948] kasan_report+0xdc/0x128 [ 82.401975] kasan_check_range+0x100/0x1a8 [ 82.402005] __kasan_check_write+0x20/0x30 [ 82.402036] strncpy_from_user+0x3c/0x2a0 [ 82.402073] copy_user_test_oob+0x5c0/0xec8 [ 82.402108] kunit_try_run_case+0x170/0x3f0 [ 82.402144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.402178] kthread+0x328/0x630 [ 82.402207] ret_from_fork+0x10/0x20 [ 82.402239] [ 82.473185] Allocated by task 369: [ 82.476572] kasan_save_stack+0x3c/0x68 [ 82.480390] kasan_save_track+0x20/0x40 [ 82.484209] kasan_save_alloc_info+0x40/0x58 [ 82.488463] __kasan_kmalloc+0xd4/0xd8 [ 82.492196] __kmalloc_noprof+0x198/0x4c8 [ 82.496189] kunit_kmalloc_array+0x34/0x88 [ 82.500268] copy_user_test_oob+0xac/0xec8 [ 82.504348] kunit_try_run_case+0x170/0x3f0 [ 82.508515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.513983] kthread+0x328/0x630 [ 82.517195] ret_from_fork+0x10/0x20 [ 82.520754] [ 82.522229] The buggy address belongs to the object at ffff0008074f9300 [ 82.522229] which belongs to the cache kmalloc-128 of size 128 [ 82.534732] The buggy address is located 0 bytes inside of [ 82.534732] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.547143] [ 82.548620] The buggy address belongs to the physical page: [ 82.554176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.562160] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.569798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.576743] page_type: f5(slab) [ 82.579878] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.595326] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.603138] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.610951] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.618762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.626569] page dumped because: kasan: bad access detected [ 82.632124] [ 82.633600] Memory state around the buggy address: [ 82.638379] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.645582] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.652787] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.659988] ^ [ 82.667110] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.674314] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.681516] ==================================================================
[ 32.921256] ================================================================== [ 32.921757] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 32.921881] Write of size 1 at addr fff00000c85fcf78 by task kunit_try_catch/316 [ 32.921956] [ 32.921990] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.922166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.922193] Hardware name: linux,dummy-virt (DT) [ 32.922754] Call trace: [ 32.922902] show_stack+0x20/0x38 (C) [ 32.923039] dump_stack_lvl+0x8c/0xd0 [ 32.923159] print_report+0x118/0x5d0 [ 32.923329] kasan_report+0xdc/0x128 [ 32.923395] __asan_report_store1_noabort+0x20/0x30 [ 32.923447] strncpy_from_user+0x270/0x2a0 [ 32.923795] copy_user_test_oob+0x5c0/0xec8 [ 32.923875] kunit_try_run_case+0x170/0x3f0 [ 32.924298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.924510] kthread+0x328/0x630 [ 32.924617] ret_from_fork+0x10/0x20 [ 32.924786] [ 32.924806] Allocated by task 316: [ 32.924835] kasan_save_stack+0x3c/0x68 [ 32.925178] kasan_save_track+0x20/0x40 [ 32.925435] kasan_save_alloc_info+0x40/0x58 [ 32.925509] __kasan_kmalloc+0xd4/0xd8 [ 32.925660] __kmalloc_noprof+0x198/0x4c8 [ 32.925930] kunit_kmalloc_array+0x34/0x88 [ 32.926130] copy_user_test_oob+0xac/0xec8 [ 32.926234] kunit_try_run_case+0x170/0x3f0 [ 32.926277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.926627] kthread+0x328/0x630 [ 32.926714] ret_from_fork+0x10/0x20 [ 32.926782] [ 32.926977] The buggy address belongs to the object at fff00000c85fcf00 [ 32.926977] which belongs to the cache kmalloc-128 of size 128 [ 32.927454] The buggy address is located 0 bytes to the right of [ 32.927454] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.927565] [ 32.927599] The buggy address belongs to the physical page: [ 32.927861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.928105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.928228] page_type: f5(slab) [ 32.928527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.928605] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.929038] page dumped because: kasan: bad access detected [ 32.929115] [ 32.929249] Memory state around the buggy address: [ 32.929708] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.929813] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.929864] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.930201] ^ [ 32.930290] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.930661] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.930803] ================================================================== [ 32.911269] ================================================================== [ 32.911338] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 32.911399] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.911452] [ 32.911489] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.911585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.911616] Hardware name: linux,dummy-virt (DT) [ 32.911659] Call trace: [ 32.911684] show_stack+0x20/0x38 (C) [ 32.911732] dump_stack_lvl+0x8c/0xd0 [ 32.911780] print_report+0x118/0x5d0 [ 32.911835] kasan_report+0xdc/0x128 [ 32.911880] kasan_check_range+0x100/0x1a8 [ 32.911926] __kasan_check_write+0x20/0x30 [ 32.911982] strncpy_from_user+0x3c/0x2a0 [ 32.912032] copy_user_test_oob+0x5c0/0xec8 [ 32.912096] kunit_try_run_case+0x170/0x3f0 [ 32.912147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.912982] kthread+0x328/0x630 [ 32.913108] ret_from_fork+0x10/0x20 [ 32.913192] [ 32.913247] Allocated by task 316: [ 32.913317] kasan_save_stack+0x3c/0x68 [ 32.913401] kasan_save_track+0x20/0x40 [ 32.913481] kasan_save_alloc_info+0x40/0x58 [ 32.913535] __kasan_kmalloc+0xd4/0xd8 [ 32.913576] __kmalloc_noprof+0x198/0x4c8 [ 32.913907] kunit_kmalloc_array+0x34/0x88 [ 32.914442] copy_user_test_oob+0xac/0xec8 [ 32.914525] kunit_try_run_case+0x170/0x3f0 [ 32.914643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.914701] kthread+0x328/0x630 [ 32.914736] ret_from_fork+0x10/0x20 [ 32.915342] [ 32.915423] The buggy address belongs to the object at fff00000c85fcf00 [ 32.915423] which belongs to the cache kmalloc-128 of size 128 [ 32.915568] The buggy address is located 0 bytes inside of [ 32.915568] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.915919] [ 32.916092] The buggy address belongs to the physical page: [ 32.916378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.916469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.916659] page_type: f5(slab) [ 32.916730] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.916923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.917299] page dumped because: kasan: bad access detected [ 32.917381] [ 32.917713] Memory state around the buggy address: [ 32.917776] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.918075] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.918209] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.918776] ^ [ 32.918959] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.919125] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.919461] ==================================================================
[ 28.494178] ================================================================== [ 28.494427] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 28.494993] Write of size 121 at addr ffff888105919e00 by task kunit_try_catch/334 [ 28.495333] [ 28.495446] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.495499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.495513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.495537] Call Trace: [ 28.495557] <TASK> [ 28.495577] dump_stack_lvl+0x73/0xb0 [ 28.495608] print_report+0xd1/0x610 [ 28.495632] ? __virt_addr_valid+0x1db/0x2d0 [ 28.495670] ? strncpy_from_user+0x2e/0x1d0 [ 28.495694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.495721] ? strncpy_from_user+0x2e/0x1d0 [ 28.495744] kasan_report+0x141/0x180 [ 28.495778] ? strncpy_from_user+0x2e/0x1d0 [ 28.495806] kasan_check_range+0x10c/0x1c0 [ 28.495829] __kasan_check_write+0x18/0x20 [ 28.495853] strncpy_from_user+0x2e/0x1d0 [ 28.495877] ? __kasan_check_read+0x15/0x20 [ 28.495903] copy_user_test_oob+0x760/0x10f0 [ 28.495930] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.495953] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.495985] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.496013] kunit_try_run_case+0x1a5/0x480 [ 28.496036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.496057] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.496083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.496107] ? __kthread_parkme+0x82/0x180 [ 28.496130] ? preempt_count_sub+0x50/0x80 [ 28.496155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.496178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.496205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.496231] kthread+0x337/0x6f0 [ 28.496252] ? trace_preempt_on+0x20/0xc0 [ 28.496277] ? __pfx_kthread+0x10/0x10 [ 28.496299] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.496322] ? calculate_sigpending+0x7b/0xa0 [ 28.496347] ? __pfx_kthread+0x10/0x10 [ 28.496370] ret_from_fork+0x116/0x1d0 [ 28.496391] ? __pfx_kthread+0x10/0x10 [ 28.496413] ret_from_fork_asm+0x1a/0x30 [ 28.496445] </TASK> [ 28.496457] [ 28.503497] Allocated by task 334: [ 28.503632] kasan_save_stack+0x45/0x70 [ 28.503847] kasan_save_track+0x18/0x40 [ 28.504035] kasan_save_alloc_info+0x3b/0x50 [ 28.504243] __kasan_kmalloc+0xb7/0xc0 [ 28.504431] __kmalloc_noprof+0x1c9/0x500 [ 28.504765] kunit_kmalloc_array+0x25/0x60 [ 28.504979] copy_user_test_oob+0xab/0x10f0 [ 28.505182] kunit_try_run_case+0x1a5/0x480 [ 28.505383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.505645] kthread+0x337/0x6f0 [ 28.505802] ret_from_fork+0x116/0x1d0 [ 28.505929] ret_from_fork_asm+0x1a/0x30 [ 28.506068] [ 28.506134] The buggy address belongs to the object at ffff888105919e00 [ 28.506134] which belongs to the cache kmalloc-128 of size 128 [ 28.506977] The buggy address is located 0 bytes inside of [ 28.506977] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.507409] [ 28.507510] The buggy address belongs to the physical page: [ 28.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.508127] flags: 0x200000000000000(node=0|zone=2) [ 28.508341] page_type: f5(slab) [ 28.508474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.508736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.509088] page dumped because: kasan: bad access detected [ 28.509310] [ 28.509397] Memory state around the buggy address: [ 28.509594] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.509937] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.510174] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.510412] ^ [ 28.510731] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.511020] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.511227] ================================================================== [ 28.513094] ================================================================== [ 28.513882] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 28.514674] Write of size 1 at addr ffff888105919e78 by task kunit_try_catch/334 [ 28.515569] [ 28.515900] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.515964] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.515980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.516005] Call Trace: [ 28.516025] <TASK> [ 28.516048] dump_stack_lvl+0x73/0xb0 [ 28.516089] print_report+0xd1/0x610 [ 28.516116] ? __virt_addr_valid+0x1db/0x2d0 [ 28.516141] ? strncpy_from_user+0x1a5/0x1d0 [ 28.516167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.516194] ? strncpy_from_user+0x1a5/0x1d0 [ 28.516217] kasan_report+0x141/0x180 [ 28.516240] ? strncpy_from_user+0x1a5/0x1d0 [ 28.516268] __asan_report_store1_noabort+0x1b/0x30 [ 28.516292] strncpy_from_user+0x1a5/0x1d0 [ 28.516318] copy_user_test_oob+0x760/0x10f0 [ 28.516345] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.516368] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.516399] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.516427] kunit_try_run_case+0x1a5/0x480 [ 28.516450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.516471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.516496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.516521] ? __kthread_parkme+0x82/0x180 [ 28.516544] ? preempt_count_sub+0x50/0x80 [ 28.516568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.516591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.516617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.516643] kthread+0x337/0x6f0 [ 28.516674] ? trace_preempt_on+0x20/0xc0 [ 28.516700] ? __pfx_kthread+0x10/0x10 [ 28.516721] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.516744] ? calculate_sigpending+0x7b/0xa0 [ 28.516769] ? __pfx_kthread+0x10/0x10 [ 28.516792] ret_from_fork+0x116/0x1d0 [ 28.516822] ? __pfx_kthread+0x10/0x10 [ 28.516845] ret_from_fork_asm+0x1a/0x30 [ 28.516877] </TASK> [ 28.516889] [ 28.525708] Allocated by task 334: [ 28.525886] kasan_save_stack+0x45/0x70 [ 28.526072] kasan_save_track+0x18/0x40 [ 28.526245] kasan_save_alloc_info+0x3b/0x50 [ 28.526389] __kasan_kmalloc+0xb7/0xc0 [ 28.526547] __kmalloc_noprof+0x1c9/0x500 [ 28.526759] kunit_kmalloc_array+0x25/0x60 [ 28.526960] copy_user_test_oob+0xab/0x10f0 [ 28.527165] kunit_try_run_case+0x1a5/0x480 [ 28.527312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.527482] kthread+0x337/0x6f0 [ 28.527599] ret_from_fork+0x116/0x1d0 [ 28.527769] ret_from_fork_asm+0x1a/0x30 [ 28.527961] [ 28.528054] The buggy address belongs to the object at ffff888105919e00 [ 28.528054] which belongs to the cache kmalloc-128 of size 128 [ 28.528511] The buggy address is located 0 bytes to the right of [ 28.528511] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.529244] [ 28.529358] The buggy address belongs to the physical page: [ 28.529585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.529941] flags: 0x200000000000000(node=0|zone=2) [ 28.530109] page_type: f5(slab) [ 28.530228] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.530563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.530917] page dumped because: kasan: bad access detected [ 28.531108] [ 28.531208] Memory state around the buggy address: [ 28.531416] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.531635] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.532170] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.532455] ^ [ 28.532732] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.533001] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.533208] ==================================================================