Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 81.158794] ================================================================== [ 81.172996] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 81.180370] Read of size 8 at addr ffff000800de4878 by task kunit_try_catch/362 [ 81.187661] [ 81.189146] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 81.189205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.189223] Hardware name: WinLink E850-96 board (DT) [ 81.189250] Call trace: [ 81.189265] show_stack+0x20/0x38 (C) [ 81.189303] dump_stack_lvl+0x8c/0xd0 [ 81.189340] print_report+0x118/0x5d0 [ 81.189371] kasan_report+0xdc/0x128 [ 81.189400] __asan_report_load8_noabort+0x20/0x30 [ 81.189435] copy_to_kernel_nofault+0x204/0x250 [ 81.189472] copy_to_kernel_nofault_oob+0x158/0x418 [ 81.189509] kunit_try_run_case+0x170/0x3f0 [ 81.189541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.189579] kthread+0x328/0x630 [ 81.189609] ret_from_fork+0x10/0x20 [ 81.189643] [ 81.258406] Allocated by task 362: [ 81.261793] kasan_save_stack+0x3c/0x68 [ 81.265610] kasan_save_track+0x20/0x40 [ 81.269429] kasan_save_alloc_info+0x40/0x58 [ 81.273683] __kasan_kmalloc+0xd4/0xd8 [ 81.277415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.281929] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.286704] kunit_try_run_case+0x170/0x3f0 [ 81.290870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.296340] kthread+0x328/0x630 [ 81.299550] ret_from_fork+0x10/0x20 [ 81.303109] [ 81.304587] The buggy address belongs to the object at ffff000800de4800 [ 81.304587] which belongs to the cache kmalloc-128 of size 128 [ 81.317089] The buggy address is located 0 bytes to the right of [ 81.317089] allocated 120-byte region [ffff000800de4800, ffff000800de4878) [ 81.330019] [ 81.331498] The buggy address belongs to the physical page: [ 81.337056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 81.345038] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.352676] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.359620] page_type: f5(slab) [ 81.362757] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.370476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.378206] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.386014] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.393827] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 81.401639] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.409446] page dumped because: kasan: bad access detected [ 81.415000] [ 81.416476] Memory state around the buggy address: [ 81.421257] ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.428460] ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.435666] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.442864] ^ [ 81.449986] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.457191] ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.464392] ================================================================== [ 81.471836] ================================================================== [ 81.478804] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 81.486095] Write of size 8 at addr ffff000800de4878 by task kunit_try_catch/362 [ 81.493471] [ 81.494956] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 81.495016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.495034] Hardware name: WinLink E850-96 board (DT) [ 81.495053] Call trace: [ 81.495063] show_stack+0x20/0x38 (C) [ 81.495097] dump_stack_lvl+0x8c/0xd0 [ 81.495133] print_report+0x118/0x5d0 [ 81.495164] kasan_report+0xdc/0x128 [ 81.495189] kasan_check_range+0x100/0x1a8 [ 81.495220] __kasan_check_write+0x20/0x30 [ 81.495252] copy_to_kernel_nofault+0x8c/0x250 [ 81.495287] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 81.495323] kunit_try_run_case+0x170/0x3f0 [ 81.495356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.495391] kthread+0x328/0x630 [ 81.495420] ret_from_fork+0x10/0x20 [ 81.495455] [ 81.567515] Allocated by task 362: [ 81.570903] kasan_save_stack+0x3c/0x68 [ 81.574720] kasan_save_track+0x20/0x40 [ 81.578539] kasan_save_alloc_info+0x40/0x58 [ 81.582793] __kasan_kmalloc+0xd4/0xd8 [ 81.586526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.591039] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.595814] kunit_try_run_case+0x170/0x3f0 [ 81.599980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.605450] kthread+0x328/0x630 [ 81.608660] ret_from_fork+0x10/0x20 [ 81.612220] [ 81.613697] The buggy address belongs to the object at ffff000800de4800 [ 81.613697] which belongs to the cache kmalloc-128 of size 128 [ 81.626195] The buggy address is located 0 bytes to the right of [ 81.626195] allocated 120-byte region [ffff000800de4800, ffff000800de4878) [ 81.639128] [ 81.640608] The buggy address belongs to the physical page: [ 81.646164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 81.654147] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.661788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.668729] page_type: f5(slab) [ 81.671866] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.679586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.687313] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.695124] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.702937] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 81.710749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.718554] page dumped because: kasan: bad access detected [ 81.724111] [ 81.725585] Memory state around the buggy address: [ 81.730367] ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.737570] ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.744773] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.751974] ^ [ 81.759096] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.766301] ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.773502] ==================================================================
[ 33.635239] ================================================================== [ 33.635297] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.635352] Write of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313 [ 33.635404] [ 33.637859] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.637965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.637993] Hardware name: linux,dummy-virt (DT) [ 33.638027] Call trace: [ 33.638051] show_stack+0x20/0x38 (C) [ 33.638109] dump_stack_lvl+0x8c/0xd0 [ 33.638161] print_report+0x118/0x5d0 [ 33.638206] kasan_report+0xdc/0x128 [ 33.638253] kasan_check_range+0x100/0x1a8 [ 33.638301] __kasan_check_write+0x20/0x30 [ 33.638351] copy_to_kernel_nofault+0x8c/0x250 [ 33.638405] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.638927] kunit_try_run_case+0x170/0x3f0 [ 33.639306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.639487] kthread+0x328/0x630 [ 33.639538] ret_from_fork+0x10/0x20 [ 33.639998] [ 33.640031] Allocated by task 313: [ 33.640246] kasan_save_stack+0x3c/0x68 [ 33.640499] kasan_save_track+0x20/0x40 [ 33.640710] kasan_save_alloc_info+0x40/0x58 [ 33.640763] __kasan_kmalloc+0xd4/0xd8 [ 33.640812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.640856] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.640900] kunit_try_run_case+0x170/0x3f0 [ 33.640939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.640983] kthread+0x328/0x630 [ 33.641414] ret_from_fork+0x10/0x20 [ 33.641793] [ 33.641828] The buggy address belongs to the object at fff00000c64f9500 [ 33.641828] which belongs to the cache kmalloc-128 of size 128 [ 33.641923] The buggy address is located 0 bytes to the right of [ 33.641923] allocated 120-byte region [fff00000c64f9500, fff00000c64f9578) [ 33.641989] [ 33.642206] The buggy address belongs to the physical page: [ 33.642266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.642323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.642736] page_type: f5(slab) [ 33.642849] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.642982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.643323] page dumped because: kasan: bad access detected [ 33.643528] [ 33.643608] Memory state around the buggy address: [ 33.643826] fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.643915] fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644183] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.644409] ^ [ 33.644470] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644516] fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644557] ================================================================== [ 33.622977] ================================================================== [ 33.623047] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.623127] Read of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313 [ 33.623179] [ 33.623221] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.623312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.623340] Hardware name: linux,dummy-virt (DT) [ 33.623375] Call trace: [ 33.623401] show_stack+0x20/0x38 (C) [ 33.623586] dump_stack_lvl+0x8c/0xd0 [ 33.623758] print_report+0x118/0x5d0 [ 33.624307] kasan_report+0xdc/0x128 [ 33.624377] __asan_report_load8_noabort+0x20/0x30 [ 33.624928] copy_to_kernel_nofault+0x204/0x250 [ 33.625000] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.625055] kunit_try_run_case+0x170/0x3f0 [ 33.625632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.625840] kthread+0x328/0x630 [ 33.625938] ret_from_fork+0x10/0x20 [ 33.626000] [ 33.626029] Allocated by task 313: [ 33.626063] kasan_save_stack+0x3c/0x68 [ 33.626132] kasan_save_track+0x20/0x40 [ 33.626175] kasan_save_alloc_info+0x40/0x58 [ 33.626216] __kasan_kmalloc+0xd4/0xd8 [ 33.626256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.626621] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.626668] kunit_try_run_case+0x170/0x3f0 [ 33.626715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.626904] kthread+0x328/0x630 [ 33.626945] ret_from_fork+0x10/0x20 [ 33.626994] [ 33.627334] The buggy address belongs to the object at fff00000c64f9500 [ 33.627334] which belongs to the cache kmalloc-128 of size 128 [ 33.627743] The buggy address is located 0 bytes to the right of [ 33.627743] allocated 120-byte region [fff00000c64f9500, fff00000c64f9578) [ 33.627891] [ 33.628132] The buggy address belongs to the physical page: [ 33.628634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.629056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.629699] page_type: f5(slab) [ 33.629854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.629911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.630356] page dumped because: kasan: bad access detected [ 33.630927] [ 33.631105] Memory state around the buggy address: [ 33.631506] fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.631556] fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.632145] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.632543] ^ [ 33.632780] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633276] fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633580] ==================================================================
[ 27.967751] ================================================================== [ 27.968481] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 27.968999] Write of size 8 at addr ffff8881060ab278 by task kunit_try_catch/329 [ 27.969508] [ 27.969676] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.969812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.969827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.969848] Call Trace: [ 27.969862] <TASK> [ 27.969878] dump_stack_lvl+0x73/0xb0 [ 27.969908] print_report+0xd1/0x610 [ 27.969932] ? __virt_addr_valid+0x1db/0x2d0 [ 27.969955] ? copy_to_kernel_nofault+0x99/0x260 [ 27.969979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.970007] ? copy_to_kernel_nofault+0x99/0x260 [ 27.970032] kasan_report+0x141/0x180 [ 27.970056] ? copy_to_kernel_nofault+0x99/0x260 [ 27.970085] kasan_check_range+0x10c/0x1c0 [ 27.970110] __kasan_check_write+0x18/0x20 [ 27.970135] copy_to_kernel_nofault+0x99/0x260 [ 27.970162] copy_to_kernel_nofault_oob+0x288/0x560 [ 27.970187] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.970210] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.970235] ? trace_hardirqs_on+0x37/0xe0 [ 27.970267] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.970296] kunit_try_run_case+0x1a5/0x480 [ 27.970320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.970343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.970366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.970390] ? __kthread_parkme+0x82/0x180 [ 27.970411] ? preempt_count_sub+0x50/0x80 [ 27.970435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.970459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.970495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.970523] kthread+0x337/0x6f0 [ 27.970556] ? trace_preempt_on+0x20/0xc0 [ 27.970588] ? __pfx_kthread+0x10/0x10 [ 27.970610] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.970644] ? calculate_sigpending+0x7b/0xa0 [ 27.970668] ? __pfx_kthread+0x10/0x10 [ 27.970691] ret_from_fork+0x116/0x1d0 [ 27.970711] ? __pfx_kthread+0x10/0x10 [ 27.970732] ret_from_fork_asm+0x1a/0x30 [ 27.970766] </TASK> [ 27.970777] [ 27.979195] Allocated by task 329: [ 27.979325] kasan_save_stack+0x45/0x70 [ 27.979467] kasan_save_track+0x18/0x40 [ 27.981144] kasan_save_alloc_info+0x3b/0x50 [ 27.982361] __kasan_kmalloc+0xb7/0xc0 [ 27.982866] __kmalloc_cache_noprof+0x189/0x420 [ 27.983572] copy_to_kernel_nofault_oob+0x12f/0x560 [ 27.984375] kunit_try_run_case+0x1a5/0x480 [ 27.984983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.985269] kthread+0x337/0x6f0 [ 27.985444] ret_from_fork+0x116/0x1d0 [ 27.985627] ret_from_fork_asm+0x1a/0x30 [ 27.985796] [ 27.985895] The buggy address belongs to the object at ffff8881060ab200 [ 27.985895] which belongs to the cache kmalloc-128 of size 128 [ 27.986411] The buggy address is located 0 bytes to the right of [ 27.986411] allocated 120-byte region [ffff8881060ab200, ffff8881060ab278) [ 27.986950] [ 27.987066] The buggy address belongs to the physical page: [ 27.987312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab [ 27.987713] flags: 0x200000000000000(node=0|zone=2) [ 27.987899] page_type: f5(slab) [ 27.988058] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.988353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.988586] page dumped because: kasan: bad access detected [ 27.989139] [ 27.989228] Memory state around the buggy address: [ 27.989474] ffff8881060ab100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.989904] ffff8881060ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.990188] >ffff8881060ab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.990484] ^ [ 27.991399] ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.991808] ffff8881060ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.992212] ================================================================== [ 27.943916] ================================================================== [ 27.944713] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 27.945067] Read of size 8 at addr ffff8881060ab278 by task kunit_try_catch/329 [ 27.945463] [ 27.945575] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.945631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.945646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.945669] Call Trace: [ 27.945683] <TASK> [ 27.945703] dump_stack_lvl+0x73/0xb0 [ 27.945736] print_report+0xd1/0x610 [ 27.945761] ? __virt_addr_valid+0x1db/0x2d0 [ 27.945786] ? copy_to_kernel_nofault+0x225/0x260 [ 27.945810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.945838] ? copy_to_kernel_nofault+0x225/0x260 [ 27.945862] kasan_report+0x141/0x180 [ 27.945886] ? copy_to_kernel_nofault+0x225/0x260 [ 27.945917] __asan_report_load8_noabort+0x18/0x20 [ 27.945942] copy_to_kernel_nofault+0x225/0x260 [ 27.945969] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 27.945994] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.946018] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.946044] ? trace_hardirqs_on+0x37/0xe0 [ 27.946077] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 27.946105] kunit_try_run_case+0x1a5/0x480 [ 27.946131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.946153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.946177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.946200] ? __kthread_parkme+0x82/0x180 [ 27.946221] ? preempt_count_sub+0x50/0x80 [ 27.946247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.946271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.946299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.946326] kthread+0x337/0x6f0 [ 27.946346] ? trace_preempt_on+0x20/0xc0 [ 27.946370] ? __pfx_kthread+0x10/0x10 [ 27.946391] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.946417] ? calculate_sigpending+0x7b/0xa0 [ 27.946442] ? __pfx_kthread+0x10/0x10 [ 27.946464] ret_from_fork+0x116/0x1d0 [ 27.946491] ? __pfx_kthread+0x10/0x10 [ 27.946514] ret_from_fork_asm+0x1a/0x30 [ 27.946558] </TASK> [ 27.946770] [ 27.956668] Allocated by task 329: [ 27.956833] kasan_save_stack+0x45/0x70 [ 27.956978] kasan_save_track+0x18/0x40 [ 27.957501] kasan_save_alloc_info+0x3b/0x50 [ 27.957785] __kasan_kmalloc+0xb7/0xc0 [ 27.957964] __kmalloc_cache_noprof+0x189/0x420 [ 27.958314] copy_to_kernel_nofault_oob+0x12f/0x560 [ 27.958554] kunit_try_run_case+0x1a5/0x480 [ 27.959015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.959238] kthread+0x337/0x6f0 [ 27.959522] ret_from_fork+0x116/0x1d0 [ 27.959748] ret_from_fork_asm+0x1a/0x30 [ 27.960039] [ 27.960114] The buggy address belongs to the object at ffff8881060ab200 [ 27.960114] which belongs to the cache kmalloc-128 of size 128 [ 27.960612] The buggy address is located 0 bytes to the right of [ 27.960612] allocated 120-byte region [ffff8881060ab200, ffff8881060ab278) [ 27.961424] [ 27.961613] The buggy address belongs to the physical page: [ 27.961836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab [ 27.962357] flags: 0x200000000000000(node=0|zone=2) [ 27.962696] page_type: f5(slab) [ 27.962865] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.963328] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.963777] page dumped because: kasan: bad access detected [ 27.963966] [ 27.964062] Memory state around the buggy address: [ 27.964385] ffff8881060ab100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.964930] ffff8881060ab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.965354] >ffff8881060ab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.965660] ^ [ 27.966063] ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.966471] ffff8881060ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.966867] ==================================================================