Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   83.628439] ==================================================================
[   83.635543] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   83.642398] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.649949] 
[   83.651432] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.651481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.651497] Hardware name: WinLink E850-96 board (DT)
[   83.651517] Call trace:
[   83.651531]  show_stack+0x20/0x38 (C)
[   83.651567]  dump_stack_lvl+0x8c/0xd0
[   83.651599]  print_report+0x118/0x5d0
[   83.651628]  kasan_report+0xdc/0x128
[   83.651656]  kasan_check_range+0x100/0x1a8
[   83.651685]  __kasan_check_write+0x20/0x30
[   83.651715]  strncpy_from_user+0x3c/0x2a0
[   83.651748]  copy_user_test_oob+0x5c0/0xec8
[   83.651783]  kunit_try_run_case+0x170/0x3f0
[   83.651811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.651844]  kthread+0x328/0x630
[   83.651873]  ret_from_fork+0x10/0x20
[   83.651907] 
[   83.722865] Allocated by task 366:
[   83.726252]  kasan_save_stack+0x3c/0x68
[   83.730070]  kasan_save_track+0x20/0x40
[   83.733889]  kasan_save_alloc_info+0x40/0x58
[   83.738143]  __kasan_kmalloc+0xd4/0xd8
[   83.741875]  __kmalloc_noprof+0x198/0x4c8
[   83.745867]  kunit_kmalloc_array+0x34/0x88
[   83.749948]  copy_user_test_oob+0xac/0xec8
[   83.754028]  kunit_try_run_case+0x170/0x3f0
[   83.758194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.763663]  kthread+0x328/0x630
[   83.766874]  ret_from_fork+0x10/0x20
[   83.770434] 
[   83.771909] The buggy address belongs to the object at ffff000800de4900
[   83.771909]  which belongs to the cache kmalloc-128 of size 128
[   83.784409] The buggy address is located 0 bytes inside of
[   83.784409]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.796822] 
[   83.798299] The buggy address belongs to the physical page:
[   83.803857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.811839] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.819477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.826422] page_type: f5(slab)
[   83.829557] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.837279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.845006] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.852817] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.860630] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.868442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.876248] page dumped because: kasan: bad access detected
[   83.881803] 
[   83.883279] Memory state around the buggy address:
[   83.888057]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.895262]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.902467] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.909667]                                                                 ^
[   83.916789]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.923994]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.931195] ==================================================================
[   83.938678] ==================================================================
[   83.945607] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   83.952551] Write of size 1 at addr ffff000800de4978 by task kunit_try_catch/366
[   83.959927] 
[   83.961408] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.961460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.961477] Hardware name: WinLink E850-96 board (DT)
[   83.961496] Call trace:
[   83.961510]  show_stack+0x20/0x38 (C)
[   83.961544]  dump_stack_lvl+0x8c/0xd0
[   83.961580]  print_report+0x118/0x5d0
[   83.961607]  kasan_report+0xdc/0x128
[   83.961636]  __asan_report_store1_noabort+0x20/0x30
[   83.961669]  strncpy_from_user+0x270/0x2a0
[   83.961700]  copy_user_test_oob+0x5c0/0xec8
[   83.961735]  kunit_try_run_case+0x170/0x3f0
[   83.961766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.961799]  kthread+0x328/0x630
[   83.961828]  ret_from_fork+0x10/0x20
[   83.961859] 
[   84.029631] Allocated by task 366:
[   84.033021]  kasan_save_stack+0x3c/0x68
[   84.036836]  kasan_save_track+0x20/0x40
[   84.040655]  kasan_save_alloc_info+0x40/0x58
[   84.044909]  __kasan_kmalloc+0xd4/0xd8
[   84.048641]  __kmalloc_noprof+0x198/0x4c8
[   84.052634]  kunit_kmalloc_array+0x34/0x88
[   84.056714]  copy_user_test_oob+0xac/0xec8
[   84.060794]  kunit_try_run_case+0x170/0x3f0
[   84.064960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.070429]  kthread+0x328/0x630
[   84.073641]  ret_from_fork+0x10/0x20
[   84.077200] 
[   84.078675] The buggy address belongs to the object at ffff000800de4900
[   84.078675]  which belongs to the cache kmalloc-128 of size 128
[   84.091177] The buggy address is located 0 bytes to the right of
[   84.091177]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   84.104109] 
[   84.105588] The buggy address belongs to the physical page:
[   84.111144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   84.119126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   84.126766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   84.133709] page_type: f5(slab)
[   84.136845] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   84.144567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.152293] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   84.160104] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.167917] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   84.175729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   84.183535] page dumped because: kasan: bad access detected
[   84.189090] 
[   84.190566] Memory state around the buggy address:
[   84.195344]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.202549]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.209753] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.216955]                                                                 ^
[   84.224076]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.231281]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.238482] ==================================================================

[   33.783973] ==================================================================
[   33.784024] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   33.784079] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317
[   33.784132] 
[   33.784163] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.784247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.785235] Hardware name: linux,dummy-virt (DT)
[   33.785610] Call trace:
[   33.786074]  show_stack+0x20/0x38 (C)
[   33.786134]  dump_stack_lvl+0x8c/0xd0
[   33.786407]  print_report+0x118/0x5d0
[   33.786481]  kasan_report+0xdc/0x128
[   33.786527]  kasan_check_range+0x100/0x1a8
[   33.786575]  __kasan_check_write+0x20/0x30
[   33.786624]  strncpy_from_user+0x3c/0x2a0
[   33.787443]  copy_user_test_oob+0x5c0/0xec8
[   33.787499]  kunit_try_run_case+0x170/0x3f0
[   33.787548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.787604]  kthread+0x328/0x630
[   33.787648]  ret_from_fork+0x10/0x20
[   33.788636] 
[   33.788675] Allocated by task 317:
[   33.788705]  kasan_save_stack+0x3c/0x68
[   33.789044]  kasan_save_track+0x20/0x40
[   33.789095]  kasan_save_alloc_info+0x40/0x58
[   33.789364]  __kasan_kmalloc+0xd4/0xd8
[   33.789405]  __kmalloc_noprof+0x198/0x4c8
[   33.789457]  kunit_kmalloc_array+0x34/0x88
[   33.789496]  copy_user_test_oob+0xac/0xec8
[   33.789775]  kunit_try_run_case+0x170/0x3f0
[   33.790403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.791059]  kthread+0x328/0x630
[   33.791114]  ret_from_fork+0x10/0x20
[   33.791157] 
[   33.791180] The buggy address belongs to the object at fff00000c64f9600
[   33.791180]  which belongs to the cache kmalloc-128 of size 128
[   33.791242] The buggy address is located 0 bytes inside of
[   33.791242]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.791307] 
[   33.791456] The buggy address belongs to the physical page:
[   33.791768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.792202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.792413] page_type: f5(slab)
[   33.792466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.792520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.792563] page dumped because: kasan: bad access detected
[   33.792598] 
[   33.792617] Memory state around the buggy address:
[   33.792652]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.792704]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.793272] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.793444]                                                                 ^
[   33.793659]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794019]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794254] ==================================================================
[   33.797683] ==================================================================
[   33.797743] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   33.797795] Write of size 1 at addr fff00000c64f9678 by task kunit_try_catch/317
[   33.797845] 
[   33.797882] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.798025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.798057] Hardware name: linux,dummy-virt (DT)
[   33.798091] Call trace:
[   33.798116]  show_stack+0x20/0x38 (C)
[   33.798168]  dump_stack_lvl+0x8c/0xd0
[   33.798228]  print_report+0x118/0x5d0
[   33.798313]  kasan_report+0xdc/0x128
[   33.798358]  __asan_report_store1_noabort+0x20/0x30
[   33.798429]  strncpy_from_user+0x270/0x2a0
[   33.798487]  copy_user_test_oob+0x5c0/0xec8
[   33.798536]  kunit_try_run_case+0x170/0x3f0
[   33.798584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.798638]  kthread+0x328/0x630
[   33.798681]  ret_from_fork+0x10/0x20
[   33.798870] 
[   33.798935] Allocated by task 317:
[   33.798964]  kasan_save_stack+0x3c/0x68
[   33.799057]  kasan_save_track+0x20/0x40
[   33.799100]  kasan_save_alloc_info+0x40/0x58
[   33.799171]  __kasan_kmalloc+0xd4/0xd8
[   33.799362]  __kmalloc_noprof+0x198/0x4c8
[   33.799523]  kunit_kmalloc_array+0x34/0x88
[   33.799563]  copy_user_test_oob+0xac/0xec8
[   33.799609]  kunit_try_run_case+0x170/0x3f0
[   33.799656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.799849]  kthread+0x328/0x630
[   33.799891]  ret_from_fork+0x10/0x20
[   33.800046] 
[   33.800101] The buggy address belongs to the object at fff00000c64f9600
[   33.800101]  which belongs to the cache kmalloc-128 of size 128
[   33.800161] The buggy address is located 0 bytes to the right of
[   33.800161]  allocated 120-byte region [fff00000c64f9600, fff00000c64f9678)
[   33.800256] 
[   33.800330] The buggy address belongs to the physical page:
[   33.800408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   33.800806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.800923] page_type: f5(slab)
[   33.801077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.801162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.801205] page dumped because: kasan: bad access detected
[   33.801490] 
[   33.801516] Memory state around the buggy address:
[   33.801702]  fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.801752]  fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.802276] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.802328]                                                                 ^
[   33.802372]  fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.802417]  fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.803002] ==================================================================

[   28.134632] ==================================================================
[   28.134867] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   28.135087] Write of size 121 at addr ffff8881060ab300 by task kunit_try_catch/333
[   28.135307] 
[   28.135385] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.135433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.135447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.135468] Call Trace:
[   28.135484]  <TASK>
[   28.135499]  dump_stack_lvl+0x73/0xb0
[   28.135526]  print_report+0xd1/0x610
[   28.135565]  ? __virt_addr_valid+0x1db/0x2d0
[   28.135589]  ? strncpy_from_user+0x2e/0x1d0
[   28.135611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.135638]  ? strncpy_from_user+0x2e/0x1d0
[   28.136044]  kasan_report+0x141/0x180
[   28.136074]  ? strncpy_from_user+0x2e/0x1d0
[   28.136103]  kasan_check_range+0x10c/0x1c0
[   28.136129]  __kasan_check_write+0x18/0x20
[   28.136155]  strncpy_from_user+0x2e/0x1d0
[   28.136180]  copy_user_test_oob+0x760/0x10f0
[   28.136208]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.136232]  ? finish_task_switch.isra.0+0x153/0x700
[   28.136255]  ? __switch_to+0x47/0xf80
[   28.136281]  ? __schedule+0x10cc/0x2b60
[   28.136305]  ? __pfx_read_tsc+0x10/0x10
[   28.136328]  ? ktime_get_ts64+0x86/0x230
[   28.136353]  kunit_try_run_case+0x1a5/0x480
[   28.136378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.136401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.136687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.136716]  ? __kthread_parkme+0x82/0x180
[   28.136739]  ? preempt_count_sub+0x50/0x80
[   28.136764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.136788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.136815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.136843]  kthread+0x337/0x6f0
[   28.136863]  ? trace_preempt_on+0x20/0xc0
[   28.136888]  ? __pfx_kthread+0x10/0x10
[   28.136910]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.136935]  ? calculate_sigpending+0x7b/0xa0
[   28.136959]  ? __pfx_kthread+0x10/0x10
[   28.136982]  ret_from_fork+0x116/0x1d0
[   28.137002]  ? __pfx_kthread+0x10/0x10
[   28.137023]  ret_from_fork_asm+0x1a/0x30
[   28.137056]  </TASK>
[   28.137068] 
[   28.146850] Allocated by task 333:
[   28.146978]  kasan_save_stack+0x45/0x70
[   28.147121]  kasan_save_track+0x18/0x40
[   28.147251]  kasan_save_alloc_info+0x3b/0x50
[   28.147395]  __kasan_kmalloc+0xb7/0xc0
[   28.147540]  __kmalloc_noprof+0x1c9/0x500
[   28.147739]  kunit_kmalloc_array+0x25/0x60
[   28.147920]  copy_user_test_oob+0xab/0x10f0
[   28.148102]  kunit_try_run_case+0x1a5/0x480
[   28.148282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.148515]  kthread+0x337/0x6f0
[   28.148685]  ret_from_fork+0x116/0x1d0
[   28.148850]  ret_from_fork_asm+0x1a/0x30
[   28.149020] 
[   28.149094] The buggy address belongs to the object at ffff8881060ab300
[   28.149094]  which belongs to the cache kmalloc-128 of size 128
[   28.149617] The buggy address is located 0 bytes inside of
[   28.149617]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.150075] 
[   28.150163] The buggy address belongs to the physical page:
[   28.150375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.150649] flags: 0x200000000000000(node=0|zone=2)
[   28.150811] page_type: f5(slab)
[   28.150973] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.151304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.151725] page dumped because: kasan: bad access detected
[   28.151974] 
[   28.152066] Memory state around the buggy address:
[   28.152253]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.152492]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.152735] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.152984]                                                                 ^
[   28.153300]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.153652]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.153959] ==================================================================
[   28.154491] ==================================================================
[   28.154861] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   28.155118] Write of size 1 at addr ffff8881060ab378 by task kunit_try_catch/333
[   28.155337] 
[   28.155430] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   28.155477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.155491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.155514] Call Trace:
[   28.155528]  <TASK>
[   28.155555]  dump_stack_lvl+0x73/0xb0
[   28.155583]  print_report+0xd1/0x610
[   28.155627]  ? __virt_addr_valid+0x1db/0x2d0
[   28.155652]  ? strncpy_from_user+0x1a5/0x1d0
[   28.155674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.155702]  ? strncpy_from_user+0x1a5/0x1d0
[   28.155725]  kasan_report+0x141/0x180
[   28.155748]  ? strncpy_from_user+0x1a5/0x1d0
[   28.155775]  __asan_report_store1_noabort+0x1b/0x30
[   28.155801]  strncpy_from_user+0x1a5/0x1d0
[   28.155826]  copy_user_test_oob+0x760/0x10f0
[   28.155853]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.155877]  ? finish_task_switch.isra.0+0x153/0x700
[   28.155898]  ? __switch_to+0x47/0xf80
[   28.155925]  ? __schedule+0x10cc/0x2b60
[   28.155947]  ? __pfx_read_tsc+0x10/0x10
[   28.155969]  ? ktime_get_ts64+0x86/0x230
[   28.155993]  kunit_try_run_case+0x1a5/0x480
[   28.156018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.156040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.156063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.156086]  ? __kthread_parkme+0x82/0x180
[   28.156107]  ? preempt_count_sub+0x50/0x80
[   28.156132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.156157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.156183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.156210]  kthread+0x337/0x6f0
[   28.156232]  ? trace_preempt_on+0x20/0xc0
[   28.156255]  ? __pfx_kthread+0x10/0x10
[   28.156277]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.156303]  ? calculate_sigpending+0x7b/0xa0
[   28.156327]  ? __pfx_kthread+0x10/0x10
[   28.156351]  ret_from_fork+0x116/0x1d0
[   28.156371]  ? __pfx_kthread+0x10/0x10
[   28.156393]  ret_from_fork_asm+0x1a/0x30
[   28.156426]  </TASK>
[   28.156437] 
[   28.163345] Allocated by task 333:
[   28.163520]  kasan_save_stack+0x45/0x70
[   28.163751]  kasan_save_track+0x18/0x40
[   28.163891]  kasan_save_alloc_info+0x3b/0x50
[   28.164035]  __kasan_kmalloc+0xb7/0xc0
[   28.164162]  __kmalloc_noprof+0x1c9/0x500
[   28.164317]  kunit_kmalloc_array+0x25/0x60
[   28.164518]  copy_user_test_oob+0xab/0x10f0
[   28.164752]  kunit_try_run_case+0x1a5/0x480
[   28.164956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.165204]  kthread+0x337/0x6f0
[   28.165326]  ret_from_fork+0x116/0x1d0
[   28.165511]  ret_from_fork_asm+0x1a/0x30
[   28.165720] 
[   28.165786] The buggy address belongs to the object at ffff8881060ab300
[   28.165786]  which belongs to the cache kmalloc-128 of size 128
[   28.166184] The buggy address is located 0 bytes to the right of
[   28.166184]  allocated 120-byte region [ffff8881060ab300, ffff8881060ab378)
[   28.166771] 
[   28.166864] The buggy address belongs to the physical page:
[   28.167119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   28.167426] flags: 0x200000000000000(node=0|zone=2)
[   28.167643] page_type: f5(slab)
[   28.167793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.168035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.168370] page dumped because: kasan: bad access detected
[   28.168651] 
[   28.168718] Memory state around the buggy address:
[   28.168907]  ffff8881060ab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.169189]  ffff8881060ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.169457] >ffff8881060ab300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.169776]                                                                 ^
[   28.170039]  ffff8881060ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.170251]  ffff8881060ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.170457] ==================================================================