Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 61.895894] ================================================================== [ 61.910055] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 61.917429] Read of size 8 at addr ffff000802408b78 by task kunit_try_catch/328 [ 61.924720] [ 61.926205] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.926261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.926277] Hardware name: WinLink E850-96 board (DT) [ 61.926298] Call trace: [ 61.926315] show_stack+0x20/0x38 (C) [ 61.926353] dump_stack_lvl+0x8c/0xd0 [ 61.926390] print_report+0x118/0x608 [ 61.926425] kasan_report+0xdc/0x128 [ 61.926454] __asan_report_load8_noabort+0x20/0x30 [ 61.926492] copy_to_kernel_nofault+0x204/0x250 [ 61.926524] copy_to_kernel_nofault_oob+0x158/0x418 [ 61.926563] kunit_try_run_case+0x170/0x3f0 [ 61.926601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.926639] kthread+0x328/0x630 [ 61.926675] ret_from_fork+0x10/0x20 [ 61.926708] [ 61.994248] Allocated by task 328: [ 61.997638] kasan_save_stack+0x3c/0x68 [ 62.001453] kasan_save_track+0x20/0x40 [ 62.005273] kasan_save_alloc_info+0x40/0x58 [ 62.009526] __kasan_kmalloc+0xd4/0xd8 [ 62.013259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.017772] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.022548] kunit_try_run_case+0x170/0x3f0 [ 62.026713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.032182] kthread+0x328/0x630 [ 62.035394] ret_from_fork+0x10/0x20 [ 62.038953] [ 62.040430] The buggy address belongs to the object at ffff000802408b00 [ 62.040430] which belongs to the cache kmalloc-128 of size 128 [ 62.052930] The buggy address is located 0 bytes to the right of [ 62.052930] allocated 120-byte region [ffff000802408b00, ffff000802408b78) [ 62.065862] [ 62.067340] The buggy address belongs to the physical page: [ 62.072898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 62.080883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.088522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.095464] page_type: f5(slab) [ 62.098601] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.106320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.114046] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.121857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.129670] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 62.137482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.145288] page dumped because: kasan: bad access detected [ 62.150843] [ 62.152319] Memory state around the buggy address: [ 62.157100] ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.164302] ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.171506] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.178707] ^ [ 62.185829] ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.193035] ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.200237] ================================================================== [ 62.207663] ================================================================== [ 62.214648] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 62.221936] Write of size 8 at addr ffff000802408b78 by task kunit_try_catch/328 [ 62.229314] [ 62.230799] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.230855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.230873] Hardware name: WinLink E850-96 board (DT) [ 62.230894] Call trace: [ 62.230910] show_stack+0x20/0x38 (C) [ 62.230942] dump_stack_lvl+0x8c/0xd0 [ 62.230978] print_report+0x118/0x608 [ 62.231011] kasan_report+0xdc/0x128 [ 62.231039] kasan_check_range+0x100/0x1a8 [ 62.231073] __kasan_check_write+0x20/0x30 [ 62.231105] copy_to_kernel_nofault+0x8c/0x250 [ 62.231137] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 62.231174] kunit_try_run_case+0x170/0x3f0 [ 62.231210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.231250] kthread+0x328/0x630 [ 62.231285] ret_from_fork+0x10/0x20 [ 62.231319] [ 62.302143] Allocated by task 328: [ 62.305530] kasan_save_stack+0x3c/0x68 [ 62.309348] kasan_save_track+0x20/0x40 [ 62.313167] kasan_save_alloc_info+0x40/0x58 [ 62.317421] __kasan_kmalloc+0xd4/0xd8 [ 62.321153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.325667] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.330441] kunit_try_run_case+0x170/0x3f0 [ 62.334608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.340077] kthread+0x328/0x630 [ 62.343288] ret_from_fork+0x10/0x20 [ 62.346848] [ 62.348324] The buggy address belongs to the object at ffff000802408b00 [ 62.348324] which belongs to the cache kmalloc-128 of size 128 [ 62.360825] The buggy address is located 0 bytes to the right of [ 62.360825] allocated 120-byte region [ffff000802408b00, ffff000802408b78) [ 62.373757] [ 62.375236] The buggy address belongs to the physical page: [ 62.380793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 62.388776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.396415] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.403358] page_type: f5(slab) [ 62.406494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.414214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.421941] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.429752] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.437565] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 62.445377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.453183] page dumped because: kasan: bad access detected [ 62.458738] [ 62.460213] Memory state around the buggy address: [ 62.464995] ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.472196] ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.479401] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.486602] ^ [ 62.493724] ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.500930] ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.508130] ==================================================================
[ 21.307616] ================================================================== [ 21.307686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 21.307759] Read of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284 [ 21.309517] [ 21.309727] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.309847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.309879] Hardware name: linux,dummy-virt (DT) [ 21.310322] Call trace: [ 21.310475] show_stack+0x20/0x38 (C) [ 21.310748] dump_stack_lvl+0x8c/0xd0 [ 21.310822] print_report+0x118/0x608 [ 21.311383] kasan_report+0xdc/0x128 [ 21.311470] __asan_report_load8_noabort+0x20/0x30 [ 21.311955] copy_to_kernel_nofault+0x204/0x250 [ 21.312227] copy_to_kernel_nofault_oob+0x158/0x418 [ 21.312590] kunit_try_run_case+0x170/0x3f0 [ 21.313110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.313689] kthread+0x328/0x630 [ 21.314003] ret_from_fork+0x10/0x20 [ 21.314064] [ 21.314087] Allocated by task 284: [ 21.314445] kasan_save_stack+0x3c/0x68 [ 21.314688] kasan_save_track+0x20/0x40 [ 21.314797] kasan_save_alloc_info+0x40/0x58 [ 21.314842] __kasan_kmalloc+0xd4/0xd8 [ 21.314880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.315506] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.315616] kunit_try_run_case+0x170/0x3f0 [ 21.315833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.316034] kthread+0x328/0x630 [ 21.316077] ret_from_fork+0x10/0x20 [ 21.316117] [ 21.316576] The buggy address belongs to the object at fff00000c3f9e700 [ 21.316576] which belongs to the cache kmalloc-128 of size 128 [ 21.316690] The buggy address is located 0 bytes to the right of [ 21.316690] allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778) [ 21.316758] [ 21.317310] The buggy address belongs to the physical page: [ 21.317365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.317810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.317934] page_type: f5(slab) [ 21.318707] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.319075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.319164] page dumped because: kasan: bad access detected [ 21.319277] [ 21.319311] Memory state around the buggy address: [ 21.319715] fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.319781] fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.319830] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.319873] ^ [ 21.319920] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.319967] fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320009] ================================================================== [ 21.323411] ================================================================== [ 21.323472] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 21.323530] Write of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284 [ 21.324672] [ 21.324733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.324826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.325430] Hardware name: linux,dummy-virt (DT) [ 21.325898] Call trace: [ 21.326141] show_stack+0x20/0x38 (C) [ 21.326217] dump_stack_lvl+0x8c/0xd0 [ 21.326362] print_report+0x118/0x608 [ 21.326647] kasan_report+0xdc/0x128 [ 21.327286] kasan_check_range+0x100/0x1a8 [ 21.327396] __kasan_check_write+0x20/0x30 [ 21.327457] copy_to_kernel_nofault+0x8c/0x250 [ 21.327768] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 21.328443] kunit_try_run_case+0x170/0x3f0 [ 21.328538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.328847] kthread+0x328/0x630 [ 21.328913] ret_from_fork+0x10/0x20 [ 21.329470] [ 21.329518] Allocated by task 284: [ 21.329555] kasan_save_stack+0x3c/0x68 [ 21.329761] kasan_save_track+0x20/0x40 [ 21.330075] kasan_save_alloc_info+0x40/0x58 [ 21.330447] __kasan_kmalloc+0xd4/0xd8 [ 21.330521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.331013] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.331336] kunit_try_run_case+0x170/0x3f0 [ 21.331399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.331449] kthread+0x328/0x630 [ 21.331488] ret_from_fork+0x10/0x20 [ 21.331528] [ 21.331550] The buggy address belongs to the object at fff00000c3f9e700 [ 21.331550] which belongs to the cache kmalloc-128 of size 128 [ 21.332164] The buggy address is located 0 bytes to the right of [ 21.332164] allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778) [ 21.332276] [ 21.332323] The buggy address belongs to the physical page: [ 21.332367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.332804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.333047] page_type: f5(slab) [ 21.333097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.333154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.333202] page dumped because: kasan: bad access detected [ 21.333680] [ 21.333706] Memory state around the buggy address: [ 21.333820] fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.333872] fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334063] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.334133] ^ [ 21.334282] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334682] fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334819] ==================================================================
[ 21.940775] ================================================================== [ 21.941272] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 21.941548] Write of size 8 at addr ffff888102b31b78 by task kunit_try_catch/302 [ 21.941784] [ 21.942571] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.942709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.942741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.942805] Call Trace: [ 21.942850] <TASK> [ 21.942899] dump_stack_lvl+0x73/0xb0 [ 21.942983] print_report+0xd1/0x650 [ 21.943045] ? __virt_addr_valid+0x1db/0x2d0 [ 21.943139] ? copy_to_kernel_nofault+0x99/0x260 [ 21.943186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.943256] ? copy_to_kernel_nofault+0x99/0x260 [ 21.943310] kasan_report+0x141/0x180 [ 21.943373] ? copy_to_kernel_nofault+0x99/0x260 [ 21.943438] kasan_check_range+0x10c/0x1c0 [ 21.943490] __kasan_check_write+0x18/0x20 [ 21.943531] copy_to_kernel_nofault+0x99/0x260 [ 21.943568] copy_to_kernel_nofault_oob+0x288/0x560 [ 21.943599] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 21.943638] ? finish_task_switch.isra.0+0x153/0x700 [ 21.943674] ? __schedule+0x10cc/0x2b30 [ 21.943701] ? trace_hardirqs_on+0x37/0xe0 [ 21.943739] ? __pfx_read_tsc+0x10/0x10 [ 21.943792] ? ktime_get_ts64+0x86/0x230 [ 21.943825] kunit_try_run_case+0x1a5/0x480 [ 21.943858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.943885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.943914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.943942] ? __kthread_parkme+0x82/0x180 [ 21.943968] ? preempt_count_sub+0x50/0x80 [ 21.943996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.944025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.944052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.944080] kthread+0x337/0x6f0 [ 21.944103] ? trace_preempt_on+0x20/0xc0 [ 21.944146] ? __pfx_kthread+0x10/0x10 [ 21.944168] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.944192] ? calculate_sigpending+0x7b/0xa0 [ 21.944219] ? __pfx_kthread+0x10/0x10 [ 21.944241] ret_from_fork+0x41/0x80 [ 21.944276] ? __pfx_kthread+0x10/0x10 [ 21.944311] ret_from_fork_asm+0x1a/0x30 [ 21.944366] </TASK> [ 21.944392] [ 21.958346] Allocated by task 302: [ 21.958666] kasan_save_stack+0x45/0x70 [ 21.959075] kasan_save_track+0x18/0x40 [ 21.959327] kasan_save_alloc_info+0x3b/0x50 [ 21.959547] __kasan_kmalloc+0xb7/0xc0 [ 21.959901] __kmalloc_cache_noprof+0x189/0x420 [ 21.960293] copy_to_kernel_nofault_oob+0x12f/0x560 [ 21.960577] kunit_try_run_case+0x1a5/0x480 [ 21.960934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.961307] kthread+0x337/0x6f0 [ 21.961510] ret_from_fork+0x41/0x80 [ 21.961866] ret_from_fork_asm+0x1a/0x30 [ 21.962256] [ 21.962444] The buggy address belongs to the object at ffff888102b31b00 [ 21.962444] which belongs to the cache kmalloc-128 of size 128 [ 21.963061] The buggy address is located 0 bytes to the right of [ 21.963061] allocated 120-byte region [ffff888102b31b00, ffff888102b31b78) [ 21.963895] [ 21.964042] The buggy address belongs to the physical page: [ 21.964342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31 [ 21.964832] flags: 0x200000000000000(node=0|zone=2) [ 21.965261] page_type: f5(slab) [ 21.965569] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.965991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.966306] page dumped because: kasan: bad access detected [ 21.966720] [ 21.966940] Memory state around the buggy address: [ 21.967247] ffff888102b31a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.967542] ffff888102b31a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.968155] >ffff888102b31b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.968698] ^ [ 21.969079] ffff888102b31b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.969595] ffff888102b31c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.969889] ================================================================== [ 21.906864] ================================================================== [ 21.907634] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 21.908474] Read of size 8 at addr ffff888102b31b78 by task kunit_try_catch/302 [ 21.909165] [ 21.909467] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.909589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.909623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.909685] Call Trace: [ 21.909721] <TASK> [ 21.909792] dump_stack_lvl+0x73/0xb0 [ 21.909915] print_report+0xd1/0x650 [ 21.909995] ? __virt_addr_valid+0x1db/0x2d0 [ 21.910044] ? copy_to_kernel_nofault+0x225/0x260 [ 21.910071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.910103] ? copy_to_kernel_nofault+0x225/0x260 [ 21.910160] kasan_report+0x141/0x180 [ 21.910193] ? copy_to_kernel_nofault+0x225/0x260 [ 21.910223] __asan_report_load8_noabort+0x18/0x20 [ 21.910250] copy_to_kernel_nofault+0x225/0x260 [ 21.910278] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 21.910307] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 21.910335] ? finish_task_switch.isra.0+0x153/0x700 [ 21.910367] ? __schedule+0x10cc/0x2b30 [ 21.910393] ? trace_hardirqs_on+0x37/0xe0 [ 21.910431] ? __pfx_read_tsc+0x10/0x10 [ 21.910457] ? ktime_get_ts64+0x86/0x230 [ 21.910489] kunit_try_run_case+0x1a5/0x480 [ 21.910522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.910548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.910578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.910604] ? __kthread_parkme+0x82/0x180 [ 21.910631] ? preempt_count_sub+0x50/0x80 [ 21.910660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.910688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.910715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.910758] kthread+0x337/0x6f0 [ 21.910788] ? trace_preempt_on+0x20/0xc0 [ 21.910815] ? __pfx_kthread+0x10/0x10 [ 21.910838] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.910864] ? calculate_sigpending+0x7b/0xa0 [ 21.910891] ? __pfx_kthread+0x10/0x10 [ 21.910914] ret_from_fork+0x41/0x80 [ 21.910939] ? __pfx_kthread+0x10/0x10 [ 21.910961] ret_from_fork_asm+0x1a/0x30 [ 21.910998] </TASK> [ 21.911017] [ 21.924434] Allocated by task 302: [ 21.924891] kasan_save_stack+0x45/0x70 [ 21.925494] kasan_save_track+0x18/0x40 [ 21.926400] kasan_save_alloc_info+0x3b/0x50 [ 21.926814] __kasan_kmalloc+0xb7/0xc0 [ 21.927071] __kmalloc_cache_noprof+0x189/0x420 [ 21.927613] copy_to_kernel_nofault_oob+0x12f/0x560 [ 21.928015] kunit_try_run_case+0x1a5/0x480 [ 21.928334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.928863] kthread+0x337/0x6f0 [ 21.929133] ret_from_fork+0x41/0x80 [ 21.929757] ret_from_fork_asm+0x1a/0x30 [ 21.930074] [ 21.930373] The buggy address belongs to the object at ffff888102b31b00 [ 21.930373] which belongs to the cache kmalloc-128 of size 128 [ 21.931198] The buggy address is located 0 bytes to the right of [ 21.931198] allocated 120-byte region [ffff888102b31b00, ffff888102b31b78) [ 21.932023] [ 21.932247] The buggy address belongs to the physical page: [ 21.932580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31 [ 21.932974] flags: 0x200000000000000(node=0|zone=2) [ 21.933219] page_type: f5(slab) [ 21.933421] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.934143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.935220] page dumped because: kasan: bad access detected [ 21.935656] [ 21.935861] Memory state around the buggy address: [ 21.936182] ffff888102b31a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.936663] ffff888102b31a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.937062] >ffff888102b31b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.937557] ^ [ 21.938017] ffff888102b31b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.938490] ffff888102b31c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.938893] ==================================================================