Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 64.309905] ================================================================== [ 64.316772] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.324058] Write of size 8 at addr ffff000801936378 by task kunit_try_catch/330 [ 64.331436] [ 64.332922] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.332973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.332989] Hardware name: WinLink E850-96 board (DT) [ 64.333010] Call trace: [ 64.333025] show_stack+0x20/0x38 (C) [ 64.333060] dump_stack_lvl+0x8c/0xd0 [ 64.333100] print_report+0x118/0x608 [ 64.333134] kasan_report+0xdc/0x128 [ 64.333166] kasan_check_range+0x100/0x1a8 [ 64.333202] __kasan_check_write+0x20/0x30 [ 64.333238] copy_to_kernel_nofault+0x8c/0x250 [ 64.333270] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.333308] kunit_try_run_case+0x170/0x3f0 [ 64.333345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.333387] kthread+0x328/0x630 [ 64.333422] ret_from_fork+0x10/0x20 [ 64.333458] [ 64.404265] Allocated by task 330: [ 64.407653] kasan_save_stack+0x3c/0x68 [ 64.411469] kasan_save_track+0x20/0x40 [ 64.415289] kasan_save_alloc_info+0x40/0x58 [ 64.419542] __kasan_kmalloc+0xd4/0xd8 [ 64.423275] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.427789] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.432564] kunit_try_run_case+0x170/0x3f0 [ 64.436729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.442198] kthread+0x328/0x630 [ 64.445410] ret_from_fork+0x10/0x20 [ 64.448969] [ 64.450444] The buggy address belongs to the object at ffff000801936300 [ 64.450444] which belongs to the cache kmalloc-128 of size 128 [ 64.462946] The buggy address is located 0 bytes to the right of [ 64.462946] allocated 120-byte region [ffff000801936300, ffff000801936378) [ 64.475878] [ 64.477358] The buggy address belongs to the physical page: [ 64.482915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936 [ 64.490897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.498536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.505478] page_type: f5(slab) [ 64.508614] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.516336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.524062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.531874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.539687] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff [ 64.547499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.555304] page dumped because: kasan: bad access detected [ 64.560860] [ 64.562337] Memory state around the buggy address: [ 64.567116] ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.574318] ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.581523] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.588724] ^ [ 64.595845] ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.603052] ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.610251] ================================================================== [ 63.998053] ================================================================== [ 64.012174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.019550] Read of size 8 at addr ffff000801936378 by task kunit_try_catch/330 [ 64.026840] [ 64.028328] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.028383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.028403] Hardware name: WinLink E850-96 board (DT) [ 64.028428] Call trace: [ 64.028443] show_stack+0x20/0x38 (C) [ 64.028483] dump_stack_lvl+0x8c/0xd0 [ 64.028522] print_report+0x118/0x608 [ 64.028558] kasan_report+0xdc/0x128 [ 64.028590] __asan_report_load8_noabort+0x20/0x30 [ 64.028626] copy_to_kernel_nofault+0x204/0x250 [ 64.028658] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.028702] kunit_try_run_case+0x170/0x3f0 [ 64.028741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.028781] kthread+0x328/0x630 [ 64.028818] ret_from_fork+0x10/0x20 [ 64.028854] [ 64.096371] Allocated by task 330: [ 64.099760] kasan_save_stack+0x3c/0x68 [ 64.103576] kasan_save_track+0x20/0x40 [ 64.107396] kasan_save_alloc_info+0x40/0x58 [ 64.111648] __kasan_kmalloc+0xd4/0xd8 [ 64.115380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.119894] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.124670] kunit_try_run_case+0x170/0x3f0 [ 64.128835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.134304] kthread+0x328/0x630 [ 64.137515] ret_from_fork+0x10/0x20 [ 64.141074] [ 64.142551] The buggy address belongs to the object at ffff000801936300 [ 64.142551] which belongs to the cache kmalloc-128 of size 128 [ 64.155052] The buggy address is located 0 bytes to the right of [ 64.155052] allocated 120-byte region [ffff000801936300, ffff000801936378) [ 64.167983] [ 64.169464] The buggy address belongs to the physical page: [ 64.175021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936 [ 64.183003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.190641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.197585] page_type: f5(slab) [ 64.200723] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.208441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.216168] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.223979] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.231792] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff [ 64.239604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.247409] page dumped because: kasan: bad access detected [ 64.252965] [ 64.254442] Memory state around the buggy address: [ 64.259221] ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.266424] ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.273630] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.280829] ^ [ 64.287951] ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.295157] ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.302358] ==================================================================
[ 20.978033] ================================================================== [ 20.978312] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.978486] Read of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283 [ 20.978580] [ 20.978620] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.978831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.978978] Hardware name: linux,dummy-virt (DT) [ 20.979115] Call trace: [ 20.979171] show_stack+0x20/0x38 (C) [ 20.979231] dump_stack_lvl+0x8c/0xd0 [ 20.979318] print_report+0x118/0x608 [ 20.979368] kasan_report+0xdc/0x128 [ 20.979414] __asan_report_load8_noabort+0x20/0x30 [ 20.979464] copy_to_kernel_nofault+0x204/0x250 [ 20.979514] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.979576] kunit_try_run_case+0x170/0x3f0 [ 20.979631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.979686] kthread+0x328/0x630 [ 20.979733] ret_from_fork+0x10/0x20 [ 20.979781] [ 20.979808] Allocated by task 283: [ 20.979838] kasan_save_stack+0x3c/0x68 [ 20.980063] kasan_save_track+0x20/0x40 [ 20.980287] kasan_save_alloc_info+0x40/0x58 [ 20.980339] __kasan_kmalloc+0xd4/0xd8 [ 20.980379] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.980673] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.980913] kunit_try_run_case+0x170/0x3f0 [ 20.981097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.981346] kthread+0x328/0x630 [ 20.981631] ret_from_fork+0x10/0x20 [ 20.981748] [ 20.981772] The buggy address belongs to the object at fff00000c791dd00 [ 20.981772] which belongs to the cache kmalloc-128 of size 128 [ 20.981911] The buggy address is located 0 bytes to the right of [ 20.981911] allocated 120-byte region [fff00000c791dd00, fff00000c791dd78) [ 20.982257] [ 20.982346] The buggy address belongs to the physical page: [ 20.982411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.982589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.982747] page_type: f5(slab) [ 20.983028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.983088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.983351] page dumped because: kasan: bad access detected [ 20.983392] [ 20.983532] Memory state around the buggy address: [ 20.983620] fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.983751] fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.983801] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.984135] ^ [ 20.984202] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.984304] fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.984402] ================================================================== [ 20.985700] ================================================================== [ 20.985997] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.986412] Write of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283 [ 20.986481] [ 20.986541] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.986628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.986819] Hardware name: linux,dummy-virt (DT) [ 20.986964] Call trace: [ 20.987019] show_stack+0x20/0x38 (C) [ 20.987074] dump_stack_lvl+0x8c/0xd0 [ 20.987366] print_report+0x118/0x608 [ 20.987478] kasan_report+0xdc/0x128 [ 20.987543] kasan_check_range+0x100/0x1a8 [ 20.987597] __kasan_check_write+0x20/0x30 [ 20.987653] copy_to_kernel_nofault+0x8c/0x250 [ 20.987712] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.987768] kunit_try_run_case+0x170/0x3f0 [ 20.987821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988132] kthread+0x328/0x630 [ 20.988375] ret_from_fork+0x10/0x20 [ 20.989028] [ 20.989130] Allocated by task 283: [ 20.989174] kasan_save_stack+0x3c/0x68 [ 20.989263] kasan_save_track+0x20/0x40 [ 20.989587] kasan_save_alloc_info+0x40/0x58 [ 20.989644] __kasan_kmalloc+0xd4/0xd8 [ 20.989849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.989953] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.990095] kunit_try_run_case+0x170/0x3f0 [ 20.990593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.990758] kthread+0x328/0x630 [ 20.990800] ret_from_fork+0x10/0x20 [ 20.990977] [ 20.991169] The buggy address belongs to the object at fff00000c791dd00 [ 20.991169] which belongs to the cache kmalloc-128 of size 128 [ 20.991273] The buggy address is located 0 bytes to the right of [ 20.991273] allocated 120-byte region [fff00000c791dd00, fff00000c791dd78) [ 20.991613] [ 20.991683] The buggy address belongs to the physical page: [ 20.991947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.992160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.992227] page_type: f5(slab) [ 20.992549] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.992619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.992840] page dumped because: kasan: bad access detected [ 20.992921] [ 20.992944] Memory state around the buggy address: [ 20.992981] fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.993045] fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993106] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.993150] ^ [ 20.993205] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993262] fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993305] ==================================================================
[ 14.735741] ================================================================== [ 14.736339] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 14.736608] Write of size 8 at addr ffff888102a14078 by task kunit_try_catch/300 [ 14.737456] [ 14.737725] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.737779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.737792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.737815] Call Trace: [ 14.737837] <TASK> [ 14.737858] dump_stack_lvl+0x73/0xb0 [ 14.737886] print_report+0xd1/0x650 [ 14.737913] ? __virt_addr_valid+0x1db/0x2d0 [ 14.737947] ? copy_to_kernel_nofault+0x99/0x260 [ 14.737968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.737992] ? copy_to_kernel_nofault+0x99/0x260 [ 14.738014] kasan_report+0x141/0x180 [ 14.738036] ? copy_to_kernel_nofault+0x99/0x260 [ 14.738062] kasan_check_range+0x10c/0x1c0 [ 14.738083] __kasan_check_write+0x18/0x20 [ 14.738104] copy_to_kernel_nofault+0x99/0x260 [ 14.738126] copy_to_kernel_nofault_oob+0x288/0x560 [ 14.738151] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 14.738174] ? finish_task_switch.isra.0+0x153/0x700 [ 14.738199] ? __schedule+0x10cc/0x2b60 [ 14.738223] ? trace_hardirqs_on+0x37/0xe0 [ 14.738256] ? __pfx_read_tsc+0x10/0x10 [ 14.738276] ? ktime_get_ts64+0x86/0x230 [ 14.738302] kunit_try_run_case+0x1a5/0x480 [ 14.738329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.738377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.738401] ? __kthread_parkme+0x82/0x180 [ 14.738424] ? preempt_count_sub+0x50/0x80 [ 14.738449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738499] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.738523] kthread+0x337/0x6f0 [ 14.738541] ? trace_preempt_on+0x20/0xc0 [ 14.738616] ? __pfx_kthread+0x10/0x10 [ 14.738638] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.738660] ? calculate_sigpending+0x7b/0xa0 [ 14.738683] ? __pfx_kthread+0x10/0x10 [ 14.738702] ret_from_fork+0x41/0x80 [ 14.738944] ? __pfx_kthread+0x10/0x10 [ 14.738968] ret_from_fork_asm+0x1a/0x30 [ 14.739000] </TASK> [ 14.739013] [ 14.754281] Allocated by task 300: [ 14.754450] kasan_save_stack+0x45/0x70 [ 14.754666] kasan_save_track+0x18/0x40 [ 14.755410] kasan_save_alloc_info+0x3b/0x50 [ 14.755960] __kasan_kmalloc+0xb7/0xc0 [ 14.756350] __kmalloc_cache_noprof+0x189/0x420 [ 14.756874] copy_to_kernel_nofault_oob+0x12f/0x560 [ 14.757298] kunit_try_run_case+0x1a5/0x480 [ 14.757451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.757652] kthread+0x337/0x6f0 [ 14.758014] ret_from_fork+0x41/0x80 [ 14.758461] ret_from_fork_asm+0x1a/0x30 [ 14.758969] [ 14.759094] The buggy address belongs to the object at ffff888102a14000 [ 14.759094] which belongs to the cache kmalloc-128 of size 128 [ 14.760577] The buggy address is located 0 bytes to the right of [ 14.760577] allocated 120-byte region [ffff888102a14000, ffff888102a14078) [ 14.761044] [ 14.761206] The buggy address belongs to the physical page: [ 14.761754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a14 [ 14.762587] flags: 0x200000000000000(node=0|zone=2) [ 14.762976] page_type: f5(slab) [ 14.763172] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.763612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.763841] page dumped because: kasan: bad access detected [ 14.764042] [ 14.764112] Memory state around the buggy address: [ 14.764303] ffff888102a13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765050] ffff888102a13f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765779] >ffff888102a14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.766710] ^ [ 14.767174] ffff888102a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767594] ffff888102a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768364] ================================================================== [ 14.699282] ================================================================== [ 14.700171] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 14.700436] Read of size 8 at addr ffff888102a14078 by task kunit_try_catch/300 [ 14.701987] [ 14.702209] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.702264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.702279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.702312] Call Trace: [ 14.702326] <TASK> [ 14.702346] dump_stack_lvl+0x73/0xb0 [ 14.702378] print_report+0xd1/0x650 [ 14.702404] ? __virt_addr_valid+0x1db/0x2d0 [ 14.702427] ? copy_to_kernel_nofault+0x225/0x260 [ 14.702449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.702473] ? copy_to_kernel_nofault+0x225/0x260 [ 14.702495] kasan_report+0x141/0x180 [ 14.702519] ? copy_to_kernel_nofault+0x225/0x260 [ 14.702546] __asan_report_load8_noabort+0x18/0x20 [ 14.702845] copy_to_kernel_nofault+0x225/0x260 [ 14.702871] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 14.702898] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 14.702937] ? finish_task_switch.isra.0+0x153/0x700 [ 14.702965] ? __schedule+0x10cc/0x2b60 [ 14.703080] ? trace_hardirqs_on+0x37/0xe0 [ 14.703114] ? __pfx_read_tsc+0x10/0x10 [ 14.703135] ? ktime_get_ts64+0x86/0x230 [ 14.703162] kunit_try_run_case+0x1a5/0x480 [ 14.703189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703212] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.703238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.703263] ? __kthread_parkme+0x82/0x180 [ 14.703286] ? preempt_count_sub+0x50/0x80 [ 14.703312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.703384] kthread+0x337/0x6f0 [ 14.703402] ? trace_preempt_on+0x20/0xc0 [ 14.703425] ? __pfx_kthread+0x10/0x10 [ 14.703444] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.703466] ? calculate_sigpending+0x7b/0xa0 [ 14.703489] ? __pfx_kthread+0x10/0x10 [ 14.703508] ret_from_fork+0x41/0x80 [ 14.703529] ? __pfx_kthread+0x10/0x10 [ 14.703599] ret_from_fork_asm+0x1a/0x30 [ 14.703634] </TASK> [ 14.703647] [ 14.718392] Allocated by task 300: [ 14.718616] kasan_save_stack+0x45/0x70 [ 14.719189] kasan_save_track+0x18/0x40 [ 14.719993] kasan_save_alloc_info+0x3b/0x50 [ 14.720470] __kasan_kmalloc+0xb7/0xc0 [ 14.720998] __kmalloc_cache_noprof+0x189/0x420 [ 14.721476] copy_to_kernel_nofault_oob+0x12f/0x560 [ 14.722074] kunit_try_run_case+0x1a5/0x480 [ 14.722520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.723123] kthread+0x337/0x6f0 [ 14.723538] ret_from_fork+0x41/0x80 [ 14.723836] ret_from_fork_asm+0x1a/0x30 [ 14.724020] [ 14.724179] The buggy address belongs to the object at ffff888102a14000 [ 14.724179] which belongs to the cache kmalloc-128 of size 128 [ 14.725513] The buggy address is located 0 bytes to the right of [ 14.725513] allocated 120-byte region [ffff888102a14000, ffff888102a14078) [ 14.726415] [ 14.726661] The buggy address belongs to the physical page: [ 14.727199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a14 [ 14.727462] flags: 0x200000000000000(node=0|zone=2) [ 14.727698] page_type: f5(slab) [ 14.728105] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.728894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.729707] page dumped because: kasan: bad access detected [ 14.730324] [ 14.730417] Memory state around the buggy address: [ 14.730578] ffff888102a13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.731083] ffff888102a13f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.731871] >ffff888102a14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.732601] ^ [ 14.733375] ffff888102a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.733616] ffff888102a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734504] ==================================================================