Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 66.766749] ================================================================== [ 66.773850] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 66.780793] Write of size 1 at addr ffff000800dad678 by task kunit_try_catch/334 [ 66.788170] [ 66.789655] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.789708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.789726] Hardware name: WinLink E850-96 board (DT) [ 66.789746] Call trace: [ 66.789762] show_stack+0x20/0x38 (C) [ 66.789798] dump_stack_lvl+0x8c/0xd0 [ 66.789837] print_report+0x118/0x608 [ 66.789868] kasan_report+0xdc/0x128 [ 66.789900] __asan_report_store1_noabort+0x20/0x30 [ 66.789935] strncpy_from_user+0x270/0x2a0 [ 66.789966] copy_user_test_oob+0x5c0/0xec8 [ 66.789995] kunit_try_run_case+0x170/0x3f0 [ 66.790032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.790071] kthread+0x328/0x630 [ 66.790104] ret_from_fork+0x10/0x20 [ 66.790140] [ 66.856658] Allocated by task 334: [ 66.860044] kasan_save_stack+0x3c/0x68 [ 66.863863] kasan_save_track+0x20/0x40 [ 66.867683] kasan_save_alloc_info+0x40/0x58 [ 66.871936] __kasan_kmalloc+0xd4/0xd8 [ 66.875669] __kmalloc_noprof+0x198/0x4c8 [ 66.879662] kunit_kmalloc_array+0x34/0x88 [ 66.883741] copy_user_test_oob+0xac/0xec8 [ 66.887821] kunit_try_run_case+0x170/0x3f0 [ 66.891988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.897457] kthread+0x328/0x630 [ 66.900668] ret_from_fork+0x10/0x20 [ 66.904227] [ 66.905703] The buggy address belongs to the object at ffff000800dad600 [ 66.905703] which belongs to the cache kmalloc-128 of size 128 [ 66.918203] The buggy address is located 0 bytes to the right of [ 66.918203] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.931137] [ 66.932616] The buggy address belongs to the physical page: [ 66.938170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.946154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.953793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.960737] page_type: f5(slab) [ 66.963873] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.971594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.979321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.987132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.994945] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 67.002757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 67.010562] page dumped because: kasan: bad access detected [ 67.016118] [ 67.017593] Memory state around the buggy address: [ 67.022373] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.029577] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.036781] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 67.043982] ^ [ 67.051104] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.058309] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.065510] ================================================================== [ 66.457892] ================================================================== [ 66.465000] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 66.471855] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 66.479407] [ 66.480892] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.480942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.480958] Hardware name: WinLink E850-96 board (DT) [ 66.480977] Call trace: [ 66.480990] show_stack+0x20/0x38 (C) [ 66.481026] dump_stack_lvl+0x8c/0xd0 [ 66.481061] print_report+0x118/0x608 [ 66.481093] kasan_report+0xdc/0x128 [ 66.481122] kasan_check_range+0x100/0x1a8 [ 66.481156] __kasan_check_write+0x20/0x30 [ 66.481192] strncpy_from_user+0x3c/0x2a0 [ 66.481223] copy_user_test_oob+0x5c0/0xec8 [ 66.481253] kunit_try_run_case+0x170/0x3f0 [ 66.481290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.481329] kthread+0x328/0x630 [ 66.481365] ret_from_fork+0x10/0x20 [ 66.481401] [ 66.551110] Allocated by task 334: [ 66.554494] kasan_save_stack+0x3c/0x68 [ 66.558312] kasan_save_track+0x20/0x40 [ 66.562132] kasan_save_alloc_info+0x40/0x58 [ 66.566385] __kasan_kmalloc+0xd4/0xd8 [ 66.570118] __kmalloc_noprof+0x198/0x4c8 [ 66.574111] kunit_kmalloc_array+0x34/0x88 [ 66.578190] copy_user_test_oob+0xac/0xec8 [ 66.582270] kunit_try_run_case+0x170/0x3f0 [ 66.586437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.591906] kthread+0x328/0x630 [ 66.595117] ret_from_fork+0x10/0x20 [ 66.598676] [ 66.600152] The buggy address belongs to the object at ffff000800dad600 [ 66.600152] which belongs to the cache kmalloc-128 of size 128 [ 66.612652] The buggy address is located 0 bytes inside of [ 66.612652] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.625065] [ 66.626544] The buggy address belongs to the physical page: [ 66.632099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.640082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.647721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.654665] page_type: f5(slab) [ 66.657802] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.665522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.673249] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.681060] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.688873] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.696685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.704491] page dumped because: kasan: bad access detected [ 66.710048] [ 66.711523] Memory state around the buggy address: [ 66.716303] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.723505] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.730709] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.737910] ^ [ 66.745032] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.752237] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.759438] ==================================================================
[ 21.116048] ================================================================== [ 21.116128] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.116308] Write of size 1 at addr fff00000c791de78 by task kunit_try_catch/287 [ 21.116900] [ 21.117082] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.117188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.117222] Hardware name: linux,dummy-virt (DT) [ 21.117468] Call trace: [ 21.117599] show_stack+0x20/0x38 (C) [ 21.117957] dump_stack_lvl+0x8c/0xd0 [ 21.118101] print_report+0x118/0x608 [ 21.118285] kasan_report+0xdc/0x128 [ 21.118746] __asan_report_store1_noabort+0x20/0x30 [ 21.118924] strncpy_from_user+0x270/0x2a0 [ 21.119345] copy_user_test_oob+0x5c0/0xec8 [ 21.119476] kunit_try_run_case+0x170/0x3f0 [ 21.119632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.119701] kthread+0x328/0x630 [ 21.119751] ret_from_fork+0x10/0x20 [ 21.119837] [ 21.119870] Allocated by task 287: [ 21.120333] kasan_save_stack+0x3c/0x68 [ 21.120472] kasan_save_track+0x20/0x40 [ 21.120647] kasan_save_alloc_info+0x40/0x58 [ 21.120794] __kasan_kmalloc+0xd4/0xd8 [ 21.120958] __kmalloc_noprof+0x198/0x4c8 [ 21.121000] kunit_kmalloc_array+0x34/0x88 [ 21.121055] copy_user_test_oob+0xac/0xec8 [ 21.121099] kunit_try_run_case+0x170/0x3f0 [ 21.121535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.121651] kthread+0x328/0x630 [ 21.122132] ret_from_fork+0x10/0x20 [ 21.122656] [ 21.122710] The buggy address belongs to the object at fff00000c791de00 [ 21.122710] which belongs to the cache kmalloc-128 of size 128 [ 21.123112] The buggy address is located 0 bytes to the right of [ 21.123112] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.123198] [ 21.123526] The buggy address belongs to the physical page: [ 21.123641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.124455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.124650] page_type: f5(slab) [ 21.124702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.124758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.125184] page dumped because: kasan: bad access detected [ 21.125389] [ 21.125418] Memory state around the buggy address: [ 21.125455] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.125505] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125586] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.125651] ^ [ 21.125707] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125760] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125813] ================================================================== [ 21.106438] ================================================================== [ 21.106491] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.106812] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.106903] [ 21.106935] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.107021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.107069] Hardware name: linux,dummy-virt (DT) [ 21.107104] Call trace: [ 21.107128] show_stack+0x20/0x38 (C) [ 21.107186] dump_stack_lvl+0x8c/0xd0 [ 21.107236] print_report+0x118/0x608 [ 21.107284] kasan_report+0xdc/0x128 [ 21.107333] kasan_check_range+0x100/0x1a8 [ 21.107383] __kasan_check_write+0x20/0x30 [ 21.107447] strncpy_from_user+0x3c/0x2a0 [ 21.107495] copy_user_test_oob+0x5c0/0xec8 [ 21.107542] kunit_try_run_case+0x170/0x3f0 [ 21.107593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.107649] kthread+0x328/0x630 [ 21.107696] ret_from_fork+0x10/0x20 [ 21.107754] [ 21.107774] Allocated by task 287: [ 21.107804] kasan_save_stack+0x3c/0x68 [ 21.107862] kasan_save_track+0x20/0x40 [ 21.108438] kasan_save_alloc_info+0x40/0x58 [ 21.108816] __kasan_kmalloc+0xd4/0xd8 [ 21.108883] __kmalloc_noprof+0x198/0x4c8 [ 21.108922] kunit_kmalloc_array+0x34/0x88 [ 21.109561] copy_user_test_oob+0xac/0xec8 [ 21.109769] kunit_try_run_case+0x170/0x3f0 [ 21.109847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109984] kthread+0x328/0x630 [ 21.110276] ret_from_fork+0x10/0x20 [ 21.110319] [ 21.110565] The buggy address belongs to the object at fff00000c791de00 [ 21.110565] which belongs to the cache kmalloc-128 of size 128 [ 21.110787] The buggy address is located 0 bytes inside of [ 21.110787] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.111019] [ 21.111204] The buggy address belongs to the physical page: [ 21.111264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.111348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.112332] page_type: f5(slab) [ 21.112443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.112542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.112589] page dumped because: kasan: bad access detected [ 21.112763] [ 21.112888] Memory state around the buggy address: [ 21.112963] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.113350] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.113518] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.113654] ^ [ 21.114047] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.114160] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.114319] ==================================================================
[ 14.939327] ================================================================== [ 14.939773] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 14.940481] Write of size 1 at addr ffff888102f60f78 by task kunit_try_catch/304 [ 14.940882] [ 14.941096] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.941159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941196] Call Trace: [ 14.941259] <TASK> [ 14.941279] dump_stack_lvl+0x73/0xb0 [ 14.941357] print_report+0xd1/0x650 [ 14.941382] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941417] ? strncpy_from_user+0x1a5/0x1d0 [ 14.941443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.941467] ? strncpy_from_user+0x1a5/0x1d0 [ 14.941490] kasan_report+0x141/0x180 [ 14.941514] ? strncpy_from_user+0x1a5/0x1d0 [ 14.941542] __asan_report_store1_noabort+0x1b/0x30 [ 14.941585] strncpy_from_user+0x1a5/0x1d0 [ 14.941612] copy_user_test_oob+0x760/0x10f0 [ 14.941638] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.941658] ? finish_task_switch.isra.0+0x153/0x700 [ 14.941685] ? __switch_to+0x5d9/0xf60 [ 14.941707] ? dequeue_task_fair+0x166/0x4e0 [ 14.941733] ? __schedule+0x10cc/0x2b60 [ 14.941757] ? __pfx_read_tsc+0x10/0x10 [ 14.941778] ? ktime_get_ts64+0x86/0x230 [ 14.941805] kunit_try_run_case+0x1a5/0x480 [ 14.941831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.941855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.941880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.941905] ? __kthread_parkme+0x82/0x180 [ 14.941938] ? preempt_count_sub+0x50/0x80 [ 14.941963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.941987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942035] kthread+0x337/0x6f0 [ 14.942052] ? trace_preempt_on+0x20/0xc0 [ 14.942077] ? __pfx_kthread+0x10/0x10 [ 14.942095] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942118] ? calculate_sigpending+0x7b/0xa0 [ 14.942142] ? __pfx_kthread+0x10/0x10 [ 14.942161] ret_from_fork+0x41/0x80 [ 14.942183] ? __pfx_kthread+0x10/0x10 [ 14.942202] ret_from_fork_asm+0x1a/0x30 [ 14.942234] </TASK> [ 14.942246] [ 14.950945] Allocated by task 304: [ 14.951151] kasan_save_stack+0x45/0x70 [ 14.951354] kasan_save_track+0x18/0x40 [ 14.951542] kasan_save_alloc_info+0x3b/0x50 [ 14.951835] __kasan_kmalloc+0xb7/0xc0 [ 14.952059] __kmalloc_noprof+0x1c9/0x500 [ 14.952249] kunit_kmalloc_array+0x25/0x60 [ 14.952502] copy_user_test_oob+0xab/0x10f0 [ 14.952786] kunit_try_run_case+0x1a5/0x480 [ 14.953006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.953278] kthread+0x337/0x6f0 [ 14.953398] ret_from_fork+0x41/0x80 [ 14.953527] ret_from_fork_asm+0x1a/0x30 [ 14.953741] [ 14.953897] The buggy address belongs to the object at ffff888102f60f00 [ 14.953897] which belongs to the cache kmalloc-128 of size 128 [ 14.954605] The buggy address is located 0 bytes to the right of [ 14.954605] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.955068] [ 14.955158] The buggy address belongs to the physical page: [ 14.955410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.955940] flags: 0x200000000000000(node=0|zone=2) [ 14.956225] page_type: f5(slab) [ 14.956407] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.956712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.957036] page dumped because: kasan: bad access detected [ 14.957276] [ 14.957358] Memory state around the buggy address: [ 14.957635] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.957861] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.958178] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.958603] ^ [ 14.958869] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959231] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.959521] ================================================================== [ 14.918132] ================================================================== [ 14.918456] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 14.918894] Write of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304 [ 14.919264] [ 14.919458] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.919509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.919522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.919545] Call Trace: [ 14.919587] <TASK> [ 14.919662] dump_stack_lvl+0x73/0xb0 [ 14.919707] print_report+0xd1/0x650 [ 14.919732] ? __virt_addr_valid+0x1db/0x2d0 [ 14.919755] ? strncpy_from_user+0x2e/0x1d0 [ 14.919778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.919802] ? strncpy_from_user+0x2e/0x1d0 [ 14.919825] kasan_report+0x141/0x180 [ 14.919849] ? strncpy_from_user+0x2e/0x1d0 [ 14.919877] kasan_check_range+0x10c/0x1c0 [ 14.919898] __kasan_check_write+0x18/0x20 [ 14.919928] strncpy_from_user+0x2e/0x1d0 [ 14.919950] ? __kasan_check_read+0x15/0x20 [ 14.919974] copy_user_test_oob+0x760/0x10f0 [ 14.919999] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.920020] ? finish_task_switch.isra.0+0x153/0x700 [ 14.920048] ? __switch_to+0x5d9/0xf60 [ 14.920070] ? dequeue_task_fair+0x166/0x4e0 [ 14.920096] ? __schedule+0x10cc/0x2b60 [ 14.920121] ? __pfx_read_tsc+0x10/0x10 [ 14.920142] ? ktime_get_ts64+0x86/0x230 [ 14.920169] kunit_try_run_case+0x1a5/0x480 [ 14.920195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.920248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.920273] ? __kthread_parkme+0x82/0x180 [ 14.920296] ? preempt_count_sub+0x50/0x80 [ 14.920322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.920369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.920392] kthread+0x337/0x6f0 [ 14.920410] ? trace_preempt_on+0x20/0xc0 [ 14.920435] ? __pfx_kthread+0x10/0x10 [ 14.920453] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.920476] ? calculate_sigpending+0x7b/0xa0 [ 14.920499] ? __pfx_kthread+0x10/0x10 [ 14.920519] ret_from_fork+0x41/0x80 [ 14.920541] ? __pfx_kthread+0x10/0x10 [ 14.920579] ret_from_fork_asm+0x1a/0x30 [ 14.920610] </TASK> [ 14.920622] [ 14.929426] Allocated by task 304: [ 14.929634] kasan_save_stack+0x45/0x70 [ 14.929937] kasan_save_track+0x18/0x40 [ 14.930133] kasan_save_alloc_info+0x3b/0x50 [ 14.930342] __kasan_kmalloc+0xb7/0xc0 [ 14.930515] __kmalloc_noprof+0x1c9/0x500 [ 14.930802] kunit_kmalloc_array+0x25/0x60 [ 14.930959] copy_user_test_oob+0xab/0x10f0 [ 14.931242] kunit_try_run_case+0x1a5/0x480 [ 14.931536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931785] kthread+0x337/0x6f0 [ 14.931994] ret_from_fork+0x41/0x80 [ 14.932212] ret_from_fork_asm+0x1a/0x30 [ 14.932456] [ 14.932565] The buggy address belongs to the object at ffff888102f60f00 [ 14.932565] which belongs to the cache kmalloc-128 of size 128 [ 14.933186] The buggy address is located 0 bytes inside of [ 14.933186] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.933701] [ 14.933906] The buggy address belongs to the physical page: [ 14.934178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.934534] flags: 0x200000000000000(node=0|zone=2) [ 14.934852] page_type: f5(slab) [ 14.935037] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.935430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.935814] page dumped because: kasan: bad access detected [ 14.936036] [ 14.936126] Memory state around the buggy address: [ 14.936285] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.936674] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936935] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.937251] ^ [ 14.937689] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937951] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.938261] ==================================================================