Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   66.766749] ==================================================================
[   66.773850] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.780793] Write of size 1 at addr ffff000800dad678 by task kunit_try_catch/334
[   66.788170] 
[   66.789655] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   66.789708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.789726] Hardware name: WinLink E850-96 board (DT)
[   66.789746] Call trace:
[   66.789762]  show_stack+0x20/0x38 (C)
[   66.789798]  dump_stack_lvl+0x8c/0xd0
[   66.789837]  print_report+0x118/0x608
[   66.789868]  kasan_report+0xdc/0x128
[   66.789900]  __asan_report_store1_noabort+0x20/0x30
[   66.789935]  strncpy_from_user+0x270/0x2a0
[   66.789966]  copy_user_test_oob+0x5c0/0xec8
[   66.789995]  kunit_try_run_case+0x170/0x3f0
[   66.790032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.790071]  kthread+0x328/0x630
[   66.790104]  ret_from_fork+0x10/0x20
[   66.790140] 
[   66.856658] Allocated by task 334:
[   66.860044]  kasan_save_stack+0x3c/0x68
[   66.863863]  kasan_save_track+0x20/0x40
[   66.867683]  kasan_save_alloc_info+0x40/0x58
[   66.871936]  __kasan_kmalloc+0xd4/0xd8
[   66.875669]  __kmalloc_noprof+0x198/0x4c8
[   66.879662]  kunit_kmalloc_array+0x34/0x88
[   66.883741]  copy_user_test_oob+0xac/0xec8
[   66.887821]  kunit_try_run_case+0x170/0x3f0
[   66.891988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.897457]  kthread+0x328/0x630
[   66.900668]  ret_from_fork+0x10/0x20
[   66.904227] 
[   66.905703] The buggy address belongs to the object at ffff000800dad600
[   66.905703]  which belongs to the cache kmalloc-128 of size 128
[   66.918203] The buggy address is located 0 bytes to the right of
[   66.918203]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.931137] 
[   66.932616] The buggy address belongs to the physical page:
[   66.938170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.946154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.953793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.960737] page_type: f5(slab)
[   66.963873] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.971594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.979321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.987132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.994945] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   67.002757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   67.010562] page dumped because: kasan: bad access detected
[   67.016118] 
[   67.017593] Memory state around the buggy address:
[   67.022373]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.029577]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.036781] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.043982]                                                                 ^
[   67.051104]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.058309]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.065510] ==================================================================
[   66.457892] ==================================================================
[   66.465000] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.471855] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   66.479407] 
[   66.480892] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   66.480942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.480958] Hardware name: WinLink E850-96 board (DT)
[   66.480977] Call trace:
[   66.480990]  show_stack+0x20/0x38 (C)
[   66.481026]  dump_stack_lvl+0x8c/0xd0
[   66.481061]  print_report+0x118/0x608
[   66.481093]  kasan_report+0xdc/0x128
[   66.481122]  kasan_check_range+0x100/0x1a8
[   66.481156]  __kasan_check_write+0x20/0x30
[   66.481192]  strncpy_from_user+0x3c/0x2a0
[   66.481223]  copy_user_test_oob+0x5c0/0xec8
[   66.481253]  kunit_try_run_case+0x170/0x3f0
[   66.481290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.481329]  kthread+0x328/0x630
[   66.481365]  ret_from_fork+0x10/0x20
[   66.481401] 
[   66.551110] Allocated by task 334:
[   66.554494]  kasan_save_stack+0x3c/0x68
[   66.558312]  kasan_save_track+0x20/0x40
[   66.562132]  kasan_save_alloc_info+0x40/0x58
[   66.566385]  __kasan_kmalloc+0xd4/0xd8
[   66.570118]  __kmalloc_noprof+0x198/0x4c8
[   66.574111]  kunit_kmalloc_array+0x34/0x88
[   66.578190]  copy_user_test_oob+0xac/0xec8
[   66.582270]  kunit_try_run_case+0x170/0x3f0
[   66.586437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.591906]  kthread+0x328/0x630
[   66.595117]  ret_from_fork+0x10/0x20
[   66.598676] 
[   66.600152] The buggy address belongs to the object at ffff000800dad600
[   66.600152]  which belongs to the cache kmalloc-128 of size 128
[   66.612652] The buggy address is located 0 bytes inside of
[   66.612652]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.625065] 
[   66.626544] The buggy address belongs to the physical page:
[   66.632099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.640082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.647721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.654665] page_type: f5(slab)
[   66.657802] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.665522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.673249] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.681060] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.688873] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   66.696685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.704491] page dumped because: kasan: bad access detected
[   66.710048] 
[   66.711523] Memory state around the buggy address:
[   66.716303]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.723505]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.730709] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.737910]                                                                 ^
[   66.745032]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.752237]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.759438] ==================================================================

[   21.116048] ==================================================================
[   21.116128] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.116308] Write of size 1 at addr fff00000c791de78 by task kunit_try_catch/287
[   21.116900] 
[   21.117082] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.117188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.117222] Hardware name: linux,dummy-virt (DT)
[   21.117468] Call trace:
[   21.117599]  show_stack+0x20/0x38 (C)
[   21.117957]  dump_stack_lvl+0x8c/0xd0
[   21.118101]  print_report+0x118/0x608
[   21.118285]  kasan_report+0xdc/0x128
[   21.118746]  __asan_report_store1_noabort+0x20/0x30
[   21.118924]  strncpy_from_user+0x270/0x2a0
[   21.119345]  copy_user_test_oob+0x5c0/0xec8
[   21.119476]  kunit_try_run_case+0x170/0x3f0
[   21.119632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.119701]  kthread+0x328/0x630
[   21.119751]  ret_from_fork+0x10/0x20
[   21.119837] 
[   21.119870] Allocated by task 287:
[   21.120333]  kasan_save_stack+0x3c/0x68
[   21.120472]  kasan_save_track+0x20/0x40
[   21.120647]  kasan_save_alloc_info+0x40/0x58
[   21.120794]  __kasan_kmalloc+0xd4/0xd8
[   21.120958]  __kmalloc_noprof+0x198/0x4c8
[   21.121000]  kunit_kmalloc_array+0x34/0x88
[   21.121055]  copy_user_test_oob+0xac/0xec8
[   21.121099]  kunit_try_run_case+0x170/0x3f0
[   21.121535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.121651]  kthread+0x328/0x630
[   21.122132]  ret_from_fork+0x10/0x20
[   21.122656] 
[   21.122710] The buggy address belongs to the object at fff00000c791de00
[   21.122710]  which belongs to the cache kmalloc-128 of size 128
[   21.123112] The buggy address is located 0 bytes to the right of
[   21.123112]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.123198] 
[   21.123526] The buggy address belongs to the physical page:
[   21.123641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.124455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.124650] page_type: f5(slab)
[   21.124702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.124758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.125184] page dumped because: kasan: bad access detected
[   21.125389] 
[   21.125418] Memory state around the buggy address:
[   21.125455]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.125505]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125586] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.125651]                                                                 ^
[   21.125707]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125760]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125813] ==================================================================
[   21.106438] ==================================================================
[   21.106491] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.106812] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.106903] 
[   21.106935] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.107021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.107069] Hardware name: linux,dummy-virt (DT)
[   21.107104] Call trace:
[   21.107128]  show_stack+0x20/0x38 (C)
[   21.107186]  dump_stack_lvl+0x8c/0xd0
[   21.107236]  print_report+0x118/0x608
[   21.107284]  kasan_report+0xdc/0x128
[   21.107333]  kasan_check_range+0x100/0x1a8
[   21.107383]  __kasan_check_write+0x20/0x30
[   21.107447]  strncpy_from_user+0x3c/0x2a0
[   21.107495]  copy_user_test_oob+0x5c0/0xec8
[   21.107542]  kunit_try_run_case+0x170/0x3f0
[   21.107593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107649]  kthread+0x328/0x630
[   21.107696]  ret_from_fork+0x10/0x20
[   21.107754] 
[   21.107774] Allocated by task 287:
[   21.107804]  kasan_save_stack+0x3c/0x68
[   21.107862]  kasan_save_track+0x20/0x40
[   21.108438]  kasan_save_alloc_info+0x40/0x58
[   21.108816]  __kasan_kmalloc+0xd4/0xd8
[   21.108883]  __kmalloc_noprof+0x198/0x4c8
[   21.108922]  kunit_kmalloc_array+0x34/0x88
[   21.109561]  copy_user_test_oob+0xac/0xec8
[   21.109769]  kunit_try_run_case+0x170/0x3f0
[   21.109847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109984]  kthread+0x328/0x630
[   21.110276]  ret_from_fork+0x10/0x20
[   21.110319] 
[   21.110565] The buggy address belongs to the object at fff00000c791de00
[   21.110565]  which belongs to the cache kmalloc-128 of size 128
[   21.110787] The buggy address is located 0 bytes inside of
[   21.110787]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.111019] 
[   21.111204] The buggy address belongs to the physical page:
[   21.111264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.111348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.112332] page_type: f5(slab)
[   21.112443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.112542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.112589] page dumped because: kasan: bad access detected
[   21.112763] 
[   21.112888] Memory state around the buggy address:
[   21.112963]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.113350]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.113518] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.113654]                                                                 ^
[   21.114047]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.114160]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.114319] ==================================================================

[   14.939327] ==================================================================
[   14.939773] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   14.940481] Write of size 1 at addr ffff888102f60f78 by task kunit_try_catch/304
[   14.940882] 
[   14.941096] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.941159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941196] Call Trace:
[   14.941259]  <TASK>
[   14.941279]  dump_stack_lvl+0x73/0xb0
[   14.941357]  print_report+0xd1/0x650
[   14.941382]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941417]  ? strncpy_from_user+0x1a5/0x1d0
[   14.941443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.941467]  ? strncpy_from_user+0x1a5/0x1d0
[   14.941490]  kasan_report+0x141/0x180
[   14.941514]  ? strncpy_from_user+0x1a5/0x1d0
[   14.941542]  __asan_report_store1_noabort+0x1b/0x30
[   14.941585]  strncpy_from_user+0x1a5/0x1d0
[   14.941612]  copy_user_test_oob+0x760/0x10f0
[   14.941638]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.941658]  ? finish_task_switch.isra.0+0x153/0x700
[   14.941685]  ? __switch_to+0x5d9/0xf60
[   14.941707]  ? dequeue_task_fair+0x166/0x4e0
[   14.941733]  ? __schedule+0x10cc/0x2b60
[   14.941757]  ? __pfx_read_tsc+0x10/0x10
[   14.941778]  ? ktime_get_ts64+0x86/0x230
[   14.941805]  kunit_try_run_case+0x1a5/0x480
[   14.941831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.941855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.941880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.941905]  ? __kthread_parkme+0x82/0x180
[   14.941938]  ? preempt_count_sub+0x50/0x80
[   14.941963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.941987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942035]  kthread+0x337/0x6f0
[   14.942052]  ? trace_preempt_on+0x20/0xc0
[   14.942077]  ? __pfx_kthread+0x10/0x10
[   14.942095]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942118]  ? calculate_sigpending+0x7b/0xa0
[   14.942142]  ? __pfx_kthread+0x10/0x10
[   14.942161]  ret_from_fork+0x41/0x80
[   14.942183]  ? __pfx_kthread+0x10/0x10
[   14.942202]  ret_from_fork_asm+0x1a/0x30
[   14.942234]  </TASK>
[   14.942246] 
[   14.950945] Allocated by task 304:
[   14.951151]  kasan_save_stack+0x45/0x70
[   14.951354]  kasan_save_track+0x18/0x40
[   14.951542]  kasan_save_alloc_info+0x3b/0x50
[   14.951835]  __kasan_kmalloc+0xb7/0xc0
[   14.952059]  __kmalloc_noprof+0x1c9/0x500
[   14.952249]  kunit_kmalloc_array+0x25/0x60
[   14.952502]  copy_user_test_oob+0xab/0x10f0
[   14.952786]  kunit_try_run_case+0x1a5/0x480
[   14.953006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.953278]  kthread+0x337/0x6f0
[   14.953398]  ret_from_fork+0x41/0x80
[   14.953527]  ret_from_fork_asm+0x1a/0x30
[   14.953741] 
[   14.953897] The buggy address belongs to the object at ffff888102f60f00
[   14.953897]  which belongs to the cache kmalloc-128 of size 128
[   14.954605] The buggy address is located 0 bytes to the right of
[   14.954605]  allocated 120-byte region [ffff888102f60f00, ffff888102f60f78)
[   14.955068] 
[   14.955158] The buggy address belongs to the physical page:
[   14.955410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   14.955940] flags: 0x200000000000000(node=0|zone=2)
[   14.956225] page_type: f5(slab)
[   14.956407] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.956712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.957036] page dumped because: kasan: bad access detected
[   14.957276] 
[   14.957358] Memory state around the buggy address:
[   14.957635]  ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.957861]  ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.958178] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.958603]                                                                 ^
[   14.958869]  ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959231]  ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.959521] ==================================================================
[   14.918132] ==================================================================
[   14.918456] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   14.918894] Write of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304
[   14.919264] 
[   14.919458] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.919509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.919522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.919545] Call Trace:
[   14.919587]  <TASK>
[   14.919662]  dump_stack_lvl+0x73/0xb0
[   14.919707]  print_report+0xd1/0x650
[   14.919732]  ? __virt_addr_valid+0x1db/0x2d0
[   14.919755]  ? strncpy_from_user+0x2e/0x1d0
[   14.919778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.919802]  ? strncpy_from_user+0x2e/0x1d0
[   14.919825]  kasan_report+0x141/0x180
[   14.919849]  ? strncpy_from_user+0x2e/0x1d0
[   14.919877]  kasan_check_range+0x10c/0x1c0
[   14.919898]  __kasan_check_write+0x18/0x20
[   14.919928]  strncpy_from_user+0x2e/0x1d0
[   14.919950]  ? __kasan_check_read+0x15/0x20
[   14.919974]  copy_user_test_oob+0x760/0x10f0
[   14.919999]  ? __pfx_copy_user_test_oob+0x10/0x10
[   14.920020]  ? finish_task_switch.isra.0+0x153/0x700
[   14.920048]  ? __switch_to+0x5d9/0xf60
[   14.920070]  ? dequeue_task_fair+0x166/0x4e0
[   14.920096]  ? __schedule+0x10cc/0x2b60
[   14.920121]  ? __pfx_read_tsc+0x10/0x10
[   14.920142]  ? ktime_get_ts64+0x86/0x230
[   14.920169]  kunit_try_run_case+0x1a5/0x480
[   14.920195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.920248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.920273]  ? __kthread_parkme+0x82/0x180
[   14.920296]  ? preempt_count_sub+0x50/0x80
[   14.920322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.920392]  kthread+0x337/0x6f0
[   14.920410]  ? trace_preempt_on+0x20/0xc0
[   14.920435]  ? __pfx_kthread+0x10/0x10
[   14.920453]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.920476]  ? calculate_sigpending+0x7b/0xa0
[   14.920499]  ? __pfx_kthread+0x10/0x10
[   14.920519]  ret_from_fork+0x41/0x80
[   14.920541]  ? __pfx_kthread+0x10/0x10
[   14.920579]  ret_from_fork_asm+0x1a/0x30
[   14.920610]  </TASK>
[   14.920622] 
[   14.929426] Allocated by task 304:
[   14.929634]  kasan_save_stack+0x45/0x70
[   14.929937]  kasan_save_track+0x18/0x40
[   14.930133]  kasan_save_alloc_info+0x3b/0x50
[   14.930342]  __kasan_kmalloc+0xb7/0xc0
[   14.930515]  __kmalloc_noprof+0x1c9/0x500
[   14.930802]  kunit_kmalloc_array+0x25/0x60
[   14.930959]  copy_user_test_oob+0xab/0x10f0
[   14.931242]  kunit_try_run_case+0x1a5/0x480
[   14.931536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931785]  kthread+0x337/0x6f0
[   14.931994]  ret_from_fork+0x41/0x80
[   14.932212]  ret_from_fork_asm+0x1a/0x30
[   14.932456] 
[   14.932565] The buggy address belongs to the object at ffff888102f60f00
[   14.932565]  which belongs to the cache kmalloc-128 of size 128
[   14.933186] The buggy address is located 0 bytes inside of
[   14.933186]  allocated 120-byte region [ffff888102f60f00, ffff888102f60f78)
[   14.933701] 
[   14.933906] The buggy address belongs to the physical page:
[   14.934178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   14.934534] flags: 0x200000000000000(node=0|zone=2)
[   14.934852] page_type: f5(slab)
[   14.935037] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.935430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.935814] page dumped because: kasan: bad access detected
[   14.936036] 
[   14.936126] Memory state around the buggy address:
[   14.936285]  ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.936674]  ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936935] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   14.937251]                                                                 ^
[   14.937689]  ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937951]  ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.938261] ==================================================================