Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 61.917552] ================================================================== [ 61.931759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 61.939136] Read of size 8 at addr ffff000802678c78 by task kunit_try_catch/330 [ 61.946427] [ 61.947912] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.947969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.947987] Hardware name: WinLink E850-96 board (DT) [ 61.948010] Call trace: [ 61.948026] show_stack+0x20/0x38 (C) [ 61.948062] dump_stack_lvl+0x8c/0xd0 [ 61.948103] print_report+0x118/0x608 [ 61.948136] kasan_report+0xdc/0x128 [ 61.948167] __asan_report_load8_noabort+0x20/0x30 [ 61.948202] copy_to_kernel_nofault+0x204/0x250 [ 61.948232] copy_to_kernel_nofault_oob+0x158/0x418 [ 61.948271] kunit_try_run_case+0x170/0x3f0 [ 61.948307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.948346] kthread+0x328/0x630 [ 61.948380] ret_from_fork+0x10/0x20 [ 61.948416] [ 62.015956] Allocated by task 330: [ 62.019342] kasan_save_stack+0x3c/0x68 [ 62.023159] kasan_save_track+0x20/0x40 [ 62.026978] kasan_save_alloc_info+0x40/0x58 [ 62.031232] __kasan_kmalloc+0xd4/0xd8 [ 62.034964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.039478] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.044252] kunit_try_run_case+0x170/0x3f0 [ 62.048419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.053888] kthread+0x328/0x630 [ 62.057099] ret_from_fork+0x10/0x20 [ 62.060658] [ 62.062136] The buggy address belongs to the object at ffff000802678c00 [ 62.062136] which belongs to the cache kmalloc-128 of size 128 [ 62.074638] The buggy address is located 0 bytes to the right of [ 62.074638] allocated 120-byte region [ffff000802678c00, ffff000802678c78) [ 62.087568] [ 62.089047] The buggy address belongs to the physical page: [ 62.094605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 62.102587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.110225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.117168] page_type: f5(slab) [ 62.120308] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.128025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.135753] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.143563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.151376] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 62.159188] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.166993] page dumped because: kasan: bad access detected [ 62.172549] [ 62.174024] Memory state around the buggy address: [ 62.178807] ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.186008] ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.193215] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.200413] ^ [ 62.207535] ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.214740] ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.221942] ================================================================== [ 62.229672] ================================================================== [ 62.236357] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 62.243643] Write of size 8 at addr ffff000802678c78 by task kunit_try_catch/330 [ 62.251020] [ 62.252507] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 62.252560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.252579] Hardware name: WinLink E850-96 board (DT) [ 62.252601] Call trace: [ 62.252615] show_stack+0x20/0x38 (C) [ 62.252651] dump_stack_lvl+0x8c/0xd0 [ 62.252690] print_report+0x118/0x608 [ 62.252719] kasan_report+0xdc/0x128 [ 62.252748] kasan_check_range+0x100/0x1a8 [ 62.252784] __kasan_check_write+0x20/0x30 [ 62.252817] copy_to_kernel_nofault+0x8c/0x250 [ 62.252847] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 62.252885] kunit_try_run_case+0x170/0x3f0 [ 62.252923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.252962] kthread+0x328/0x630 [ 62.252995] ret_from_fork+0x10/0x20 [ 62.253030] [ 62.323849] Allocated by task 330: [ 62.327238] kasan_save_stack+0x3c/0x68 [ 62.331054] kasan_save_track+0x20/0x40 [ 62.334873] kasan_save_alloc_info+0x40/0x58 [ 62.339126] __kasan_kmalloc+0xd4/0xd8 [ 62.342859] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.347373] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.352148] kunit_try_run_case+0x170/0x3f0 [ 62.356314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.361782] kthread+0x328/0x630 [ 62.364994] ret_from_fork+0x10/0x20 [ 62.368553] [ 62.370028] The buggy address belongs to the object at ffff000802678c00 [ 62.370028] which belongs to the cache kmalloc-128 of size 128 [ 62.382530] The buggy address is located 0 bytes to the right of [ 62.382530] allocated 120-byte region [ffff000802678c00, ffff000802678c78) [ 62.395462] [ 62.396940] The buggy address belongs to the physical page: [ 62.402498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 62.410481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.418120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.425064] page_type: f5(slab) [ 62.428201] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.435920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.443648] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.451458] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.459271] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 62.467083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.474888] page dumped because: kasan: bad access detected [ 62.480444] [ 62.481919] Memory state around the buggy address: [ 62.486701] ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.493902] ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.501109] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.508308] ^ [ 62.515430] ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.522636] ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.529837] ==================================================================
[ 18.627995] ================================================================== [ 18.629125] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 18.629247] Read of size 8 at addr fff00000c793a478 by task kunit_try_catch/286 [ 18.629399] [ 18.629581] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.629791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.629839] Hardware name: linux,dummy-virt (DT) [ 18.629874] Call trace: [ 18.630455] show_stack+0x20/0x38 (C) [ 18.630576] dump_stack_lvl+0x8c/0xd0 [ 18.630680] print_report+0x118/0x608 [ 18.630852] kasan_report+0xdc/0x128 [ 18.630972] __asan_report_load8_noabort+0x20/0x30 [ 18.631110] copy_to_kernel_nofault+0x204/0x250 [ 18.631246] copy_to_kernel_nofault_oob+0x158/0x418 [ 18.631320] kunit_try_run_case+0x170/0x3f0 [ 18.631660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.631897] kthread+0x328/0x630 [ 18.632354] ret_from_fork+0x10/0x20 [ 18.632535] [ 18.632578] Allocated by task 286: [ 18.632608] kasan_save_stack+0x3c/0x68 [ 18.632665] kasan_save_track+0x20/0x40 [ 18.632703] kasan_save_alloc_info+0x40/0x58 [ 18.632985] __kasan_kmalloc+0xd4/0xd8 [ 18.633035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.633372] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.633788] kunit_try_run_case+0x170/0x3f0 [ 18.633910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.634125] kthread+0x328/0x630 [ 18.634309] ret_from_fork+0x10/0x20 [ 18.634420] [ 18.634510] The buggy address belongs to the object at fff00000c793a400 [ 18.634510] which belongs to the cache kmalloc-128 of size 128 [ 18.634842] The buggy address is located 0 bytes to the right of [ 18.634842] allocated 120-byte region [fff00000c793a400, fff00000c793a478) [ 18.634996] [ 18.635024] The buggy address belongs to the physical page: [ 18.635081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a [ 18.635501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.635855] page_type: f5(slab) [ 18.636004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.636188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.636413] page dumped because: kasan: bad access detected [ 18.636543] [ 18.636571] Memory state around the buggy address: [ 18.636606] fff00000c793a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.636666] fff00000c793a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636722] >fff00000c793a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.636770] ^ [ 18.636815] fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636868] fff00000c793a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636909] ================================================================== [ 18.641536] ================================================================== [ 18.641674] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 18.641735] Write of size 8 at addr fff00000c793a478 by task kunit_try_catch/286 [ 18.641947] [ 18.642113] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.642200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.642229] Hardware name: linux,dummy-virt (DT) [ 18.642309] Call trace: [ 18.642339] show_stack+0x20/0x38 (C) [ 18.642390] dump_stack_lvl+0x8c/0xd0 [ 18.642450] print_report+0x118/0x608 [ 18.642497] kasan_report+0xdc/0x128 [ 18.642544] kasan_check_range+0x100/0x1a8 [ 18.642590] __kasan_check_write+0x20/0x30 [ 18.642986] copy_to_kernel_nofault+0x8c/0x250 [ 18.643438] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 18.643683] kunit_try_run_case+0x170/0x3f0 [ 18.643746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.643820] kthread+0x328/0x630 [ 18.643872] ret_from_fork+0x10/0x20 [ 18.643920] [ 18.643942] Allocated by task 286: [ 18.644373] kasan_save_stack+0x3c/0x68 [ 18.644425] kasan_save_track+0x20/0x40 [ 18.644490] kasan_save_alloc_info+0x40/0x58 [ 18.644552] __kasan_kmalloc+0xd4/0xd8 [ 18.644886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.644988] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.645035] kunit_try_run_case+0x170/0x3f0 [ 18.645642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.645804] kthread+0x328/0x630 [ 18.645965] ret_from_fork+0x10/0x20 [ 18.646092] [ 18.646350] The buggy address belongs to the object at fff00000c793a400 [ 18.646350] which belongs to the cache kmalloc-128 of size 128 [ 18.646548] The buggy address is located 0 bytes to the right of [ 18.646548] allocated 120-byte region [fff00000c793a400, fff00000c793a478) [ 18.646785] [ 18.646829] The buggy address belongs to the physical page: [ 18.646881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a [ 18.647068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.647262] page_type: f5(slab) [ 18.647344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.647478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.647988] page dumped because: kasan: bad access detected [ 18.648104] [ 18.648253] Memory state around the buggy address: [ 18.648403] fff00000c793a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.648455] fff00000c793a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.648501] >fff00000c793a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.648559] ^ [ 18.648752] fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.648948] fff00000c793a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.649042] ==================================================================
[ 19.633732] ================================================================== [ 19.634789] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 19.637381] Write of size 8 at addr ffff8881025faa78 by task kunit_try_catch/302 [ 19.638002] [ 19.638409] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.638675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.638706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.638736] Call Trace: [ 19.638760] <TASK> [ 19.638790] dump_stack_lvl+0x73/0xb0 [ 19.638836] print_report+0xd1/0x650 [ 19.638866] ? __virt_addr_valid+0x1db/0x2d0 [ 19.638894] ? copy_to_kernel_nofault+0x99/0x260 [ 19.638919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.638946] ? copy_to_kernel_nofault+0x99/0x260 [ 19.638970] kasan_report+0x141/0x180 [ 19.638998] ? copy_to_kernel_nofault+0x99/0x260 [ 19.639026] kasan_check_range+0x10c/0x1c0 [ 19.639051] __kasan_check_write+0x18/0x20 [ 19.639097] copy_to_kernel_nofault+0x99/0x260 [ 19.639123] copy_to_kernel_nofault_oob+0x288/0x560 [ 19.639152] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.639179] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 19.639210] ? trace_hardirqs_on+0x37/0xe0 [ 19.639246] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.639278] kunit_try_run_case+0x1a5/0x480 [ 19.639309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.639353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.639387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.639416] ? __kthread_parkme+0x82/0x180 [ 19.639443] ? preempt_count_sub+0x50/0x80 [ 19.639474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.639502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.639530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.639571] kthread+0x337/0x6f0 [ 19.639594] ? trace_preempt_on+0x20/0xc0 [ 19.639621] ? __pfx_kthread+0x10/0x10 [ 19.639644] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.639670] ? calculate_sigpending+0x7b/0xa0 [ 19.639696] ? __pfx_kthread+0x10/0x10 [ 19.639718] ret_from_fork+0x41/0x80 [ 19.639744] ? __pfx_kthread+0x10/0x10 [ 19.639766] ret_from_fork_asm+0x1a/0x30 [ 19.639802] </TASK> [ 19.639816] [ 19.652719] Allocated by task 302: [ 19.653376] kasan_save_stack+0x45/0x70 [ 19.653869] kasan_save_track+0x18/0x40 [ 19.654099] kasan_save_alloc_info+0x3b/0x50 [ 19.654666] __kasan_kmalloc+0xb7/0xc0 [ 19.654990] __kmalloc_cache_noprof+0x189/0x420 [ 19.655290] copy_to_kernel_nofault_oob+0x12f/0x560 [ 19.655588] kunit_try_run_case+0x1a5/0x480 [ 19.655896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.656684] kthread+0x337/0x6f0 [ 19.656868] ret_from_fork+0x41/0x80 [ 19.657230] ret_from_fork_asm+0x1a/0x30 [ 19.657813] [ 19.658145] The buggy address belongs to the object at ffff8881025faa00 [ 19.658145] which belongs to the cache kmalloc-128 of size 128 [ 19.658799] The buggy address is located 0 bytes to the right of [ 19.658799] allocated 120-byte region [ffff8881025faa00, ffff8881025faa78) [ 19.659905] [ 19.660029] The buggy address belongs to the physical page: [ 19.660492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa [ 19.661377] flags: 0x200000000000000(node=0|zone=2) [ 19.661850] page_type: f5(slab) [ 19.662194] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.662807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.663275] page dumped because: kasan: bad access detected [ 19.663694] [ 19.663878] Memory state around the buggy address: [ 19.664523] ffff8881025fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.664900] ffff8881025fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665525] >ffff8881025faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.665866] ^ [ 19.666218] ffff8881025faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.666706] ffff8881025fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.666998] ================================================================== [ 19.605796] ================================================================== [ 19.606523] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 19.606941] Read of size 8 at addr ffff8881025faa78 by task kunit_try_catch/302 [ 19.607934] [ 19.608603] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.608739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.608771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.608837] Call Trace: [ 19.608875] <TASK> [ 19.608916] dump_stack_lvl+0x73/0xb0 [ 19.608977] print_report+0xd1/0x650 [ 19.609028] ? __virt_addr_valid+0x1db/0x2d0 [ 19.609106] ? copy_to_kernel_nofault+0x225/0x260 [ 19.609136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.609166] ? copy_to_kernel_nofault+0x225/0x260 [ 19.609191] kasan_report+0x141/0x180 [ 19.609219] ? copy_to_kernel_nofault+0x225/0x260 [ 19.609250] __asan_report_load8_noabort+0x18/0x20 [ 19.609275] copy_to_kernel_nofault+0x225/0x260 [ 19.609302] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 19.609331] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.609381] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 19.609414] ? trace_hardirqs_on+0x37/0xe0 [ 19.609452] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 19.609485] kunit_try_run_case+0x1a5/0x480 [ 19.609518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.609544] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.609575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.609605] ? __kthread_parkme+0x82/0x180 [ 19.609635] ? preempt_count_sub+0x50/0x80 [ 19.609667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.609695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.609723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.609751] kthread+0x337/0x6f0 [ 19.609772] ? trace_preempt_on+0x20/0xc0 [ 19.609799] ? __pfx_kthread+0x10/0x10 [ 19.609821] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.609849] ? calculate_sigpending+0x7b/0xa0 [ 19.609876] ? __pfx_kthread+0x10/0x10 [ 19.609899] ret_from_fork+0x41/0x80 [ 19.609925] ? __pfx_kthread+0x10/0x10 [ 19.609947] ret_from_fork_asm+0x1a/0x30 [ 19.609985] </TASK> [ 19.610001] [ 19.619946] Allocated by task 302: [ 19.620297] kasan_save_stack+0x45/0x70 [ 19.620660] kasan_save_track+0x18/0x40 [ 19.620899] kasan_save_alloc_info+0x3b/0x50 [ 19.621245] __kasan_kmalloc+0xb7/0xc0 [ 19.621530] __kmalloc_cache_noprof+0x189/0x420 [ 19.621825] copy_to_kernel_nofault_oob+0x12f/0x560 [ 19.622058] kunit_try_run_case+0x1a5/0x480 [ 19.622267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.622757] kthread+0x337/0x6f0 [ 19.623066] ret_from_fork+0x41/0x80 [ 19.623490] ret_from_fork_asm+0x1a/0x30 [ 19.623731] [ 19.623855] The buggy address belongs to the object at ffff8881025faa00 [ 19.623855] which belongs to the cache kmalloc-128 of size 128 [ 19.624940] The buggy address is located 0 bytes to the right of [ 19.624940] allocated 120-byte region [ffff8881025faa00, ffff8881025faa78) [ 19.625462] [ 19.625681] The buggy address belongs to the physical page: [ 19.626024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa [ 19.626567] flags: 0x200000000000000(node=0|zone=2) [ 19.626903] page_type: f5(slab) [ 19.627265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.627618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.628030] page dumped because: kasan: bad access detected [ 19.628255] [ 19.628397] Memory state around the buggy address: [ 19.628615] ffff8881025fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.628888] ffff8881025fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.629176] >ffff8881025faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.629584] ^ [ 19.630173] ffff8881025faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630754] ffff8881025fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.631425] ==================================================================