Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 64.770442] ================================================================== [ 64.782756] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.789783] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 64.797333] [ 64.798820] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 64.798875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.798896] Hardware name: WinLink E850-96 board (DT) [ 64.798918] Call trace: [ 64.798932] show_stack+0x20/0x38 (C) [ 64.798970] dump_stack_lvl+0x8c/0xd0 [ 64.799009] print_report+0x118/0x608 [ 64.799048] kasan_report+0xdc/0x128 [ 64.799082] kasan_check_range+0x100/0x1a8 [ 64.799121] __kasan_check_write+0x20/0x30 [ 64.799152] copy_user_test_oob+0x234/0xec8 [ 64.799187] kunit_try_run_case+0x170/0x3f0 [ 64.799230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.799273] kthread+0x328/0x630 [ 64.799303] ret_from_fork+0x10/0x20 [ 64.799341] [ 64.865909] Allocated by task 329: [ 64.869296] kasan_save_stack+0x3c/0x68 [ 64.873113] kasan_save_track+0x20/0x40 [ 64.876932] kasan_save_alloc_info+0x40/0x58 [ 64.881186] __kasan_kmalloc+0xd4/0xd8 [ 64.884918] __kmalloc_noprof+0x190/0x4d0 [ 64.888911] kunit_kmalloc_array+0x34/0x88 [ 64.892992] copy_user_test_oob+0xac/0xec8 [ 64.897071] kunit_try_run_case+0x170/0x3f0 [ 64.901237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.906706] kthread+0x328/0x630 [ 64.909918] ret_from_fork+0x10/0x20 [ 64.913477] [ 64.914955] The buggy address belongs to the object at ffff000800da9800 [ 64.914955] which belongs to the cache kmalloc-128 of size 128 [ 64.927456] The buggy address is located 0 bytes inside of [ 64.927456] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 64.939865] [ 64.941344] The buggy address belongs to the physical page: [ 64.946901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 64.954886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.962525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.969467] page_type: f5(slab) [ 64.972604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.980323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.988050] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.995860] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.003673] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.011485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.019291] page dumped because: kasan: bad access detected [ 65.024848] [ 65.026322] Memory state around the buggy address: [ 65.031104] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.038305] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.045512] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.052711] ^ [ 65.059832] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.067037] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.074239] ================================================================== [ 66.304907] ================================================================== [ 66.311896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.318926] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 66.326389] [ 66.327872] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.327924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.327941] Hardware name: WinLink E850-96 board (DT) [ 66.327963] Call trace: [ 66.327978] show_stack+0x20/0x38 (C) [ 66.328014] dump_stack_lvl+0x8c/0xd0 [ 66.328052] print_report+0x118/0x608 [ 66.328088] kasan_report+0xdc/0x128 [ 66.328120] kasan_check_range+0x100/0x1a8 [ 66.328154] __kasan_check_read+0x20/0x30 [ 66.328184] copy_user_test_oob+0x4a0/0xec8 [ 66.328219] kunit_try_run_case+0x170/0x3f0 [ 66.328255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.328297] kthread+0x328/0x630 [ 66.328324] ret_from_fork+0x10/0x20 [ 66.328359] [ 66.394878] Allocated by task 329: [ 66.398264] kasan_save_stack+0x3c/0x68 [ 66.402083] kasan_save_track+0x20/0x40 [ 66.405902] kasan_save_alloc_info+0x40/0x58 [ 66.410156] __kasan_kmalloc+0xd4/0xd8 [ 66.413888] __kmalloc_noprof+0x190/0x4d0 [ 66.417881] kunit_kmalloc_array+0x34/0x88 [ 66.421961] copy_user_test_oob+0xac/0xec8 [ 66.426041] kunit_try_run_case+0x170/0x3f0 [ 66.430208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.435676] kthread+0x328/0x630 [ 66.438888] ret_from_fork+0x10/0x20 [ 66.442447] [ 66.443923] The buggy address belongs to the object at ffff000800da9800 [ 66.443923] which belongs to the cache kmalloc-128 of size 128 [ 66.456424] The buggy address is located 0 bytes inside of [ 66.456424] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 66.468835] [ 66.470313] The buggy address belongs to the physical page: [ 66.475869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 66.483853] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.491492] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.498437] page_type: f5(slab) [ 66.501570] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.509293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.517019] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.524831] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.532643] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 66.540455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.548261] page dumped because: kasan: bad access detected [ 66.553818] [ 66.555292] Memory state around the buggy address: [ 66.560074] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.567275] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.574480] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.581681] ^ [ 66.588803] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.596007] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.603209] ================================================================== [ 65.999186] ================================================================== [ 66.006001] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 66.013027] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 66.020578] [ 66.022064] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 66.022115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.022133] Hardware name: WinLink E850-96 board (DT) [ 66.022153] Call trace: [ 66.022168] show_stack+0x20/0x38 (C) [ 66.022206] dump_stack_lvl+0x8c/0xd0 [ 66.022244] print_report+0x118/0x608 [ 66.022280] kasan_report+0xdc/0x128 [ 66.022312] kasan_check_range+0x100/0x1a8 [ 66.022347] __kasan_check_write+0x20/0x30 [ 66.022376] copy_user_test_oob+0x434/0xec8 [ 66.022409] kunit_try_run_case+0x170/0x3f0 [ 66.022444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.022485] kthread+0x328/0x630 [ 66.022513] ret_from_fork+0x10/0x20 [ 66.022547] [ 66.089154] Allocated by task 329: [ 66.092539] kasan_save_stack+0x3c/0x68 [ 66.096358] kasan_save_track+0x20/0x40 [ 66.100178] kasan_save_alloc_info+0x40/0x58 [ 66.104431] __kasan_kmalloc+0xd4/0xd8 [ 66.108164] __kmalloc_noprof+0x190/0x4d0 [ 66.112157] kunit_kmalloc_array+0x34/0x88 [ 66.116237] copy_user_test_oob+0xac/0xec8 [ 66.120316] kunit_try_run_case+0x170/0x3f0 [ 66.124483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.129952] kthread+0x328/0x630 [ 66.133163] ret_from_fork+0x10/0x20 [ 66.136723] [ 66.138200] The buggy address belongs to the object at ffff000800da9800 [ 66.138200] which belongs to the cache kmalloc-128 of size 128 [ 66.150700] The buggy address is located 0 bytes inside of [ 66.150700] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 66.163111] [ 66.164590] The buggy address belongs to the physical page: [ 66.170146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 66.178131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.185770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.192713] page_type: f5(slab) [ 66.195846] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.203568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.211294] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.219106] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.226919] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 66.234731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.242537] page dumped because: kasan: bad access detected [ 66.248094] [ 66.249568] Memory state around the buggy address: [ 66.254348] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.261551] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.268755] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.275957] ^ [ 66.283078] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.290283] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.297484] ================================================================== [ 65.081656] ================================================================== [ 65.088652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 65.095679] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.103144] [ 65.104629] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.104688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.104708] Hardware name: WinLink E850-96 board (DT) [ 65.104729] Call trace: [ 65.104743] show_stack+0x20/0x38 (C) [ 65.104776] dump_stack_lvl+0x8c/0xd0 [ 65.104814] print_report+0x118/0x608 [ 65.104852] kasan_report+0xdc/0x128 [ 65.104885] kasan_check_range+0x100/0x1a8 [ 65.104922] __kasan_check_read+0x20/0x30 [ 65.104952] copy_user_test_oob+0x728/0xec8 [ 65.104987] kunit_try_run_case+0x170/0x3f0 [ 65.105025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.105064] kthread+0x328/0x630 [ 65.105094] ret_from_fork+0x10/0x20 [ 65.105131] [ 65.171632] Allocated by task 329: [ 65.175020] kasan_save_stack+0x3c/0x68 [ 65.178838] kasan_save_track+0x20/0x40 [ 65.182657] kasan_save_alloc_info+0x40/0x58 [ 65.186910] __kasan_kmalloc+0xd4/0xd8 [ 65.190643] __kmalloc_noprof+0x190/0x4d0 [ 65.194636] kunit_kmalloc_array+0x34/0x88 [ 65.198715] copy_user_test_oob+0xac/0xec8 [ 65.202795] kunit_try_run_case+0x170/0x3f0 [ 65.206962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.212431] kthread+0x328/0x630 [ 65.215643] ret_from_fork+0x10/0x20 [ 65.219201] [ 65.220679] The buggy address belongs to the object at ffff000800da9800 [ 65.220679] which belongs to the cache kmalloc-128 of size 128 [ 65.233179] The buggy address is located 0 bytes inside of [ 65.233179] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.245590] [ 65.247069] The buggy address belongs to the physical page: [ 65.252624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.260607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.268246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.275190] page_type: f5(slab) [ 65.278328] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.286047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.293774] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.301585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.309398] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.317210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.325016] page dumped because: kasan: bad access detected [ 65.330572] [ 65.332047] Memory state around the buggy address: [ 65.336827] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.344030] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.351237] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.358436] ^ [ 65.365557] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.372762] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.379963] ================================================================== [ 65.693259] ================================================================== [ 65.700276] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.707304] Read of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.714767] [ 65.716252] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.716310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.716328] Hardware name: WinLink E850-96 board (DT) [ 65.716348] Call trace: [ 65.716363] show_stack+0x20/0x38 (C) [ 65.716400] dump_stack_lvl+0x8c/0xd0 [ 65.716437] print_report+0x118/0x608 [ 65.716474] kasan_report+0xdc/0x128 [ 65.716506] kasan_check_range+0x100/0x1a8 [ 65.716542] __kasan_check_read+0x20/0x30 [ 65.716571] copy_user_test_oob+0x3c8/0xec8 [ 65.716604] kunit_try_run_case+0x170/0x3f0 [ 65.716639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.716681] kthread+0x328/0x630 [ 65.716712] ret_from_fork+0x10/0x20 [ 65.716749] [ 65.783255] Allocated by task 329: [ 65.786644] kasan_save_stack+0x3c/0x68 [ 65.790461] kasan_save_track+0x20/0x40 [ 65.794279] kasan_save_alloc_info+0x40/0x58 [ 65.798533] __kasan_kmalloc+0xd4/0xd8 [ 65.802266] __kmalloc_noprof+0x190/0x4d0 [ 65.806259] kunit_kmalloc_array+0x34/0x88 [ 65.810339] copy_user_test_oob+0xac/0xec8 [ 65.814418] kunit_try_run_case+0x170/0x3f0 [ 65.818585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.824054] kthread+0x328/0x630 [ 65.827265] ret_from_fork+0x10/0x20 [ 65.830824] [ 65.832302] The buggy address belongs to the object at ffff000800da9800 [ 65.832302] which belongs to the cache kmalloc-128 of size 128 [ 65.844800] The buggy address is located 0 bytes inside of [ 65.844800] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.857213] [ 65.858692] The buggy address belongs to the physical page: [ 65.864249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.872232] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.879870] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.886814] page_type: f5(slab) [ 65.889950] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.897670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.905397] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.913208] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.921021] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.928833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.936638] page dumped because: kasan: bad access detected [ 65.942196] [ 65.943669] Memory state around the buggy address: [ 65.948449] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.955652] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.962857] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.970058] ^ [ 65.977180] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.984384] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991586] ================================================================== [ 65.387656] ================================================================== [ 65.394378] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.401404] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329 [ 65.408956] [ 65.410441] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 65.410497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.410514] Hardware name: WinLink E850-96 board (DT) [ 65.410538] Call trace: [ 65.410554] show_stack+0x20/0x38 (C) [ 65.410590] dump_stack_lvl+0x8c/0xd0 [ 65.410626] print_report+0x118/0x608 [ 65.410664] kasan_report+0xdc/0x128 [ 65.410696] kasan_check_range+0x100/0x1a8 [ 65.410736] __kasan_check_write+0x20/0x30 [ 65.410766] copy_user_test_oob+0x35c/0xec8 [ 65.410797] kunit_try_run_case+0x170/0x3f0 [ 65.410831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.410872] kthread+0x328/0x630 [ 65.410899] ret_from_fork+0x10/0x20 [ 65.410937] [ 65.477531] Allocated by task 329: [ 65.480917] kasan_save_stack+0x3c/0x68 [ 65.484735] kasan_save_track+0x20/0x40 [ 65.488555] kasan_save_alloc_info+0x40/0x58 [ 65.492808] __kasan_kmalloc+0xd4/0xd8 [ 65.496541] __kmalloc_noprof+0x190/0x4d0 [ 65.500534] kunit_kmalloc_array+0x34/0x88 [ 65.504614] copy_user_test_oob+0xac/0xec8 [ 65.508693] kunit_try_run_case+0x170/0x3f0 [ 65.512860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.518329] kthread+0x328/0x630 [ 65.521541] ret_from_fork+0x10/0x20 [ 65.525100] [ 65.526577] The buggy address belongs to the object at ffff000800da9800 [ 65.526577] which belongs to the cache kmalloc-128 of size 128 [ 65.539077] The buggy address is located 0 bytes inside of [ 65.539077] allocated 120-byte region [ffff000800da9800, ffff000800da9878) [ 65.551488] [ 65.552966] The buggy address belongs to the physical page: [ 65.558522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8 [ 65.566508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.574144] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.581088] page_type: f5(slab) [ 65.584225] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.591946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.599673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.607483] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.615296] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff [ 65.623108] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.630914] page dumped because: kasan: bad access detected [ 65.636471] [ 65.637945] Memory state around the buggy address: [ 65.642727] ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.649928] ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.657135] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.664333] ^ [ 65.671455] ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.678660] ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.685861] ==================================================================
[ 30.012532] ================================================================== [ 30.012728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 30.013997] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.014142] [ 30.014234] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.014466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.014537] Hardware name: linux,dummy-virt (DT) [ 30.014617] Call trace: [ 30.014677] show_stack+0x20/0x38 (C) [ 30.014824] dump_stack_lvl+0x8c/0xd0 [ 30.014986] print_report+0x118/0x608 [ 30.015749] kasan_report+0xdc/0x128 [ 30.015908] kasan_check_range+0x100/0x1a8 [ 30.016055] __kasan_check_write+0x20/0x30 [ 30.016201] copy_user_test_oob+0x35c/0xec8 [ 30.016352] kunit_try_run_case+0x170/0x3f0 [ 30.016491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.016645] kthread+0x328/0x630 [ 30.016966] ret_from_fork+0x10/0x20 [ 30.017119] [ 30.017181] Allocated by task 286: [ 30.017285] kasan_save_stack+0x3c/0x68 [ 30.017407] kasan_save_track+0x20/0x40 [ 30.017525] kasan_save_alloc_info+0x40/0x58 [ 30.017806] __kasan_kmalloc+0xd4/0xd8 [ 30.018107] __kmalloc_noprof+0x190/0x4d0 [ 30.018245] kunit_kmalloc_array+0x34/0x88 [ 30.018506] copy_user_test_oob+0xac/0xec8 [ 30.018693] kunit_try_run_case+0x170/0x3f0 [ 30.018797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.018920] kthread+0x328/0x630 [ 30.019103] ret_from_fork+0x10/0x20 [ 30.019277] [ 30.019434] The buggy address belongs to the object at fff00000c56e8f00 [ 30.019434] which belongs to the cache kmalloc-128 of size 128 [ 30.019911] The buggy address is located 0 bytes inside of [ 30.019911] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.020255] [ 30.020330] The buggy address belongs to the physical page: [ 30.020420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.020573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.020736] page_type: f5(slab) [ 30.020840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.021657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.022059] page dumped because: kasan: bad access detected [ 30.022234] [ 30.022438] Memory state around the buggy address: [ 30.022561] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.022694] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.022815] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.022920] ^ [ 30.023021] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025647] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.025783] ================================================================== [ 29.966133] ================================================================== [ 29.966428] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 29.966736] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 29.966873] [ 29.967077] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.967301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.967393] Hardware name: linux,dummy-virt (DT) [ 29.967641] Call trace: [ 29.967733] show_stack+0x20/0x38 (C) [ 29.967874] dump_stack_lvl+0x8c/0xd0 [ 29.968135] print_report+0x118/0x608 [ 29.968288] kasan_report+0xdc/0x128 [ 29.968417] kasan_check_range+0x100/0x1a8 [ 29.969042] __kasan_check_write+0x20/0x30 [ 29.969113] copy_user_test_oob+0x234/0xec8 [ 29.969192] kunit_try_run_case+0x170/0x3f0 [ 29.970274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.970430] kthread+0x328/0x630 [ 29.970553] ret_from_fork+0x10/0x20 [ 29.970776] [ 29.970839] Allocated by task 286: [ 29.970967] kasan_save_stack+0x3c/0x68 [ 29.971095] kasan_save_track+0x20/0x40 [ 29.971231] kasan_save_alloc_info+0x40/0x58 [ 29.971554] __kasan_kmalloc+0xd4/0xd8 [ 29.971673] __kmalloc_noprof+0x190/0x4d0 [ 29.971842] kunit_kmalloc_array+0x34/0x88 [ 29.971941] copy_user_test_oob+0xac/0xec8 [ 29.972038] kunit_try_run_case+0x170/0x3f0 [ 29.972200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.972488] kthread+0x328/0x630 [ 29.972714] ret_from_fork+0x10/0x20 [ 29.972887] [ 29.972967] The buggy address belongs to the object at fff00000c56e8f00 [ 29.972967] which belongs to the cache kmalloc-128 of size 128 [ 29.973188] The buggy address is located 0 bytes inside of [ 29.973188] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 29.973638] [ 29.973718] The buggy address belongs to the physical page: [ 29.973813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.973975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.974178] page_type: f5(slab) [ 29.974300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.974497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.974611] page dumped because: kasan: bad access detected [ 29.974770] [ 29.974867] Memory state around the buggy address: [ 29.974966] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.975091] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.975301] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.975440] ^ [ 29.975576] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.975789] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.975936] ================================================================== [ 29.986174] ================================================================== [ 29.986329] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 29.986463] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 29.986596] [ 29.986773] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.987596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.987726] Hardware name: linux,dummy-virt (DT) [ 29.988069] Call trace: [ 29.988264] show_stack+0x20/0x38 (C) [ 29.988403] dump_stack_lvl+0x8c/0xd0 [ 29.988537] print_report+0x118/0x608 [ 29.988926] kasan_report+0xdc/0x128 [ 29.989131] kasan_check_range+0x100/0x1a8 [ 29.989402] __kasan_check_read+0x20/0x30 [ 29.989783] copy_user_test_oob+0x728/0xec8 [ 29.989971] kunit_try_run_case+0x170/0x3f0 [ 29.990111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.990247] kthread+0x328/0x630 [ 29.990370] ret_from_fork+0x10/0x20 [ 29.990541] [ 29.990627] Allocated by task 286: [ 29.990728] kasan_save_stack+0x3c/0x68 [ 29.990852] kasan_save_track+0x20/0x40 [ 29.990975] kasan_save_alloc_info+0x40/0x58 [ 29.991177] __kasan_kmalloc+0xd4/0xd8 [ 29.991543] __kmalloc_noprof+0x190/0x4d0 [ 29.991676] kunit_kmalloc_array+0x34/0x88 [ 29.991802] copy_user_test_oob+0xac/0xec8 [ 29.991899] kunit_try_run_case+0x170/0x3f0 [ 29.992295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.992589] kthread+0x328/0x630 [ 29.992706] ret_from_fork+0x10/0x20 [ 29.993183] [ 29.993275] The buggy address belongs to the object at fff00000c56e8f00 [ 29.993275] which belongs to the cache kmalloc-128 of size 128 [ 29.993579] The buggy address is located 0 bytes inside of [ 29.993579] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 29.993809] [ 29.993866] The buggy address belongs to the physical page: [ 29.993946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 29.994075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.994201] page_type: f5(slab) [ 29.994350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.994573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.994767] page dumped because: kasan: bad access detected [ 29.994855] [ 29.994916] Memory state around the buggy address: [ 29.995135] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.995351] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995560] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.995661] ^ [ 29.995796] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995925] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.996032] ================================================================== [ 30.028944] ================================================================== [ 30.029118] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 30.029354] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.029548] [ 30.029635] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.030080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.030159] Hardware name: linux,dummy-virt (DT) [ 30.030282] Call trace: [ 30.030357] show_stack+0x20/0x38 (C) [ 30.030563] dump_stack_lvl+0x8c/0xd0 [ 30.030949] print_report+0x118/0x608 [ 30.031095] kasan_report+0xdc/0x128 [ 30.031305] kasan_check_range+0x100/0x1a8 [ 30.031658] __kasan_check_read+0x20/0x30 [ 30.031802] copy_user_test_oob+0x3c8/0xec8 [ 30.031924] kunit_try_run_case+0x170/0x3f0 [ 30.032044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.032177] kthread+0x328/0x630 [ 30.032339] ret_from_fork+0x10/0x20 [ 30.032460] [ 30.032511] Allocated by task 286: [ 30.032583] kasan_save_stack+0x3c/0x68 [ 30.032734] kasan_save_track+0x20/0x40 [ 30.032858] kasan_save_alloc_info+0x40/0x58 [ 30.032980] __kasan_kmalloc+0xd4/0xd8 [ 30.033097] __kmalloc_noprof+0x190/0x4d0 [ 30.033217] kunit_kmalloc_array+0x34/0x88 [ 30.033373] copy_user_test_oob+0xac/0xec8 [ 30.033484] kunit_try_run_case+0x170/0x3f0 [ 30.033605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.033934] kthread+0x328/0x630 [ 30.034195] ret_from_fork+0x10/0x20 [ 30.034318] [ 30.034378] The buggy address belongs to the object at fff00000c56e8f00 [ 30.034378] which belongs to the cache kmalloc-128 of size 128 [ 30.034537] The buggy address is located 0 bytes inside of [ 30.034537] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.034797] [ 30.035010] The buggy address belongs to the physical page: [ 30.035533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.035880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.036006] page_type: f5(slab) [ 30.036573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.037298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.037460] page dumped because: kasan: bad access detected [ 30.037836] [ 30.038130] Memory state around the buggy address: [ 30.038221] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.038330] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.038484] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.038605] ^ [ 30.039002] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.039115] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.039755] ================================================================== [ 30.068074] ================================================================== [ 30.068193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 30.068334] Read of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.068456] [ 30.068539] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.073127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.073206] Hardware name: linux,dummy-virt (DT) [ 30.073916] Call trace: [ 30.073984] show_stack+0x20/0x38 (C) [ 30.074111] dump_stack_lvl+0x8c/0xd0 [ 30.075353] print_report+0x118/0x608 [ 30.075745] kasan_report+0xdc/0x128 [ 30.075860] kasan_check_range+0x100/0x1a8 [ 30.075992] __kasan_check_read+0x20/0x30 [ 30.077768] copy_user_test_oob+0x4a0/0xec8 [ 30.078290] kunit_try_run_case+0x170/0x3f0 [ 30.078565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.079064] kthread+0x328/0x630 [ 30.079389] ret_from_fork+0x10/0x20 [ 30.079619] [ 30.079737] Allocated by task 286: [ 30.079827] kasan_save_stack+0x3c/0x68 [ 30.080003] kasan_save_track+0x20/0x40 [ 30.080109] kasan_save_alloc_info+0x40/0x58 [ 30.080232] __kasan_kmalloc+0xd4/0xd8 [ 30.080379] __kmalloc_noprof+0x190/0x4d0 [ 30.080487] kunit_kmalloc_array+0x34/0x88 [ 30.080672] copy_user_test_oob+0xac/0xec8 [ 30.080832] kunit_try_run_case+0x170/0x3f0 [ 30.081375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.081550] kthread+0x328/0x630 [ 30.081658] ret_from_fork+0x10/0x20 [ 30.082075] [ 30.082129] The buggy address belongs to the object at fff00000c56e8f00 [ 30.082129] which belongs to the cache kmalloc-128 of size 128 [ 30.082556] The buggy address is located 0 bytes inside of [ 30.082556] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.082759] [ 30.082919] The buggy address belongs to the physical page: [ 30.083005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.083143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.083284] page_type: f5(slab) [ 30.083384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.083511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.083613] page dumped because: kasan: bad access detected [ 30.083714] [ 30.083769] Memory state around the buggy address: [ 30.083849] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.083956] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084062] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.084158] ^ [ 30.084260] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084367] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.084460] ================================================================== [ 30.042209] ================================================================== [ 30.042476] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 30.042893] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286 [ 30.043247] [ 30.043347] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.043924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.044111] Hardware name: linux,dummy-virt (DT) [ 30.044199] Call trace: [ 30.044473] show_stack+0x20/0x38 (C) [ 30.044697] dump_stack_lvl+0x8c/0xd0 [ 30.045049] print_report+0x118/0x608 [ 30.045176] kasan_report+0xdc/0x128 [ 30.045322] kasan_check_range+0x100/0x1a8 [ 30.045450] __kasan_check_write+0x20/0x30 [ 30.045615] copy_user_test_oob+0x434/0xec8 [ 30.046047] kunit_try_run_case+0x170/0x3f0 [ 30.046479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047161] kthread+0x328/0x630 [ 30.047533] ret_from_fork+0x10/0x20 [ 30.047997] [ 30.048068] Allocated by task 286: [ 30.048162] kasan_save_stack+0x3c/0x68 [ 30.048348] kasan_save_track+0x20/0x40 [ 30.048458] kasan_save_alloc_info+0x40/0x58 [ 30.048846] __kasan_kmalloc+0xd4/0xd8 [ 30.049138] __kmalloc_noprof+0x190/0x4d0 [ 30.049412] kunit_kmalloc_array+0x34/0x88 [ 30.049862] copy_user_test_oob+0xac/0xec8 [ 30.050116] kunit_try_run_case+0x170/0x3f0 [ 30.050446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.050581] kthread+0x328/0x630 [ 30.050841] ret_from_fork+0x10/0x20 [ 30.051198] [ 30.051306] The buggy address belongs to the object at fff00000c56e8f00 [ 30.051306] which belongs to the cache kmalloc-128 of size 128 [ 30.051472] The buggy address is located 0 bytes inside of [ 30.051472] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 30.051876] [ 30.052007] The buggy address belongs to the physical page: [ 30.053283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 30.053475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.054573] page_type: f5(slab) [ 30.054903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.055513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.056479] page dumped because: kasan: bad access detected [ 30.056574] [ 30.057420] Memory state around the buggy address: [ 30.057907] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.058424] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.058542] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.058641] ^ [ 30.058769] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.060229] fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.061526] ==================================================================
[ 25.674891] ================================================================== [ 25.675589] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 25.676251] Write of size 121 at addr ffff8881022e0700 by task kunit_try_catch/302 [ 25.678902] [ 25.679461] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.679553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.679599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.679665] Call Trace: [ 25.680134] <TASK> [ 25.680172] dump_stack_lvl+0x73/0xb0 [ 25.680217] print_report+0xd1/0x650 [ 25.680256] ? __virt_addr_valid+0x1db/0x2d0 [ 25.680292] ? copy_user_test_oob+0x3fd/0x10f0 [ 25.680322] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.680357] ? copy_user_test_oob+0x3fd/0x10f0 [ 25.680386] kasan_report+0x141/0x180 [ 25.680420] ? copy_user_test_oob+0x3fd/0x10f0 [ 25.680455] kasan_check_range+0x10c/0x1c0 [ 25.680491] __kasan_check_write+0x18/0x20 [ 25.680543] copy_user_test_oob+0x3fd/0x10f0 [ 25.680623] ? __pfx_copy_user_test_oob+0x10/0x10 [ 25.680655] ? finish_task_switch.isra.0+0x153/0x700 [ 25.680692] ? __switch_to+0x47/0xf50 [ 25.680732] ? __schedule+0x10cc/0x2b60 [ 25.680768] ? __pfx_read_tsc+0x10/0x10 [ 25.680801] ? ktime_get_ts64+0x86/0x230 [ 25.680862] kunit_try_run_case+0x1a5/0x480 [ 25.680898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.680930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.680967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.681005] ? __kthread_parkme+0x82/0x180 [ 25.681037] ? preempt_count_sub+0x50/0x80 [ 25.681070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.681102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.681138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.681175] kthread+0x337/0x6f0 [ 25.681204] ? trace_preempt_on+0x20/0xc0 [ 25.681238] ? __pfx_kthread+0x10/0x10 [ 25.681272] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.681307] ? calculate_sigpending+0x7b/0xa0 [ 25.681343] ? __pfx_kthread+0x10/0x10 [ 25.681375] ret_from_fork+0x116/0x1d0 [ 25.681400] ? __pfx_kthread+0x10/0x10 [ 25.681431] ret_from_fork_asm+0x1a/0x30 [ 25.681474] </TASK> [ 25.681491] [ 25.703256] Allocated by task 302: [ 25.703746] kasan_save_stack+0x45/0x70 [ 25.704044] kasan_save_track+0x18/0x40 [ 25.704488] kasan_save_alloc_info+0x3b/0x50 [ 25.704863] __kasan_kmalloc+0xb7/0xc0 [ 25.705301] __kmalloc_noprof+0x1c9/0x500 [ 25.705678] kunit_kmalloc_array+0x25/0x60 [ 25.706261] copy_user_test_oob+0xab/0x10f0 [ 25.707365] kunit_try_run_case+0x1a5/0x480 [ 25.707740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.708143] kthread+0x337/0x6f0 [ 25.708770] ret_from_fork+0x116/0x1d0 [ 25.709196] ret_from_fork_asm+0x1a/0x30 [ 25.709606] [ 25.709845] The buggy address belongs to the object at ffff8881022e0700 [ 25.709845] which belongs to the cache kmalloc-128 of size 128 [ 25.710788] The buggy address is located 0 bytes inside of [ 25.710788] allocated 120-byte region [ffff8881022e0700, ffff8881022e0778) [ 25.712394] [ 25.712797] The buggy address belongs to the physical page: [ 25.713377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 25.714228] flags: 0x200000000000000(node=0|zone=2) [ 25.714877] page_type: f5(slab) [ 25.715357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.716184] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.716767] page dumped because: kasan: bad access detected [ 25.717235] [ 25.717811] Memory state around the buggy address: [ 25.718377] ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.719265] ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.719973] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.720795] ^ [ 25.721513] ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.722124] ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.722642] ================================================================== [ 25.724406] ================================================================== [ 25.725118] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 25.727135] Read of size 121 at addr ffff8881022e0700 by task kunit_try_catch/302 [ 25.727665] [ 25.727979] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.728115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.728163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.728206] Call Trace: [ 25.728248] <TASK> [ 25.728272] dump_stack_lvl+0x73/0xb0 [ 25.728322] print_report+0xd1/0x650 [ 25.728393] ? __virt_addr_valid+0x1db/0x2d0 [ 25.728431] ? copy_user_test_oob+0x4aa/0x10f0 [ 25.728461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.728497] ? copy_user_test_oob+0x4aa/0x10f0 [ 25.728528] kasan_report+0x141/0x180 [ 25.728845] ? copy_user_test_oob+0x4aa/0x10f0 [ 25.728896] kasan_check_range+0x10c/0x1c0 [ 25.728935] __kasan_check_read+0x15/0x20 [ 25.728965] copy_user_test_oob+0x4aa/0x10f0 [ 25.728998] ? __pfx_copy_user_test_oob+0x10/0x10 [ 25.729026] ? finish_task_switch.isra.0+0x153/0x700 [ 25.729062] ? __switch_to+0x47/0xf50 [ 25.729100] ? __schedule+0x10cc/0x2b60 [ 25.729136] ? __pfx_read_tsc+0x10/0x10 [ 25.729167] ? ktime_get_ts64+0x86/0x230 [ 25.729202] kunit_try_run_case+0x1a5/0x480 [ 25.729232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.729262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.729299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.729335] ? __kthread_parkme+0x82/0x180 [ 25.729365] ? preempt_count_sub+0x50/0x80 [ 25.729397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.729428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.729464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.729502] kthread+0x337/0x6f0 [ 25.729531] ? trace_preempt_on+0x20/0xc0 [ 25.729599] ? __pfx_kthread+0x10/0x10 [ 25.729632] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.729666] ? calculate_sigpending+0x7b/0xa0 [ 25.729702] ? __pfx_kthread+0x10/0x10 [ 25.729733] ret_from_fork+0x116/0x1d0 [ 25.729762] ? __pfx_kthread+0x10/0x10 [ 25.729792] ret_from_fork_asm+0x1a/0x30 [ 25.729859] </TASK> [ 25.729877] [ 25.750131] Allocated by task 302: [ 25.750505] kasan_save_stack+0x45/0x70 [ 25.750889] kasan_save_track+0x18/0x40 [ 25.751216] kasan_save_alloc_info+0x3b/0x50 [ 25.751617] __kasan_kmalloc+0xb7/0xc0 [ 25.752151] __kmalloc_noprof+0x1c9/0x500 [ 25.752590] kunit_kmalloc_array+0x25/0x60 [ 25.753183] copy_user_test_oob+0xab/0x10f0 [ 25.753627] kunit_try_run_case+0x1a5/0x480 [ 25.754100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.754511] kthread+0x337/0x6f0 [ 25.754882] ret_from_fork+0x116/0x1d0 [ 25.755460] ret_from_fork_asm+0x1a/0x30 [ 25.755968] [ 25.756261] The buggy address belongs to the object at ffff8881022e0700 [ 25.756261] which belongs to the cache kmalloc-128 of size 128 [ 25.757424] The buggy address is located 0 bytes inside of [ 25.757424] allocated 120-byte region [ffff8881022e0700, ffff8881022e0778) [ 25.758590] [ 25.758889] The buggy address belongs to the physical page: [ 25.759390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 25.760047] flags: 0x200000000000000(node=0|zone=2) [ 25.760592] page_type: f5(slab) [ 25.761003] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.761645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.762376] page dumped because: kasan: bad access detected [ 25.763118] [ 25.763327] Memory state around the buggy address: [ 25.763929] ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.764543] ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.765169] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.765844] ^ [ 25.766529] ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.767127] ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.767867] ================================================================== [ 25.769147] ================================================================== [ 25.769918] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 25.770541] Write of size 121 at addr ffff8881022e0700 by task kunit_try_catch/302 [ 25.771316] [ 25.771629] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.771761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.771803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.771888] Call Trace: [ 25.771944] <TASK> [ 25.771995] dump_stack_lvl+0x73/0xb0 [ 25.772086] print_report+0xd1/0x650 [ 25.772191] ? __virt_addr_valid+0x1db/0x2d0 [ 25.772303] ? copy_user_test_oob+0x557/0x10f0 [ 25.772358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.772431] ? copy_user_test_oob+0x557/0x10f0 [ 25.772509] kasan_report+0x141/0x180 [ 25.772631] ? copy_user_test_oob+0x557/0x10f0 [ 25.772750] kasan_check_range+0x10c/0x1c0 [ 25.772852] __kasan_check_write+0x18/0x20 [ 25.772935] copy_user_test_oob+0x557/0x10f0 [ 25.773042] ? __pfx_copy_user_test_oob+0x10/0x10 [ 25.773149] ? finish_task_switch.isra.0+0x153/0x700 [ 25.773229] ? __switch_to+0x47/0xf50 [ 25.773338] ? __schedule+0x10cc/0x2b60 [ 25.773460] ? __pfx_read_tsc+0x10/0x10 [ 25.773542] ? ktime_get_ts64+0x86/0x230 [ 25.773652] kunit_try_run_case+0x1a5/0x480 [ 25.773786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.773897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.773987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.774076] ? __kthread_parkme+0x82/0x180 [ 25.774159] ? preempt_count_sub+0x50/0x80 [ 25.774257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.774340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.774454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.774573] kthread+0x337/0x6f0 [ 25.774649] ? trace_preempt_on+0x20/0xc0 [ 25.774735] ? __pfx_kthread+0x10/0x10 [ 25.774813] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.774914] ? calculate_sigpending+0x7b/0xa0 [ 25.775003] ? __pfx_kthread+0x10/0x10 [ 25.775042] ret_from_fork+0x116/0x1d0 [ 25.775071] ? __pfx_kthread+0x10/0x10 [ 25.775102] ret_from_fork_asm+0x1a/0x30 [ 25.775149] </TASK> [ 25.775165] [ 25.794755] Allocated by task 302: [ 25.795450] kasan_save_stack+0x45/0x70 [ 25.796139] kasan_save_track+0x18/0x40 [ 25.796799] kasan_save_alloc_info+0x3b/0x50 [ 25.797327] __kasan_kmalloc+0xb7/0xc0 [ 25.797712] __kmalloc_noprof+0x1c9/0x500 [ 25.798127] kunit_kmalloc_array+0x25/0x60 [ 25.798515] copy_user_test_oob+0xab/0x10f0 [ 25.799485] kunit_try_run_case+0x1a5/0x480 [ 25.800227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.800924] kthread+0x337/0x6f0 [ 25.801463] ret_from_fork+0x116/0x1d0 [ 25.802058] ret_from_fork_asm+0x1a/0x30 [ 25.802407] [ 25.802595] The buggy address belongs to the object at ffff8881022e0700 [ 25.802595] which belongs to the cache kmalloc-128 of size 128 [ 25.803401] The buggy address is located 0 bytes inside of [ 25.803401] allocated 120-byte region [ffff8881022e0700, ffff8881022e0778) [ 25.804935] [ 25.805718] The buggy address belongs to the physical page: [ 25.806340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 25.807188] flags: 0x200000000000000(node=0|zone=2) [ 25.807768] page_type: f5(slab) [ 25.808273] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.809042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.809884] page dumped because: kasan: bad access detected [ 25.810742] [ 25.810962] Memory state around the buggy address: [ 25.811315] ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.813340] ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.814408] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.815082] ^ [ 25.815729] ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.816475] ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.817170] ================================================================== [ 25.820489] ================================================================== [ 25.821591] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 25.823610] Read of size 121 at addr ffff8881022e0700 by task kunit_try_catch/302 [ 25.824210] [ 25.824398] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.824507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.824540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.824599] Call Trace: [ 25.824640] <TASK> [ 25.824681] dump_stack_lvl+0x73/0xb0 [ 25.824747] print_report+0xd1/0x650 [ 25.824807] ? __virt_addr_valid+0x1db/0x2d0 [ 25.824892] ? copy_user_test_oob+0x604/0x10f0 [ 25.824946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.825006] ? copy_user_test_oob+0x604/0x10f0 [ 25.825081] kasan_report+0x141/0x180 [ 25.825163] ? copy_user_test_oob+0x604/0x10f0 [ 25.825254] kasan_check_range+0x10c/0x1c0 [ 25.825716] __kasan_check_read+0x15/0x20 [ 25.825792] copy_user_test_oob+0x604/0x10f0 [ 25.825884] ? __pfx_copy_user_test_oob+0x10/0x10 [ 25.825950] ? finish_task_switch.isra.0+0x153/0x700 [ 25.826011] ? __switch_to+0x47/0xf50 [ 25.826082] ? __schedule+0x10cc/0x2b60 [ 25.827111] ? __pfx_read_tsc+0x10/0x10 [ 25.827180] ? ktime_get_ts64+0x86/0x230 [ 25.827245] kunit_try_run_case+0x1a5/0x480 [ 25.827286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.827318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.827357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.827396] ? __kthread_parkme+0x82/0x180 [ 25.827429] ? preempt_count_sub+0x50/0x80 [ 25.827464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.827496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.827534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.827719] kthread+0x337/0x6f0 [ 25.827760] ? trace_preempt_on+0x20/0xc0 [ 25.827797] ? __pfx_kthread+0x10/0x10 [ 25.827862] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.827904] ? calculate_sigpending+0x7b/0xa0 [ 25.827941] ? __pfx_kthread+0x10/0x10 [ 25.827974] ret_from_fork+0x116/0x1d0 [ 25.828002] ? __pfx_kthread+0x10/0x10 [ 25.828034] ret_from_fork_asm+0x1a/0x30 [ 25.828077] </TASK> [ 25.828096] [ 25.844076] Allocated by task 302: [ 25.844378] kasan_save_stack+0x45/0x70 [ 25.844995] kasan_save_track+0x18/0x40 [ 25.845323] kasan_save_alloc_info+0x3b/0x50 [ 25.845685] __kasan_kmalloc+0xb7/0xc0 [ 25.847044] __kmalloc_noprof+0x1c9/0x500 [ 25.848091] kunit_kmalloc_array+0x25/0x60 [ 25.848499] copy_user_test_oob+0xab/0x10f0 [ 25.849069] kunit_try_run_case+0x1a5/0x480 [ 25.849592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.850175] kthread+0x337/0x6f0 [ 25.850646] ret_from_fork+0x116/0x1d0 [ 25.851101] ret_from_fork_asm+0x1a/0x30 [ 25.851502] [ 25.851918] The buggy address belongs to the object at ffff8881022e0700 [ 25.851918] which belongs to the cache kmalloc-128 of size 128 [ 25.853029] The buggy address is located 0 bytes inside of [ 25.853029] allocated 120-byte region [ffff8881022e0700, ffff8881022e0778) [ 25.854086] [ 25.854354] The buggy address belongs to the physical page: [ 25.855028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 25.855739] flags: 0x200000000000000(node=0|zone=2) [ 25.856233] page_type: f5(slab) [ 25.856776] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.857420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.858258] page dumped because: kasan: bad access detected [ 25.858857] [ 25.859069] Memory state around the buggy address: [ 25.859604] ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.860133] ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.860753] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.861390] ^ [ 25.861963] ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.862543] ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.863291] ==================================================================
[ 91.230102] ================================================================== [ 91.237365] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0 [ 91.244567] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.251403] [ 91.252899] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.252929] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.252960] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.252960] Call trace: [ 91.252960] unwind_backtrace from show_stack+0x18/0x1c [ 91.252990] show_stack from dump_stack_lvl+0x70/0x90 [ 91.253021] dump_stack_lvl from print_report+0x158/0x528 [ 91.253051] print_report from kasan_report+0xdc/0x118 [ 91.253082] kasan_report from kasan_check_range+0x14c/0x198 [ 91.253082] kasan_check_range from copy_user_test_oob+0x800/0x12b0 [ 91.253112] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.253143] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.253173] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.253204] kthread from ret_from_fork+0x14/0x20 [ 91.253204] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.253234] bfa0: 00000000 00000000 00000000 00000000 [ 91.253234] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.253265] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.253265] [ 91.365386] Allocated by task 337: [ 91.368835] kasan_save_track+0x30/0x5c [ 91.372680] __kasan_kmalloc+0x8c/0x94 [ 91.376464] __kmalloc_noprof+0x20c/0x488 [ 91.380523] kunit_kmalloc_array+0x28/0x60 [ 91.384643] copy_user_test_oob+0xac/0x12b0 [ 91.388854] kunit_try_run_case+0x22c/0x5a8 [ 91.393096] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.398620] kthread+0x464/0x810 [ 91.401885] ret_from_fork+0x14/0x20 [ 91.405487] [ 91.406982] The buggy address belongs to the object at cc90cd00 [ 91.406982] which belongs to the cache kmalloc-128 of size 128 [ 91.418884] The buggy address is located 0 bytes inside of [ 91.418884] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.429992] [ 91.431488] The buggy address belongs to the physical page: [ 91.437103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.444366] flags: 0x0(zone=0) [ 91.447448] page_type: f5(slab) [ 91.450622] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.458770] raw: 00000000 [ 91.461395] page dumped because: kasan: bad access detected [ 91.467010] [ 91.468505] Memory state around the buggy address: [ 91.473327] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.479919] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.486480] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.493041] ^ [ 91.499542] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.506103] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.512664] ================================================================== [ 92.390350] ================================================================== [ 92.397644] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0 [ 92.404815] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 92.411651] [ 92.413146] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.413177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.413208] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.413208] Call trace: [ 92.413208] unwind_backtrace from show_stack+0x18/0x1c [ 92.413238] show_stack from dump_stack_lvl+0x70/0x90 [ 92.413269] dump_stack_lvl from print_report+0x158/0x528 [ 92.413299] print_report from kasan_report+0xdc/0x118 [ 92.413299] kasan_report from kasan_check_range+0x14c/0x198 [ 92.413330] kasan_check_range from copy_user_test_oob+0x604/0x12b0 [ 92.413360] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.413391] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.413421] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.413452] kthread from ret_from_fork+0x14/0x20 [ 92.413452] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.413482] bfa0: 00000000 00000000 00000000 00000000 [ 92.413482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.413513] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.413513] [ 92.525634] Allocated by task 337: [ 92.529052] kasan_save_track+0x30/0x5c [ 92.532928] __kasan_kmalloc+0x8c/0x94 [ 92.536712] __kmalloc_noprof+0x20c/0x488 [ 92.540740] kunit_kmalloc_array+0x28/0x60 [ 92.544891] copy_user_test_oob+0xac/0x12b0 [ 92.549102] kunit_try_run_case+0x22c/0x5a8 [ 92.553314] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.558837] kthread+0x464/0x810 [ 92.562103] ret_from_fork+0x14/0x20 [ 92.565704] [ 92.567199] The buggy address belongs to the object at cc90cd00 [ 92.567199] which belongs to the cache kmalloc-128 of size 128 [ 92.579101] The buggy address is located 0 bytes inside of [ 92.579101] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.590240] [ 92.591735] The buggy address belongs to the physical page: [ 92.597351] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.604614] flags: 0x0(zone=0) [ 92.607696] page_type: f5(slab) [ 92.610870] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.618988] raw: 00000000 [ 92.621643] page dumped because: kasan: bad access detected [ 92.627227] [ 92.628753] Memory state around the buggy address: [ 92.633575] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.640136] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.646697] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.653289] ^ [ 92.659759] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.666320] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.672912] ================================================================== [ 92.100402] ================================================================== [ 92.107696] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0 [ 92.114868] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 92.121795] [ 92.123291] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 92.123321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.123352] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.123352] Call trace: [ 92.123352] unwind_backtrace from show_stack+0x18/0x1c [ 92.123382] show_stack from dump_stack_lvl+0x70/0x90 [ 92.123413] dump_stack_lvl from print_report+0x158/0x528 [ 92.123443] print_report from kasan_report+0xdc/0x118 [ 92.123443] kasan_report from kasan_check_range+0x14c/0x198 [ 92.123474] kasan_check_range from copy_user_test_oob+0x544/0x12b0 [ 92.123504] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.123535] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.123565] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.123596] kthread from ret_from_fork+0x14/0x20 [ 92.123596] Exception stack(0xf256bfb0 to 0xf256bff8) [ 92.123626] bfa0: 00000000 00000000 00000000 00000000 [ 92.123626] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.123657] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.123657] [ 92.235778] Allocated by task 337: [ 92.239196] kasan_save_track+0x30/0x5c [ 92.243072] __kasan_kmalloc+0x8c/0x94 [ 92.246856] __kmalloc_noprof+0x20c/0x488 [ 92.250885] kunit_kmalloc_array+0x28/0x60 [ 92.255035] copy_user_test_oob+0xac/0x12b0 [ 92.259246] kunit_try_run_case+0x22c/0x5a8 [ 92.263458] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.268981] kthread+0x464/0x810 [ 92.272247] ret_from_fork+0x14/0x20 [ 92.275848] [ 92.277343] The buggy address belongs to the object at cc90cd00 [ 92.277343] which belongs to the cache kmalloc-128 of size 128 [ 92.289245] The buggy address is located 0 bytes inside of [ 92.289245] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.300354] [ 92.301849] The buggy address belongs to the physical page: [ 92.307464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.314758] flags: 0x0(zone=0) [ 92.317810] page_type: f5(slab) [ 92.320983] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.329132] raw: 00000000 [ 92.331756] page dumped because: kasan: bad access detected [ 92.337371] [ 92.338867] Memory state around the buggy address: [ 92.343688] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.350280] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.356842] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.363403] ^ [ 92.369903] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.376464] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.383026] ================================================================== [ 91.520233] ================================================================== [ 91.527526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0 [ 91.534698] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.541625] [ 91.543121] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.543151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.543182] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.543182] Call trace: [ 91.543182] unwind_backtrace from show_stack+0x18/0x1c [ 91.543212] show_stack from dump_stack_lvl+0x70/0x90 [ 91.543243] dump_stack_lvl from print_report+0x158/0x528 [ 91.543273] print_report from kasan_report+0xdc/0x118 [ 91.543304] kasan_report from kasan_check_range+0x14c/0x198 [ 91.543304] kasan_check_range from copy_user_test_oob+0x3c4/0x12b0 [ 91.543334] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.543365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.543395] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.543426] kthread from ret_from_fork+0x14/0x20 [ 91.543426] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.543457] bfa0: 00000000 00000000 00000000 00000000 [ 91.543457] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.543487] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.543487] [ 91.655609] Allocated by task 337: [ 91.659057] kasan_save_track+0x30/0x5c [ 91.662902] __kasan_kmalloc+0x8c/0x94 [ 91.666687] __kmalloc_noprof+0x20c/0x488 [ 91.670745] kunit_kmalloc_array+0x28/0x60 [ 91.674865] copy_user_test_oob+0xac/0x12b0 [ 91.679077] kunit_try_run_case+0x22c/0x5a8 [ 91.683319] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.688842] kthread+0x464/0x810 [ 91.692077] ret_from_fork+0x14/0x20 [ 91.695678] [ 91.697204] The buggy address belongs to the object at cc90cd00 [ 91.697204] which belongs to the cache kmalloc-128 of size 128 [ 91.709075] The buggy address is located 0 bytes inside of [ 91.709075] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.720214] [ 91.721710] The buggy address belongs to the physical page: [ 91.727325] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.734588] flags: 0x0(zone=0) [ 91.737670] page_type: f5(slab) [ 91.740844] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.748962] raw: 00000000 [ 91.751617] page dumped because: kasan: bad access detected [ 91.757232] [ 91.758728] Memory state around the buggy address: [ 91.763549] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.770111] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.776702] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.783264] ^ [ 91.789733] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.796325] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.802886] ================================================================== [ 91.810455] ================================================================== [ 91.817718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0 [ 91.824890] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 91.831726] [ 91.833251] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 91.833282] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.833282] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.833282] Call trace: [ 91.833312] unwind_backtrace from show_stack+0x18/0x1c [ 91.833312] show_stack from dump_stack_lvl+0x70/0x90 [ 91.833343] dump_stack_lvl from print_report+0x158/0x528 [ 91.833374] print_report from kasan_report+0xdc/0x118 [ 91.833404] kasan_report from kasan_check_range+0x14c/0x198 [ 91.833435] kasan_check_range from copy_user_test_oob+0x484/0x12b0 [ 91.833435] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.833465] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.833496] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.833526] kthread from ret_from_fork+0x14/0x20 [ 91.833557] Exception stack(0xf256bfb0 to 0xf256bff8) [ 91.833557] bfa0: 00000000 00000000 00000000 00000000 [ 91.833587] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.833587] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.833618] [ 91.945739] Allocated by task 337: [ 91.949157] kasan_save_track+0x30/0x5c [ 91.953033] __kasan_kmalloc+0x8c/0x94 [ 91.956817] __kmalloc_noprof+0x20c/0x488 [ 91.960845] kunit_kmalloc_array+0x28/0x60 [ 91.964965] copy_user_test_oob+0xac/0x12b0 [ 91.969177] kunit_try_run_case+0x22c/0x5a8 [ 91.973419] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.978942] kthread+0x464/0x810 [ 91.982208] ret_from_fork+0x14/0x20 [ 91.985809] [ 91.987304] The buggy address belongs to the object at cc90cd00 [ 91.987304] which belongs to the cache kmalloc-128 of size 128 [ 91.999206] The buggy address is located 0 bytes inside of [ 91.999206] allocated 120-byte region [cc90cd00, cc90cd78) [ 92.010314] [ 92.011810] The buggy address belongs to the physical page: [ 92.017425] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 92.024688] flags: 0x0(zone=0) [ 92.027770] page_type: f5(slab) [ 92.030944] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.039093] raw: 00000000 [ 92.041717] page dumped because: kasan: bad access detected [ 92.047332] [ 92.048828] Memory state around the buggy address: [ 92.053649] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 92.060211] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.066802] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.073364] ^ [ 92.079864] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.086425] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.092987] ================================================================== [ 90.933654] ================================================================== [ 90.947052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0 [ 90.954254] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337 [ 90.961181] [ 90.962677] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.962707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.962738] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.962738] Call trace: [ 90.962738] unwind_backtrace from show_stack+0x18/0x1c [ 90.962768] show_stack from dump_stack_lvl+0x70/0x90 [ 90.962799] dump_stack_lvl from print_report+0x158/0x528 [ 90.962829] print_report from kasan_report+0xdc/0x118 [ 90.962860] kasan_report from kasan_check_range+0x14c/0x198 [ 90.962860] kasan_check_range from copy_user_test_oob+0x24c/0x12b0 [ 90.962890] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.962921] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.962951] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.962982] kthread from ret_from_fork+0x14/0x20 [ 90.963012] Exception stack(0xf256bfb0 to 0xf256bff8) [ 90.963012] bfa0: 00000000 00000000 00000000 00000000 [ 90.963043] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.963043] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.963073] [ 91.075164] Allocated by task 337: [ 91.078613] kasan_save_track+0x30/0x5c [ 91.082489] __kasan_kmalloc+0x8c/0x94 [ 91.086242] __kmalloc_noprof+0x20c/0x488 [ 91.090301] kunit_kmalloc_array+0x28/0x60 [ 91.094421] copy_user_test_oob+0xac/0x12b0 [ 91.098663] kunit_try_run_case+0x22c/0x5a8 [ 91.102874] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.108398] kthread+0x464/0x810 [ 91.111663] ret_from_fork+0x14/0x20 [ 91.115264] [ 91.116760] The buggy address belongs to the object at cc90cd00 [ 91.116760] which belongs to the cache kmalloc-128 of size 128 [ 91.128662] The buggy address is located 0 bytes inside of [ 91.128662] allocated 120-byte region [cc90cd00, cc90cd78) [ 91.139770] [ 91.141265] The buggy address belongs to the physical page: [ 91.146881] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c [ 91.154144] flags: 0x0(zone=0) [ 91.157226] page_type: f5(slab) [ 91.160400] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.168548] raw: 00000000 [ 91.171173] page dumped because: kasan: bad access detected [ 91.176788] [ 91.178283] Memory state around the buggy address: [ 91.183105] cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.189697] cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.196258] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.202819] ^ [ 91.209320] cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.215881] cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.222442] ==================================================================