Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.590183] ================================================================== [ 30.590467] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 30.590615] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.590752] [ 30.590859] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.591282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.591388] Hardware name: linux,dummy-virt (DT) [ 30.591506] Call trace: [ 30.591658] show_stack+0x20/0x38 (C) [ 30.591926] dump_stack_lvl+0x8c/0xd0 [ 30.592032] print_report+0x118/0x608 [ 30.592147] kasan_report+0xdc/0x128 [ 30.592215] kasan_check_range+0x100/0x1a8 [ 30.592277] __kasan_check_read+0x20/0x30 [ 30.592362] copy_user_test_oob+0x728/0xec8 [ 30.592432] kunit_try_run_case+0x170/0x3f0 [ 30.592495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.592567] kthread+0x328/0x630 [ 30.592623] ret_from_fork+0x10/0x20 [ 30.592685] [ 30.592711] Allocated by task 285: [ 30.592748] kasan_save_stack+0x3c/0x68 [ 30.592800] kasan_save_track+0x20/0x40 [ 30.592851] kasan_save_alloc_info+0x40/0x58 [ 30.592905] __kasan_kmalloc+0xd4/0xd8 [ 30.592951] __kmalloc_noprof+0x198/0x4c8 [ 30.593002] kunit_kmalloc_array+0x34/0x88 [ 30.593051] copy_user_test_oob+0xac/0xec8 [ 30.593100] kunit_try_run_case+0x170/0x3f0 [ 30.593150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.593207] kthread+0x328/0x630 [ 30.593248] ret_from_fork+0x10/0x20 [ 30.593307] [ 30.593370] The buggy address belongs to the object at fff00000c7719c00 [ 30.593370] which belongs to the cache kmalloc-128 of size 128 [ 30.593577] The buggy address is located 0 bytes inside of [ 30.593577] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.593744] [ 30.593801] The buggy address belongs to the physical page: [ 30.594324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.594515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.594743] page_type: f5(slab) [ 30.594861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.594994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.596186] page dumped because: kasan: bad access detected [ 30.596285] [ 30.596358] Memory state around the buggy address: [ 30.596643] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.597512] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.597966] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.598891] ^ [ 30.599357] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.600276] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.600691] ================================================================== [ 30.628528] ================================================================== [ 30.628635] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 30.628740] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.628867] [ 30.628952] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.629161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.629236] Hardware name: linux,dummy-virt (DT) [ 30.629525] Call trace: [ 30.629595] show_stack+0x20/0x38 (C) [ 30.629914] dump_stack_lvl+0x8c/0xd0 [ 30.630041] print_report+0x118/0x608 [ 30.630156] kasan_report+0xdc/0x128 [ 30.630300] kasan_check_range+0x100/0x1a8 [ 30.630464] __kasan_check_read+0x20/0x30 [ 30.630605] copy_user_test_oob+0x3c8/0xec8 [ 30.630752] kunit_try_run_case+0x170/0x3f0 [ 30.630892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.631052] kthread+0x328/0x630 [ 30.631186] ret_from_fork+0x10/0x20 [ 30.631323] [ 30.631403] Allocated by task 285: [ 30.631487] kasan_save_stack+0x3c/0x68 [ 30.631590] kasan_save_track+0x20/0x40 [ 30.631706] kasan_save_alloc_info+0x40/0x58 [ 30.631907] __kasan_kmalloc+0xd4/0xd8 [ 30.632107] __kmalloc_noprof+0x198/0x4c8 [ 30.632268] kunit_kmalloc_array+0x34/0x88 [ 30.632415] copy_user_test_oob+0xac/0xec8 [ 30.632541] kunit_try_run_case+0x170/0x3f0 [ 30.632662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.632797] kthread+0x328/0x630 [ 30.632995] ret_from_fork+0x10/0x20 [ 30.633201] [ 30.633258] The buggy address belongs to the object at fff00000c7719c00 [ 30.633258] which belongs to the cache kmalloc-128 of size 128 [ 30.633442] The buggy address is located 0 bytes inside of [ 30.633442] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.633621] [ 30.633789] The buggy address belongs to the physical page: [ 30.633929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.634095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.634254] page_type: f5(slab) [ 30.634384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.634533] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.634656] page dumped because: kasan: bad access detected [ 30.634747] [ 30.634802] Memory state around the buggy address: [ 30.634895] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.635010] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635181] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.635419] ^ [ 30.635729] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635853] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.635973] ================================================================== [ 30.636409] ================================================================== [ 30.636516] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 30.636621] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.636758] [ 30.636830] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.637039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.637114] Hardware name: linux,dummy-virt (DT) [ 30.637191] Call trace: [ 30.637253] show_stack+0x20/0x38 (C) [ 30.637406] dump_stack_lvl+0x8c/0xd0 [ 30.637533] print_report+0x118/0x608 [ 30.637646] kasan_report+0xdc/0x128 [ 30.637758] kasan_check_range+0x100/0x1a8 [ 30.637879] __kasan_check_write+0x20/0x30 [ 30.637996] copy_user_test_oob+0x434/0xec8 [ 30.638115] kunit_try_run_case+0x170/0x3f0 [ 30.638231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.639869] kthread+0x328/0x630 [ 30.640008] ret_from_fork+0x10/0x20 [ 30.640154] [ 30.640205] Allocated by task 285: [ 30.640297] kasan_save_stack+0x3c/0x68 [ 30.640435] kasan_save_track+0x20/0x40 [ 30.640606] kasan_save_alloc_info+0x40/0x58 [ 30.640748] __kasan_kmalloc+0xd4/0xd8 [ 30.641235] __kmalloc_noprof+0x198/0x4c8 [ 30.641392] kunit_kmalloc_array+0x34/0x88 [ 30.641512] copy_user_test_oob+0xac/0xec8 [ 30.641612] kunit_try_run_case+0x170/0x3f0 [ 30.641715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641857] kthread+0x328/0x630 [ 30.642026] ret_from_fork+0x10/0x20 [ 30.642299] [ 30.642370] The buggy address belongs to the object at fff00000c7719c00 [ 30.642370] which belongs to the cache kmalloc-128 of size 128 [ 30.642518] The buggy address is located 0 bytes inside of [ 30.642518] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.642673] [ 30.642724] The buggy address belongs to the physical page: [ 30.642834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.643157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.643279] page_type: f5(slab) [ 30.643402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.643545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.644139] page dumped because: kasan: bad access detected [ 30.644248] [ 30.644309] Memory state around the buggy address: [ 30.644426] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.644560] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.644689] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.644852] ^ [ 30.644999] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.645247] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.645417] ================================================================== [ 30.559926] ================================================================== [ 30.560211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 30.560421] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.560560] [ 30.560660] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.562267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.562413] Hardware name: linux,dummy-virt (DT) [ 30.562853] Call trace: [ 30.563263] show_stack+0x20/0x38 (C) [ 30.563823] dump_stack_lvl+0x8c/0xd0 [ 30.564250] print_report+0x118/0x608 [ 30.564495] kasan_report+0xdc/0x128 [ 30.564631] kasan_check_range+0x100/0x1a8 [ 30.565152] __kasan_check_write+0x20/0x30 [ 30.565861] copy_user_test_oob+0x234/0xec8 [ 30.566098] kunit_try_run_case+0x170/0x3f0 [ 30.566429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.566570] kthread+0x328/0x630 [ 30.566695] ret_from_fork+0x10/0x20 [ 30.567082] [ 30.567247] Allocated by task 285: [ 30.567449] kasan_save_stack+0x3c/0x68 [ 30.567658] kasan_save_track+0x20/0x40 [ 30.567754] kasan_save_alloc_info+0x40/0x58 [ 30.567866] __kasan_kmalloc+0xd4/0xd8 [ 30.567976] __kmalloc_noprof+0x198/0x4c8 [ 30.568142] kunit_kmalloc_array+0x34/0x88 [ 30.568354] copy_user_test_oob+0xac/0xec8 [ 30.568471] kunit_try_run_case+0x170/0x3f0 [ 30.568584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568966] kthread+0x328/0x630 [ 30.569162] ret_from_fork+0x10/0x20 [ 30.569269] [ 30.569350] The buggy address belongs to the object at fff00000c7719c00 [ 30.569350] which belongs to the cache kmalloc-128 of size 128 [ 30.569506] The buggy address is located 0 bytes inside of [ 30.569506] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.569677] [ 30.569797] The buggy address belongs to the physical page: [ 30.570062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.570220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.570461] page_type: f5(slab) [ 30.570576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.570717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.570832] page dumped because: kasan: bad access detected [ 30.570977] [ 30.571077] Memory state around the buggy address: [ 30.571172] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.571393] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.571577] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.571684] ^ [ 30.571956] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572021] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572124] ================================================================== [ 30.616657] ================================================================== [ 30.616781] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 30.616898] Write of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.617023] [ 30.617298] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.617541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.617877] Hardware name: linux,dummy-virt (DT) [ 30.618107] Call trace: [ 30.618267] show_stack+0x20/0x38 (C) [ 30.618413] dump_stack_lvl+0x8c/0xd0 [ 30.618531] print_report+0x118/0x608 [ 30.618655] kasan_report+0xdc/0x128 [ 30.618798] kasan_check_range+0x100/0x1a8 [ 30.618929] __kasan_check_write+0x20/0x30 [ 30.619045] copy_user_test_oob+0x35c/0xec8 [ 30.619167] kunit_try_run_case+0x170/0x3f0 [ 30.619287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.619439] kthread+0x328/0x630 [ 30.619551] ret_from_fork+0x10/0x20 [ 30.619674] [ 30.619726] Allocated by task 285: [ 30.619805] kasan_save_stack+0x3c/0x68 [ 30.619984] kasan_save_track+0x20/0x40 [ 30.620107] kasan_save_alloc_info+0x40/0x58 [ 30.620774] __kasan_kmalloc+0xd4/0xd8 [ 30.621255] __kmalloc_noprof+0x198/0x4c8 [ 30.621795] kunit_kmalloc_array+0x34/0x88 [ 30.622111] copy_user_test_oob+0xac/0xec8 [ 30.622359] kunit_try_run_case+0x170/0x3f0 [ 30.622489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.622653] kthread+0x328/0x630 [ 30.622754] ret_from_fork+0x10/0x20 [ 30.622924] [ 30.623038] The buggy address belongs to the object at fff00000c7719c00 [ 30.623038] which belongs to the cache kmalloc-128 of size 128 [ 30.623188] The buggy address is located 0 bytes inside of [ 30.623188] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.623363] [ 30.623418] The buggy address belongs to the physical page: [ 30.623499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.623659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.623882] page_type: f5(slab) [ 30.623977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.624303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.624438] page dumped because: kasan: bad access detected [ 30.624533] [ 30.624593] Memory state around the buggy address: [ 30.624690] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.624824] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.624955] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.625133] ^ [ 30.627204] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.627355] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.627475] ================================================================== [ 30.646251] ================================================================== [ 30.646418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 30.646576] Read of size 121 at addr fff00000c7719c00 by task kunit_try_catch/285 [ 30.646793] [ 30.646996] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.647568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.647786] Hardware name: linux,dummy-virt (DT) [ 30.648146] Call trace: [ 30.648249] show_stack+0x20/0x38 (C) [ 30.648393] dump_stack_lvl+0x8c/0xd0 [ 30.648511] print_report+0x118/0x608 [ 30.648628] kasan_report+0xdc/0x128 [ 30.648740] kasan_check_range+0x100/0x1a8 [ 30.648863] __kasan_check_read+0x20/0x30 [ 30.648979] copy_user_test_oob+0x4a0/0xec8 [ 30.649099] kunit_try_run_case+0x170/0x3f0 [ 30.649224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.649388] kthread+0x328/0x630 [ 30.649496] ret_from_fork+0x10/0x20 [ 30.649614] [ 30.649662] Allocated by task 285: [ 30.649733] kasan_save_stack+0x3c/0x68 [ 30.649828] kasan_save_track+0x20/0x40 [ 30.649925] kasan_save_alloc_info+0x40/0x58 [ 30.650026] __kasan_kmalloc+0xd4/0xd8 [ 30.650675] __kmalloc_noprof+0x198/0x4c8 [ 30.651095] kunit_kmalloc_array+0x34/0x88 [ 30.655387] copy_user_test_oob+0xac/0xec8 [ 30.655740] kunit_try_run_case+0x170/0x3f0 [ 30.656139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.657386] kthread+0x328/0x630 [ 30.657488] ret_from_fork+0x10/0x20 [ 30.657580] [ 30.657637] The buggy address belongs to the object at fff00000c7719c00 [ 30.657637] which belongs to the cache kmalloc-128 of size 128 [ 30.657838] The buggy address is located 0 bytes inside of [ 30.657838] allocated 120-byte region [fff00000c7719c00, fff00000c7719c78) [ 30.658072] [ 30.658136] The buggy address belongs to the physical page: [ 30.658236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107719 [ 30.658777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.658994] page_type: f5(slab) [ 30.659113] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.659312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.659789] page dumped because: kasan: bad access detected [ 30.659937] [ 30.660039] Memory state around the buggy address: [ 30.660241] fff00000c7719b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.661192] fff00000c7719b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.661764] >fff00000c7719c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.661878] ^ [ 30.661993] fff00000c7719c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662114] fff00000c7719d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662222] ==================================================================
[ 15.616695] ================================================================== [ 15.617091] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 15.617328] Read of size 121 at addr ffff888102b2dc00 by task kunit_try_catch/302 [ 15.617737] [ 15.617857] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.617910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.617922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.617945] Call Trace: [ 15.617960] <TASK> [ 15.617973] dump_stack_lvl+0x73/0xb0 [ 15.617999] print_report+0xd1/0x650 [ 15.618023] ? __virt_addr_valid+0x1db/0x2d0 [ 15.618048] ? copy_user_test_oob+0x604/0x10f0 [ 15.618073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.618110] ? copy_user_test_oob+0x604/0x10f0 [ 15.618136] kasan_report+0x141/0x180 [ 15.618160] ? copy_user_test_oob+0x604/0x10f0 [ 15.618190] kasan_check_range+0x10c/0x1c0 [ 15.618216] __kasan_check_read+0x15/0x20 [ 15.618237] copy_user_test_oob+0x604/0x10f0 [ 15.618264] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.618299] ? finish_task_switch.isra.0+0x153/0x700 [ 15.618324] ? __switch_to+0x47/0xf50 [ 15.618351] ? __schedule+0x10cc/0x2b60 [ 15.618387] ? __pfx_read_tsc+0x10/0x10 [ 15.618409] ? ktime_get_ts64+0x86/0x230 [ 15.618435] kunit_try_run_case+0x1a5/0x480 [ 15.618458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.618480] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.618507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.618534] ? __kthread_parkme+0x82/0x180 [ 15.618556] ? preempt_count_sub+0x50/0x80 [ 15.618580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.618604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.618658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.618686] kthread+0x337/0x6f0 [ 15.618713] ? trace_preempt_on+0x20/0xc0 [ 15.618737] ? __pfx_kthread+0x10/0x10 [ 15.618759] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.618783] ? calculate_sigpending+0x7b/0xa0 [ 15.618810] ? __pfx_kthread+0x10/0x10 [ 15.618833] ret_from_fork+0x116/0x1d0 [ 15.618853] ? __pfx_kthread+0x10/0x10 [ 15.618875] ret_from_fork_asm+0x1a/0x30 [ 15.618917] </TASK> [ 15.618928] [ 15.626366] Allocated by task 302: [ 15.626548] kasan_save_stack+0x45/0x70 [ 15.626791] kasan_save_track+0x18/0x40 [ 15.627002] kasan_save_alloc_info+0x3b/0x50 [ 15.627229] __kasan_kmalloc+0xb7/0xc0 [ 15.627426] __kmalloc_noprof+0x1c9/0x500 [ 15.627568] kunit_kmalloc_array+0x25/0x60 [ 15.627839] copy_user_test_oob+0xab/0x10f0 [ 15.628074] kunit_try_run_case+0x1a5/0x480 [ 15.628259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.628476] kthread+0x337/0x6f0 [ 15.628670] ret_from_fork+0x116/0x1d0 [ 15.628878] ret_from_fork_asm+0x1a/0x30 [ 15.629110] [ 15.629182] The buggy address belongs to the object at ffff888102b2dc00 [ 15.629182] which belongs to the cache kmalloc-128 of size 128 [ 15.629746] The buggy address is located 0 bytes inside of [ 15.629746] allocated 120-byte region [ffff888102b2dc00, ffff888102b2dc78) [ 15.630196] [ 15.630307] The buggy address belongs to the physical page: [ 15.630567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d [ 15.630901] flags: 0x200000000000000(node=0|zone=2) [ 15.631066] page_type: f5(slab) [ 15.631186] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.631417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.631645] page dumped because: kasan: bad access detected [ 15.631903] [ 15.631994] Memory state around the buggy address: [ 15.632249] ffff888102b2db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.632576] ffff888102b2db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.632856] >ffff888102b2dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.633083] ^ [ 15.633297] ffff888102b2dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633514] ffff888102b2dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633728] ================================================================== [ 15.596248] ================================================================== [ 15.596563] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 15.597054] Write of size 121 at addr ffff888102b2dc00 by task kunit_try_catch/302 [ 15.597297] [ 15.597381] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.597424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.597437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.597458] Call Trace: [ 15.597470] <TASK> [ 15.597484] dump_stack_lvl+0x73/0xb0 [ 15.597510] print_report+0xd1/0x650 [ 15.598616] ? __virt_addr_valid+0x1db/0x2d0 [ 15.598649] ? copy_user_test_oob+0x557/0x10f0 [ 15.598688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.598715] ? copy_user_test_oob+0x557/0x10f0 [ 15.598747] kasan_report+0x141/0x180 [ 15.598772] ? copy_user_test_oob+0x557/0x10f0 [ 15.598817] kasan_check_range+0x10c/0x1c0 [ 15.598843] __kasan_check_write+0x18/0x20 [ 15.599035] copy_user_test_oob+0x557/0x10f0 [ 15.599066] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.599091] ? finish_task_switch.isra.0+0x153/0x700 [ 15.599363] ? __switch_to+0x47/0xf50 [ 15.599390] ? __schedule+0x10cc/0x2b60 [ 15.599415] ? __pfx_read_tsc+0x10/0x10 [ 15.599438] ? ktime_get_ts64+0x86/0x230 [ 15.599464] kunit_try_run_case+0x1a5/0x480 [ 15.599487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.599509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.599537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.599564] ? __kthread_parkme+0x82/0x180 [ 15.599587] ? preempt_count_sub+0x50/0x80 [ 15.599612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.599953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.600026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.600068] kthread+0x337/0x6f0 [ 15.600089] ? trace_preempt_on+0x20/0xc0 [ 15.600113] ? __pfx_kthread+0x10/0x10 [ 15.600146] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.600171] ? calculate_sigpending+0x7b/0xa0 [ 15.600198] ? __pfx_kthread+0x10/0x10 [ 15.600221] ret_from_fork+0x116/0x1d0 [ 15.600242] ? __pfx_kthread+0x10/0x10 [ 15.600265] ret_from_fork_asm+0x1a/0x30 [ 15.600298] </TASK> [ 15.600310] [ 15.608142] Allocated by task 302: [ 15.608358] kasan_save_stack+0x45/0x70 [ 15.608531] kasan_save_track+0x18/0x40 [ 15.608773] kasan_save_alloc_info+0x3b/0x50 [ 15.608991] __kasan_kmalloc+0xb7/0xc0 [ 15.609172] __kmalloc_noprof+0x1c9/0x500 [ 15.609382] kunit_kmalloc_array+0x25/0x60 [ 15.609591] copy_user_test_oob+0xab/0x10f0 [ 15.609814] kunit_try_run_case+0x1a5/0x480 [ 15.610034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.610270] kthread+0x337/0x6f0 [ 15.610457] ret_from_fork+0x116/0x1d0 [ 15.610645] ret_from_fork_asm+0x1a/0x30 [ 15.610931] [ 15.611004] The buggy address belongs to the object at ffff888102b2dc00 [ 15.611004] which belongs to the cache kmalloc-128 of size 128 [ 15.611368] The buggy address is located 0 bytes inside of [ 15.611368] allocated 120-byte region [ffff888102b2dc00, ffff888102b2dc78) [ 15.611867] [ 15.611969] The buggy address belongs to the physical page: [ 15.612218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d [ 15.612573] flags: 0x200000000000000(node=0|zone=2) [ 15.613011] page_type: f5(slab) [ 15.613139] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.613372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.613643] page dumped because: kasan: bad access detected [ 15.613910] [ 15.614017] Memory state around the buggy address: [ 15.614268] ffff888102b2db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.614622] ffff888102b2db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614959] >ffff888102b2dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.615233] ^ [ 15.615529] ffff888102b2dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.615837] ffff888102b2dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.616137] ================================================================== [ 15.574672] ================================================================== [ 15.574962] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 15.575243] Read of size 121 at addr ffff888102b2dc00 by task kunit_try_catch/302 [ 15.575870] [ 15.576065] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.576122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.576136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.576157] Call Trace: [ 15.576183] <TASK> [ 15.576196] dump_stack_lvl+0x73/0xb0 [ 15.576225] print_report+0xd1/0x650 [ 15.576249] ? __virt_addr_valid+0x1db/0x2d0 [ 15.576274] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.576300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.576325] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.576352] kasan_report+0x141/0x180 [ 15.576385] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.576415] kasan_check_range+0x10c/0x1c0 [ 15.576441] __kasan_check_read+0x15/0x20 [ 15.576472] copy_user_test_oob+0x4aa/0x10f0 [ 15.576500] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.576526] ? finish_task_switch.isra.0+0x153/0x700 [ 15.576559] ? __switch_to+0x47/0xf50 [ 15.576586] ? __schedule+0x10cc/0x2b60 [ 15.576611] ? __pfx_read_tsc+0x10/0x10 [ 15.576652] ? ktime_get_ts64+0x86/0x230 [ 15.576677] kunit_try_run_case+0x1a5/0x480 [ 15.576701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.576723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.576759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.576786] ? __kthread_parkme+0x82/0x180 [ 15.576808] ? preempt_count_sub+0x50/0x80 [ 15.576843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.576866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.576904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.576932] kthread+0x337/0x6f0 [ 15.576953] ? trace_preempt_on+0x20/0xc0 [ 15.576977] ? __pfx_kthread+0x10/0x10 [ 15.576999] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.577024] ? calculate_sigpending+0x7b/0xa0 [ 15.577055] ? __pfx_kthread+0x10/0x10 [ 15.577078] ret_from_fork+0x116/0x1d0 [ 15.577098] ? __pfx_kthread+0x10/0x10 [ 15.577120] ret_from_fork_asm+0x1a/0x30 [ 15.577153] </TASK> [ 15.577165] [ 15.587956] Allocated by task 302: [ 15.588138] kasan_save_stack+0x45/0x70 [ 15.588298] kasan_save_track+0x18/0x40 [ 15.588437] kasan_save_alloc_info+0x3b/0x50 [ 15.588668] __kasan_kmalloc+0xb7/0xc0 [ 15.588857] __kmalloc_noprof+0x1c9/0x500 [ 15.589236] kunit_kmalloc_array+0x25/0x60 [ 15.589386] copy_user_test_oob+0xab/0x10f0 [ 15.589537] kunit_try_run_case+0x1a5/0x480 [ 15.589737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.590023] kthread+0x337/0x6f0 [ 15.590245] ret_from_fork+0x116/0x1d0 [ 15.590380] ret_from_fork_asm+0x1a/0x30 [ 15.590522] [ 15.590593] The buggy address belongs to the object at ffff888102b2dc00 [ 15.590593] which belongs to the cache kmalloc-128 of size 128 [ 15.591140] The buggy address is located 0 bytes inside of [ 15.591140] allocated 120-byte region [ffff888102b2dc00, ffff888102b2dc78) [ 15.591739] [ 15.591840] The buggy address belongs to the physical page: [ 15.592041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d [ 15.592415] flags: 0x200000000000000(node=0|zone=2) [ 15.592616] page_type: f5(slab) [ 15.592805] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.593133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.593464] page dumped because: kasan: bad access detected [ 15.593710] [ 15.593781] Memory state around the buggy address: [ 15.594025] ffff888102b2db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.594340] ffff888102b2db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.594613] >ffff888102b2dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.594845] ^ [ 15.595068] ffff888102b2dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.595401] ffff888102b2dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.595746] ================================================================== [ 15.549372] ================================================================== [ 15.549723] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 15.550078] Write of size 121 at addr ffff888102b2dc00 by task kunit_try_catch/302 [ 15.550459] [ 15.550552] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.550597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.550611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.550646] Call Trace: [ 15.550679] <TASK> [ 15.550695] dump_stack_lvl+0x73/0xb0 [ 15.550722] print_report+0xd1/0x650 [ 15.550746] ? __virt_addr_valid+0x1db/0x2d0 [ 15.550789] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.550815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.550841] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.550867] kasan_report+0x141/0x180 [ 15.550901] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.550932] kasan_check_range+0x10c/0x1c0 [ 15.550958] __kasan_check_write+0x18/0x20 [ 15.550980] copy_user_test_oob+0x3fd/0x10f0 [ 15.551007] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.551033] ? finish_task_switch.isra.0+0x153/0x700 [ 15.551058] ? __switch_to+0x47/0xf50 [ 15.551085] ? __schedule+0x10cc/0x2b60 [ 15.551111] ? __pfx_read_tsc+0x10/0x10 [ 15.551133] ? ktime_get_ts64+0x86/0x230 [ 15.551158] kunit_try_run_case+0x1a5/0x480 [ 15.551200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551223] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.551266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.551294] ? __kthread_parkme+0x82/0x180 [ 15.551316] ? preempt_count_sub+0x50/0x80 [ 15.551341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.551421] kthread+0x337/0x6f0 [ 15.551441] ? trace_preempt_on+0x20/0xc0 [ 15.551466] ? __pfx_kthread+0x10/0x10 [ 15.551489] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.551513] ? calculate_sigpending+0x7b/0xa0 [ 15.551540] ? __pfx_kthread+0x10/0x10 [ 15.551563] ret_from_fork+0x116/0x1d0 [ 15.551583] ? __pfx_kthread+0x10/0x10 [ 15.551606] ret_from_fork_asm+0x1a/0x30 [ 15.551648] </TASK> [ 15.551659] [ 15.559527] Allocated by task 302: [ 15.559783] kasan_save_stack+0x45/0x70 [ 15.560014] kasan_save_track+0x18/0x40 [ 15.560241] kasan_save_alloc_info+0x3b/0x50 [ 15.560453] __kasan_kmalloc+0xb7/0xc0 [ 15.560660] __kmalloc_noprof+0x1c9/0x500 [ 15.560828] kunit_kmalloc_array+0x25/0x60 [ 15.561020] copy_user_test_oob+0xab/0x10f0 [ 15.561247] kunit_try_run_case+0x1a5/0x480 [ 15.561436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561677] kthread+0x337/0x6f0 [ 15.561830] ret_from_fork+0x116/0x1d0 [ 15.562050] ret_from_fork_asm+0x1a/0x30 [ 15.562248] [ 15.562349] The buggy address belongs to the object at ffff888102b2dc00 [ 15.562349] which belongs to the cache kmalloc-128 of size 128 [ 15.562953] The buggy address is located 0 bytes inside of [ 15.562953] allocated 120-byte region [ffff888102b2dc00, ffff888102b2dc78) [ 15.563486] [ 15.563580] The buggy address belongs to the physical page: [ 15.563830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d [ 15.564581] flags: 0x200000000000000(node=0|zone=2) [ 15.566720] page_type: f5(slab) [ 15.566858] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.568126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.569153] page dumped because: kasan: bad access detected [ 15.570035] [ 15.570399] Memory state around the buggy address: [ 15.571266] ffff888102b2db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.572041] ffff888102b2db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572347] >ffff888102b2dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.572905] ^ [ 15.573344] ffff888102b2dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.573594] ffff888102b2dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.573956] ==================================================================