Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.010499] ================================================================== [ 23.010577] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 23.010657] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.010718] [ 23.010765] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.010901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.010938] Hardware name: linux,dummy-virt (DT) [ 23.010979] Call trace: [ 23.011156] show_stack+0x20/0x38 (C) [ 23.011249] dump_stack_lvl+0x8c/0xd0 [ 23.011307] print_report+0x118/0x608 [ 23.011361] kasan_report+0xdc/0x128 [ 23.011415] kasan_check_range+0x100/0x1a8 [ 23.011500] __kasan_check_read+0x20/0x30 [ 23.011574] copy_user_test_oob+0x728/0xec8 [ 23.011631] kunit_try_run_case+0x170/0x3f0 [ 23.011690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011805] kthread+0x328/0x630 [ 23.011932] ret_from_fork+0x10/0x20 [ 23.011997] [ 23.012022] Allocated by task 294: [ 23.012061] kasan_save_stack+0x3c/0x68 [ 23.012111] kasan_save_track+0x20/0x40 [ 23.012159] kasan_save_alloc_info+0x40/0x58 [ 23.012201] __kasan_kmalloc+0xd4/0xd8 [ 23.012246] __kmalloc_noprof+0x198/0x4c8 [ 23.012290] kunit_kmalloc_array+0x34/0x88 [ 23.012335] copy_user_test_oob+0xac/0xec8 [ 23.012379] kunit_try_run_case+0x170/0x3f0 [ 23.012423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.012475] kthread+0x328/0x630 [ 23.012515] ret_from_fork+0x10/0x20 [ 23.012559] [ 23.012584] The buggy address belongs to the object at fff00000c6587700 [ 23.012584] which belongs to the cache kmalloc-128 of size 128 [ 23.012653] The buggy address is located 0 bytes inside of [ 23.012653] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.012724] [ 23.012753] The buggy address belongs to the physical page: [ 23.012794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.012870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.012959] page_type: f5(slab) [ 23.013009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.013112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.013172] page dumped because: kasan: bad access detected [ 23.013218] [ 23.013245] Memory state around the buggy address: [ 23.013306] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.013365] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013422] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.013472] ^ [ 23.013522] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013576] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013641] ================================================================== [ 22.999532] ================================================================== [ 22.999649] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 22.999754] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 22.999822] [ 23.000225] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.000534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.000573] Hardware name: linux,dummy-virt (DT) [ 23.000980] Call trace: [ 23.001103] show_stack+0x20/0x38 (C) [ 23.001312] dump_stack_lvl+0x8c/0xd0 [ 23.001405] print_report+0x118/0x608 [ 23.001557] kasan_report+0xdc/0x128 [ 23.001633] kasan_check_range+0x100/0x1a8 [ 23.001695] __kasan_check_write+0x20/0x30 [ 23.001814] copy_user_test_oob+0x234/0xec8 [ 23.001887] kunit_try_run_case+0x170/0x3f0 [ 23.001954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.002020] kthread+0x328/0x630 [ 23.002074] ret_from_fork+0x10/0x20 [ 23.002142] [ 23.002170] Allocated by task 294: [ 23.002209] kasan_save_stack+0x3c/0x68 [ 23.002278] kasan_save_track+0x20/0x40 [ 23.002328] kasan_save_alloc_info+0x40/0x58 [ 23.002557] __kasan_kmalloc+0xd4/0xd8 [ 23.002642] __kmalloc_noprof+0x198/0x4c8 [ 23.002693] kunit_kmalloc_array+0x34/0x88 [ 23.002740] copy_user_test_oob+0xac/0xec8 [ 23.002788] kunit_try_run_case+0x170/0x3f0 [ 23.002849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.002906] kthread+0x328/0x630 [ 23.003167] ret_from_fork+0x10/0x20 [ 23.003297] [ 23.003334] The buggy address belongs to the object at fff00000c6587700 [ 23.003334] which belongs to the cache kmalloc-128 of size 128 [ 23.003449] The buggy address is located 0 bytes inside of [ 23.003449] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.003523] [ 23.003553] The buggy address belongs to the physical page: [ 23.003597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.003668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.003731] page_type: f5(slab) [ 23.003787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.003863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.003915] page dumped because: kasan: bad access detected [ 23.003954] [ 23.003980] Memory state around the buggy address: [ 23.004034] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.004089] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004316] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.004485] ^ [ 23.004638] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004701] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.004778] ================================================================== [ 23.031851] ================================================================== [ 23.031906] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 23.031965] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.032023] [ 23.032064] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.032163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.032197] Hardware name: linux,dummy-virt (DT) [ 23.032238] Call trace: [ 23.032267] show_stack+0x20/0x38 (C) [ 23.032325] dump_stack_lvl+0x8c/0xd0 [ 23.032376] print_report+0x118/0x608 [ 23.032429] kasan_report+0xdc/0x128 [ 23.032481] kasan_check_range+0x100/0x1a8 [ 23.033050] __kasan_check_write+0x20/0x30 [ 23.033136] copy_user_test_oob+0x434/0xec8 [ 23.033544] kunit_try_run_case+0x170/0x3f0 [ 23.033623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.033886] kthread+0x328/0x630 [ 23.033989] ret_from_fork+0x10/0x20 [ 23.034057] [ 23.034188] Allocated by task 294: [ 23.034307] kasan_save_stack+0x3c/0x68 [ 23.034368] kasan_save_track+0x20/0x40 [ 23.034417] kasan_save_alloc_info+0x40/0x58 [ 23.034465] __kasan_kmalloc+0xd4/0xd8 [ 23.034514] __kmalloc_noprof+0x198/0x4c8 [ 23.034692] kunit_kmalloc_array+0x34/0x88 [ 23.034749] copy_user_test_oob+0xac/0xec8 [ 23.034822] kunit_try_run_case+0x170/0x3f0 [ 23.034938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.035059] kthread+0x328/0x630 [ 23.035153] ret_from_fork+0x10/0x20 [ 23.035212] [ 23.035503] The buggy address belongs to the object at fff00000c6587700 [ 23.035503] which belongs to the cache kmalloc-128 of size 128 [ 23.035587] The buggy address is located 0 bytes inside of [ 23.035587] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.035667] [ 23.035695] The buggy address belongs to the physical page: [ 23.035736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.035796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.035867] page_type: f5(slab) [ 23.035917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.035979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.036039] page dumped because: kasan: bad access detected [ 23.036120] [ 23.036167] Memory state around the buggy address: [ 23.036366] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.036477] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.036697] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.037227] ^ [ 23.037302] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037359] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037405] ================================================================== [ 23.019962] ================================================================== [ 23.020148] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 23.020416] Write of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.020588] [ 23.020770] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.021023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.021065] Hardware name: linux,dummy-virt (DT) [ 23.021247] Call trace: [ 23.021285] show_stack+0x20/0x38 (C) [ 23.021406] dump_stack_lvl+0x8c/0xd0 [ 23.021479] print_report+0x118/0x608 [ 23.021600] kasan_report+0xdc/0x128 [ 23.021667] kasan_check_range+0x100/0x1a8 [ 23.021862] __kasan_check_write+0x20/0x30 [ 23.021925] copy_user_test_oob+0x35c/0xec8 [ 23.022003] kunit_try_run_case+0x170/0x3f0 [ 23.022243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.022447] kthread+0x328/0x630 [ 23.022530] ret_from_fork+0x10/0x20 [ 23.022593] [ 23.022625] Allocated by task 294: [ 23.022880] kasan_save_stack+0x3c/0x68 [ 23.022981] kasan_save_track+0x20/0x40 [ 23.023156] kasan_save_alloc_info+0x40/0x58 [ 23.023210] __kasan_kmalloc+0xd4/0xd8 [ 23.023416] __kmalloc_noprof+0x198/0x4c8 [ 23.023525] kunit_kmalloc_array+0x34/0x88 [ 23.023651] copy_user_test_oob+0xac/0xec8 [ 23.023710] kunit_try_run_case+0x170/0x3f0 [ 23.023759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.023815] kthread+0x328/0x630 [ 23.023866] ret_from_fork+0x10/0x20 [ 23.024265] [ 23.024301] The buggy address belongs to the object at fff00000c6587700 [ 23.024301] which belongs to the cache kmalloc-128 of size 128 [ 23.024534] The buggy address is located 0 bytes inside of [ 23.024534] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.024701] [ 23.025067] The buggy address belongs to the physical page: [ 23.025133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.025370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.025510] page_type: f5(slab) [ 23.025582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.025788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.025911] page dumped because: kasan: bad access detected [ 23.026017] [ 23.026112] Memory state around the buggy address: [ 23.026280] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.026375] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026433] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.026481] ^ [ 23.026537] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026592] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.026643] ================================================================== [ 23.038976] ================================================================== [ 23.039053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 23.039122] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.039185] [ 23.039229] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.039334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.039368] Hardware name: linux,dummy-virt (DT) [ 23.039409] Call trace: [ 23.039439] show_stack+0x20/0x38 (C) [ 23.039499] dump_stack_lvl+0x8c/0xd0 [ 23.039882] print_report+0x118/0x608 [ 23.039961] kasan_report+0xdc/0x128 [ 23.040160] kasan_check_range+0x100/0x1a8 [ 23.040223] __kasan_check_read+0x20/0x30 [ 23.040511] copy_user_test_oob+0x4a0/0xec8 [ 23.040739] kunit_try_run_case+0x170/0x3f0 [ 23.040996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.041110] kthread+0x328/0x630 [ 23.041313] ret_from_fork+0x10/0x20 [ 23.041474] [ 23.041511] Allocated by task 294: [ 23.041568] kasan_save_stack+0x3c/0x68 [ 23.041702] kasan_save_track+0x20/0x40 [ 23.041752] kasan_save_alloc_info+0x40/0x58 [ 23.041872] __kasan_kmalloc+0xd4/0xd8 [ 23.042236] __kmalloc_noprof+0x198/0x4c8 [ 23.042310] kunit_kmalloc_array+0x34/0x88 [ 23.042566] copy_user_test_oob+0xac/0xec8 [ 23.042669] kunit_try_run_case+0x170/0x3f0 [ 23.042820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.042897] kthread+0x328/0x630 [ 23.042941] ret_from_fork+0x10/0x20 [ 23.042988] [ 23.043259] The buggy address belongs to the object at fff00000c6587700 [ 23.043259] which belongs to the cache kmalloc-128 of size 128 [ 23.043699] The buggy address is located 0 bytes inside of [ 23.043699] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.043879] [ 23.043913] The buggy address belongs to the physical page: [ 23.043955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.044115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.044230] page_type: f5(slab) [ 23.044304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.044364] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.044414] page dumped because: kasan: bad access detected [ 23.044595] [ 23.044634] Memory state around the buggy address: [ 23.044865] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.045008] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045066] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.045115] ^ [ 23.045276] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045496] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.045548] ================================================================== [ 23.027250] ================================================================== [ 23.027323] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 23.027395] Read of size 121 at addr fff00000c6587700 by task kunit_try_catch/294 [ 23.027461] [ 23.027505] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 23.027611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.027647] Hardware name: linux,dummy-virt (DT) [ 23.027685] Call trace: [ 23.027717] show_stack+0x20/0x38 (C) [ 23.027775] dump_stack_lvl+0x8c/0xd0 [ 23.027829] print_report+0x118/0x608 [ 23.028593] kasan_report+0xdc/0x128 [ 23.028802] kasan_check_range+0x100/0x1a8 [ 23.028888] __kasan_check_read+0x20/0x30 [ 23.029019] copy_user_test_oob+0x3c8/0xec8 [ 23.029088] kunit_try_run_case+0x170/0x3f0 [ 23.029156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.029218] kthread+0x328/0x630 [ 23.029269] ret_from_fork+0x10/0x20 [ 23.029584] [ 23.029631] Allocated by task 294: [ 23.029711] kasan_save_stack+0x3c/0x68 [ 23.029778] kasan_save_track+0x20/0x40 [ 23.029852] kasan_save_alloc_info+0x40/0x58 [ 23.029909] __kasan_kmalloc+0xd4/0xd8 [ 23.029956] __kmalloc_noprof+0x198/0x4c8 [ 23.030020] kunit_kmalloc_array+0x34/0x88 [ 23.030109] copy_user_test_oob+0xac/0xec8 [ 23.030197] kunit_try_run_case+0x170/0x3f0 [ 23.030288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.030345] kthread+0x328/0x630 [ 23.030389] ret_from_fork+0x10/0x20 [ 23.030439] [ 23.030469] The buggy address belongs to the object at fff00000c6587700 [ 23.030469] which belongs to the cache kmalloc-128 of size 128 [ 23.030553] The buggy address is located 0 bytes inside of [ 23.030553] allocated 120-byte region [fff00000c6587700, fff00000c6587778) [ 23.030692] [ 23.030749] The buggy address belongs to the physical page: [ 23.030847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106587 [ 23.030916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.030978] page_type: f5(slab) [ 23.031033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.031096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.031148] page dumped because: kasan: bad access detected [ 23.031187] [ 23.031213] Memory state around the buggy address: [ 23.031254] fff00000c6587600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.031313] fff00000c6587680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031369] >fff00000c6587700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.031419] ^ [ 23.031470] fff00000c6587780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031518] fff00000c6587800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.031565] ==================================================================
[ 15.576169] ================================================================== [ 15.576888] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 15.577549] Read of size 121 at addr ffff8881028df100 by task kunit_try_catch/311 [ 15.578223] [ 15.578420] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.578487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.578500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.578522] Call Trace: [ 15.578551] <TASK> [ 15.578570] dump_stack_lvl+0x73/0xb0 [ 15.578599] print_report+0xd1/0x650 [ 15.578623] ? __virt_addr_valid+0x1db/0x2d0 [ 15.578648] ? copy_user_test_oob+0x604/0x10f0 [ 15.578672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.578695] ? copy_user_test_oob+0x604/0x10f0 [ 15.578719] kasan_report+0x141/0x180 [ 15.578741] ? copy_user_test_oob+0x604/0x10f0 [ 15.578769] kasan_check_range+0x10c/0x1c0 [ 15.578794] __kasan_check_read+0x15/0x20 [ 15.578815] copy_user_test_oob+0x604/0x10f0 [ 15.578840] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.578863] ? finish_task_switch.isra.0+0x153/0x700 [ 15.578884] ? __switch_to+0x47/0xf50 [ 15.578909] ? __schedule+0x10cc/0x2b60 [ 15.578942] ? __pfx_read_tsc+0x10/0x10 [ 15.578964] ? ktime_get_ts64+0x86/0x230 [ 15.578989] kunit_try_run_case+0x1a5/0x480 [ 15.579014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.579036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.579058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.579080] ? __kthread_parkme+0x82/0x180 [ 15.579101] ? preempt_count_sub+0x50/0x80 [ 15.579125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.579149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.579173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.579196] kthread+0x337/0x6f0 [ 15.579216] ? trace_preempt_on+0x20/0xc0 [ 15.579242] ? __pfx_kthread+0x10/0x10 [ 15.579263] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.579283] ? calculate_sigpending+0x7b/0xa0 [ 15.579308] ? __pfx_kthread+0x10/0x10 [ 15.579329] ret_from_fork+0x116/0x1d0 [ 15.579348] ? __pfx_kthread+0x10/0x10 [ 15.579369] ret_from_fork_asm+0x1a/0x30 [ 15.579419] </TASK> [ 15.579431] [ 15.591791] Allocated by task 311: [ 15.592078] kasan_save_stack+0x45/0x70 [ 15.592277] kasan_save_track+0x18/0x40 [ 15.592651] kasan_save_alloc_info+0x3b/0x50 [ 15.593012] __kasan_kmalloc+0xb7/0xc0 [ 15.593140] __kmalloc_noprof+0x1c9/0x500 [ 15.593273] kunit_kmalloc_array+0x25/0x60 [ 15.593513] copy_user_test_oob+0xab/0x10f0 [ 15.593917] kunit_try_run_case+0x1a5/0x480 [ 15.594305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594800] kthread+0x337/0x6f0 [ 15.595114] ret_from_fork+0x116/0x1d0 [ 15.595478] ret_from_fork_asm+0x1a/0x30 [ 15.595743] [ 15.595811] The buggy address belongs to the object at ffff8881028df100 [ 15.595811] which belongs to the cache kmalloc-128 of size 128 [ 15.596173] The buggy address is located 0 bytes inside of [ 15.596173] allocated 120-byte region [ffff8881028df100, ffff8881028df178) [ 15.596885] [ 15.597063] The buggy address belongs to the physical page: [ 15.597572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028df [ 15.598262] flags: 0x200000000000000(node=0|zone=2) [ 15.598722] page_type: f5(slab) [ 15.599038] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.599711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.600205] page dumped because: kasan: bad access detected [ 15.600403] [ 15.600571] Memory state around the buggy address: [ 15.601015] ffff8881028df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.601643] ffff8881028df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.602126] >ffff8881028df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.602333] ^ [ 15.602951] ffff8881028df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.603587] ffff8881028df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.604020] ================================================================== [ 15.512424] ================================================================== [ 15.512692] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 15.512925] Write of size 121 at addr ffff8881028df100 by task kunit_try_catch/311 [ 15.513161] [ 15.513244] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.513291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513327] Call Trace: [ 15.513343] <TASK> [ 15.513361] dump_stack_lvl+0x73/0xb0 [ 15.513390] print_report+0xd1/0x650 [ 15.513413] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513436] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.513459] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513482] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.513506] kasan_report+0x141/0x180 [ 15.513528] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.513556] kasan_check_range+0x10c/0x1c0 [ 15.513580] __kasan_check_write+0x18/0x20 [ 15.513599] copy_user_test_oob+0x3fd/0x10f0 [ 15.513624] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.513647] ? finish_task_switch.isra.0+0x153/0x700 [ 15.513671] ? __switch_to+0x47/0xf50 [ 15.513702] ? __schedule+0x10cc/0x2b60 [ 15.513724] ? __pfx_read_tsc+0x10/0x10 [ 15.513745] ? ktime_get_ts64+0x86/0x230 [ 15.513771] kunit_try_run_case+0x1a5/0x480 [ 15.513794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.513816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.513839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.513861] ? __kthread_parkme+0x82/0x180 [ 15.513881] ? preempt_count_sub+0x50/0x80 [ 15.513904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.513937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.513959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.513982] kthread+0x337/0x6f0 [ 15.514002] ? trace_preempt_on+0x20/0xc0 [ 15.514026] ? __pfx_kthread+0x10/0x10 [ 15.514047] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.514068] ? calculate_sigpending+0x7b/0xa0 [ 15.514092] ? __pfx_kthread+0x10/0x10 [ 15.514114] ret_from_fork+0x116/0x1d0 [ 15.514132] ? __pfx_kthread+0x10/0x10 [ 15.514152] ret_from_fork_asm+0x1a/0x30 [ 15.514183] </TASK> [ 15.514194] [ 15.522253] Allocated by task 311: [ 15.522623] kasan_save_stack+0x45/0x70 [ 15.522784] kasan_save_track+0x18/0x40 [ 15.522915] kasan_save_alloc_info+0x3b/0x50 [ 15.523072] __kasan_kmalloc+0xb7/0xc0 [ 15.523199] __kmalloc_noprof+0x1c9/0x500 [ 15.523335] kunit_kmalloc_array+0x25/0x60 [ 15.523475] copy_user_test_oob+0xab/0x10f0 [ 15.523614] kunit_try_run_case+0x1a5/0x480 [ 15.523752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.523918] kthread+0x337/0x6f0 [ 15.524053] ret_from_fork+0x116/0x1d0 [ 15.524204] ret_from_fork_asm+0x1a/0x30 [ 15.524337] [ 15.524417] The buggy address belongs to the object at ffff8881028df100 [ 15.524417] which belongs to the cache kmalloc-128 of size 128 [ 15.524769] The buggy address is located 0 bytes inside of [ 15.524769] allocated 120-byte region [ffff8881028df100, ffff8881028df178) [ 15.525116] [ 15.525185] The buggy address belongs to the physical page: [ 15.525357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028df [ 15.525698] flags: 0x200000000000000(node=0|zone=2) [ 15.525918] page_type: f5(slab) [ 15.526101] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.526422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.527337] page dumped because: kasan: bad access detected [ 15.527513] [ 15.527584] Memory state around the buggy address: [ 15.528139] ffff8881028df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.528473] ffff8881028df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528760] >ffff8881028df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.529028] ^ [ 15.529267] ffff8881028df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529723] ffff8881028df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.530021] ================================================================== [ 15.530543] ================================================================== [ 15.530885] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 15.531231] Read of size 121 at addr ffff8881028df100 by task kunit_try_catch/311 [ 15.531727] [ 15.531809] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.531855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.531867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.531888] Call Trace: [ 15.531907] <TASK> [ 15.531925] dump_stack_lvl+0x73/0xb0 [ 15.531984] print_report+0xd1/0x650 [ 15.532009] ? __virt_addr_valid+0x1db/0x2d0 [ 15.532033] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.532056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.532095] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.532120] kasan_report+0x141/0x180 [ 15.532142] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.532171] kasan_check_range+0x10c/0x1c0 [ 15.532195] __kasan_check_read+0x15/0x20 [ 15.532215] copy_user_test_oob+0x4aa/0x10f0 [ 15.532241] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.532265] ? finish_task_switch.isra.0+0x153/0x700 [ 15.532288] ? __switch_to+0x47/0xf50 [ 15.532313] ? __schedule+0x10cc/0x2b60 [ 15.532336] ? __pfx_read_tsc+0x10/0x10 [ 15.532358] ? ktime_get_ts64+0x86/0x230 [ 15.532383] kunit_try_run_case+0x1a5/0x480 [ 15.532407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.532429] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.532453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.532475] ? __kthread_parkme+0x82/0x180 [ 15.532496] ? preempt_count_sub+0x50/0x80 [ 15.532520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.532544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.532567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.532598] kthread+0x337/0x6f0 [ 15.532618] ? trace_preempt_on+0x20/0xc0 [ 15.532643] ? __pfx_kthread+0x10/0x10 [ 15.532664] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.532685] ? calculate_sigpending+0x7b/0xa0 [ 15.532709] ? __pfx_kthread+0x10/0x10 [ 15.532731] ret_from_fork+0x116/0x1d0 [ 15.532749] ? __pfx_kthread+0x10/0x10 [ 15.532770] ret_from_fork_asm+0x1a/0x30 [ 15.532801] </TASK> [ 15.532813] [ 15.539752] Allocated by task 311: [ 15.539941] kasan_save_stack+0x45/0x70 [ 15.540141] kasan_save_track+0x18/0x40 [ 15.540285] kasan_save_alloc_info+0x3b/0x50 [ 15.540523] __kasan_kmalloc+0xb7/0xc0 [ 15.540685] __kmalloc_noprof+0x1c9/0x500 [ 15.540848] kunit_kmalloc_array+0x25/0x60 [ 15.541006] copy_user_test_oob+0xab/0x10f0 [ 15.541211] kunit_try_run_case+0x1a5/0x480 [ 15.541420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.541644] kthread+0x337/0x6f0 [ 15.541796] ret_from_fork+0x116/0x1d0 [ 15.541972] ret_from_fork_asm+0x1a/0x30 [ 15.542141] [ 15.542208] The buggy address belongs to the object at ffff8881028df100 [ 15.542208] which belongs to the cache kmalloc-128 of size 128 [ 15.542944] The buggy address is located 0 bytes inside of [ 15.542944] allocated 120-byte region [ffff8881028df100, ffff8881028df178) [ 15.543516] [ 15.543610] The buggy address belongs to the physical page: [ 15.543837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028df [ 15.544159] flags: 0x200000000000000(node=0|zone=2) [ 15.544355] page_type: f5(slab) [ 15.544576] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.544854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.545161] page dumped because: kasan: bad access detected [ 15.545371] [ 15.545491] Memory state around the buggy address: [ 15.545700] ffff8881028df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.545980] ffff8881028df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.546218] >ffff8881028df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.546447] ^ [ 15.546751] ffff8881028df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.547144] ffff8881028df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.547351] ================================================================== [ 15.548051] ================================================================== [ 15.548486] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 15.548780] Write of size 121 at addr ffff8881028df100 by task kunit_try_catch/311 [ 15.549113] [ 15.549313] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.549359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.549372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.549394] Call Trace: [ 15.549414] <TASK> [ 15.549430] dump_stack_lvl+0x73/0xb0 [ 15.549458] print_report+0xd1/0x650 [ 15.549480] ? __virt_addr_valid+0x1db/0x2d0 [ 15.549504] ? copy_user_test_oob+0x557/0x10f0 [ 15.549527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.549549] ? copy_user_test_oob+0x557/0x10f0 [ 15.549575] kasan_report+0x141/0x180 [ 15.549598] ? copy_user_test_oob+0x557/0x10f0 [ 15.549626] kasan_check_range+0x10c/0x1c0 [ 15.549650] __kasan_check_write+0x18/0x20 [ 15.549669] copy_user_test_oob+0x557/0x10f0 [ 15.549700] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.549723] ? finish_task_switch.isra.0+0x153/0x700 [ 15.549757] ? __switch_to+0x47/0xf50 [ 15.549782] ? __schedule+0x10cc/0x2b60 [ 15.549804] ? __pfx_read_tsc+0x10/0x10 [ 15.549825] ? ktime_get_ts64+0x86/0x230 [ 15.549849] kunit_try_run_case+0x1a5/0x480 [ 15.549873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.549896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.549919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.550836] ? __kthread_parkme+0x82/0x180 [ 15.550863] ? preempt_count_sub+0x50/0x80 [ 15.550888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.550913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.550951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.550975] kthread+0x337/0x6f0 [ 15.550995] ? trace_preempt_on+0x20/0xc0 [ 15.551022] ? __pfx_kthread+0x10/0x10 [ 15.551043] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.551064] ? calculate_sigpending+0x7b/0xa0 [ 15.551088] ? __pfx_kthread+0x10/0x10 [ 15.551110] ret_from_fork+0x116/0x1d0 [ 15.551129] ? __pfx_kthread+0x10/0x10 [ 15.551150] ret_from_fork_asm+0x1a/0x30 [ 15.551181] </TASK> [ 15.551193] [ 15.563446] Allocated by task 311: [ 15.563803] kasan_save_stack+0x45/0x70 [ 15.564186] kasan_save_track+0x18/0x40 [ 15.564569] kasan_save_alloc_info+0x3b/0x50 [ 15.564972] __kasan_kmalloc+0xb7/0xc0 [ 15.565324] __kmalloc_noprof+0x1c9/0x500 [ 15.565716] kunit_kmalloc_array+0x25/0x60 [ 15.566043] copy_user_test_oob+0xab/0x10f0 [ 15.566180] kunit_try_run_case+0x1a5/0x480 [ 15.566315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.566753] kthread+0x337/0x6f0 [ 15.567072] ret_from_fork+0x116/0x1d0 [ 15.567441] ret_from_fork_asm+0x1a/0x30 [ 15.567806] [ 15.567971] The buggy address belongs to the object at ffff8881028df100 [ 15.567971] which belongs to the cache kmalloc-128 of size 128 [ 15.568616] The buggy address is located 0 bytes inside of [ 15.568616] allocated 120-byte region [ffff8881028df100, ffff8881028df178) [ 15.569011] [ 15.569185] The buggy address belongs to the physical page: [ 15.569695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028df [ 15.570366] flags: 0x200000000000000(node=0|zone=2) [ 15.570829] page_type: f5(slab) [ 15.571149] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.571821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.572119] page dumped because: kasan: bad access detected [ 15.572280] [ 15.572343] Memory state around the buggy address: [ 15.572789] ffff8881028df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.573436] ffff8881028df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.574066] >ffff8881028df100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.574622] ^ [ 15.574824] ffff8881028df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.575038] ffff8881028df200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.575238] ==================================================================