Date
June 17, 2025, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.146101] ================================================================== [ 20.146199] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 20.146363] Read of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.146449] [ 20.146796] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.147020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.147088] Hardware name: linux,dummy-virt (DT) [ 20.147522] Call trace: [ 20.147620] show_stack+0x20/0x38 (C) [ 20.147827] dump_stack_lvl+0x8c/0xd0 [ 20.147882] print_report+0x118/0x608 [ 20.148217] kasan_report+0xdc/0x128 [ 20.148298] kasan_check_range+0x100/0x1a8 [ 20.148612] __kasan_check_read+0x20/0x30 [ 20.148721] copy_user_test_oob+0x3c8/0xec8 [ 20.148899] kunit_try_run_case+0x170/0x3f0 [ 20.149052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.149134] kthread+0x328/0x630 [ 20.149180] ret_from_fork+0x10/0x20 [ 20.149550] [ 20.149711] Allocated by task 294: [ 20.149786] kasan_save_stack+0x3c/0x68 [ 20.149973] kasan_save_track+0x20/0x40 [ 20.150118] kasan_save_alloc_info+0x40/0x58 [ 20.150207] __kasan_kmalloc+0xd4/0xd8 [ 20.150323] __kmalloc_noprof+0x198/0x4c8 [ 20.150399] kunit_kmalloc_array+0x34/0x88 [ 20.150457] copy_user_test_oob+0xac/0xec8 [ 20.150498] kunit_try_run_case+0x170/0x3f0 [ 20.150674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.150900] kthread+0x328/0x630 [ 20.151107] ret_from_fork+0x10/0x20 [ 20.151282] [ 20.151340] The buggy address belongs to the object at fff00000c522f000 [ 20.151340] which belongs to the cache kmalloc-128 of size 128 [ 20.151539] The buggy address is located 0 bytes inside of [ 20.151539] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.151610] [ 20.151760] The buggy address belongs to the physical page: [ 20.151843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.152025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.152392] page_type: f5(slab) [ 20.152610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.152872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.153161] page dumped because: kasan: bad access detected [ 20.153315] [ 20.153449] Memory state around the buggy address: [ 20.153489] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.153638] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.153876] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.154068] ^ [ 20.154260] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.154320] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.154363] ================================================================== [ 20.137592] ================================================================== [ 20.138002] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 20.138278] Write of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.138342] [ 20.138387] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.138741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.138883] Hardware name: linux,dummy-virt (DT) [ 20.138966] Call trace: [ 20.139081] show_stack+0x20/0x38 (C) [ 20.139178] dump_stack_lvl+0x8c/0xd0 [ 20.139417] print_report+0x118/0x608 [ 20.139644] kasan_report+0xdc/0x128 [ 20.139770] kasan_check_range+0x100/0x1a8 [ 20.139865] __kasan_check_write+0x20/0x30 [ 20.139963] copy_user_test_oob+0x35c/0xec8 [ 20.140050] kunit_try_run_case+0x170/0x3f0 [ 20.140168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.140253] kthread+0x328/0x630 [ 20.140537] ret_from_fork+0x10/0x20 [ 20.140635] [ 20.140757] Allocated by task 294: [ 20.140828] kasan_save_stack+0x3c/0x68 [ 20.140980] kasan_save_track+0x20/0x40 [ 20.141039] kasan_save_alloc_info+0x40/0x58 [ 20.141180] __kasan_kmalloc+0xd4/0xd8 [ 20.141223] __kmalloc_noprof+0x198/0x4c8 [ 20.141527] kunit_kmalloc_array+0x34/0x88 [ 20.141875] copy_user_test_oob+0xac/0xec8 [ 20.141960] kunit_try_run_case+0x170/0x3f0 [ 20.142221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142301] kthread+0x328/0x630 [ 20.142352] ret_from_fork+0x10/0x20 [ 20.142486] [ 20.142593] The buggy address belongs to the object at fff00000c522f000 [ 20.142593] which belongs to the cache kmalloc-128 of size 128 [ 20.142665] The buggy address is located 0 bytes inside of [ 20.142665] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.142934] [ 20.142970] The buggy address belongs to the physical page: [ 20.143008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.143077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.143134] page_type: f5(slab) [ 20.143178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.143236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.143295] page dumped because: kasan: bad access detected [ 20.143331] [ 20.143352] Memory state around the buggy address: [ 20.143389] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.143443] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.143498] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.143544] ^ [ 20.143589] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.143650] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.143692] ================================================================== [ 20.121457] ================================================================== [ 20.121574] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 20.121647] Read of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.121962] [ 20.122286] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.122572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.122610] Hardware name: linux,dummy-virt (DT) [ 20.122649] Call trace: [ 20.122869] show_stack+0x20/0x38 (C) [ 20.123052] dump_stack_lvl+0x8c/0xd0 [ 20.123174] print_report+0x118/0x608 [ 20.123558] kasan_report+0xdc/0x128 [ 20.123647] kasan_check_range+0x100/0x1a8 [ 20.124038] __kasan_check_read+0x20/0x30 [ 20.124174] copy_user_test_oob+0x728/0xec8 [ 20.124281] kunit_try_run_case+0x170/0x3f0 [ 20.124575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.124642] kthread+0x328/0x630 [ 20.124690] ret_from_fork+0x10/0x20 [ 20.124793] [ 20.124819] Allocated by task 294: [ 20.124859] kasan_save_stack+0x3c/0x68 [ 20.124906] kasan_save_track+0x20/0x40 [ 20.124957] kasan_save_alloc_info+0x40/0x58 [ 20.125008] __kasan_kmalloc+0xd4/0xd8 [ 20.125047] __kmalloc_noprof+0x198/0x4c8 [ 20.125089] kunit_kmalloc_array+0x34/0x88 [ 20.125129] copy_user_test_oob+0xac/0xec8 [ 20.125171] kunit_try_run_case+0x170/0x3f0 [ 20.125212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.125262] kthread+0x328/0x630 [ 20.125310] ret_from_fork+0x10/0x20 [ 20.125366] [ 20.125397] The buggy address belongs to the object at fff00000c522f000 [ 20.125397] which belongs to the cache kmalloc-128 of size 128 [ 20.125462] The buggy address is located 0 bytes inside of [ 20.125462] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.125529] [ 20.125589] The buggy address belongs to the physical page: [ 20.125635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.125694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.125753] page_type: f5(slab) [ 20.125796] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.125856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.125910] page dumped because: kasan: bad access detected [ 20.126672] [ 20.126946] Memory state around the buggy address: [ 20.127228] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.127675] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.127935] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.128114] ^ [ 20.128287] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128360] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128427] ================================================================== [ 20.155965] ================================================================== [ 20.156054] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 20.156140] Write of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.156352] [ 20.156399] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.156759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.156960] Hardware name: linux,dummy-virt (DT) [ 20.157037] Call trace: [ 20.157064] show_stack+0x20/0x38 (C) [ 20.157127] dump_stack_lvl+0x8c/0xd0 [ 20.157180] print_report+0x118/0x608 [ 20.157229] kasan_report+0xdc/0x128 [ 20.157279] kasan_check_range+0x100/0x1a8 [ 20.157330] __kasan_check_write+0x20/0x30 [ 20.157378] copy_user_test_oob+0x434/0xec8 [ 20.157429] kunit_try_run_case+0x170/0x3f0 [ 20.157480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.157589] kthread+0x328/0x630 [ 20.157645] ret_from_fork+0x10/0x20 [ 20.157697] [ 20.157717] Allocated by task 294: [ 20.157749] kasan_save_stack+0x3c/0x68 [ 20.157792] kasan_save_track+0x20/0x40 [ 20.157841] kasan_save_alloc_info+0x40/0x58 [ 20.157881] __kasan_kmalloc+0xd4/0xd8 [ 20.157921] __kmalloc_noprof+0x198/0x4c8 [ 20.158637] kunit_kmalloc_array+0x34/0x88 [ 20.158735] copy_user_test_oob+0xac/0xec8 [ 20.158812] kunit_try_run_case+0x170/0x3f0 [ 20.158854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.159216] kthread+0x328/0x630 [ 20.159420] ret_from_fork+0x10/0x20 [ 20.159502] [ 20.159853] The buggy address belongs to the object at fff00000c522f000 [ 20.159853] which belongs to the cache kmalloc-128 of size 128 [ 20.160044] The buggy address is located 0 bytes inside of [ 20.160044] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.160396] [ 20.160628] The buggy address belongs to the physical page: [ 20.160704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.160772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.161135] page_type: f5(slab) [ 20.161587] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.161821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.161999] page dumped because: kasan: bad access detected [ 20.162049] [ 20.162237] Memory state around the buggy address: [ 20.162369] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.162582] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.162667] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.162716] ^ [ 20.162938] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.163152] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.163247] ================================================================== [ 20.164592] ================================================================== [ 20.164655] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 20.164708] Read of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.164972] [ 20.165017] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.165406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.165562] Hardware name: linux,dummy-virt (DT) [ 20.165614] Call trace: [ 20.165641] show_stack+0x20/0x38 (C) [ 20.165695] dump_stack_lvl+0x8c/0xd0 [ 20.165920] print_report+0x118/0x608 [ 20.166132] kasan_report+0xdc/0x128 [ 20.166267] kasan_check_range+0x100/0x1a8 [ 20.166365] __kasan_check_read+0x20/0x30 [ 20.166483] copy_user_test_oob+0x4a0/0xec8 [ 20.166556] kunit_try_run_case+0x170/0x3f0 [ 20.166613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.166988] kthread+0x328/0x630 [ 20.167048] ret_from_fork+0x10/0x20 [ 20.167099] [ 20.167120] Allocated by task 294: [ 20.167152] kasan_save_stack+0x3c/0x68 [ 20.167195] kasan_save_track+0x20/0x40 [ 20.167238] kasan_save_alloc_info+0x40/0x58 [ 20.167277] __kasan_kmalloc+0xd4/0xd8 [ 20.167315] __kmalloc_noprof+0x198/0x4c8 [ 20.167356] kunit_kmalloc_array+0x34/0x88 [ 20.167395] copy_user_test_oob+0xac/0xec8 [ 20.167436] kunit_try_run_case+0x170/0x3f0 [ 20.167478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.167524] kthread+0x328/0x630 [ 20.167560] ret_from_fork+0x10/0x20 [ 20.167603] [ 20.167624] The buggy address belongs to the object at fff00000c522f000 [ 20.167624] which belongs to the cache kmalloc-128 of size 128 [ 20.167687] The buggy address is located 0 bytes inside of [ 20.167687] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.167754] [ 20.167778] The buggy address belongs to the physical page: [ 20.167812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.167869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.167921] page_type: f5(slab) [ 20.167974] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.168028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.168374] page dumped because: kasan: bad access detected [ 20.168519] [ 20.168544] Memory state around the buggy address: [ 20.168592] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.168641] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.168686] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.168727] ^ [ 20.168774] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.168831] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.168879] ================================================================== [ 20.105086] ================================================================== [ 20.105545] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 20.105976] Write of size 121 at addr fff00000c522f000 by task kunit_try_catch/294 [ 20.106061] [ 20.106131] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 20.106243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.106386] Hardware name: linux,dummy-virt (DT) [ 20.106464] Call trace: [ 20.106603] show_stack+0x20/0x38 (C) [ 20.106669] dump_stack_lvl+0x8c/0xd0 [ 20.106726] print_report+0x118/0x608 [ 20.107049] kasan_report+0xdc/0x128 [ 20.107175] kasan_check_range+0x100/0x1a8 [ 20.107322] __kasan_check_write+0x20/0x30 [ 20.107471] copy_user_test_oob+0x234/0xec8 [ 20.107559] kunit_try_run_case+0x170/0x3f0 [ 20.107728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.107893] kthread+0x328/0x630 [ 20.108155] ret_from_fork+0x10/0x20 [ 20.108299] [ 20.108402] Allocated by task 294: [ 20.108461] kasan_save_stack+0x3c/0x68 [ 20.108802] kasan_save_track+0x20/0x40 [ 20.108895] kasan_save_alloc_info+0x40/0x58 [ 20.108978] __kasan_kmalloc+0xd4/0xd8 [ 20.109051] __kmalloc_noprof+0x198/0x4c8 [ 20.109114] kunit_kmalloc_array+0x34/0x88 [ 20.109341] copy_user_test_oob+0xac/0xec8 [ 20.109398] kunit_try_run_case+0x170/0x3f0 [ 20.109478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.109551] kthread+0x328/0x630 [ 20.109619] ret_from_fork+0x10/0x20 [ 20.109687] [ 20.110025] The buggy address belongs to the object at fff00000c522f000 [ 20.110025] which belongs to the cache kmalloc-128 of size 128 [ 20.110140] The buggy address is located 0 bytes inside of [ 20.110140] allocated 120-byte region [fff00000c522f000, fff00000c522f078) [ 20.110334] [ 20.110392] The buggy address belongs to the physical page: [ 20.110695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10522f [ 20.110827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.110902] page_type: f5(slab) [ 20.110972] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.111069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.111138] page dumped because: kasan: bad access detected [ 20.111204] [ 20.111262] Memory state around the buggy address: [ 20.111352] fff00000c522ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.111429] fff00000c522ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.111477] >fff00000c522f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.111783] ^ [ 20.111859] fff00000c522f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.111919] fff00000c522f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.112002] ==================================================================
[ 24.865460] ================================================================== [ 24.866172] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 24.866859] Write of size 121 at addr ffff8881033b2200 by task kunit_try_catch/312 [ 24.867566] [ 24.867814] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.867954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.867993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.868053] Call Trace: [ 24.868099] <TASK> [ 24.868145] dump_stack_lvl+0x73/0xb0 [ 24.868274] print_report+0xd1/0x650 [ 24.868356] ? __virt_addr_valid+0x1db/0x2d0 [ 24.868426] ? copy_user_test_oob+0x557/0x10f0 [ 24.868480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.868551] ? copy_user_test_oob+0x557/0x10f0 [ 24.868628] kasan_report+0x141/0x180 [ 24.868749] ? copy_user_test_oob+0x557/0x10f0 [ 24.868887] kasan_check_range+0x10c/0x1c0 [ 24.868973] __kasan_check_write+0x18/0x20 [ 24.869043] copy_user_test_oob+0x557/0x10f0 [ 24.869128] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.869203] ? finish_task_switch.isra.0+0x153/0x700 [ 24.869330] ? __switch_to+0x47/0xf50 [ 24.869417] ? __schedule+0x10cc/0x2b60 [ 24.869543] ? __pfx_read_tsc+0x10/0x10 [ 24.869648] ? ktime_get_ts64+0x86/0x230 [ 24.869733] kunit_try_run_case+0x1a5/0x480 [ 24.869808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.869902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.869975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.870052] ? __kthread_parkme+0x82/0x180 [ 24.870120] ? preempt_count_sub+0x50/0x80 [ 24.870197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.870322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.870401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.870480] kthread+0x337/0x6f0 [ 24.870549] ? trace_preempt_on+0x20/0xc0 [ 24.870687] ? __pfx_kthread+0x10/0x10 [ 24.870795] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.870972] ? calculate_sigpending+0x7b/0xa0 [ 24.871055] ? __pfx_kthread+0x10/0x10 [ 24.871116] ret_from_fork+0x116/0x1d0 [ 24.871149] ? __pfx_kthread+0x10/0x10 [ 24.871182] ret_from_fork_asm+0x1a/0x30 [ 24.871257] </TASK> [ 24.871282] [ 24.885853] Allocated by task 312: [ 24.886175] kasan_save_stack+0x45/0x70 [ 24.886563] kasan_save_track+0x18/0x40 [ 24.886955] kasan_save_alloc_info+0x3b/0x50 [ 24.887427] __kasan_kmalloc+0xb7/0xc0 [ 24.887814] __kmalloc_noprof+0x1c9/0x500 [ 24.888171] kunit_kmalloc_array+0x25/0x60 [ 24.888583] copy_user_test_oob+0xab/0x10f0 [ 24.889020] kunit_try_run_case+0x1a5/0x480 [ 24.889371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.889725] kthread+0x337/0x6f0 [ 24.890095] ret_from_fork+0x116/0x1d0 [ 24.890517] ret_from_fork_asm+0x1a/0x30 [ 24.890949] [ 24.891151] The buggy address belongs to the object at ffff8881033b2200 [ 24.891151] which belongs to the cache kmalloc-128 of size 128 [ 24.891996] The buggy address is located 0 bytes inside of [ 24.891996] allocated 120-byte region [ffff8881033b2200, ffff8881033b2278) [ 24.892974] [ 24.893198] The buggy address belongs to the physical page: [ 24.893732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b2 [ 24.894401] flags: 0x200000000000000(node=0|zone=2) [ 24.894806] page_type: f5(slab) [ 24.895180] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.895779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.896436] page dumped because: kasan: bad access detected [ 24.896882] [ 24.897091] Memory state around the buggy address: [ 24.897549] ffff8881033b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.898006] ffff8881033b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.898561] >ffff8881033b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.899255] ^ [ 24.899789] ffff8881033b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900338] ffff8881033b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900929] ================================================================== [ 24.902096] ================================================================== [ 24.904352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 24.904920] Read of size 121 at addr ffff8881033b2200 by task kunit_try_catch/312 [ 24.905357] [ 24.905545] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.905660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.905692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.905745] Call Trace: [ 24.905794] <TASK> [ 24.905887] dump_stack_lvl+0x73/0xb0 [ 24.905973] print_report+0xd1/0x650 [ 24.906054] ? __virt_addr_valid+0x1db/0x2d0 [ 24.906130] ? copy_user_test_oob+0x604/0x10f0 [ 24.906247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.906334] ? copy_user_test_oob+0x604/0x10f0 [ 24.906414] kasan_report+0x141/0x180 [ 24.906488] ? copy_user_test_oob+0x604/0x10f0 [ 24.906578] kasan_check_range+0x10c/0x1c0 [ 24.906658] __kasan_check_read+0x15/0x20 [ 24.906729] copy_user_test_oob+0x604/0x10f0 [ 24.906816] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.906909] ? finish_task_switch.isra.0+0x153/0x700 [ 24.906983] ? __switch_to+0x47/0xf50 [ 24.907066] ? __schedule+0x10cc/0x2b60 [ 24.907140] ? __pfx_read_tsc+0x10/0x10 [ 24.907207] ? ktime_get_ts64+0x86/0x230 [ 24.907331] kunit_try_run_case+0x1a5/0x480 [ 24.907409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.907481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.907557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.907640] ? __kthread_parkme+0x82/0x180 [ 24.907711] ? preempt_count_sub+0x50/0x80 [ 24.907787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.907889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.907971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.908051] kthread+0x337/0x6f0 [ 24.908127] ? trace_preempt_on+0x20/0xc0 [ 24.908207] ? __pfx_kthread+0x10/0x10 [ 24.908329] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.908411] ? calculate_sigpending+0x7b/0xa0 [ 24.908494] ? __pfx_kthread+0x10/0x10 [ 24.908564] ret_from_fork+0x116/0x1d0 [ 24.908596] ? __pfx_kthread+0x10/0x10 [ 24.908629] ret_from_fork_asm+0x1a/0x30 [ 24.908673] </TASK> [ 24.908689] [ 24.921623] Allocated by task 312: [ 24.921981] kasan_save_stack+0x45/0x70 [ 24.922379] kasan_save_track+0x18/0x40 [ 24.922757] kasan_save_alloc_info+0x3b/0x50 [ 24.923153] __kasan_kmalloc+0xb7/0xc0 [ 24.923595] __kmalloc_noprof+0x1c9/0x500 [ 24.923969] kunit_kmalloc_array+0x25/0x60 [ 24.924362] copy_user_test_oob+0xab/0x10f0 [ 24.924739] kunit_try_run_case+0x1a5/0x480 [ 24.925153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.925552] kthread+0x337/0x6f0 [ 24.925785] ret_from_fork+0x116/0x1d0 [ 24.926055] ret_from_fork_asm+0x1a/0x30 [ 24.929370] [ 24.929527] The buggy address belongs to the object at ffff8881033b2200 [ 24.929527] which belongs to the cache kmalloc-128 of size 128 [ 24.930147] The buggy address is located 0 bytes inside of [ 24.930147] allocated 120-byte region [ffff8881033b2200, ffff8881033b2278) [ 24.931205] [ 24.931339] The buggy address belongs to the physical page: [ 24.931622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b2 [ 24.932158] flags: 0x200000000000000(node=0|zone=2) [ 24.932603] page_type: f5(slab) [ 24.932985] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.936566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.937032] page dumped because: kasan: bad access detected [ 24.941147] [ 24.941344] Memory state around the buggy address: [ 24.941611] ffff8881033b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.942002] ffff8881033b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.942644] >ffff8881033b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.943361] ^ [ 24.944023] ffff8881033b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944795] ffff8881033b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.945505] ================================================================== [ 24.788364] ================================================================== [ 24.788871] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 24.789543] Write of size 121 at addr ffff8881033b2200 by task kunit_try_catch/312 [ 24.790096] [ 24.790451] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.790586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.790627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.790686] Call Trace: [ 24.790729] <TASK> [ 24.790774] dump_stack_lvl+0x73/0xb0 [ 24.790876] print_report+0xd1/0x650 [ 24.790955] ? __virt_addr_valid+0x1db/0x2d0 [ 24.791033] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.791107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.791188] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.791313] kasan_report+0x141/0x180 [ 24.791394] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.791486] kasan_check_range+0x10c/0x1c0 [ 24.791576] __kasan_check_write+0x18/0x20 [ 24.791646] copy_user_test_oob+0x3fd/0x10f0 [ 24.791692] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.791729] ? finish_task_switch.isra.0+0x153/0x700 [ 24.791762] ? __switch_to+0x47/0xf50 [ 24.791798] ? __schedule+0x10cc/0x2b60 [ 24.791845] ? __pfx_read_tsc+0x10/0x10 [ 24.791886] ? ktime_get_ts64+0x86/0x230 [ 24.791923] kunit_try_run_case+0x1a5/0x480 [ 24.791961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.791995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.792024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.792060] ? __kthread_parkme+0x82/0x180 [ 24.792090] ? preempt_count_sub+0x50/0x80 [ 24.792122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.792156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.792189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.792265] kthread+0x337/0x6f0 [ 24.792302] ? trace_preempt_on+0x20/0xc0 [ 24.792340] ? __pfx_kthread+0x10/0x10 [ 24.792370] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.792405] ? calculate_sigpending+0x7b/0xa0 [ 24.792441] ? __pfx_kthread+0x10/0x10 [ 24.792474] ret_from_fork+0x116/0x1d0 [ 24.792502] ? __pfx_kthread+0x10/0x10 [ 24.792532] ret_from_fork_asm+0x1a/0x30 [ 24.792577] </TASK> [ 24.792593] [ 24.807082] Allocated by task 312: [ 24.807643] kasan_save_stack+0x45/0x70 [ 24.808081] kasan_save_track+0x18/0x40 [ 24.809079] kasan_save_alloc_info+0x3b/0x50 [ 24.809512] __kasan_kmalloc+0xb7/0xc0 [ 24.809797] __kmalloc_noprof+0x1c9/0x500 [ 24.810110] kunit_kmalloc_array+0x25/0x60 [ 24.810754] copy_user_test_oob+0xab/0x10f0 [ 24.812456] kunit_try_run_case+0x1a5/0x480 [ 24.813089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.813593] kthread+0x337/0x6f0 [ 24.813990] ret_from_fork+0x116/0x1d0 [ 24.814330] ret_from_fork_asm+0x1a/0x30 [ 24.814768] [ 24.814986] The buggy address belongs to the object at ffff8881033b2200 [ 24.814986] which belongs to the cache kmalloc-128 of size 128 [ 24.816360] The buggy address is located 0 bytes inside of [ 24.816360] allocated 120-byte region [ffff8881033b2200, ffff8881033b2278) [ 24.817663] [ 24.817881] The buggy address belongs to the physical page: [ 24.818373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b2 [ 24.818996] flags: 0x200000000000000(node=0|zone=2) [ 24.819409] page_type: f5(slab) [ 24.819698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.820782] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.821485] page dumped because: kasan: bad access detected [ 24.822194] [ 24.822487] Memory state around the buggy address: [ 24.823115] ffff8881033b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.824526] ffff8881033b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.825020] >ffff8881033b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.825549] ^ [ 24.826068] ffff8881033b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.826588] ffff8881033b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.827396] ================================================================== [ 24.828590] ================================================================== [ 24.829241] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 24.830149] Read of size 121 at addr ffff8881033b2200 by task kunit_try_catch/312 [ 24.830657] [ 24.830985] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.831146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.831347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.831408] Call Trace: [ 24.831495] <TASK> [ 24.831556] dump_stack_lvl+0x73/0xb0 [ 24.831787] print_report+0xd1/0x650 [ 24.831897] ? __virt_addr_valid+0x1db/0x2d0 [ 24.832114] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.832316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.832405] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.832485] kasan_report+0x141/0x180 [ 24.832560] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.832646] kasan_check_range+0x10c/0x1c0 [ 24.832725] __kasan_check_read+0x15/0x20 [ 24.832792] copy_user_test_oob+0x4aa/0x10f0 [ 24.832897] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.832974] ? finish_task_switch.isra.0+0x153/0x700 [ 24.833051] ? __switch_to+0x47/0xf50 [ 24.833136] ? __schedule+0x10cc/0x2b60 [ 24.833257] ? __pfx_read_tsc+0x10/0x10 [ 24.833362] ? ktime_get_ts64+0x86/0x230 [ 24.833441] kunit_try_run_case+0x1a5/0x480 [ 24.833502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.833539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.833569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.833607] ? __kthread_parkme+0x82/0x180 [ 24.833637] ? preempt_count_sub+0x50/0x80 [ 24.833671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.833707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.833740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.833774] kthread+0x337/0x6f0 [ 24.833803] ? trace_preempt_on+0x20/0xc0 [ 24.833862] ? __pfx_kthread+0x10/0x10 [ 24.833897] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.833934] ? calculate_sigpending+0x7b/0xa0 [ 24.833971] ? __pfx_kthread+0x10/0x10 [ 24.834002] ret_from_fork+0x116/0x1d0 [ 24.834028] ? __pfx_kthread+0x10/0x10 [ 24.834058] ret_from_fork_asm+0x1a/0x30 [ 24.834100] </TASK> [ 24.834116] [ 24.848546] Allocated by task 312: [ 24.848802] kasan_save_stack+0x45/0x70 [ 24.849250] kasan_save_track+0x18/0x40 [ 24.849638] kasan_save_alloc_info+0x3b/0x50 [ 24.850099] __kasan_kmalloc+0xb7/0xc0 [ 24.850565] __kmalloc_noprof+0x1c9/0x500 [ 24.850975] kunit_kmalloc_array+0x25/0x60 [ 24.851444] copy_user_test_oob+0xab/0x10f0 [ 24.851858] kunit_try_run_case+0x1a5/0x480 [ 24.852338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.852698] kthread+0x337/0x6f0 [ 24.852976] ret_from_fork+0x116/0x1d0 [ 24.853425] ret_from_fork_asm+0x1a/0x30 [ 24.853842] [ 24.854081] The buggy address belongs to the object at ffff8881033b2200 [ 24.854081] which belongs to the cache kmalloc-128 of size 128 [ 24.855153] The buggy address is located 0 bytes inside of [ 24.855153] allocated 120-byte region [ffff8881033b2200, ffff8881033b2278) [ 24.855972] [ 24.856244] The buggy address belongs to the physical page: [ 24.856740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b2 [ 24.857448] flags: 0x200000000000000(node=0|zone=2) [ 24.857917] page_type: f5(slab) [ 24.858293] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.858963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.859607] page dumped because: kasan: bad access detected [ 24.860100] [ 24.860366] Memory state around the buggy address: [ 24.860732] ffff8881033b2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.861309] ffff8881033b2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.861743] >ffff8881033b2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.862334] ^ [ 24.862976] ffff8881033b2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.863444] ffff8881033b2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.863886] ==================================================================