Date
June 18, 2025, 6:43 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.548974] ================================================================== [ 24.549038] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 24.549097] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.549151] [ 24.549185] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.549375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.549450] Hardware name: linux,dummy-virt (DT) [ 24.549518] Call trace: [ 24.549570] show_stack+0x20/0x38 (C) [ 24.549681] dump_stack_lvl+0x8c/0xd0 [ 24.549794] print_report+0x118/0x608 [ 24.549864] kasan_report+0xdc/0x128 [ 24.549913] kasan_check_range+0x100/0x1a8 [ 24.549965] __kasan_check_write+0x20/0x30 [ 24.550013] copy_user_test_oob+0x434/0xec8 [ 24.550121] kunit_try_run_case+0x170/0x3f0 [ 24.550190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.550249] kthread+0x328/0x630 [ 24.550293] ret_from_fork+0x10/0x20 [ 24.550346] [ 24.550377] Allocated by task 295: [ 24.550415] kasan_save_stack+0x3c/0x68 [ 24.550477] kasan_save_track+0x20/0x40 [ 24.550522] kasan_save_alloc_info+0x40/0x58 [ 24.550580] __kasan_kmalloc+0xd4/0xd8 [ 24.550661] __kmalloc_noprof+0x198/0x4c8 [ 24.550705] kunit_kmalloc_array+0x34/0x88 [ 24.550813] copy_user_test_oob+0xac/0xec8 [ 24.550997] kunit_try_run_case+0x170/0x3f0 [ 24.551080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.551138] kthread+0x328/0x630 [ 24.551217] ret_from_fork+0x10/0x20 [ 24.551354] [ 24.551399] The buggy address belongs to the object at fff00000c641b000 [ 24.551399] which belongs to the cache kmalloc-128 of size 128 [ 24.551650] The buggy address is located 0 bytes inside of [ 24.551650] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.551761] [ 24.551787] The buggy address belongs to the physical page: [ 24.551836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.551894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.551948] page_type: f5(slab) [ 24.551992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.552077] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.552186] page dumped because: kasan: bad access detected [ 24.552244] [ 24.552267] Memory state around the buggy address: [ 24.552493] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552587] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552843] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.552997] ^ [ 24.553293] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553352] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553400] ================================================================== [ 24.511252] ================================================================== [ 24.511439] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 24.511540] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.511597] [ 24.511648] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.511776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.511816] Hardware name: linux,dummy-virt (DT) [ 24.511854] Call trace: [ 24.511885] show_stack+0x20/0x38 (C) [ 24.511944] dump_stack_lvl+0x8c/0xd0 [ 24.512033] print_report+0x118/0x608 [ 24.512090] kasan_report+0xdc/0x128 [ 24.512229] kasan_check_range+0x100/0x1a8 [ 24.512371] __kasan_check_write+0x20/0x30 [ 24.512433] copy_user_test_oob+0x234/0xec8 [ 24.512488] kunit_try_run_case+0x170/0x3f0 [ 24.512561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.512625] kthread+0x328/0x630 [ 24.512678] ret_from_fork+0x10/0x20 [ 24.512746] [ 24.512769] Allocated by task 295: [ 24.512805] kasan_save_stack+0x3c/0x68 [ 24.512855] kasan_save_track+0x20/0x40 [ 24.512898] kasan_save_alloc_info+0x40/0x58 [ 24.512941] __kasan_kmalloc+0xd4/0xd8 [ 24.512980] __kmalloc_noprof+0x198/0x4c8 [ 24.514524] kunit_kmalloc_array+0x34/0x88 [ 24.515430] copy_user_test_oob+0xac/0xec8 [ 24.515929] kunit_try_run_case+0x170/0x3f0 [ 24.515988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.516559] kthread+0x328/0x630 [ 24.516635] ret_from_fork+0x10/0x20 [ 24.516820] [ 24.516849] The buggy address belongs to the object at fff00000c641b000 [ 24.516849] which belongs to the cache kmalloc-128 of size 128 [ 24.517253] The buggy address is located 0 bytes inside of [ 24.517253] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.517328] [ 24.517358] The buggy address belongs to the physical page: [ 24.518109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.518196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.518365] page_type: f5(slab) [ 24.518476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.518534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.518580] page dumped because: kasan: bad access detected [ 24.518621] [ 24.518645] Memory state around the buggy address: [ 24.518683] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.518732] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.518780] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.519008] ^ [ 24.519142] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519264] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519310] ================================================================== [ 24.555964] ================================================================== [ 24.556054] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 24.556576] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.556810] [ 24.556964] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.557198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.557236] Hardware name: linux,dummy-virt (DT) [ 24.557275] Call trace: [ 24.557304] show_stack+0x20/0x38 (C) [ 24.557477] dump_stack_lvl+0x8c/0xd0 [ 24.557711] print_report+0x118/0x608 [ 24.557781] kasan_report+0xdc/0x128 [ 24.557992] kasan_check_range+0x100/0x1a8 [ 24.558234] __kasan_check_read+0x20/0x30 [ 24.558337] copy_user_test_oob+0x4a0/0xec8 [ 24.558395] kunit_try_run_case+0x170/0x3f0 [ 24.558448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.558506] kthread+0x328/0x630 [ 24.558797] ret_from_fork+0x10/0x20 [ 24.558925] [ 24.558961] Allocated by task 295: [ 24.559309] kasan_save_stack+0x3c/0x68 [ 24.559460] kasan_save_track+0x20/0x40 [ 24.559513] kasan_save_alloc_info+0x40/0x58 [ 24.559563] __kasan_kmalloc+0xd4/0xd8 [ 24.559607] __kmalloc_noprof+0x198/0x4c8 [ 24.559652] kunit_kmalloc_array+0x34/0x88 [ 24.559696] copy_user_test_oob+0xac/0xec8 [ 24.560214] kunit_try_run_case+0x170/0x3f0 [ 24.560353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.560468] kthread+0x328/0x630 [ 24.560627] ret_from_fork+0x10/0x20 [ 24.560821] [ 24.561049] The buggy address belongs to the object at fff00000c641b000 [ 24.561049] which belongs to the cache kmalloc-128 of size 128 [ 24.561135] The buggy address is located 0 bytes inside of [ 24.561135] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.561221] [ 24.561250] The buggy address belongs to the physical page: [ 24.561288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.561349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.561692] page_type: f5(slab) [ 24.561807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.562138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.562217] page dumped because: kasan: bad access detected [ 24.562349] [ 24.562379] Memory state around the buggy address: [ 24.562430] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.562485] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.562769] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.562835] ^ [ 24.562909] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563082] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563328] ================================================================== [ 24.527745] ================================================================== [ 24.527934] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 24.528030] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.528178] [ 24.528281] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.528749] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.528879] Hardware name: linux,dummy-virt (DT) [ 24.528937] Call trace: [ 24.528985] show_stack+0x20/0x38 (C) [ 24.529083] dump_stack_lvl+0x8c/0xd0 [ 24.529141] print_report+0x118/0x608 [ 24.529199] kasan_report+0xdc/0x128 [ 24.529252] kasan_check_range+0x100/0x1a8 [ 24.529309] __kasan_check_read+0x20/0x30 [ 24.529363] copy_user_test_oob+0x728/0xec8 [ 24.529419] kunit_try_run_case+0x170/0x3f0 [ 24.529474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.529932] kthread+0x328/0x630 [ 24.530068] ret_from_fork+0x10/0x20 [ 24.530163] [ 24.530189] Allocated by task 295: [ 24.530346] kasan_save_stack+0x3c/0x68 [ 24.530629] kasan_save_track+0x20/0x40 [ 24.530723] kasan_save_alloc_info+0x40/0x58 [ 24.530946] __kasan_kmalloc+0xd4/0xd8 [ 24.531006] __kmalloc_noprof+0x198/0x4c8 [ 24.531065] kunit_kmalloc_array+0x34/0x88 [ 24.531110] copy_user_test_oob+0xac/0xec8 [ 24.531153] kunit_try_run_case+0x170/0x3f0 [ 24.531195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.531242] kthread+0x328/0x630 [ 24.531278] ret_from_fork+0x10/0x20 [ 24.531316] [ 24.531345] The buggy address belongs to the object at fff00000c641b000 [ 24.531345] which belongs to the cache kmalloc-128 of size 128 [ 24.531940] The buggy address is located 0 bytes inside of [ 24.531940] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.532066] [ 24.532328] The buggy address belongs to the physical page: [ 24.532423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.532755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.532930] page_type: f5(slab) [ 24.533036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.533138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.533200] page dumped because: kasan: bad access detected [ 24.533363] [ 24.533472] Memory state around the buggy address: [ 24.533616] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.533708] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.533855] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.534171] ^ [ 24.534254] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.534308] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.534361] ================================================================== [ 24.545473] ================================================================== [ 24.545543] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 24.545606] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.545666] [ 24.545704] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.545892] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.545926] Hardware name: linux,dummy-virt (DT) [ 24.545992] Call trace: [ 24.546092] show_stack+0x20/0x38 (C) [ 24.546215] dump_stack_lvl+0x8c/0xd0 [ 24.546275] print_report+0x118/0x608 [ 24.546328] kasan_report+0xdc/0x128 [ 24.546377] kasan_check_range+0x100/0x1a8 [ 24.546456] __kasan_check_read+0x20/0x30 [ 24.546504] copy_user_test_oob+0x3c8/0xec8 [ 24.546569] kunit_try_run_case+0x170/0x3f0 [ 24.546636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.546694] kthread+0x328/0x630 [ 24.546738] ret_from_fork+0x10/0x20 [ 24.546804] [ 24.546859] Allocated by task 295: [ 24.546894] kasan_save_stack+0x3c/0x68 [ 24.546943] kasan_save_track+0x20/0x40 [ 24.546985] kasan_save_alloc_info+0x40/0x58 [ 24.547048] __kasan_kmalloc+0xd4/0xd8 [ 24.547133] __kmalloc_noprof+0x198/0x4c8 [ 24.547202] kunit_kmalloc_array+0x34/0x88 [ 24.547258] copy_user_test_oob+0xac/0xec8 [ 24.547345] kunit_try_run_case+0x170/0x3f0 [ 24.547477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.547532] kthread+0x328/0x630 [ 24.547569] ret_from_fork+0x10/0x20 [ 24.547607] [ 24.547633] The buggy address belongs to the object at fff00000c641b000 [ 24.547633] which belongs to the cache kmalloc-128 of size 128 [ 24.547695] The buggy address is located 0 bytes inside of [ 24.547695] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.547760] [ 24.547801] The buggy address belongs to the physical page: [ 24.547836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.547903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.547970] page_type: f5(slab) [ 24.548030] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.548153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.548203] page dumped because: kasan: bad access detected [ 24.548242] [ 24.548265] Memory state around the buggy address: [ 24.548302] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548352] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548400] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.548444] ^ [ 24.548490] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548553] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548601] ================================================================== [ 24.540303] ================================================================== [ 24.540466] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 24.540750] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.540884] [ 24.541087] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.541361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.541430] Hardware name: linux,dummy-virt (DT) [ 24.541598] Call trace: [ 24.541671] show_stack+0x20/0x38 (C) [ 24.541935] dump_stack_lvl+0x8c/0xd0 [ 24.542169] print_report+0x118/0x608 [ 24.542270] kasan_report+0xdc/0x128 [ 24.542361] kasan_check_range+0x100/0x1a8 [ 24.542444] __kasan_check_write+0x20/0x30 [ 24.542497] copy_user_test_oob+0x35c/0xec8 [ 24.542548] kunit_try_run_case+0x170/0x3f0 [ 24.542633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.542714] kthread+0x328/0x630 [ 24.542761] ret_from_fork+0x10/0x20 [ 24.542815] [ 24.542840] Allocated by task 295: [ 24.542872] kasan_save_stack+0x3c/0x68 [ 24.542945] kasan_save_track+0x20/0x40 [ 24.542993] kasan_save_alloc_info+0x40/0x58 [ 24.543048] __kasan_kmalloc+0xd4/0xd8 [ 24.543090] __kmalloc_noprof+0x198/0x4c8 [ 24.543133] kunit_kmalloc_array+0x34/0x88 [ 24.543188] copy_user_test_oob+0xac/0xec8 [ 24.543240] kunit_try_run_case+0x170/0x3f0 [ 24.543307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.543400] kthread+0x328/0x630 [ 24.543490] ret_from_fork+0x10/0x20 [ 24.543535] [ 24.543559] The buggy address belongs to the object at fff00000c641b000 [ 24.543559] which belongs to the cache kmalloc-128 of size 128 [ 24.543624] The buggy address is located 0 bytes inside of [ 24.543624] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.543692] [ 24.543717] The buggy address belongs to the physical page: [ 24.543768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.543901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.543968] page_type: f5(slab) [ 24.544064] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.544164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.544218] page dumped because: kasan: bad access detected [ 24.544299] [ 24.544325] Memory state around the buggy address: [ 24.544363] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.544412] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.544461] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.544505] ^ [ 24.544564] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.544617] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.544663] ==================================================================
[ 15.085963] ================================================================== [ 15.086530] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 15.086892] Read of size 121 at addr ffff888101addf00 by task kunit_try_catch/311 [ 15.087289] [ 15.087378] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 15.087424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.087437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.087458] Call Trace: [ 15.087474] <TASK> [ 15.087489] dump_stack_lvl+0x73/0xb0 [ 15.087516] print_report+0xd1/0x650 [ 15.087537] ? __virt_addr_valid+0x1db/0x2d0 [ 15.087559] ? copy_user_test_oob+0x604/0x10f0 [ 15.087582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.087607] ? copy_user_test_oob+0x604/0x10f0 [ 15.087631] kasan_report+0x141/0x180 [ 15.087652] ? copy_user_test_oob+0x604/0x10f0 [ 15.087679] kasan_check_range+0x10c/0x1c0 [ 15.087703] __kasan_check_read+0x15/0x20 [ 15.087726] copy_user_test_oob+0x604/0x10f0 [ 15.087750] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.087773] ? finish_task_switch.isra.0+0x153/0x700 [ 15.087796] ? __switch_to+0x47/0xf50 [ 15.087820] ? __schedule+0x10cc/0x2b60 [ 15.087842] ? __pfx_read_tsc+0x10/0x10 [ 15.087862] ? ktime_get_ts64+0x86/0x230 [ 15.087887] kunit_try_run_case+0x1a5/0x480 [ 15.087911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.087933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.087956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.088002] ? __kthread_parkme+0x82/0x180 [ 15.088023] ? preempt_count_sub+0x50/0x80 [ 15.088047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.088069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.088092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.088115] kthread+0x337/0x6f0 [ 15.088135] ? trace_preempt_on+0x20/0xc0 [ 15.088158] ? __pfx_kthread+0x10/0x10 [ 15.088179] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.088199] ? calculate_sigpending+0x7b/0xa0 [ 15.088233] ? __pfx_kthread+0x10/0x10 [ 15.088254] ret_from_fork+0x116/0x1d0 [ 15.088273] ? __pfx_kthread+0x10/0x10 [ 15.088293] ret_from_fork_asm+0x1a/0x30 [ 15.088323] </TASK> [ 15.088336] [ 15.095482] Allocated by task 311: [ 15.095606] kasan_save_stack+0x45/0x70 [ 15.095742] kasan_save_track+0x18/0x40 [ 15.095869] kasan_save_alloc_info+0x3b/0x50 [ 15.096014] __kasan_kmalloc+0xb7/0xc0 [ 15.096173] __kmalloc_noprof+0x1c9/0x500 [ 15.096349] kunit_kmalloc_array+0x25/0x60 [ 15.096527] copy_user_test_oob+0xab/0x10f0 [ 15.096713] kunit_try_run_case+0x1a5/0x480 [ 15.096906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097124] kthread+0x337/0x6f0 [ 15.098183] ret_from_fork+0x116/0x1d0 [ 15.098552] ret_from_fork_asm+0x1a/0x30 [ 15.098694] [ 15.098760] The buggy address belongs to the object at ffff888101addf00 [ 15.098760] which belongs to the cache kmalloc-128 of size 128 [ 15.099116] The buggy address is located 0 bytes inside of [ 15.099116] allocated 120-byte region [ffff888101addf00, ffff888101addf78) [ 15.099982] [ 15.100194] The buggy address belongs to the physical page: [ 15.100611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101add [ 15.101117] flags: 0x200000000000000(node=0|zone=2) [ 15.101478] page_type: f5(slab) [ 15.101636] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.101940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.102456] page dumped because: kasan: bad access detected [ 15.102928] [ 15.103028] Memory state around the buggy address: [ 15.103487] ffff888101adde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.103902] ffff888101adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.104379] >ffff888101addf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.104823] ^ [ 15.105265] ffff888101addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105561] ffff888101ade000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.105846] ================================================================== [ 15.033505] ================================================================== [ 15.033805] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 15.034105] Write of size 121 at addr ffff888101addf00 by task kunit_try_catch/311 [ 15.034527] [ 15.034625] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 15.034692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.034706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.034729] Call Trace: [ 15.034742] <TASK> [ 15.034758] dump_stack_lvl+0x73/0xb0 [ 15.034786] print_report+0xd1/0x650 [ 15.034808] ? __virt_addr_valid+0x1db/0x2d0 [ 15.034830] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.034853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.034899] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.034922] kasan_report+0x141/0x180 [ 15.034944] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.034971] kasan_check_range+0x10c/0x1c0 [ 15.035012] __kasan_check_write+0x18/0x20 [ 15.035034] copy_user_test_oob+0x3fd/0x10f0 [ 15.035059] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.035082] ? finish_task_switch.isra.0+0x153/0x700 [ 15.035104] ? __switch_to+0x47/0xf50 [ 15.035130] ? __schedule+0x10cc/0x2b60 [ 15.035151] ? __pfx_read_tsc+0x10/0x10 [ 15.035171] ? ktime_get_ts64+0x86/0x230 [ 15.035196] kunit_try_run_case+0x1a5/0x480 [ 15.035248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.035293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.035317] ? __kthread_parkme+0x82/0x180 [ 15.035337] ? preempt_count_sub+0x50/0x80 [ 15.035361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.035430] kthread+0x337/0x6f0 [ 15.035449] ? trace_preempt_on+0x20/0xc0 [ 15.035473] ? __pfx_kthread+0x10/0x10 [ 15.035494] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.035514] ? calculate_sigpending+0x7b/0xa0 [ 15.035538] ? __pfx_kthread+0x10/0x10 [ 15.035561] ret_from_fork+0x116/0x1d0 [ 15.035579] ? __pfx_kthread+0x10/0x10 [ 15.035600] ret_from_fork_asm+0x1a/0x30 [ 15.035629] </TASK> [ 15.035640] [ 15.042959] Allocated by task 311: [ 15.043081] kasan_save_stack+0x45/0x70 [ 15.043236] kasan_save_track+0x18/0x40 [ 15.043468] kasan_save_alloc_info+0x3b/0x50 [ 15.043696] __kasan_kmalloc+0xb7/0xc0 [ 15.043899] __kmalloc_noprof+0x1c9/0x500 [ 15.044086] kunit_kmalloc_array+0x25/0x60 [ 15.044289] copy_user_test_oob+0xab/0x10f0 [ 15.044496] kunit_try_run_case+0x1a5/0x480 [ 15.044707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.045017] kthread+0x337/0x6f0 [ 15.045179] ret_from_fork+0x116/0x1d0 [ 15.045373] ret_from_fork_asm+0x1a/0x30 [ 15.045555] [ 15.045631] The buggy address belongs to the object at ffff888101addf00 [ 15.045631] which belongs to the cache kmalloc-128 of size 128 [ 15.046116] The buggy address is located 0 bytes inside of [ 15.046116] allocated 120-byte region [ffff888101addf00, ffff888101addf78) [ 15.046540] [ 15.046608] The buggy address belongs to the physical page: [ 15.046777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101add [ 15.047110] flags: 0x200000000000000(node=0|zone=2) [ 15.047347] page_type: f5(slab) [ 15.047515] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.047788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.048009] page dumped because: kasan: bad access detected [ 15.048238] [ 15.048326] Memory state around the buggy address: [ 15.048541] ffff888101adde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.048896] ffff888101adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.049245] >ffff888101addf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.049544] ^ [ 15.049787] ffff888101addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.050090] ffff888101ade000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.050423] ================================================================== [ 15.050888] ================================================================== [ 15.051236] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 15.051829] Read of size 121 at addr ffff888101addf00 by task kunit_try_catch/311 [ 15.052144] [ 15.052231] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 15.052277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.052290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.052312] Call Trace: [ 15.052327] <TASK> [ 15.052341] dump_stack_lvl+0x73/0xb0 [ 15.052368] print_report+0xd1/0x650 [ 15.052390] ? __virt_addr_valid+0x1db/0x2d0 [ 15.052413] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.052435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.052461] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.052485] kasan_report+0x141/0x180 [ 15.052506] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.052534] kasan_check_range+0x10c/0x1c0 [ 15.052557] __kasan_check_read+0x15/0x20 [ 15.052581] copy_user_test_oob+0x4aa/0x10f0 [ 15.052606] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.052656] ? finish_task_switch.isra.0+0x153/0x700 [ 15.052679] ? __switch_to+0x47/0xf50 [ 15.052703] ? __schedule+0x10cc/0x2b60 [ 15.052724] ? __pfx_read_tsc+0x10/0x10 [ 15.052745] ? ktime_get_ts64+0x86/0x230 [ 15.052769] kunit_try_run_case+0x1a5/0x480 [ 15.052792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.052815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.052837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.052859] ? __kthread_parkme+0x82/0x180 [ 15.052880] ? preempt_count_sub+0x50/0x80 [ 15.052902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.052926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.052948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.052971] kthread+0x337/0x6f0 [ 15.052990] ? trace_preempt_on+0x20/0xc0 [ 15.053013] ? __pfx_kthread+0x10/0x10 [ 15.053034] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.053055] ? calculate_sigpending+0x7b/0xa0 [ 15.053078] ? __pfx_kthread+0x10/0x10 [ 15.053099] ret_from_fork+0x116/0x1d0 [ 15.053118] ? __pfx_kthread+0x10/0x10 [ 15.053138] ret_from_fork_asm+0x1a/0x30 [ 15.053167] </TASK> [ 15.053179] [ 15.060116] Allocated by task 311: [ 15.060404] kasan_save_stack+0x45/0x70 [ 15.060596] kasan_save_track+0x18/0x40 [ 15.060803] kasan_save_alloc_info+0x3b/0x50 [ 15.061005] __kasan_kmalloc+0xb7/0xc0 [ 15.061145] __kmalloc_noprof+0x1c9/0x500 [ 15.061340] kunit_kmalloc_array+0x25/0x60 [ 15.061478] copy_user_test_oob+0xab/0x10f0 [ 15.061832] kunit_try_run_case+0x1a5/0x480 [ 15.061999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.062165] kthread+0x337/0x6f0 [ 15.062415] ret_from_fork+0x116/0x1d0 [ 15.062600] ret_from_fork_asm+0x1a/0x30 [ 15.062783] [ 15.062847] The buggy address belongs to the object at ffff888101addf00 [ 15.062847] which belongs to the cache kmalloc-128 of size 128 [ 15.063414] The buggy address is located 0 bytes inside of [ 15.063414] allocated 120-byte region [ffff888101addf00, ffff888101addf78) [ 15.063894] [ 15.063959] The buggy address belongs to the physical page: [ 15.064128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101add [ 15.064372] flags: 0x200000000000000(node=0|zone=2) [ 15.064563] page_type: f5(slab) [ 15.064725] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.065110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.065452] page dumped because: kasan: bad access detected [ 15.065755] [ 15.065843] Memory state around the buggy address: [ 15.066078] ffff888101adde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.066418] ffff888101adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066676] >ffff888101addf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.066885] ^ [ 15.067136] ffff888101addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067690] ffff888101ade000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.067979] ================================================================== [ 15.068539] ================================================================== [ 15.068869] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 15.069145] Write of size 121 at addr ffff888101addf00 by task kunit_try_catch/311 [ 15.069501] [ 15.069586] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 15.069633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.069646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.069669] Call Trace: [ 15.069682] <TASK> [ 15.069696] dump_stack_lvl+0x73/0xb0 [ 15.069762] print_report+0xd1/0x650 [ 15.069785] ? __virt_addr_valid+0x1db/0x2d0 [ 15.069807] ? copy_user_test_oob+0x557/0x10f0 [ 15.069831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.069857] ? copy_user_test_oob+0x557/0x10f0 [ 15.069881] kasan_report+0x141/0x180 [ 15.069903] ? copy_user_test_oob+0x557/0x10f0 [ 15.069930] kasan_check_range+0x10c/0x1c0 [ 15.069954] __kasan_check_write+0x18/0x20 [ 15.069977] copy_user_test_oob+0x557/0x10f0 [ 15.070002] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.070025] ? finish_task_switch.isra.0+0x153/0x700 [ 15.070047] ? __switch_to+0x47/0xf50 [ 15.070071] ? __schedule+0x10cc/0x2b60 [ 15.070092] ? __pfx_read_tsc+0x10/0x10 [ 15.070113] ? ktime_get_ts64+0x86/0x230 [ 15.070138] kunit_try_run_case+0x1a5/0x480 [ 15.070160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.070217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.070240] ? __kthread_parkme+0x82/0x180 [ 15.070261] ? preempt_count_sub+0x50/0x80 [ 15.070284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070372] kthread+0x337/0x6f0 [ 15.070391] ? trace_preempt_on+0x20/0xc0 [ 15.070415] ? __pfx_kthread+0x10/0x10 [ 15.070436] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070456] ? calculate_sigpending+0x7b/0xa0 [ 15.070480] ? __pfx_kthread+0x10/0x10 [ 15.070501] ret_from_fork+0x116/0x1d0 [ 15.070538] ? __pfx_kthread+0x10/0x10 [ 15.070559] ret_from_fork_asm+0x1a/0x30 [ 15.070589] </TASK> [ 15.070599] [ 15.077779] Allocated by task 311: [ 15.077949] kasan_save_stack+0x45/0x70 [ 15.078132] kasan_save_track+0x18/0x40 [ 15.078269] kasan_save_alloc_info+0x3b/0x50 [ 15.078410] __kasan_kmalloc+0xb7/0xc0 [ 15.078535] __kmalloc_noprof+0x1c9/0x500 [ 15.078930] kunit_kmalloc_array+0x25/0x60 [ 15.079124] copy_user_test_oob+0xab/0x10f0 [ 15.079556] kunit_try_run_case+0x1a5/0x480 [ 15.079738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.079963] kthread+0x337/0x6f0 [ 15.080115] ret_from_fork+0x116/0x1d0 [ 15.080263] ret_from_fork_asm+0x1a/0x30 [ 15.080466] [ 15.080544] The buggy address belongs to the object at ffff888101addf00 [ 15.080544] which belongs to the cache kmalloc-128 of size 128 [ 15.081016] The buggy address is located 0 bytes inside of [ 15.081016] allocated 120-byte region [ffff888101addf00, ffff888101addf78) [ 15.081547] [ 15.081640] The buggy address belongs to the physical page: [ 15.081867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101add [ 15.082192] flags: 0x200000000000000(node=0|zone=2) [ 15.082389] page_type: f5(slab) [ 15.082504] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.082729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.082948] page dumped because: kasan: bad access detected [ 15.083200] [ 15.083295] Memory state around the buggy address: [ 15.083510] ffff888101adde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.083814] ffff888101adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.084329] >ffff888101addf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.084533] ^ [ 15.084739] ffff888101addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.084945] ffff888101ade000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.085343] ==================================================================