Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.027415] ================================================================== [ 34.027470] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.027657] Read of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.027806] [ 34.027905] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.028217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.028249] Hardware name: linux,dummy-virt (DT) [ 34.028298] Call trace: [ 34.028323] show_stack+0x20/0x38 (C) [ 34.028500] dump_stack_lvl+0x8c/0xd0 [ 34.028742] print_report+0x118/0x608 [ 34.028810] kasan_report+0xdc/0x128 [ 34.028858] kasan_check_range+0x100/0x1a8 [ 34.028936] __kasan_check_read+0x20/0x30 [ 34.029171] copy_user_test_oob+0x3c8/0xec8 [ 34.029221] kunit_try_run_case+0x170/0x3f0 [ 34.029313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.029491] kthread+0x328/0x630 [ 34.029624] ret_from_fork+0x10/0x20 [ 34.029766] [ 34.029842] Allocated by task 318: [ 34.029879] kasan_save_stack+0x3c/0x68 [ 34.030351] kasan_save_track+0x20/0x40 [ 34.030402] kasan_save_alloc_info+0x40/0x58 [ 34.030446] __kasan_kmalloc+0xd4/0xd8 [ 34.030486] __kmalloc_noprof+0x198/0x4c8 [ 34.030940] kunit_kmalloc_array+0x34/0x88 [ 34.030995] copy_user_test_oob+0xac/0xec8 [ 34.031472] kunit_try_run_case+0x170/0x3f0 [ 34.031519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.032073] kthread+0x328/0x630 [ 34.032117] ret_from_fork+0x10/0x20 [ 34.032158] [ 34.032234] The buggy address belongs to the object at fff00000c8dc5900 [ 34.032234] which belongs to the cache kmalloc-128 of size 128 [ 34.032656] The buggy address is located 0 bytes inside of [ 34.032656] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.032736] [ 34.032763] The buggy address belongs to the physical page: [ 34.033075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.033136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.033188] page_type: f5(slab) [ 34.033574] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.033632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.033676] page dumped because: kasan: bad access detected [ 34.034014] [ 34.034038] Memory state around the buggy address: [ 34.034074] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.034446] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.034505] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.034546] ^ [ 34.034935] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.034990] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.035034] ================================================================== [ 34.022430] ================================================================== [ 34.022520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.022607] Write of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.022904] [ 34.022952] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.023053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.023197] Hardware name: linux,dummy-virt (DT) [ 34.023249] Call trace: [ 34.023274] show_stack+0x20/0x38 (C) [ 34.023511] dump_stack_lvl+0x8c/0xd0 [ 34.023630] print_report+0x118/0x608 [ 34.023681] kasan_report+0xdc/0x128 [ 34.023794] kasan_check_range+0x100/0x1a8 [ 34.023843] __kasan_check_write+0x20/0x30 [ 34.023937] copy_user_test_oob+0x35c/0xec8 [ 34.023988] kunit_try_run_case+0x170/0x3f0 [ 34.024040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.024096] kthread+0x328/0x630 [ 34.024140] ret_from_fork+0x10/0x20 [ 34.024191] [ 34.024239] Allocated by task 318: [ 34.024271] kasan_save_stack+0x3c/0x68 [ 34.024346] kasan_save_track+0x20/0x40 [ 34.024387] kasan_save_alloc_info+0x40/0x58 [ 34.024428] __kasan_kmalloc+0xd4/0xd8 [ 34.024469] __kmalloc_noprof+0x198/0x4c8 [ 34.024510] kunit_kmalloc_array+0x34/0x88 [ 34.024552] copy_user_test_oob+0xac/0xec8 [ 34.024654] kunit_try_run_case+0x170/0x3f0 [ 34.024752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.024800] kthread+0x328/0x630 [ 34.024835] ret_from_fork+0x10/0x20 [ 34.024875] [ 34.025166] The buggy address belongs to the object at fff00000c8dc5900 [ 34.025166] which belongs to the cache kmalloc-128 of size 128 [ 34.025243] The buggy address is located 0 bytes inside of [ 34.025243] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.025423] [ 34.025514] The buggy address belongs to the physical page: [ 34.025588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.025706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.025758] page_type: f5(slab) [ 34.025809] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.025956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.026197] page dumped because: kasan: bad access detected [ 34.026233] [ 34.026254] Memory state around the buggy address: [ 34.026290] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.026335] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026382] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.026425] ^ [ 34.026468] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026521] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026564] ================================================================== [ 34.042856] ================================================================== [ 34.042922] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.042984] Read of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.043048] [ 34.043155] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.043324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.043353] Hardware name: linux,dummy-virt (DT) [ 34.043409] Call trace: [ 34.043433] show_stack+0x20/0x38 (C) [ 34.043486] dump_stack_lvl+0x8c/0xd0 [ 34.044236] print_report+0x118/0x608 [ 34.044327] kasan_report+0xdc/0x128 [ 34.044786] kasan_check_range+0x100/0x1a8 [ 34.044837] __kasan_check_read+0x20/0x30 [ 34.044886] copy_user_test_oob+0x4a0/0xec8 [ 34.044967] kunit_try_run_case+0x170/0x3f0 [ 34.045022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.045078] kthread+0x328/0x630 [ 34.045121] ret_from_fork+0x10/0x20 [ 34.045460] [ 34.045526] Allocated by task 318: [ 34.045559] kasan_save_stack+0x3c/0x68 [ 34.045607] kasan_save_track+0x20/0x40 [ 34.045892] kasan_save_alloc_info+0x40/0x58 [ 34.046000] __kasan_kmalloc+0xd4/0xd8 [ 34.046043] __kmalloc_noprof+0x198/0x4c8 [ 34.046292] kunit_kmalloc_array+0x34/0x88 [ 34.046335] copy_user_test_oob+0xac/0xec8 [ 34.046382] kunit_try_run_case+0x170/0x3f0 [ 34.046424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.046472] kthread+0x328/0x630 [ 34.046510] ret_from_fork+0x10/0x20 [ 34.046595] [ 34.046713] The buggy address belongs to the object at fff00000c8dc5900 [ 34.046713] which belongs to the cache kmalloc-128 of size 128 [ 34.047048] The buggy address is located 0 bytes inside of [ 34.047048] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.047134] [ 34.047235] The buggy address belongs to the physical page: [ 34.047331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.047419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.047595] page_type: f5(slab) [ 34.047637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.047728] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.047772] page dumped because: kasan: bad access detected [ 34.047807] [ 34.048138] Memory state around the buggy address: [ 34.048178] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.048227] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.048273] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.048314] ^ [ 34.048356] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.048709] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.049010] ================================================================== [ 34.036225] ================================================================== [ 34.036281] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.036334] Write of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.036388] [ 34.036421] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.036512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.036541] Hardware name: linux,dummy-virt (DT) [ 34.036575] Call trace: [ 34.036600] show_stack+0x20/0x38 (C) [ 34.036652] dump_stack_lvl+0x8c/0xd0 [ 34.036702] print_report+0x118/0x608 [ 34.036753] kasan_report+0xdc/0x128 [ 34.036800] kasan_check_range+0x100/0x1a8 [ 34.036849] __kasan_check_write+0x20/0x30 [ 34.036897] copy_user_test_oob+0x434/0xec8 [ 34.037495] kunit_try_run_case+0x170/0x3f0 [ 34.037642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.037700] kthread+0x328/0x630 [ 34.037744] ret_from_fork+0x10/0x20 [ 34.037796] [ 34.037823] Allocated by task 318: [ 34.037971] kasan_save_stack+0x3c/0x68 [ 34.038171] kasan_save_track+0x20/0x40 [ 34.038211] kasan_save_alloc_info+0x40/0x58 [ 34.038337] __kasan_kmalloc+0xd4/0xd8 [ 34.038506] __kmalloc_noprof+0x198/0x4c8 [ 34.038560] kunit_kmalloc_array+0x34/0x88 [ 34.038601] copy_user_test_oob+0xac/0xec8 [ 34.038641] kunit_try_run_case+0x170/0x3f0 [ 34.038683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.038736] kthread+0x328/0x630 [ 34.038896] ret_from_fork+0x10/0x20 [ 34.038967] [ 34.038990] The buggy address belongs to the object at fff00000c8dc5900 [ 34.038990] which belongs to the cache kmalloc-128 of size 128 [ 34.039052] The buggy address is located 0 bytes inside of [ 34.039052] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.039118] [ 34.039140] The buggy address belongs to the physical page: [ 34.039174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.039312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.039372] page_type: f5(slab) [ 34.039412] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.040137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.040195] page dumped because: kasan: bad access detected [ 34.040346] [ 34.040368] Memory state around the buggy address: [ 34.040671] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.040745] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.040790] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.040831] ^ [ 34.041150] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.041406] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.041449] ================================================================== [ 34.012786] ================================================================== [ 34.012844] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.012898] Read of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.012967] [ 34.013000] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.013089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.013119] Hardware name: linux,dummy-virt (DT) [ 34.013152] Call trace: [ 34.013179] show_stack+0x20/0x38 (C) [ 34.013231] dump_stack_lvl+0x8c/0xd0 [ 34.013280] print_report+0x118/0x608 [ 34.013330] kasan_report+0xdc/0x128 [ 34.013378] kasan_check_range+0x100/0x1a8 [ 34.013426] __kasan_check_read+0x20/0x30 [ 34.013473] copy_user_test_oob+0x728/0xec8 [ 34.013526] kunit_try_run_case+0x170/0x3f0 [ 34.013578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.013635] kthread+0x328/0x630 [ 34.013679] ret_from_fork+0x10/0x20 [ 34.013728] [ 34.013750] Allocated by task 318: [ 34.013780] kasan_save_stack+0x3c/0x68 [ 34.013824] kasan_save_track+0x20/0x40 [ 34.013864] kasan_save_alloc_info+0x40/0x58 [ 34.013904] __kasan_kmalloc+0xd4/0xd8 [ 34.013978] __kmalloc_noprof+0x198/0x4c8 [ 34.014021] kunit_kmalloc_array+0x34/0x88 [ 34.014061] copy_user_test_oob+0xac/0xec8 [ 34.014255] kunit_try_run_case+0x170/0x3f0 [ 34.014455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.014590] kthread+0x328/0x630 [ 34.014627] ret_from_fork+0x10/0x20 [ 34.014684] [ 34.014705] The buggy address belongs to the object at fff00000c8dc5900 [ 34.014705] which belongs to the cache kmalloc-128 of size 128 [ 34.014897] The buggy address is located 0 bytes inside of [ 34.014897] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.015199] [ 34.015223] The buggy address belongs to the physical page: [ 34.015257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.015505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.015624] page_type: f5(slab) [ 34.015706] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.015834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.015878] page dumped because: kasan: bad access detected [ 34.015914] [ 34.015945] Memory state around the buggy address: [ 34.015980] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.016026] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.016071] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.016124] ^ [ 34.016277] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.016322] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.016372] ================================================================== [ 34.001401] ================================================================== [ 34.001863] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.002010] Write of size 121 at addr fff00000c8dc5900 by task kunit_try_catch/318 [ 34.002066] [ 34.002610] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.002716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.002747] Hardware name: linux,dummy-virt (DT) [ 34.002781] Call trace: [ 34.002810] show_stack+0x20/0x38 (C) [ 34.002867] dump_stack_lvl+0x8c/0xd0 [ 34.002921] print_report+0x118/0x608 [ 34.002982] kasan_report+0xdc/0x128 [ 34.003032] kasan_check_range+0x100/0x1a8 [ 34.003079] __kasan_check_write+0x20/0x30 [ 34.003127] copy_user_test_oob+0x234/0xec8 [ 34.003178] kunit_try_run_case+0x170/0x3f0 [ 34.003230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.003286] kthread+0x328/0x630 [ 34.003332] ret_from_fork+0x10/0x20 [ 34.003384] [ 34.003416] Allocated by task 318: [ 34.003450] kasan_save_stack+0x3c/0x68 [ 34.003857] kasan_save_track+0x20/0x40 [ 34.003958] kasan_save_alloc_info+0x40/0x58 [ 34.003999] __kasan_kmalloc+0xd4/0xd8 [ 34.004483] __kmalloc_noprof+0x198/0x4c8 [ 34.004721] kunit_kmalloc_array+0x34/0x88 [ 34.004913] copy_user_test_oob+0xac/0xec8 [ 34.005086] kunit_try_run_case+0x170/0x3f0 [ 34.005150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.005310] kthread+0x328/0x630 [ 34.005375] ret_from_fork+0x10/0x20 [ 34.005416] [ 34.005439] The buggy address belongs to the object at fff00000c8dc5900 [ 34.005439] which belongs to the cache kmalloc-128 of size 128 [ 34.005565] The buggy address is located 0 bytes inside of [ 34.005565] allocated 120-byte region [fff00000c8dc5900, fff00000c8dc5978) [ 34.005877] [ 34.005904] The buggy address belongs to the physical page: [ 34.006279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5 [ 34.006542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.006872] page_type: f5(slab) [ 34.006935] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.006991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.007108] page dumped because: kasan: bad access detected [ 34.007342] [ 34.007457] Memory state around the buggy address: [ 34.007589] fff00000c8dc5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.007658] fff00000c8dc5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.007758] >fff00000c8dc5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.007806] ^ [ 34.007871] fff00000c8dc5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.007916] fff00000c8dc5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.007966] ==================================================================
[ 35.523170] ================================================================== [ 35.523264] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 35.523366] Write of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.523615] [ 35.523673] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.523935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.523978] Hardware name: linux,dummy-virt (DT) [ 35.524069] Call trace: [ 35.524125] show_stack+0x20/0x38 (C) [ 35.524270] dump_stack_lvl+0x8c/0xd0 [ 35.524394] print_report+0x118/0x608 [ 35.524490] kasan_report+0xdc/0x128 [ 35.524567] kasan_check_range+0x100/0x1a8 [ 35.524640] __kasan_check_write+0x20/0x30 [ 35.524722] copy_user_test_oob+0x234/0xec8 [ 35.524781] kunit_try_run_case+0x170/0x3f0 [ 35.524836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.524902] kthread+0x328/0x630 [ 35.524956] ret_from_fork+0x10/0x20 [ 35.525011] [ 35.525049] Allocated by task 316: [ 35.525082] kasan_save_stack+0x3c/0x68 [ 35.525139] kasan_save_track+0x20/0x40 [ 35.525199] kasan_save_alloc_info+0x40/0x58 [ 35.525249] __kasan_kmalloc+0xd4/0xd8 [ 35.525305] __kmalloc_noprof+0x198/0x4c8 [ 35.525362] kunit_kmalloc_array+0x34/0x88 [ 35.525403] copy_user_test_oob+0xac/0xec8 [ 35.525453] kunit_try_run_case+0x170/0x3f0 [ 35.525504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.525552] kthread+0x328/0x630 [ 35.525586] ret_from_fork+0x10/0x20 [ 35.525626] [ 35.525658] The buggy address belongs to the object at fff00000c988b100 [ 35.525658] which belongs to the cache kmalloc-128 of size 128 [ 35.525722] The buggy address is located 0 bytes inside of [ 35.525722] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.525798] [ 35.525822] The buggy address belongs to the physical page: [ 35.525868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.525928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.525989] page_type: f5(slab) [ 35.526033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.526097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.526141] page dumped because: kasan: bad access detected [ 35.526186] [ 35.526208] Memory state around the buggy address: [ 35.526243] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.526423] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.526819] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.526917] ^ [ 35.527152] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.527309] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.527382] ================================================================== [ 35.541800] ================================================================== [ 35.541859] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 35.541928] Write of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.541983] [ 35.542018] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.542107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.542175] Hardware name: linux,dummy-virt (DT) [ 35.542212] Call trace: [ 35.542237] show_stack+0x20/0x38 (C) [ 35.542312] dump_stack_lvl+0x8c/0xd0 [ 35.542381] print_report+0x118/0x608 [ 35.542431] kasan_report+0xdc/0x128 [ 35.542483] kasan_check_range+0x100/0x1a8 [ 35.542543] __kasan_check_write+0x20/0x30 [ 35.542776] copy_user_test_oob+0x35c/0xec8 [ 35.542846] kunit_try_run_case+0x170/0x3f0 [ 35.542901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.543035] kthread+0x328/0x630 [ 35.543084] ret_from_fork+0x10/0x20 [ 35.543263] [ 35.543334] Allocated by task 316: [ 35.543372] kasan_save_stack+0x3c/0x68 [ 35.543428] kasan_save_track+0x20/0x40 [ 35.543565] kasan_save_alloc_info+0x40/0x58 [ 35.543652] __kasan_kmalloc+0xd4/0xd8 [ 35.543693] __kmalloc_noprof+0x198/0x4c8 [ 35.543733] kunit_kmalloc_array+0x34/0x88 [ 35.543789] copy_user_test_oob+0xac/0xec8 [ 35.543831] kunit_try_run_case+0x170/0x3f0 [ 35.544165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.544262] kthread+0x328/0x630 [ 35.544317] ret_from_fork+0x10/0x20 [ 35.544578] [ 35.544602] The buggy address belongs to the object at fff00000c988b100 [ 35.544602] which belongs to the cache kmalloc-128 of size 128 [ 35.544667] The buggy address is located 0 bytes inside of [ 35.544667] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.544732] [ 35.544762] The buggy address belongs to the physical page: [ 35.544809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.544863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.544915] page_type: f5(slab) [ 35.544958] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.545023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.545066] page dumped because: kasan: bad access detected [ 35.545101] [ 35.545131] Memory state around the buggy address: [ 35.545177] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.545223] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.545269] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.545311] ^ [ 35.545353] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.545510] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.545662] ================================================================== [ 35.552067] ================================================================== [ 35.552137] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 35.552205] Write of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.552258] [ 35.552466] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.552571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.552705] Hardware name: linux,dummy-virt (DT) [ 35.552762] Call trace: [ 35.552843] show_stack+0x20/0x38 (C) [ 35.552902] dump_stack_lvl+0x8c/0xd0 [ 35.553008] print_report+0x118/0x608 [ 35.553084] kasan_report+0xdc/0x128 [ 35.553146] kasan_check_range+0x100/0x1a8 [ 35.553237] __kasan_check_write+0x20/0x30 [ 35.553293] copy_user_test_oob+0x434/0xec8 [ 35.553361] kunit_try_run_case+0x170/0x3f0 [ 35.553411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.553477] kthread+0x328/0x630 [ 35.553539] ret_from_fork+0x10/0x20 [ 35.553590] [ 35.553611] Allocated by task 316: [ 35.553642] kasan_save_stack+0x3c/0x68 [ 35.553898] kasan_save_track+0x20/0x40 [ 35.553967] kasan_save_alloc_info+0x40/0x58 [ 35.554016] __kasan_kmalloc+0xd4/0xd8 [ 35.554064] __kmalloc_noprof+0x198/0x4c8 [ 35.554121] kunit_kmalloc_array+0x34/0x88 [ 35.554177] copy_user_test_oob+0xac/0xec8 [ 35.554224] kunit_try_run_case+0x170/0x3f0 [ 35.554272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.554327] kthread+0x328/0x630 [ 35.554365] ret_from_fork+0x10/0x20 [ 35.554404] [ 35.554427] The buggy address belongs to the object at fff00000c988b100 [ 35.554427] which belongs to the cache kmalloc-128 of size 128 [ 35.554506] The buggy address is located 0 bytes inside of [ 35.554506] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.554575] [ 35.554598] The buggy address belongs to the physical page: [ 35.554632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.554686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.554738] page_type: f5(slab) [ 35.554778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.554832] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.554875] page dumped because: kasan: bad access detected [ 35.554909] [ 35.554930] Memory state around the buggy address: [ 35.554975] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.555022] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.555067] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.555108] ^ [ 35.555148] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.555206] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.555247] ================================================================== [ 35.531267] ================================================================== [ 35.531321] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 35.531374] Read of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.531464] [ 35.531525] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.531656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.531706] Hardware name: linux,dummy-virt (DT) [ 35.531760] Call trace: [ 35.531828] show_stack+0x20/0x38 (C) [ 35.531906] dump_stack_lvl+0x8c/0xd0 [ 35.531970] print_report+0x118/0x608 [ 35.532020] kasan_report+0xdc/0x128 [ 35.532069] kasan_check_range+0x100/0x1a8 [ 35.532115] __kasan_check_read+0x20/0x30 [ 35.532175] copy_user_test_oob+0x728/0xec8 [ 35.532226] kunit_try_run_case+0x170/0x3f0 [ 35.532519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.532609] kthread+0x328/0x630 [ 35.532833] ret_from_fork+0x10/0x20 [ 35.532975] [ 35.533062] Allocated by task 316: [ 35.533120] kasan_save_stack+0x3c/0x68 [ 35.533233] kasan_save_track+0x20/0x40 [ 35.533291] kasan_save_alloc_info+0x40/0x58 [ 35.533358] __kasan_kmalloc+0xd4/0xd8 [ 35.533456] __kmalloc_noprof+0x198/0x4c8 [ 35.533538] kunit_kmalloc_array+0x34/0x88 [ 35.533637] copy_user_test_oob+0xac/0xec8 [ 35.533703] kunit_try_run_case+0x170/0x3f0 [ 35.533744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.534037] kthread+0x328/0x630 [ 35.534097] ret_from_fork+0x10/0x20 [ 35.534199] [ 35.534258] The buggy address belongs to the object at fff00000c988b100 [ 35.534258] which belongs to the cache kmalloc-128 of size 128 [ 35.534349] The buggy address is located 0 bytes inside of [ 35.534349] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.534640] [ 35.534687] The buggy address belongs to the physical page: [ 35.534772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.534859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.534913] page_type: f5(slab) [ 35.534954] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.535274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.535351] page dumped because: kasan: bad access detected [ 35.535395] [ 35.535682] Memory state around the buggy address: [ 35.535746] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.535794] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.535855] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.535897] ^ [ 35.536272] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.536369] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.536441] ================================================================== [ 35.546552] ================================================================== [ 35.546628] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 35.546681] Read of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.546750] [ 35.546799] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.546958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.546998] Hardware name: linux,dummy-virt (DT) [ 35.547033] Call trace: [ 35.547083] show_stack+0x20/0x38 (C) [ 35.547236] dump_stack_lvl+0x8c/0xd0 [ 35.547296] print_report+0x118/0x608 [ 35.547388] kasan_report+0xdc/0x128 [ 35.547553] kasan_check_range+0x100/0x1a8 [ 35.547634] __kasan_check_read+0x20/0x30 [ 35.547711] copy_user_test_oob+0x3c8/0xec8 [ 35.547780] kunit_try_run_case+0x170/0x3f0 [ 35.547852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.547909] kthread+0x328/0x630 [ 35.547986] ret_from_fork+0x10/0x20 [ 35.548037] [ 35.548276] Allocated by task 316: [ 35.548338] kasan_save_stack+0x3c/0x68 [ 35.548434] kasan_save_track+0x20/0x40 [ 35.548546] kasan_save_alloc_info+0x40/0x58 [ 35.548615] __kasan_kmalloc+0xd4/0xd8 [ 35.548917] __kmalloc_noprof+0x198/0x4c8 [ 35.549004] kunit_kmalloc_array+0x34/0x88 [ 35.549108] copy_user_test_oob+0xac/0xec8 [ 35.549205] kunit_try_run_case+0x170/0x3f0 [ 35.549278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.549362] kthread+0x328/0x630 [ 35.549429] ret_from_fork+0x10/0x20 [ 35.549552] [ 35.549595] The buggy address belongs to the object at fff00000c988b100 [ 35.549595] which belongs to the cache kmalloc-128 of size 128 [ 35.549658] The buggy address is located 0 bytes inside of [ 35.549658] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.549737] [ 35.550051] The buggy address belongs to the physical page: [ 35.550118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.550342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.550481] page_type: f5(slab) [ 35.550586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.550663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.550726] page dumped because: kasan: bad access detected [ 35.550819] [ 35.550840] Memory state around the buggy address: [ 35.550874] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.550945] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.551192] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.551237] ^ [ 35.551680] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.551783] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.551862] ================================================================== [ 35.555369] ================================================================== [ 35.555414] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 35.555866] Read of size 121 at addr fff00000c988b100 by task kunit_try_catch/316 [ 35.555953] [ 35.555994] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 35.556358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.556424] Hardware name: linux,dummy-virt (DT) [ 35.556458] Call trace: [ 35.556547] show_stack+0x20/0x38 (C) [ 35.556612] dump_stack_lvl+0x8c/0xd0 [ 35.556685] print_report+0x118/0x608 [ 35.556795] kasan_report+0xdc/0x128 [ 35.556927] kasan_check_range+0x100/0x1a8 [ 35.556994] __kasan_check_read+0x20/0x30 [ 35.557069] copy_user_test_oob+0x4a0/0xec8 [ 35.557172] kunit_try_run_case+0x170/0x3f0 [ 35.557242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.557325] kthread+0x328/0x630 [ 35.557370] ret_from_fork+0x10/0x20 [ 35.557420] [ 35.557440] Allocated by task 316: [ 35.557621] kasan_save_stack+0x3c/0x68 [ 35.557679] kasan_save_track+0x20/0x40 [ 35.557719] kasan_save_alloc_info+0x40/0x58 [ 35.557802] __kasan_kmalloc+0xd4/0xd8 [ 35.557880] __kmalloc_noprof+0x198/0x4c8 [ 35.557992] kunit_kmalloc_array+0x34/0x88 [ 35.558070] copy_user_test_oob+0xac/0xec8 [ 35.558375] kunit_try_run_case+0x170/0x3f0 [ 35.558476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.558525] kthread+0x328/0x630 [ 35.558828] ret_from_fork+0x10/0x20 [ 35.558927] [ 35.559020] The buggy address belongs to the object at fff00000c988b100 [ 35.559020] which belongs to the cache kmalloc-128 of size 128 [ 35.559109] The buggy address is located 0 bytes inside of [ 35.559109] allocated 120-byte region [fff00000c988b100, fff00000c988b178) [ 35.559431] [ 35.559516] The buggy address belongs to the physical page: [ 35.559626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10988b [ 35.559703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.559754] page_type: f5(slab) [ 35.559819] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.559873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.560085] page dumped because: kasan: bad access detected [ 35.560299] [ 35.560347] Memory state around the buggy address: [ 35.560394] fff00000c988b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.560468] fff00000c988b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.560734] >fff00000c988b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.560907] ^ [ 35.560971] fff00000c988b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.561029] fff00000c988b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.561096] ==================================================================
[ 27.261630] ================================================================== [ 27.262033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 27.262421] Read of size 121 at addr ffff88810255ef00 by task kunit_try_catch/334 [ 27.262762] [ 27.262855] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.262910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.262948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.262975] Call Trace: [ 27.262999] <TASK> [ 27.263024] dump_stack_lvl+0x73/0xb0 [ 27.263057] print_report+0xd1/0x650 [ 27.263093] ? __virt_addr_valid+0x1db/0x2d0 [ 27.263120] ? copy_user_test_oob+0x604/0x10f0 [ 27.263169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.263213] ? copy_user_test_oob+0x604/0x10f0 [ 27.263254] kasan_report+0x141/0x180 [ 27.263292] ? copy_user_test_oob+0x604/0x10f0 [ 27.263336] kasan_check_range+0x10c/0x1c0 [ 27.263389] __kasan_check_read+0x15/0x20 [ 27.263429] copy_user_test_oob+0x604/0x10f0 [ 27.263456] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.263481] ? finish_task_switch.isra.0+0x153/0x700 [ 27.263522] ? __switch_to+0x47/0xf50 [ 27.263551] ? __schedule+0x10cc/0x2b60 [ 27.263574] ? __pfx_read_tsc+0x10/0x10 [ 27.263598] ? ktime_get_ts64+0x86/0x230 [ 27.263627] kunit_try_run_case+0x1a5/0x480 [ 27.263656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.263682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.263705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.263732] ? __kthread_parkme+0x82/0x180 [ 27.263773] ? preempt_count_sub+0x50/0x80 [ 27.263799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.263827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.263855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.263882] kthread+0x337/0x6f0 [ 27.263905] ? trace_preempt_on+0x20/0xc0 [ 27.263970] ? __pfx_kthread+0x10/0x10 [ 27.263994] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.264022] ? calculate_sigpending+0x7b/0xa0 [ 27.264049] ? __pfx_kthread+0x10/0x10 [ 27.264082] ret_from_fork+0x116/0x1d0 [ 27.264105] ? __pfx_kthread+0x10/0x10 [ 27.264127] ret_from_fork_asm+0x1a/0x30 [ 27.264162] </TASK> [ 27.264178] [ 27.274623] Allocated by task 334: [ 27.274788] kasan_save_stack+0x45/0x70 [ 27.275404] kasan_save_track+0x18/0x40 [ 27.276042] kasan_save_alloc_info+0x3b/0x50 [ 27.276648] __kasan_kmalloc+0xb7/0xc0 [ 27.277201] __kmalloc_noprof+0x1c9/0x500 [ 27.277772] kunit_kmalloc_array+0x25/0x60 [ 27.278429] copy_user_test_oob+0xab/0x10f0 [ 27.278988] kunit_try_run_case+0x1a5/0x480 [ 27.279564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.280283] kthread+0x337/0x6f0 [ 27.280733] ret_from_fork+0x116/0x1d0 [ 27.280873] ret_from_fork_asm+0x1a/0x30 [ 27.281438] [ 27.281739] The buggy address belongs to the object at ffff88810255ef00 [ 27.281739] which belongs to the cache kmalloc-128 of size 128 [ 27.282502] The buggy address is located 0 bytes inside of [ 27.282502] allocated 120-byte region [ffff88810255ef00, ffff88810255ef78) [ 27.282852] [ 27.282924] The buggy address belongs to the physical page: [ 27.283814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e [ 27.284835] flags: 0x200000000000000(node=0|zone=2) [ 27.285454] page_type: f5(slab) [ 27.285907] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.286675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.286908] page dumped because: kasan: bad access detected [ 27.287755] [ 27.288056] Memory state around the buggy address: [ 27.288715] ffff88810255ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.289212] ffff88810255ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289434] >ffff88810255ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.289643] ^ [ 27.289857] ffff88810255ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.290903] ffff88810255f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.291733] ================================================================== [ 27.242674] ================================================================== [ 27.243088] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 27.243616] Write of size 121 at addr ffff88810255ef00 by task kunit_try_catch/334 [ 27.243926] [ 27.244043] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.244110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.244126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.244152] Call Trace: [ 27.244175] <TASK> [ 27.244198] dump_stack_lvl+0x73/0xb0 [ 27.244229] print_report+0xd1/0x650 [ 27.244254] ? __virt_addr_valid+0x1db/0x2d0 [ 27.244280] ? copy_user_test_oob+0x557/0x10f0 [ 27.244305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.244333] ? copy_user_test_oob+0x557/0x10f0 [ 27.244358] kasan_report+0x141/0x180 [ 27.244383] ? copy_user_test_oob+0x557/0x10f0 [ 27.244412] kasan_check_range+0x10c/0x1c0 [ 27.244438] __kasan_check_write+0x18/0x20 [ 27.244463] copy_user_test_oob+0x557/0x10f0 [ 27.244490] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.244515] ? finish_task_switch.isra.0+0x153/0x700 [ 27.244540] ? __switch_to+0x47/0xf50 [ 27.244568] ? __schedule+0x10cc/0x2b60 [ 27.244592] ? __pfx_read_tsc+0x10/0x10 [ 27.244617] ? ktime_get_ts64+0x86/0x230 [ 27.244644] kunit_try_run_case+0x1a5/0x480 [ 27.244672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.244698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.244723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.244747] ? __kthread_parkme+0x82/0x180 [ 27.244770] ? preempt_count_sub+0x50/0x80 [ 27.244795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.244822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.244850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.244877] kthread+0x337/0x6f0 [ 27.244899] ? trace_preempt_on+0x20/0xc0 [ 27.244925] ? __pfx_kthread+0x10/0x10 [ 27.244948] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.244975] ? calculate_sigpending+0x7b/0xa0 [ 27.245001] ? __pfx_kthread+0x10/0x10 [ 27.245025] ret_from_fork+0x116/0x1d0 [ 27.245047] ? __pfx_kthread+0x10/0x10 [ 27.245114] ret_from_fork_asm+0x1a/0x30 [ 27.245149] </TASK> [ 27.245164] [ 27.252721] Allocated by task 334: [ 27.252936] kasan_save_stack+0x45/0x70 [ 27.253124] kasan_save_track+0x18/0x40 [ 27.253318] kasan_save_alloc_info+0x3b/0x50 [ 27.253524] __kasan_kmalloc+0xb7/0xc0 [ 27.253654] __kmalloc_noprof+0x1c9/0x500 [ 27.253799] kunit_kmalloc_array+0x25/0x60 [ 27.253972] copy_user_test_oob+0xab/0x10f0 [ 27.254128] kunit_try_run_case+0x1a5/0x480 [ 27.254275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.254516] kthread+0x337/0x6f0 [ 27.254688] ret_from_fork+0x116/0x1d0 [ 27.254905] ret_from_fork_asm+0x1a/0x30 [ 27.255163] [ 27.255276] The buggy address belongs to the object at ffff88810255ef00 [ 27.255276] which belongs to the cache kmalloc-128 of size 128 [ 27.255825] The buggy address is located 0 bytes inside of [ 27.255825] allocated 120-byte region [ffff88810255ef00, ffff88810255ef78) [ 27.256375] [ 27.256490] The buggy address belongs to the physical page: [ 27.256736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e [ 27.257176] flags: 0x200000000000000(node=0|zone=2) [ 27.257479] page_type: f5(slab) [ 27.257693] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.258113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.258456] page dumped because: kasan: bad access detected [ 27.258725] [ 27.258822] Memory state around the buggy address: [ 27.259087] ffff88810255ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.259414] ffff88810255ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.259740] >ffff88810255ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.260098] ^ [ 27.260365] ffff88810255ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.260586] ffff88810255f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.260803] ================================================================== [ 27.224057] ================================================================== [ 27.224462] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 27.224811] Read of size 121 at addr ffff88810255ef00 by task kunit_try_catch/334 [ 27.225160] [ 27.225303] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.225357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.225372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.225399] Call Trace: [ 27.225441] <TASK> [ 27.225463] dump_stack_lvl+0x73/0xb0 [ 27.225495] print_report+0xd1/0x650 [ 27.225520] ? __virt_addr_valid+0x1db/0x2d0 [ 27.225546] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.225572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.225619] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.225645] kasan_report+0x141/0x180 [ 27.225670] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.225699] kasan_check_range+0x10c/0x1c0 [ 27.225725] __kasan_check_read+0x15/0x20 [ 27.225750] copy_user_test_oob+0x4aa/0x10f0 [ 27.225778] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.225825] ? finish_task_switch.isra.0+0x153/0x700 [ 27.225850] ? __switch_to+0x47/0xf50 [ 27.225880] ? __schedule+0x10cc/0x2b60 [ 27.225905] ? __pfx_read_tsc+0x10/0x10 [ 27.225950] ? ktime_get_ts64+0x86/0x230 [ 27.225996] kunit_try_run_case+0x1a5/0x480 [ 27.226026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.226052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.226085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.226109] ? __kthread_parkme+0x82/0x180 [ 27.226132] ? preempt_count_sub+0x50/0x80 [ 27.226158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.226204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.226231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.226259] kthread+0x337/0x6f0 [ 27.226281] ? trace_preempt_on+0x20/0xc0 [ 27.226307] ? __pfx_kthread+0x10/0x10 [ 27.226331] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.226375] ? calculate_sigpending+0x7b/0xa0 [ 27.226402] ? __pfx_kthread+0x10/0x10 [ 27.226427] ret_from_fork+0x116/0x1d0 [ 27.226448] ? __pfx_kthread+0x10/0x10 [ 27.226488] ret_from_fork_asm+0x1a/0x30 [ 27.226522] </TASK> [ 27.226536] [ 27.234112] Allocated by task 334: [ 27.234281] kasan_save_stack+0x45/0x70 [ 27.234489] kasan_save_track+0x18/0x40 [ 27.234689] kasan_save_alloc_info+0x3b/0x50 [ 27.234884] __kasan_kmalloc+0xb7/0xc0 [ 27.235121] __kmalloc_noprof+0x1c9/0x500 [ 27.235316] kunit_kmalloc_array+0x25/0x60 [ 27.235468] copy_user_test_oob+0xab/0x10f0 [ 27.235609] kunit_try_run_case+0x1a5/0x480 [ 27.235750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.235929] kthread+0x337/0x6f0 [ 27.236045] ret_from_fork+0x116/0x1d0 [ 27.236247] ret_from_fork_asm+0x1a/0x30 [ 27.236448] [ 27.236545] The buggy address belongs to the object at ffff88810255ef00 [ 27.236545] which belongs to the cache kmalloc-128 of size 128 [ 27.237171] The buggy address is located 0 bytes inside of [ 27.237171] allocated 120-byte region [ffff88810255ef00, ffff88810255ef78) [ 27.237700] [ 27.237772] The buggy address belongs to the physical page: [ 27.237975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e [ 27.238222] flags: 0x200000000000000(node=0|zone=2) [ 27.238383] page_type: f5(slab) [ 27.238501] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.238726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.239080] page dumped because: kasan: bad access detected [ 27.239360] [ 27.239473] Memory state around the buggy address: [ 27.239740] ffff88810255ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.240165] ffff88810255ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.240545] >ffff88810255ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.240901] ^ [ 27.241257] ffff88810255ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.241605] ffff88810255f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.241957] ================================================================== [ 27.205967] ================================================================== [ 27.206360] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 27.206677] Write of size 121 at addr ffff88810255ef00 by task kunit_try_catch/334 [ 27.207008] [ 27.207123] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.207179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.207195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.207221] Call Trace: [ 27.207238] <TASK> [ 27.207260] dump_stack_lvl+0x73/0xb0 [ 27.207292] print_report+0xd1/0x650 [ 27.207317] ? __virt_addr_valid+0x1db/0x2d0 [ 27.207345] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.207371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.207400] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.207426] kasan_report+0x141/0x180 [ 27.207450] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.207480] kasan_check_range+0x10c/0x1c0 [ 27.207506] __kasan_check_write+0x18/0x20 [ 27.207531] copy_user_test_oob+0x3fd/0x10f0 [ 27.207558] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.207583] ? finish_task_switch.isra.0+0x153/0x700 [ 27.207608] ? __switch_to+0x47/0xf50 [ 27.207637] ? __schedule+0x10cc/0x2b60 [ 27.207663] ? __pfx_read_tsc+0x10/0x10 [ 27.207688] ? ktime_get_ts64+0x86/0x230 [ 27.207716] kunit_try_run_case+0x1a5/0x480 [ 27.207744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.207771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.207795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.207820] ? __kthread_parkme+0x82/0x180 [ 27.207843] ? preempt_count_sub+0x50/0x80 [ 27.207869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.207896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.207947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.207976] kthread+0x337/0x6f0 [ 27.207998] ? trace_preempt_on+0x20/0xc0 [ 27.208024] ? __pfx_kthread+0x10/0x10 [ 27.208047] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.208082] ? calculate_sigpending+0x7b/0xa0 [ 27.208109] ? __pfx_kthread+0x10/0x10 [ 27.208133] ret_from_fork+0x116/0x1d0 [ 27.208155] ? __pfx_kthread+0x10/0x10 [ 27.208178] ret_from_fork_asm+0x1a/0x30 [ 27.208211] </TASK> [ 27.208226] [ 27.215179] Allocated by task 334: [ 27.215367] kasan_save_stack+0x45/0x70 [ 27.215568] kasan_save_track+0x18/0x40 [ 27.215761] kasan_save_alloc_info+0x3b/0x50 [ 27.215987] __kasan_kmalloc+0xb7/0xc0 [ 27.216133] __kmalloc_noprof+0x1c9/0x500 [ 27.216281] kunit_kmalloc_array+0x25/0x60 [ 27.216428] copy_user_test_oob+0xab/0x10f0 [ 27.216636] kunit_try_run_case+0x1a5/0x480 [ 27.216865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.217184] kthread+0x337/0x6f0 [ 27.217359] ret_from_fork+0x116/0x1d0 [ 27.217564] ret_from_fork_asm+0x1a/0x30 [ 27.217760] [ 27.217882] The buggy address belongs to the object at ffff88810255ef00 [ 27.217882] which belongs to the cache kmalloc-128 of size 128 [ 27.218419] The buggy address is located 0 bytes inside of [ 27.218419] allocated 120-byte region [ffff88810255ef00, ffff88810255ef78) [ 27.218983] [ 27.219109] The buggy address belongs to the physical page: [ 27.219369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e [ 27.219729] flags: 0x200000000000000(node=0|zone=2) [ 27.220016] page_type: f5(slab) [ 27.220206] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.220471] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.220704] page dumped because: kasan: bad access detected [ 27.220874] [ 27.221023] Memory state around the buggy address: [ 27.221267] ffff88810255ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.221609] ffff88810255ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.221997] >ffff88810255ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.222332] ^ [ 27.222675] ffff88810255ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.223001] ffff88810255f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.223334] ==================================================================
[ 27.006731] ================================================================== [ 27.007678] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 27.008067] Read of size 121 at addr ffff888105898a00 by task kunit_try_catch/333 [ 27.008775] [ 27.008897] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.009073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.009090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.009114] Call Trace: [ 27.009135] <TASK> [ 27.009154] dump_stack_lvl+0x73/0xb0 [ 27.009186] print_report+0xd1/0x650 [ 27.009210] ? __virt_addr_valid+0x1db/0x2d0 [ 27.009235] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.009259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.009286] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.009324] kasan_report+0x141/0x180 [ 27.009347] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.009375] kasan_check_range+0x10c/0x1c0 [ 27.009399] __kasan_check_read+0x15/0x20 [ 27.009682] copy_user_test_oob+0x4aa/0x10f0 [ 27.009708] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.009732] ? finish_task_switch.isra.0+0x153/0x700 [ 27.009763] ? __switch_to+0x47/0xf50 [ 27.009789] ? __schedule+0x10cc/0x2b60 [ 27.009813] ? __pfx_read_tsc+0x10/0x10 [ 27.009836] ? ktime_get_ts64+0x86/0x230 [ 27.009863] kunit_try_run_case+0x1a5/0x480 [ 27.009890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.009915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.009938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.009961] ? __kthread_parkme+0x82/0x180 [ 27.009984] ? preempt_count_sub+0x50/0x80 [ 27.010008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.010034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.010060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.010086] kthread+0x337/0x6f0 [ 27.010106] ? trace_preempt_on+0x20/0xc0 [ 27.010132] ? __pfx_kthread+0x10/0x10 [ 27.010153] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.010178] ? calculate_sigpending+0x7b/0xa0 [ 27.010203] ? __pfx_kthread+0x10/0x10 [ 27.010226] ret_from_fork+0x116/0x1d0 [ 27.010247] ? __pfx_kthread+0x10/0x10 [ 27.010269] ret_from_fork_asm+0x1a/0x30 [ 27.010302] </TASK> [ 27.010325] [ 27.019577] Allocated by task 333: [ 27.019735] kasan_save_stack+0x45/0x70 [ 27.019939] kasan_save_track+0x18/0x40 [ 27.020112] kasan_save_alloc_info+0x3b/0x50 [ 27.020301] __kasan_kmalloc+0xb7/0xc0 [ 27.020459] __kmalloc_noprof+0x1c9/0x500 [ 27.021093] kunit_kmalloc_array+0x25/0x60 [ 27.021272] copy_user_test_oob+0xab/0x10f0 [ 27.021666] kunit_try_run_case+0x1a5/0x480 [ 27.021879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.022237] kthread+0x337/0x6f0 [ 27.022496] ret_from_fork+0x116/0x1d0 [ 27.022641] ret_from_fork_asm+0x1a/0x30 [ 27.022843] [ 27.023093] The buggy address belongs to the object at ffff888105898a00 [ 27.023093] which belongs to the cache kmalloc-128 of size 128 [ 27.023589] The buggy address is located 0 bytes inside of [ 27.023589] allocated 120-byte region [ffff888105898a00, ffff888105898a78) [ 27.024227] [ 27.024341] The buggy address belongs to the physical page: [ 27.024585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898 [ 27.024903] flags: 0x200000000000000(node=0|zone=2) [ 27.025119] page_type: f5(slab) [ 27.025268] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.025900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.026175] page dumped because: kasan: bad access detected [ 27.026520] [ 27.026632] Memory state around the buggy address: [ 27.026919] ffff888105898900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.027252] ffff888105898980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.027677] >ffff888105898a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.027975] ^ [ 27.028393] ffff888105898a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.028745] ffff888105898b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.029114] ================================================================== [ 26.989092] ================================================================== [ 26.989469] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 26.989851] Write of size 121 at addr ffff888105898a00 by task kunit_try_catch/333 [ 26.990182] [ 26.990314] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 26.990367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.990382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.990408] Call Trace: [ 26.990423] <TASK> [ 26.990443] dump_stack_lvl+0x73/0xb0 [ 26.990475] print_report+0xd1/0x650 [ 26.990529] ? __virt_addr_valid+0x1db/0x2d0 [ 26.990554] ? copy_user_test_oob+0x3fd/0x10f0 [ 26.990578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.990606] ? copy_user_test_oob+0x3fd/0x10f0 [ 26.990630] kasan_report+0x141/0x180 [ 26.990653] ? copy_user_test_oob+0x3fd/0x10f0 [ 26.990682] kasan_check_range+0x10c/0x1c0 [ 26.990705] __kasan_check_write+0x18/0x20 [ 26.990729] copy_user_test_oob+0x3fd/0x10f0 [ 26.990755] ? __pfx_copy_user_test_oob+0x10/0x10 [ 26.990778] ? finish_task_switch.isra.0+0x153/0x700 [ 26.990802] ? __switch_to+0x47/0xf50 [ 26.990830] ? __schedule+0x10cc/0x2b60 [ 26.990853] ? __pfx_read_tsc+0x10/0x10 [ 26.990877] ? ktime_get_ts64+0x86/0x230 [ 26.990904] kunit_try_run_case+0x1a5/0x480 [ 26.990931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.990954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.990978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.991001] ? __kthread_parkme+0x82/0x180 [ 26.991023] ? preempt_count_sub+0x50/0x80 [ 26.991047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.991073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.991099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.991125] kthread+0x337/0x6f0 [ 26.991146] ? trace_preempt_on+0x20/0xc0 [ 26.991170] ? __pfx_kthread+0x10/0x10 [ 26.991192] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.991217] ? calculate_sigpending+0x7b/0xa0 [ 26.991242] ? __pfx_kthread+0x10/0x10 [ 26.991265] ret_from_fork+0x116/0x1d0 [ 26.991285] ? __pfx_kthread+0x10/0x10 [ 26.991317] ret_from_fork_asm+0x1a/0x30 [ 26.991350] </TASK> [ 26.991364] [ 26.998258] Allocated by task 333: [ 26.998394] kasan_save_stack+0x45/0x70 [ 26.998656] kasan_save_track+0x18/0x40 [ 26.998843] kasan_save_alloc_info+0x3b/0x50 [ 26.999047] __kasan_kmalloc+0xb7/0xc0 [ 26.999228] __kmalloc_noprof+0x1c9/0x500 [ 26.999412] kunit_kmalloc_array+0x25/0x60 [ 26.999720] copy_user_test_oob+0xab/0x10f0 [ 26.999877] kunit_try_run_case+0x1a5/0x480 [ 27.000064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.000236] kthread+0x337/0x6f0 [ 27.000389] ret_from_fork+0x116/0x1d0 [ 27.000579] ret_from_fork_asm+0x1a/0x30 [ 27.000783] [ 27.000969] The buggy address belongs to the object at ffff888105898a00 [ 27.000969] which belongs to the cache kmalloc-128 of size 128 [ 27.001414] The buggy address is located 0 bytes inside of [ 27.001414] allocated 120-byte region [ffff888105898a00, ffff888105898a78) [ 27.001767] [ 27.001946] The buggy address belongs to the physical page: [ 27.002193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898 [ 27.002559] flags: 0x200000000000000(node=0|zone=2) [ 27.002787] page_type: f5(slab) [ 27.002936] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.003184] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.003482] page dumped because: kasan: bad access detected [ 27.003736] [ 27.003814] Memory state around the buggy address: [ 27.003965] ffff888105898900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.004175] ffff888105898980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.004448] >ffff888105898a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.004924] ^ [ 27.005503] ffff888105898a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.005813] ffff888105898b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.006086] ================================================================== [ 27.051512] ================================================================== [ 27.051816] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 27.052555] Read of size 121 at addr ffff888105898a00 by task kunit_try_catch/333 [ 27.053005] [ 27.053234] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.053287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.053302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.053336] Call Trace: [ 27.053352] <TASK> [ 27.053425] dump_stack_lvl+0x73/0xb0 [ 27.053458] print_report+0xd1/0x650 [ 27.053481] ? __virt_addr_valid+0x1db/0x2d0 [ 27.053506] ? copy_user_test_oob+0x604/0x10f0 [ 27.053530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.053557] ? copy_user_test_oob+0x604/0x10f0 [ 27.053580] kasan_report+0x141/0x180 [ 27.053603] ? copy_user_test_oob+0x604/0x10f0 [ 27.053631] kasan_check_range+0x10c/0x1c0 [ 27.053656] __kasan_check_read+0x15/0x20 [ 27.053681] copy_user_test_oob+0x604/0x10f0 [ 27.053707] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.053731] ? finish_task_switch.isra.0+0x153/0x700 [ 27.053763] ? __switch_to+0x47/0xf50 [ 27.053790] ? __schedule+0x10cc/0x2b60 [ 27.053812] ? __pfx_read_tsc+0x10/0x10 [ 27.053835] ? ktime_get_ts64+0x86/0x230 [ 27.053859] kunit_try_run_case+0x1a5/0x480 [ 27.053885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.053912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.053935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.053958] ? __kthread_parkme+0x82/0x180 [ 27.053980] ? preempt_count_sub+0x50/0x80 [ 27.054004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.054030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.054055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.054081] kthread+0x337/0x6f0 [ 27.054103] ? trace_preempt_on+0x20/0xc0 [ 27.054127] ? __pfx_kthread+0x10/0x10 [ 27.054148] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.054173] ? calculate_sigpending+0x7b/0xa0 [ 27.054197] ? __pfx_kthread+0x10/0x10 [ 27.054220] ret_from_fork+0x116/0x1d0 [ 27.054240] ? __pfx_kthread+0x10/0x10 [ 27.054262] ret_from_fork_asm+0x1a/0x30 [ 27.054294] </TASK> [ 27.054318] [ 27.063587] Allocated by task 333: [ 27.063848] kasan_save_stack+0x45/0x70 [ 27.064110] kasan_save_track+0x18/0x40 [ 27.064260] kasan_save_alloc_info+0x3b/0x50 [ 27.064488] __kasan_kmalloc+0xb7/0xc0 [ 27.064800] __kmalloc_noprof+0x1c9/0x500 [ 27.064988] kunit_kmalloc_array+0x25/0x60 [ 27.065170] copy_user_test_oob+0xab/0x10f0 [ 27.065374] kunit_try_run_case+0x1a5/0x480 [ 27.065818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.066038] kthread+0x337/0x6f0 [ 27.066204] ret_from_fork+0x116/0x1d0 [ 27.066558] ret_from_fork_asm+0x1a/0x30 [ 27.066786] [ 27.066878] The buggy address belongs to the object at ffff888105898a00 [ 27.066878] which belongs to the cache kmalloc-128 of size 128 [ 27.067464] The buggy address is located 0 bytes inside of [ 27.067464] allocated 120-byte region [ffff888105898a00, ffff888105898a78) [ 27.068164] [ 27.068392] The buggy address belongs to the physical page: [ 27.068661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898 [ 27.068972] flags: 0x200000000000000(node=0|zone=2) [ 27.069191] page_type: f5(slab) [ 27.069349] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.069935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.070303] page dumped because: kasan: bad access detected [ 27.070553] [ 27.070659] Memory state around the buggy address: [ 27.071029] ffff888105898900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.071294] ffff888105898980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.071754] >ffff888105898a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.072121] ^ [ 27.072498] ffff888105898a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.072757] ffff888105898b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.073143] ================================================================== [ 27.030232] ================================================================== [ 27.030598] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 27.030919] Write of size 121 at addr ffff888105898a00 by task kunit_try_catch/333 [ 27.031224] [ 27.031327] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 27.031376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.031391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.031414] Call Trace: [ 27.031428] <TASK> [ 27.031446] dump_stack_lvl+0x73/0xb0 [ 27.031474] print_report+0xd1/0x650 [ 27.031713] ? __virt_addr_valid+0x1db/0x2d0 [ 27.031743] ? copy_user_test_oob+0x557/0x10f0 [ 27.031866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.031899] ? copy_user_test_oob+0x557/0x10f0 [ 27.031924] kasan_report+0x141/0x180 [ 27.031948] ? copy_user_test_oob+0x557/0x10f0 [ 27.031977] kasan_check_range+0x10c/0x1c0 [ 27.032001] __kasan_check_write+0x18/0x20 [ 27.032025] copy_user_test_oob+0x557/0x10f0 [ 27.032051] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.032074] ? finish_task_switch.isra.0+0x153/0x700 [ 27.032099] ? __switch_to+0x47/0xf50 [ 27.032126] ? __schedule+0x10cc/0x2b60 [ 27.032148] ? __pfx_read_tsc+0x10/0x10 [ 27.032171] ? ktime_get_ts64+0x86/0x230 [ 27.032198] kunit_try_run_case+0x1a5/0x480 [ 27.032224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.032248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.032272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.032295] ? __kthread_parkme+0x82/0x180 [ 27.032330] ? preempt_count_sub+0x50/0x80 [ 27.032354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.032380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.032405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.032431] kthread+0x337/0x6f0 [ 27.032452] ? trace_preempt_on+0x20/0xc0 [ 27.032477] ? __pfx_kthread+0x10/0x10 [ 27.032513] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.032538] ? calculate_sigpending+0x7b/0xa0 [ 27.032564] ? __pfx_kthread+0x10/0x10 [ 27.032587] ret_from_fork+0x116/0x1d0 [ 27.032607] ? __pfx_kthread+0x10/0x10 [ 27.032629] ret_from_fork_asm+0x1a/0x30 [ 27.032661] </TASK> [ 27.032674] [ 27.041703] Allocated by task 333: [ 27.041872] kasan_save_stack+0x45/0x70 [ 27.042046] kasan_save_track+0x18/0x40 [ 27.042203] kasan_save_alloc_info+0x3b/0x50 [ 27.042410] __kasan_kmalloc+0xb7/0xc0 [ 27.042563] __kmalloc_noprof+0x1c9/0x500 [ 27.043067] kunit_kmalloc_array+0x25/0x60 [ 27.043212] copy_user_test_oob+0xab/0x10f0 [ 27.043549] kunit_try_run_case+0x1a5/0x480 [ 27.043745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.044076] kthread+0x337/0x6f0 [ 27.044230] ret_from_fork+0x116/0x1d0 [ 27.044562] ret_from_fork_asm+0x1a/0x30 [ 27.044745] [ 27.044950] The buggy address belongs to the object at ffff888105898a00 [ 27.044950] which belongs to the cache kmalloc-128 of size 128 [ 27.045539] The buggy address is located 0 bytes inside of [ 27.045539] allocated 120-byte region [ffff888105898a00, ffff888105898a78) [ 27.046017] [ 27.046095] The buggy address belongs to the physical page: [ 27.046530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898 [ 27.046910] flags: 0x200000000000000(node=0|zone=2) [ 27.047135] page_type: f5(slab) [ 27.047418] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.047796] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.048109] page dumped because: kasan: bad access detected [ 27.048397] [ 27.048486] Memory state around the buggy address: [ 27.048863] ffff888105898900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.049221] ffff888105898980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.049622] >ffff888105898a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.049906] ^ [ 27.050266] ffff888105898a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.050667] ffff888105898b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.050908] ==================================================================