Date
July 4, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.736550] ================================================================== [ 32.736605] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.736661] Read of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.736714] [ 32.736929] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.737388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.737778] Hardware name: linux,dummy-virt (DT) [ 32.737990] Call trace: [ 32.738321] show_stack+0x20/0x38 (C) [ 32.738717] dump_stack_lvl+0x8c/0xd0 [ 32.738769] print_report+0x118/0x608 [ 32.738840] kasan_report+0xdc/0x128 [ 32.738890] kasan_check_range+0x100/0x1a8 [ 32.738948] __kasan_check_read+0x20/0x30 [ 32.738995] copy_user_test_oob+0x3c8/0xec8 [ 32.739416] kunit_try_run_case+0x170/0x3f0 [ 32.739686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.739744] kthread+0x328/0x630 [ 32.739786] ret_from_fork+0x10/0x20 [ 32.739847] [ 32.739883] Allocated by task 318: [ 32.739926] kasan_save_stack+0x3c/0x68 [ 32.739970] kasan_save_track+0x20/0x40 [ 32.740012] kasan_save_alloc_info+0x40/0x58 [ 32.740050] __kasan_kmalloc+0xd4/0xd8 [ 32.740092] __kmalloc_noprof+0x198/0x4c8 [ 32.740133] kunit_kmalloc_array+0x34/0x88 [ 32.740184] copy_user_test_oob+0xac/0xec8 [ 32.740223] kunit_try_run_case+0x170/0x3f0 [ 32.740635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.741083] kthread+0x328/0x630 [ 32.741263] ret_from_fork+0x10/0x20 [ 32.741379] [ 32.741456] The buggy address belongs to the object at fff00000c5adb400 [ 32.741456] which belongs to the cache kmalloc-128 of size 128 [ 32.741531] The buggy address is located 0 bytes inside of [ 32.741531] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.741657] [ 32.741761] The buggy address belongs to the physical page: [ 32.741796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.742514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.742678] page_type: f5(slab) [ 32.742719] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.742772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.742815] page dumped because: kasan: bad access detected [ 32.742849] [ 32.742871] Memory state around the buggy address: [ 32.742915] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.742963] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.743009] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.743047] ^ [ 32.743779] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.743845] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.743888] ================================================================== [ 32.702039] ================================================================== [ 32.702131] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.702208] Write of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.702430] [ 32.702524] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.702620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.703513] Hardware name: linux,dummy-virt (DT) [ 32.703569] Call trace: [ 32.703615] show_stack+0x20/0x38 (C) [ 32.703686] dump_stack_lvl+0x8c/0xd0 [ 32.703741] print_report+0x118/0x608 [ 32.703790] kasan_report+0xdc/0x128 [ 32.703847] kasan_check_range+0x100/0x1a8 [ 32.703894] __kasan_check_write+0x20/0x30 [ 32.703967] copy_user_test_oob+0x234/0xec8 [ 32.704019] kunit_try_run_case+0x170/0x3f0 [ 32.704070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.704126] kthread+0x328/0x630 [ 32.704180] ret_from_fork+0x10/0x20 [ 32.704232] [ 32.704255] Allocated by task 318: [ 32.704288] kasan_save_stack+0x3c/0x68 [ 32.704333] kasan_save_track+0x20/0x40 [ 32.704375] kasan_save_alloc_info+0x40/0x58 [ 32.704423] __kasan_kmalloc+0xd4/0xd8 [ 32.704464] __kmalloc_noprof+0x198/0x4c8 [ 32.704517] kunit_kmalloc_array+0x34/0x88 [ 32.704558] copy_user_test_oob+0xac/0xec8 [ 32.704597] kunit_try_run_case+0x170/0x3f0 [ 32.704649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.704695] kthread+0x328/0x630 [ 32.704729] ret_from_fork+0x10/0x20 [ 32.704773] [ 32.704799] The buggy address belongs to the object at fff00000c5adb400 [ 32.704799] which belongs to the cache kmalloc-128 of size 128 [ 32.704873] The buggy address is located 0 bytes inside of [ 32.704873] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.704952] [ 32.704977] The buggy address belongs to the physical page: [ 32.705013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.705072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.705125] page_type: f5(slab) [ 32.705167] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.705220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.705264] page dumped because: kasan: bad access detected [ 32.705298] [ 32.705318] Memory state around the buggy address: [ 32.705354] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.705400] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705444] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.705485] ^ [ 32.705527] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705571] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705609] ================================================================== [ 32.713605] ================================================================== [ 32.713667] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.713892] Read of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.714034] [ 32.714098] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.714210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.714415] Hardware name: linux,dummy-virt (DT) [ 32.714488] Call trace: [ 32.714516] show_stack+0x20/0x38 (C) [ 32.714569] dump_stack_lvl+0x8c/0xd0 [ 32.714617] print_report+0x118/0x608 [ 32.714689] kasan_report+0xdc/0x128 [ 32.714747] kasan_check_range+0x100/0x1a8 [ 32.714806] __kasan_check_read+0x20/0x30 [ 32.714860] copy_user_test_oob+0x728/0xec8 [ 32.714934] kunit_try_run_case+0x170/0x3f0 [ 32.714994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.715067] kthread+0x328/0x630 [ 32.715117] ret_from_fork+0x10/0x20 [ 32.715176] [ 32.715207] Allocated by task 318: [ 32.715236] kasan_save_stack+0x3c/0x68 [ 32.715282] kasan_save_track+0x20/0x40 [ 32.715323] kasan_save_alloc_info+0x40/0x58 [ 32.715374] __kasan_kmalloc+0xd4/0xd8 [ 32.715422] __kmalloc_noprof+0x198/0x4c8 [ 32.715465] kunit_kmalloc_array+0x34/0x88 [ 32.715506] copy_user_test_oob+0xac/0xec8 [ 32.715548] kunit_try_run_case+0x170/0x3f0 [ 32.715588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.715633] kthread+0x328/0x630 [ 32.715690] ret_from_fork+0x10/0x20 [ 32.715729] [ 32.715768] The buggy address belongs to the object at fff00000c5adb400 [ 32.715768] which belongs to the cache kmalloc-128 of size 128 [ 32.715836] The buggy address is located 0 bytes inside of [ 32.715836] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.716640] [ 32.716676] The buggy address belongs to the physical page: [ 32.716789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.716845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.716906] page_type: f5(slab) [ 32.716948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.717002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.717358] page dumped because: kasan: bad access detected [ 32.717429] [ 32.717681] Memory state around the buggy address: [ 32.717866] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.717928] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.717973] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.718014] ^ [ 32.718057] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.718476] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.718755] ================================================================== [ 32.753030] ================================================================== [ 32.753300] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.753563] Read of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.753676] [ 32.753760] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.753880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.753921] Hardware name: linux,dummy-virt (DT) [ 32.754313] Call trace: [ 32.754380] show_stack+0x20/0x38 (C) [ 32.754438] dump_stack_lvl+0x8c/0xd0 [ 32.754603] print_report+0x118/0x608 [ 32.754662] kasan_report+0xdc/0x128 [ 32.755032] kasan_check_range+0x100/0x1a8 [ 32.755087] __kasan_check_read+0x20/0x30 [ 32.755135] copy_user_test_oob+0x4a0/0xec8 [ 32.755547] kunit_try_run_case+0x170/0x3f0 [ 32.755688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.755748] kthread+0x328/0x630 [ 32.755794] ret_from_fork+0x10/0x20 [ 32.755844] [ 32.755866] Allocated by task 318: [ 32.755910] kasan_save_stack+0x3c/0x68 [ 32.755967] kasan_save_track+0x20/0x40 [ 32.756012] kasan_save_alloc_info+0x40/0x58 [ 32.756529] __kasan_kmalloc+0xd4/0xd8 [ 32.756839] __kmalloc_noprof+0x198/0x4c8 [ 32.756986] kunit_kmalloc_array+0x34/0x88 [ 32.757088] copy_user_test_oob+0xac/0xec8 [ 32.757139] kunit_try_run_case+0x170/0x3f0 [ 32.757184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.757237] kthread+0x328/0x630 [ 32.757276] ret_from_fork+0x10/0x20 [ 32.757317] [ 32.757926] The buggy address belongs to the object at fff00000c5adb400 [ 32.757926] which belongs to the cache kmalloc-128 of size 128 [ 32.758159] The buggy address is located 0 bytes inside of [ 32.758159] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.758261] [ 32.758286] The buggy address belongs to the physical page: [ 32.758322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.758402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.758778] page_type: f5(slab) [ 32.758913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.759007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.759052] page dumped because: kasan: bad access detected [ 32.759088] [ 32.759131] Memory state around the buggy address: [ 32.759320] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.759554] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.759706] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.759781] ^ [ 32.759829] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.760215] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.760620] ================================================================== [ 32.728433] ================================================================== [ 32.728668] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.728917] Write of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.728972] [ 32.729007] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.729423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.729454] Hardware name: linux,dummy-virt (DT) [ 32.729488] Call trace: [ 32.729513] show_stack+0x20/0x38 (C) [ 32.730071] dump_stack_lvl+0x8c/0xd0 [ 32.730128] print_report+0x118/0x608 [ 32.730224] kasan_report+0xdc/0x128 [ 32.730322] kasan_check_range+0x100/0x1a8 [ 32.730370] __kasan_check_write+0x20/0x30 [ 32.730441] copy_user_test_oob+0x35c/0xec8 [ 32.730489] kunit_try_run_case+0x170/0x3f0 [ 32.730810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.730872] kthread+0x328/0x630 [ 32.730924] ret_from_fork+0x10/0x20 [ 32.730975] [ 32.731022] Allocated by task 318: [ 32.731099] kasan_save_stack+0x3c/0x68 [ 32.731145] kasan_save_track+0x20/0x40 [ 32.731242] kasan_save_alloc_info+0x40/0x58 [ 32.731344] __kasan_kmalloc+0xd4/0xd8 [ 32.731423] __kmalloc_noprof+0x198/0x4c8 [ 32.731466] kunit_kmalloc_array+0x34/0x88 [ 32.731509] copy_user_test_oob+0xac/0xec8 [ 32.731552] kunit_try_run_case+0x170/0x3f0 [ 32.731639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.731855] kthread+0x328/0x630 [ 32.731918] ret_from_fork+0x10/0x20 [ 32.731958] [ 32.732013] The buggy address belongs to the object at fff00000c5adb400 [ 32.732013] which belongs to the cache kmalloc-128 of size 128 [ 32.732145] The buggy address is located 0 bytes inside of [ 32.732145] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.732307] [ 32.732362] The buggy address belongs to the physical page: [ 32.732396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.732450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.732501] page_type: f5(slab) [ 32.732548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.732815] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.733243] page dumped because: kasan: bad access detected [ 32.733894] [ 32.734087] Memory state around the buggy address: [ 32.734130] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.734519] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.734604] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.734645] ^ [ 32.734689] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.734731] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.735181] ================================================================== [ 32.744962] ================================================================== [ 32.745108] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.745161] Write of size 121 at addr fff00000c5adb400 by task kunit_try_catch/318 [ 32.745321] [ 32.745462] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 32.745766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.745796] Hardware name: linux,dummy-virt (DT) [ 32.745830] Call trace: [ 32.745854] show_stack+0x20/0x38 (C) [ 32.746344] dump_stack_lvl+0x8c/0xd0 [ 32.746479] print_report+0x118/0x608 [ 32.746546] kasan_report+0xdc/0x128 [ 32.746596] kasan_check_range+0x100/0x1a8 [ 32.746643] __kasan_check_write+0x20/0x30 [ 32.746690] copy_user_test_oob+0x434/0xec8 [ 32.746740] kunit_try_run_case+0x170/0x3f0 [ 32.747356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.747766] kthread+0x328/0x630 [ 32.747814] ret_from_fork+0x10/0x20 [ 32.748282] [ 32.748357] Allocated by task 318: [ 32.748392] kasan_save_stack+0x3c/0x68 [ 32.748438] kasan_save_track+0x20/0x40 [ 32.748480] kasan_save_alloc_info+0x40/0x58 [ 32.748521] __kasan_kmalloc+0xd4/0xd8 [ 32.748608] __kmalloc_noprof+0x198/0x4c8 [ 32.748743] kunit_kmalloc_array+0x34/0x88 [ 32.748788] copy_user_test_oob+0xac/0xec8 [ 32.748913] kunit_try_run_case+0x170/0x3f0 [ 32.748956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.749004] kthread+0x328/0x630 [ 32.749177] ret_from_fork+0x10/0x20 [ 32.749740] [ 32.749770] The buggy address belongs to the object at fff00000c5adb400 [ 32.749770] which belongs to the cache kmalloc-128 of size 128 [ 32.749837] The buggy address is located 0 bytes inside of [ 32.749837] allocated 120-byte region [fff00000c5adb400, fff00000c5adb478) [ 32.749912] [ 32.750111] The buggy address belongs to the physical page: [ 32.750173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 32.750246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.750332] page_type: f5(slab) [ 32.750476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.750530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.750574] page dumped because: kasan: bad access detected [ 32.750610] [ 32.750641] Memory state around the buggy address: [ 32.750677] fff00000c5adb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.750971] fff00000c5adb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.751020] >fff00000c5adb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.751424] ^ [ 32.751569] fff00000c5adb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.751728] fff00000c5adb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.751790] ==================================================================
[ 29.490353] ================================================================== [ 29.490663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 29.490962] Read of size 121 at addr ffff888106258900 by task kunit_try_catch/334 [ 29.491265] [ 29.491404] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 29.491466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.491483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.491511] Call Trace: [ 29.491537] <TASK> [ 29.491561] dump_stack_lvl+0x73/0xb0 [ 29.491596] print_report+0xd1/0x650 [ 29.491623] ? __virt_addr_valid+0x1db/0x2d0 [ 29.491652] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.491679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.491746] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.491776] kasan_report+0x141/0x180 [ 29.491803] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.491849] kasan_check_range+0x10c/0x1c0 [ 29.491899] __kasan_check_read+0x15/0x20 [ 29.491928] copy_user_test_oob+0x4aa/0x10f0 [ 29.491958] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.491985] ? finish_task_switch.isra.0+0x153/0x700 [ 29.492011] ? __switch_to+0x47/0xf50 [ 29.492043] ? __schedule+0x10cc/0x2b60 [ 29.492072] ? __pfx_read_tsc+0x10/0x10 [ 29.492125] ? ktime_get_ts64+0x86/0x230 [ 29.492162] kunit_try_run_case+0x1a5/0x480 [ 29.492192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.492221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.492254] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.492283] ? __kthread_parkme+0x82/0x180 [ 29.492307] ? preempt_count_sub+0x50/0x80 [ 29.492335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.492363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.492428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.492461] kthread+0x337/0x6f0 [ 29.492498] ? trace_preempt_on+0x20/0xc0 [ 29.492528] ? __pfx_kthread+0x10/0x10 [ 29.492553] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.492580] ? calculate_sigpending+0x7b/0xa0 [ 29.492609] ? __pfx_kthread+0x10/0x10 [ 29.492634] ret_from_fork+0x116/0x1d0 [ 29.492657] ? __pfx_kthread+0x10/0x10 [ 29.492681] ret_from_fork_asm+0x1a/0x30 [ 29.492718] </TASK> [ 29.492733] [ 29.502835] Allocated by task 334: [ 29.503026] kasan_save_stack+0x45/0x70 [ 29.503233] kasan_save_track+0x18/0x40 [ 29.503892] kasan_save_alloc_info+0x3b/0x50 [ 29.504189] __kasan_kmalloc+0xb7/0xc0 [ 29.504715] __kmalloc_noprof+0x1c9/0x500 [ 29.504977] kunit_kmalloc_array+0x25/0x60 [ 29.505198] copy_user_test_oob+0xab/0x10f0 [ 29.505438] kunit_try_run_case+0x1a5/0x480 [ 29.505644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.505862] kthread+0x337/0x6f0 [ 29.506024] ret_from_fork+0x116/0x1d0 [ 29.506165] ret_from_fork_asm+0x1a/0x30 [ 29.506371] [ 29.506486] The buggy address belongs to the object at ffff888106258900 [ 29.506486] which belongs to the cache kmalloc-128 of size 128 [ 29.507056] The buggy address is located 0 bytes inside of [ 29.507056] allocated 120-byte region [ffff888106258900, ffff888106258978) [ 29.507653] [ 29.507746] The buggy address belongs to the physical page: [ 29.508071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106258 [ 29.508387] flags: 0x200000000000000(node=0|zone=2) [ 29.508659] page_type: f5(slab) [ 29.508828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.509262] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.509562] page dumped because: kasan: bad access detected [ 29.509824] [ 29.509945] Memory state around the buggy address: [ 29.510412] ffff888106258800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.510706] ffff888106258880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.511509] >ffff888106258900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.512046] ^ [ 29.512585] ffff888106258980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.512876] ffff888106258a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.513201] ================================================================== [ 29.540217] ================================================================== [ 29.540623] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 29.540901] Read of size 121 at addr ffff888106258900 by task kunit_try_catch/334 [ 29.541264] [ 29.541411] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 29.541487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.541503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.541529] Call Trace: [ 29.541552] <TASK> [ 29.541575] dump_stack_lvl+0x73/0xb0 [ 29.541606] print_report+0xd1/0x650 [ 29.541649] ? __virt_addr_valid+0x1db/0x2d0 [ 29.541675] ? copy_user_test_oob+0x604/0x10f0 [ 29.541700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.541729] ? copy_user_test_oob+0x604/0x10f0 [ 29.541756] kasan_report+0x141/0x180 [ 29.541781] ? copy_user_test_oob+0x604/0x10f0 [ 29.541811] kasan_check_range+0x10c/0x1c0 [ 29.541837] __kasan_check_read+0x15/0x20 [ 29.541863] copy_user_test_oob+0x604/0x10f0 [ 29.541890] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.541915] ? finish_task_switch.isra.0+0x153/0x700 [ 29.541939] ? __switch_to+0x47/0xf50 [ 29.541968] ? __schedule+0x10cc/0x2b60 [ 29.541994] ? __pfx_read_tsc+0x10/0x10 [ 29.542018] ? ktime_get_ts64+0x86/0x230 [ 29.542063] kunit_try_run_case+0x1a5/0x480 [ 29.542105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.542131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.542171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.542211] ? __kthread_parkme+0x82/0x180 [ 29.542235] ? preempt_count_sub+0x50/0x80 [ 29.542260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.542301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.542342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.542369] kthread+0x337/0x6f0 [ 29.542401] ? trace_preempt_on+0x20/0xc0 [ 29.542428] ? __pfx_kthread+0x10/0x10 [ 29.542450] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.542475] ? calculate_sigpending+0x7b/0xa0 [ 29.542502] ? __pfx_kthread+0x10/0x10 [ 29.542526] ret_from_fork+0x116/0x1d0 [ 29.542547] ? __pfx_kthread+0x10/0x10 [ 29.542571] ret_from_fork_asm+0x1a/0x30 [ 29.542604] </TASK> [ 29.542618] [ 29.550728] Allocated by task 334: [ 29.550948] kasan_save_stack+0x45/0x70 [ 29.551199] kasan_save_track+0x18/0x40 [ 29.551371] kasan_save_alloc_info+0x3b/0x50 [ 29.551610] __kasan_kmalloc+0xb7/0xc0 [ 29.551804] __kmalloc_noprof+0x1c9/0x500 [ 29.552016] kunit_kmalloc_array+0x25/0x60 [ 29.552275] copy_user_test_oob+0xab/0x10f0 [ 29.552532] kunit_try_run_case+0x1a5/0x480 [ 29.552758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.553009] kthread+0x337/0x6f0 [ 29.553192] ret_from_fork+0x116/0x1d0 [ 29.553402] ret_from_fork_asm+0x1a/0x30 [ 29.553640] [ 29.553745] The buggy address belongs to the object at ffff888106258900 [ 29.553745] which belongs to the cache kmalloc-128 of size 128 [ 29.554411] The buggy address is located 0 bytes inside of [ 29.554411] allocated 120-byte region [ffff888106258900, ffff888106258978) [ 29.554986] [ 29.555109] The buggy address belongs to the physical page: [ 29.555381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106258 [ 29.555744] flags: 0x200000000000000(node=0|zone=2) [ 29.556014] page_type: f5(slab) [ 29.556219] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.556601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.556986] page dumped because: kasan: bad access detected [ 29.557238] [ 29.557363] Memory state around the buggy address: [ 29.557571] ffff888106258800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.557785] ffff888106258880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.558178] >ffff888106258900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.558576] ^ [ 29.558782] ffff888106258980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559242] ffff888106258a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559549] ================================================================== [ 29.513998] ================================================================== [ 29.514290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 29.515445] Write of size 121 at addr ffff888106258900 by task kunit_try_catch/334 [ 29.515781] [ 29.515905] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 29.515962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.515978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.516005] Call Trace: [ 29.516028] <TASK> [ 29.516051] dump_stack_lvl+0x73/0xb0 [ 29.516085] print_report+0xd1/0x650 [ 29.516111] ? __virt_addr_valid+0x1db/0x2d0 [ 29.516139] ? copy_user_test_oob+0x557/0x10f0 [ 29.516166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.516196] ? copy_user_test_oob+0x557/0x10f0 [ 29.516241] kasan_report+0x141/0x180 [ 29.516266] ? copy_user_test_oob+0x557/0x10f0 [ 29.516297] kasan_check_range+0x10c/0x1c0 [ 29.516324] __kasan_check_write+0x18/0x20 [ 29.516350] copy_user_test_oob+0x557/0x10f0 [ 29.516378] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.516416] ? finish_task_switch.isra.0+0x153/0x700 [ 29.516441] ? __switch_to+0x47/0xf50 [ 29.516470] ? __schedule+0x10cc/0x2b60 [ 29.516498] ? __pfx_read_tsc+0x10/0x10 [ 29.516522] ? ktime_get_ts64+0x86/0x230 [ 29.516550] kunit_try_run_case+0x1a5/0x480 [ 29.516582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.516609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.516635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.516663] ? __kthread_parkme+0x82/0x180 [ 29.516687] ? preempt_count_sub+0x50/0x80 [ 29.516713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.516741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.516768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.516796] kthread+0x337/0x6f0 [ 29.516821] ? trace_preempt_on+0x20/0xc0 [ 29.516849] ? __pfx_kthread+0x10/0x10 [ 29.516873] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.516898] ? calculate_sigpending+0x7b/0xa0 [ 29.516925] ? __pfx_kthread+0x10/0x10 [ 29.516950] ret_from_fork+0x116/0x1d0 [ 29.516972] ? __pfx_kthread+0x10/0x10 [ 29.516996] ret_from_fork_asm+0x1a/0x30 [ 29.517030] </TASK> [ 29.517045] [ 29.527158] Allocated by task 334: [ 29.527347] kasan_save_stack+0x45/0x70 [ 29.527557] kasan_save_track+0x18/0x40 [ 29.527744] kasan_save_alloc_info+0x3b/0x50 [ 29.528353] __kasan_kmalloc+0xb7/0xc0 [ 29.528611] __kmalloc_noprof+0x1c9/0x500 [ 29.528948] kunit_kmalloc_array+0x25/0x60 [ 29.529331] copy_user_test_oob+0xab/0x10f0 [ 29.529651] kunit_try_run_case+0x1a5/0x480 [ 29.530052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.530309] kthread+0x337/0x6f0 [ 29.530488] ret_from_fork+0x116/0x1d0 [ 29.530673] ret_from_fork_asm+0x1a/0x30 [ 29.530866] [ 29.530959] The buggy address belongs to the object at ffff888106258900 [ 29.530959] which belongs to the cache kmalloc-128 of size 128 [ 29.531802] The buggy address is located 0 bytes inside of [ 29.531802] allocated 120-byte region [ffff888106258900, ffff888106258978) [ 29.532758] [ 29.533011] The buggy address belongs to the physical page: [ 29.533447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106258 [ 29.534140] flags: 0x200000000000000(node=0|zone=2) [ 29.534549] page_type: f5(slab) [ 29.534719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.535345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.535844] page dumped because: kasan: bad access detected [ 29.536319] [ 29.536427] Memory state around the buggy address: [ 29.536787] ffff888106258800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.537540] ffff888106258880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.538029] >ffff888106258900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.538474] ^ [ 29.538910] ffff888106258980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.539205] ffff888106258a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.539499] ================================================================== [ 29.463405] ================================================================== [ 29.463762] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 29.464192] Write of size 121 at addr ffff888106258900 by task kunit_try_catch/334 [ 29.464502] [ 29.464632] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 29.464706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.464723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.464763] Call Trace: [ 29.464781] <TASK> [ 29.464805] dump_stack_lvl+0x73/0xb0 [ 29.464837] print_report+0xd1/0x650 [ 29.464865] ? __virt_addr_valid+0x1db/0x2d0 [ 29.464896] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.464924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.464956] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.464983] kasan_report+0x141/0x180 [ 29.465021] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.465054] kasan_check_range+0x10c/0x1c0 [ 29.465095] __kasan_check_write+0x18/0x20 [ 29.465122] copy_user_test_oob+0x3fd/0x10f0 [ 29.465163] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.465190] ? finish_task_switch.isra.0+0x153/0x700 [ 29.465217] ? __switch_to+0x47/0xf50 [ 29.465247] ? __schedule+0x10cc/0x2b60 [ 29.465275] ? __pfx_read_tsc+0x10/0x10 [ 29.465302] ? ktime_get_ts64+0x86/0x230 [ 29.465331] kunit_try_run_case+0x1a5/0x480 [ 29.465360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.465398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.465428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.465456] ? __kthread_parkme+0x82/0x180 [ 29.465481] ? preempt_count_sub+0x50/0x80 [ 29.465508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.465538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.465567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.465597] kthread+0x337/0x6f0 [ 29.465620] ? trace_preempt_on+0x20/0xc0 [ 29.465649] ? __pfx_kthread+0x10/0x10 [ 29.465674] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.465701] ? calculate_sigpending+0x7b/0xa0 [ 29.465730] ? __pfx_kthread+0x10/0x10 [ 29.465755] ret_from_fork+0x116/0x1d0 [ 29.465779] ? __pfx_kthread+0x10/0x10 [ 29.465803] ret_from_fork_asm+0x1a/0x30 [ 29.465840] </TASK> [ 29.465855] [ 29.475033] Allocated by task 334: [ 29.475237] kasan_save_stack+0x45/0x70 [ 29.475715] kasan_save_track+0x18/0x40 [ 29.476432] kasan_save_alloc_info+0x3b/0x50 [ 29.476823] __kasan_kmalloc+0xb7/0xc0 [ 29.477187] __kmalloc_noprof+0x1c9/0x500 [ 29.477630] kunit_kmalloc_array+0x25/0x60 [ 29.478053] copy_user_test_oob+0xab/0x10f0 [ 29.478276] kunit_try_run_case+0x1a5/0x480 [ 29.478500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.478758] kthread+0x337/0x6f0 [ 29.479000] ret_from_fork+0x116/0x1d0 [ 29.479190] ret_from_fork_asm+0x1a/0x30 [ 29.479399] [ 29.479481] The buggy address belongs to the object at ffff888106258900 [ 29.479481] which belongs to the cache kmalloc-128 of size 128 [ 29.480045] The buggy address is located 0 bytes inside of [ 29.480045] allocated 120-byte region [ffff888106258900, ffff888106258978) [ 29.480483] [ 29.480564] The buggy address belongs to the physical page: [ 29.480755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106258 [ 29.482515] flags: 0x200000000000000(node=0|zone=2) [ 29.483591] page_type: f5(slab) [ 29.483749] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.484594] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.484988] page dumped because: kasan: bad access detected [ 29.485270] [ 29.485349] Memory state around the buggy address: [ 29.485541] ffff888106258800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.485835] ffff888106258880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.486073] >ffff888106258900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.486383] ^ [ 29.487130] ffff888106258980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.487384] ffff888106258a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.487695] ==================================================================