Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.434842] ================================================================== [ 34.434896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.434947] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.435241] [ 34.435287] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.435388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.435427] Hardware name: linux,dummy-virt (DT) [ 34.435462] Call trace: [ 34.435493] show_stack+0x20/0x38 (C) [ 34.435752] dump_stack_lvl+0x8c/0xd0 [ 34.435816] print_report+0x118/0x5d0 [ 34.435867] kasan_report+0xdc/0x128 [ 34.435914] kasan_check_range+0x100/0x1a8 [ 34.435961] __kasan_check_read+0x20/0x30 [ 34.436007] copy_user_test_oob+0x3c8/0xec8 [ 34.436056] kunit_try_run_case+0x170/0x3f0 [ 34.436124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.436188] kthread+0x328/0x630 [ 34.436247] ret_from_fork+0x10/0x20 [ 34.436303] [ 34.436421] Allocated by task 316: [ 34.436453] kasan_save_stack+0x3c/0x68 [ 34.436499] kasan_save_track+0x20/0x40 [ 34.436705] kasan_save_alloc_info+0x40/0x58 [ 34.436917] __kasan_kmalloc+0xd4/0xd8 [ 34.437119] __kmalloc_noprof+0x198/0x4c8 [ 34.437188] kunit_kmalloc_array+0x34/0x88 [ 34.437265] copy_user_test_oob+0xac/0xec8 [ 34.437346] kunit_try_run_case+0x170/0x3f0 [ 34.437417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.437497] kthread+0x328/0x630 [ 34.437547] ret_from_fork+0x10/0x20 [ 34.437598] [ 34.437623] The buggy address belongs to the object at fff00000c9adfc00 [ 34.437623] which belongs to the cache kmalloc-128 of size 128 [ 34.437713] The buggy address is located 0 bytes inside of [ 34.437713] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.437904] [ 34.437928] The buggy address belongs to the physical page: [ 34.438039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.438100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.438348] page_type: f5(slab) [ 34.438460] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.438540] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.438614] page dumped because: kasan: bad access detected [ 34.438705] [ 34.438755] Memory state around the buggy address: [ 34.438820] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.438916] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439002] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.439068] ^ [ 34.439138] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439249] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439308] ================================================================== [ 34.444979] ================================================================== [ 34.445060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.445129] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.445183] [ 34.445226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.445352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.445480] Hardware name: linux,dummy-virt (DT) [ 34.445529] Call trace: [ 34.445554] show_stack+0x20/0x38 (C) [ 34.445614] dump_stack_lvl+0x8c/0xd0 [ 34.445689] print_report+0x118/0x5d0 [ 34.445746] kasan_report+0xdc/0x128 [ 34.445804] kasan_check_range+0x100/0x1a8 [ 34.445855] __kasan_check_read+0x20/0x30 [ 34.445903] copy_user_test_oob+0x4a0/0xec8 [ 34.445951] kunit_try_run_case+0x170/0x3f0 [ 34.446009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.446065] kthread+0x328/0x630 [ 34.446120] ret_from_fork+0x10/0x20 [ 34.446170] [ 34.446190] Allocated by task 316: [ 34.446483] kasan_save_stack+0x3c/0x68 [ 34.446553] kasan_save_track+0x20/0x40 [ 34.446614] kasan_save_alloc_info+0x40/0x58 [ 34.446663] __kasan_kmalloc+0xd4/0xd8 [ 34.446714] __kmalloc_noprof+0x198/0x4c8 [ 34.446762] kunit_kmalloc_array+0x34/0x88 [ 34.446805] copy_user_test_oob+0xac/0xec8 [ 34.447016] kunit_try_run_case+0x170/0x3f0 [ 34.447074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.447175] kthread+0x328/0x630 [ 34.447242] ret_from_fork+0x10/0x20 [ 34.447290] [ 34.447319] The buggy address belongs to the object at fff00000c9adfc00 [ 34.447319] which belongs to the cache kmalloc-128 of size 128 [ 34.447382] The buggy address is located 0 bytes inside of [ 34.447382] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.447453] [ 34.447482] The buggy address belongs to the physical page: [ 34.447531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.447592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.447641] page_type: f5(slab) [ 34.447682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.447735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.447778] page dumped because: kasan: bad access detected [ 34.447811] [ 34.447832] Memory state around the buggy address: [ 34.447874] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.447928] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.447981] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.448023] ^ [ 34.448063] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.448115] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.448163] ================================================================== [ 34.410174] ================================================================== [ 34.410341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.410416] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.410514] [ 34.410557] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.410736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.410764] Hardware name: linux,dummy-virt (DT) [ 34.410800] Call trace: [ 34.411137] show_stack+0x20/0x38 (C) [ 34.411201] dump_stack_lvl+0x8c/0xd0 [ 34.411306] print_report+0x118/0x5d0 [ 34.411361] kasan_report+0xdc/0x128 [ 34.411410] kasan_check_range+0x100/0x1a8 [ 34.411456] __kasan_check_read+0x20/0x30 [ 34.411504] copy_user_test_oob+0x728/0xec8 [ 34.411552] kunit_try_run_case+0x170/0x3f0 [ 34.411603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.411658] kthread+0x328/0x630 [ 34.411701] ret_from_fork+0x10/0x20 [ 34.411753] [ 34.411774] Allocated by task 316: [ 34.411805] kasan_save_stack+0x3c/0x68 [ 34.411850] kasan_save_track+0x20/0x40 [ 34.411891] kasan_save_alloc_info+0x40/0x58 [ 34.411930] __kasan_kmalloc+0xd4/0xd8 [ 34.411970] __kmalloc_noprof+0x198/0x4c8 [ 34.412011] kunit_kmalloc_array+0x34/0x88 [ 34.412052] copy_user_test_oob+0xac/0xec8 [ 34.412091] kunit_try_run_case+0x170/0x3f0 [ 34.412132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.412179] kthread+0x328/0x630 [ 34.412226] ret_from_fork+0x10/0x20 [ 34.412271] [ 34.412293] The buggy address belongs to the object at fff00000c9adfc00 [ 34.412293] which belongs to the cache kmalloc-128 of size 128 [ 34.412353] The buggy address is located 0 bytes inside of [ 34.412353] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.412419] [ 34.412441] The buggy address belongs to the physical page: [ 34.412477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.412533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.412622] page_type: f5(slab) [ 34.413089] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.414692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.414777] page dumped because: kasan: bad access detected [ 34.414815] [ 34.414836] Memory state around the buggy address: [ 34.414877] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.414923] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.416007] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.416375] ^ [ 34.416884] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.417399] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.417473] ================================================================== [ 34.391662] ================================================================== [ 34.392677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.393354] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.393638] [ 34.394117] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.394413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.394561] Hardware name: linux,dummy-virt (DT) [ 34.395172] Call trace: [ 34.395287] show_stack+0x20/0x38 (C) [ 34.395348] dump_stack_lvl+0x8c/0xd0 [ 34.395409] print_report+0x118/0x5d0 [ 34.395556] kasan_report+0xdc/0x128 [ 34.395692] kasan_check_range+0x100/0x1a8 [ 34.396290] __kasan_check_write+0x20/0x30 [ 34.396624] copy_user_test_oob+0x234/0xec8 [ 34.396686] kunit_try_run_case+0x170/0x3f0 [ 34.396744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.396798] kthread+0x328/0x630 [ 34.396845] ret_from_fork+0x10/0x20 [ 34.396900] [ 34.397833] Allocated by task 316: [ 34.397975] kasan_save_stack+0x3c/0x68 [ 34.398036] kasan_save_track+0x20/0x40 [ 34.398374] kasan_save_alloc_info+0x40/0x58 [ 34.398420] __kasan_kmalloc+0xd4/0xd8 [ 34.398878] __kmalloc_noprof+0x198/0x4c8 [ 34.399142] kunit_kmalloc_array+0x34/0x88 [ 34.399358] copy_user_test_oob+0xac/0xec8 [ 34.399408] kunit_try_run_case+0x170/0x3f0 [ 34.399730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.399793] kthread+0x328/0x630 [ 34.400184] ret_from_fork+0x10/0x20 [ 34.400237] [ 34.400260] The buggy address belongs to the object at fff00000c9adfc00 [ 34.400260] which belongs to the cache kmalloc-128 of size 128 [ 34.400698] The buggy address is located 0 bytes inside of [ 34.400698] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.401266] [ 34.401298] The buggy address belongs to the physical page: [ 34.401336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.401411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.401470] page_type: f5(slab) [ 34.401518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.401571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.401716] page dumped because: kasan: bad access detected [ 34.401889] [ 34.401911] Memory state around the buggy address: [ 34.401949] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.402002] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402048] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.402088] ^ [ 34.402133] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402179] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402227] ================================================================== [ 34.439652] ================================================================== [ 34.439703] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.439763] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.439936] [ 34.439975] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.440063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.440091] Hardware name: linux,dummy-virt (DT) [ 34.440244] Call trace: [ 34.440293] show_stack+0x20/0x38 (C) [ 34.440376] dump_stack_lvl+0x8c/0xd0 [ 34.440426] print_report+0x118/0x5d0 [ 34.440473] kasan_report+0xdc/0x128 [ 34.440532] kasan_check_range+0x100/0x1a8 [ 34.440755] __kasan_check_write+0x20/0x30 [ 34.440868] copy_user_test_oob+0x434/0xec8 [ 34.440962] kunit_try_run_case+0x170/0x3f0 [ 34.441065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441122] kthread+0x328/0x630 [ 34.441176] ret_from_fork+0x10/0x20 [ 34.441236] [ 34.441257] Allocated by task 316: [ 34.441288] kasan_save_stack+0x3c/0x68 [ 34.441356] kasan_save_track+0x20/0x40 [ 34.441399] kasan_save_alloc_info+0x40/0x58 [ 34.441441] __kasan_kmalloc+0xd4/0xd8 [ 34.441484] __kmalloc_noprof+0x198/0x4c8 [ 34.441674] kunit_kmalloc_array+0x34/0x88 [ 34.441755] copy_user_test_oob+0xac/0xec8 [ 34.441842] kunit_try_run_case+0x170/0x3f0 [ 34.441896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441988] kthread+0x328/0x630 [ 34.442156] ret_from_fork+0x10/0x20 [ 34.442312] [ 34.442402] The buggy address belongs to the object at fff00000c9adfc00 [ 34.442402] which belongs to the cache kmalloc-128 of size 128 [ 34.442501] The buggy address is located 0 bytes inside of [ 34.442501] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.442586] [ 34.442607] The buggy address belongs to the physical page: [ 34.442640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.442708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.442910] page_type: f5(slab) [ 34.443049] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.443145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.443226] page dumped because: kasan: bad access detected [ 34.443281] [ 34.443512] Memory state around the buggy address: [ 34.443587] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.443652] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443697] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.443738] ^ [ 34.443825] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443876] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443919] ================================================================== [ 34.428241] ================================================================== [ 34.428438] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.428615] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.428827] [ 34.428978] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.429188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.429389] Hardware name: linux,dummy-virt (DT) [ 34.429694] Call trace: [ 34.429779] show_stack+0x20/0x38 (C) [ 34.429852] dump_stack_lvl+0x8c/0xd0 [ 34.429953] print_report+0x118/0x5d0 [ 34.430041] kasan_report+0xdc/0x128 [ 34.430090] kasan_check_range+0x100/0x1a8 [ 34.430147] __kasan_check_write+0x20/0x30 [ 34.430195] copy_user_test_oob+0x35c/0xec8 [ 34.430655] kunit_try_run_case+0x170/0x3f0 [ 34.430832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.431023] kthread+0x328/0x630 [ 34.431131] ret_from_fork+0x10/0x20 [ 34.431182] [ 34.431203] Allocated by task 316: [ 34.431248] kasan_save_stack+0x3c/0x68 [ 34.431294] kasan_save_track+0x20/0x40 [ 34.431552] kasan_save_alloc_info+0x40/0x58 [ 34.431643] __kasan_kmalloc+0xd4/0xd8 [ 34.431762] __kmalloc_noprof+0x198/0x4c8 [ 34.431915] kunit_kmalloc_array+0x34/0x88 [ 34.431962] copy_user_test_oob+0xac/0xec8 [ 34.432045] kunit_try_run_case+0x170/0x3f0 [ 34.432150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432228] kthread+0x328/0x630 [ 34.432264] ret_from_fork+0x10/0x20 [ 34.432302] [ 34.432364] The buggy address belongs to the object at fff00000c9adfc00 [ 34.432364] which belongs to the cache kmalloc-128 of size 128 [ 34.432603] The buggy address is located 0 bytes inside of [ 34.432603] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.432670] [ 34.432904] The buggy address belongs to the physical page: [ 34.432952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.433029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.433139] page_type: f5(slab) [ 34.433218] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.433272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.433316] page dumped because: kasan: bad access detected [ 34.433496] [ 34.433518] Memory state around the buggy address: [ 34.433555] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.433600] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.433951] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.434024] ^ [ 34.434082] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.434167] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.434265] ==================================================================
[ 27.710255] ================================================================== [ 27.711414] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 27.712088] Write of size 121 at addr ffff8881062af800 by task kunit_try_catch/333 [ 27.712993] [ 27.713232] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.713296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.713311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.713337] Call Trace: [ 27.713370] <TASK> [ 27.713394] dump_stack_lvl+0x73/0xb0 [ 27.713439] print_report+0xd1/0x610 [ 27.713464] ? __virt_addr_valid+0x1db/0x2d0 [ 27.713491] ? copy_user_test_oob+0x557/0x10f0 [ 27.713517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.713547] ? copy_user_test_oob+0x557/0x10f0 [ 27.713573] kasan_report+0x141/0x180 [ 27.713597] ? copy_user_test_oob+0x557/0x10f0 [ 27.713628] kasan_check_range+0x10c/0x1c0 [ 27.713655] __kasan_check_write+0x18/0x20 [ 27.713683] copy_user_test_oob+0x557/0x10f0 [ 27.713720] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.713746] ? finish_task_switch.isra.0+0x153/0x700 [ 27.713773] ? __switch_to+0x47/0xf50 [ 27.713817] ? __schedule+0x10cc/0x2b60 [ 27.713850] ? __pfx_read_tsc+0x10/0x10 [ 27.713876] ? ktime_get_ts64+0x86/0x230 [ 27.713905] kunit_try_run_case+0x1a5/0x480 [ 27.713930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.713952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.713975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.714006] ? __kthread_parkme+0x82/0x180 [ 27.714038] ? preempt_count_sub+0x50/0x80 [ 27.714063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.714097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.714126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.714154] kthread+0x337/0x6f0 [ 27.714177] ? trace_preempt_on+0x20/0xc0 [ 27.714216] ? __pfx_kthread+0x10/0x10 [ 27.714247] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.714277] ? calculate_sigpending+0x7b/0xa0 [ 27.714306] ? __pfx_kthread+0x10/0x10 [ 27.714330] ret_from_fork+0x116/0x1d0 [ 27.714352] ? __pfx_kthread+0x10/0x10 [ 27.714375] ret_from_fork_asm+0x1a/0x30 [ 27.714411] </TASK> [ 27.714424] [ 27.725927] Allocated by task 333: [ 27.726135] kasan_save_stack+0x45/0x70 [ 27.726297] kasan_save_track+0x18/0x40 [ 27.726479] kasan_save_alloc_info+0x3b/0x50 [ 27.726646] __kasan_kmalloc+0xb7/0xc0 [ 27.726808] __kmalloc_noprof+0x1c9/0x500 [ 27.726950] kunit_kmalloc_array+0x25/0x60 [ 27.727082] copy_user_test_oob+0xab/0x10f0 [ 27.727281] kunit_try_run_case+0x1a5/0x480 [ 27.727624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.727875] kthread+0x337/0x6f0 [ 27.728133] ret_from_fork+0x116/0x1d0 [ 27.728282] ret_from_fork_asm+0x1a/0x30 [ 27.728420] [ 27.728485] The buggy address belongs to the object at ffff8881062af800 [ 27.728485] which belongs to the cache kmalloc-128 of size 128 [ 27.728926] The buggy address is located 0 bytes inside of [ 27.728926] allocated 120-byte region [ffff8881062af800, ffff8881062af878) [ 27.729447] [ 27.729562] The buggy address belongs to the physical page: [ 27.729771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 27.730185] flags: 0x200000000000000(node=0|zone=2) [ 27.730402] page_type: f5(slab) [ 27.730518] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.730734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.731003] page dumped because: kasan: bad access detected [ 27.731256] [ 27.731344] Memory state around the buggy address: [ 27.731567] ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.731889] ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.732185] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.732469] ^ [ 27.732734] ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.733070] ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.733354] ================================================================== [ 27.733813] ================================================================== [ 27.734086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 27.734424] Read of size 121 at addr ffff8881062af800 by task kunit_try_catch/333 [ 27.734767] [ 27.734891] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.734942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.734955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.734981] Call Trace: [ 27.734999] <TASK> [ 27.735020] dump_stack_lvl+0x73/0xb0 [ 27.735049] print_report+0xd1/0x610 [ 27.735073] ? __virt_addr_valid+0x1db/0x2d0 [ 27.735099] ? copy_user_test_oob+0x604/0x10f0 [ 27.735124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.735154] ? copy_user_test_oob+0x604/0x10f0 [ 27.735180] kasan_report+0x141/0x180 [ 27.735204] ? copy_user_test_oob+0x604/0x10f0 [ 27.735235] kasan_check_range+0x10c/0x1c0 [ 27.735273] __kasan_check_read+0x15/0x20 [ 27.735300] copy_user_test_oob+0x604/0x10f0 [ 27.735328] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.735354] ? finish_task_switch.isra.0+0x153/0x700 [ 27.735378] ? __switch_to+0x47/0xf50 [ 27.735408] ? __schedule+0x10cc/0x2b60 [ 27.735438] ? __pfx_read_tsc+0x10/0x10 [ 27.735463] ? ktime_get_ts64+0x86/0x230 [ 27.735491] kunit_try_run_case+0x1a5/0x480 [ 27.735515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.735537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.735560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.735590] ? __kthread_parkme+0x82/0x180 [ 27.735613] ? preempt_count_sub+0x50/0x80 [ 27.735638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.735661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.735689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.735717] kthread+0x337/0x6f0 [ 27.735740] ? trace_preempt_on+0x20/0xc0 [ 27.735765] ? __pfx_kthread+0x10/0x10 [ 27.735790] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.735825] ? calculate_sigpending+0x7b/0xa0 [ 27.735853] ? __pfx_kthread+0x10/0x10 [ 27.735878] ret_from_fork+0x116/0x1d0 [ 27.735899] ? __pfx_kthread+0x10/0x10 [ 27.735922] ret_from_fork_asm+0x1a/0x30 [ 27.735957] </TASK> [ 27.735970] [ 27.742457] Allocated by task 333: [ 27.742641] kasan_save_stack+0x45/0x70 [ 27.742858] kasan_save_track+0x18/0x40 [ 27.743038] kasan_save_alloc_info+0x3b/0x50 [ 27.743198] __kasan_kmalloc+0xb7/0xc0 [ 27.743332] __kmalloc_noprof+0x1c9/0x500 [ 27.743468] kunit_kmalloc_array+0x25/0x60 [ 27.743600] copy_user_test_oob+0xab/0x10f0 [ 27.743737] kunit_try_run_case+0x1a5/0x480 [ 27.743870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.744122] kthread+0x337/0x6f0 [ 27.744298] ret_from_fork+0x116/0x1d0 [ 27.744487] ret_from_fork_asm+0x1a/0x30 [ 27.744691] [ 27.744785] The buggy address belongs to the object at ffff8881062af800 [ 27.744785] which belongs to the cache kmalloc-128 of size 128 [ 27.745586] The buggy address is located 0 bytes inside of [ 27.745586] allocated 120-byte region [ffff8881062af800, ffff8881062af878) [ 27.746101] [ 27.746188] The buggy address belongs to the physical page: [ 27.746413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 27.746702] flags: 0x200000000000000(node=0|zone=2) [ 27.746908] page_type: f5(slab) [ 27.747026] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.747359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.747661] page dumped because: kasan: bad access detected [ 27.747819] [ 27.747880] Memory state around the buggy address: [ 27.748024] ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.748226] ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.749541] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.749909] ^ [ 27.750221] ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.750542] ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.751155] ================================================================== [ 27.676047] ================================================================== [ 27.676914] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 27.677174] Read of size 121 at addr ffff8881062af800 by task kunit_try_catch/333 [ 27.677418] [ 27.677508] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.677563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.677577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.677601] Call Trace: [ 27.677624] <TASK> [ 27.677646] dump_stack_lvl+0x73/0xb0 [ 27.677679] print_report+0xd1/0x610 [ 27.677703] ? __virt_addr_valid+0x1db/0x2d0 [ 27.677729] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.677755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.677784] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.677810] kasan_report+0x141/0x180 [ 27.677833] ? copy_user_test_oob+0x4aa/0x10f0 [ 27.677863] kasan_check_range+0x10c/0x1c0 [ 27.677889] __kasan_check_read+0x15/0x20 [ 27.677915] copy_user_test_oob+0x4aa/0x10f0 [ 27.677943] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.677968] ? finish_task_switch.isra.0+0x153/0x700 [ 27.677991] ? __switch_to+0x47/0xf50 [ 27.678021] ? __schedule+0x10cc/0x2b60 [ 27.678051] ? __pfx_read_tsc+0x10/0x10 [ 27.678076] ? ktime_get_ts64+0x86/0x230 [ 27.678104] kunit_try_run_case+0x1a5/0x480 [ 27.678127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.678148] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.678172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.678201] ? __kthread_parkme+0x82/0x180 [ 27.678223] ? preempt_count_sub+0x50/0x80 [ 27.678265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.678288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.678315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.678344] kthread+0x337/0x6f0 [ 27.678366] ? trace_preempt_on+0x20/0xc0 [ 27.678392] ? __pfx_kthread+0x10/0x10 [ 27.678415] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.678443] ? calculate_sigpending+0x7b/0xa0 [ 27.678472] ? __pfx_kthread+0x10/0x10 [ 27.678497] ret_from_fork+0x116/0x1d0 [ 27.678518] ? __pfx_kthread+0x10/0x10 [ 27.678541] ret_from_fork_asm+0x1a/0x30 [ 27.678575] </TASK> [ 27.678588] [ 27.696669] Allocated by task 333: [ 27.697179] kasan_save_stack+0x45/0x70 [ 27.697516] kasan_save_track+0x18/0x40 [ 27.697808] kasan_save_alloc_info+0x3b/0x50 [ 27.697972] __kasan_kmalloc+0xb7/0xc0 [ 27.698097] __kmalloc_noprof+0x1c9/0x500 [ 27.698233] kunit_kmalloc_array+0x25/0x60 [ 27.698598] copy_user_test_oob+0xab/0x10f0 [ 27.699034] kunit_try_run_case+0x1a5/0x480 [ 27.699446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.699995] kthread+0x337/0x6f0 [ 27.700309] ret_from_fork+0x116/0x1d0 [ 27.700575] ret_from_fork_asm+0x1a/0x30 [ 27.700889] [ 27.700958] The buggy address belongs to the object at ffff8881062af800 [ 27.700958] which belongs to the cache kmalloc-128 of size 128 [ 27.701320] The buggy address is located 0 bytes inside of [ 27.701320] allocated 120-byte region [ffff8881062af800, ffff8881062af878) [ 27.701655] [ 27.701724] The buggy address belongs to the physical page: [ 27.702040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 27.702722] flags: 0x200000000000000(node=0|zone=2) [ 27.703263] page_type: f5(slab) [ 27.703579] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.704411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.705259] page dumped because: kasan: bad access detected [ 27.705810] [ 27.705970] Memory state around the buggy address: [ 27.706424] ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.707067] ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.707688] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.707992] ^ [ 27.708822] ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.709249] ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.709454] ================================================================== [ 27.655855] ================================================================== [ 27.656187] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 27.656511] Write of size 121 at addr ffff8881062af800 by task kunit_try_catch/333 [ 27.656788] [ 27.656923] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.656977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.656991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.657016] Call Trace: [ 27.657032] <TASK> [ 27.657065] dump_stack_lvl+0x73/0xb0 [ 27.657098] print_report+0xd1/0x610 [ 27.657124] ? __virt_addr_valid+0x1db/0x2d0 [ 27.657152] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.657178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.657214] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.657251] kasan_report+0x141/0x180 [ 27.657276] ? copy_user_test_oob+0x3fd/0x10f0 [ 27.657307] kasan_check_range+0x10c/0x1c0 [ 27.657333] __kasan_check_write+0x18/0x20 [ 27.657362] copy_user_test_oob+0x3fd/0x10f0 [ 27.657391] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.657417] ? finish_task_switch.isra.0+0x153/0x700 [ 27.657441] ? __switch_to+0x47/0xf50 [ 27.657472] ? __schedule+0x10cc/0x2b60 [ 27.657503] ? __pfx_read_tsc+0x10/0x10 [ 27.657529] ? ktime_get_ts64+0x86/0x230 [ 27.657558] kunit_try_run_case+0x1a5/0x480 [ 27.657582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.657604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.657628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.657659] ? __kthread_parkme+0x82/0x180 [ 27.657682] ? preempt_count_sub+0x50/0x80 [ 27.657707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.657730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.657759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.657788] kthread+0x337/0x6f0 [ 27.657811] ? trace_preempt_on+0x20/0xc0 [ 27.657848] ? __pfx_kthread+0x10/0x10 [ 27.657873] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.657901] ? calculate_sigpending+0x7b/0xa0 [ 27.657930] ? __pfx_kthread+0x10/0x10 [ 27.657956] ret_from_fork+0x116/0x1d0 [ 27.657977] ? __pfx_kthread+0x10/0x10 [ 27.658002] ret_from_fork_asm+0x1a/0x30 [ 27.658037] </TASK> [ 27.658050] [ 27.664601] Allocated by task 333: [ 27.664785] kasan_save_stack+0x45/0x70 [ 27.664999] kasan_save_track+0x18/0x40 [ 27.665184] kasan_save_alloc_info+0x3b/0x50 [ 27.665408] __kasan_kmalloc+0xb7/0xc0 [ 27.665592] __kmalloc_noprof+0x1c9/0x500 [ 27.665790] kunit_kmalloc_array+0x25/0x60 [ 27.666006] copy_user_test_oob+0xab/0x10f0 [ 27.666208] kunit_try_run_case+0x1a5/0x480 [ 27.666401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.666609] kthread+0x337/0x6f0 [ 27.666767] ret_from_fork+0x116/0x1d0 [ 27.666983] ret_from_fork_asm+0x1a/0x30 [ 27.667122] [ 27.667211] The buggy address belongs to the object at ffff8881062af800 [ 27.667211] which belongs to the cache kmalloc-128 of size 128 [ 27.667709] The buggy address is located 0 bytes inside of [ 27.667709] allocated 120-byte region [ffff8881062af800, ffff8881062af878) [ 27.668136] [ 27.668205] The buggy address belongs to the physical page: [ 27.668387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 27.668625] flags: 0x200000000000000(node=0|zone=2) [ 27.668849] page_type: f5(slab) [ 27.669012] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.669356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.669692] page dumped because: kasan: bad access detected [ 27.669960] [ 27.670045] Memory state around the buggy address: [ 27.670224] ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.670447] ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.670661] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.670893] ^ [ 27.671205] ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.671530] ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.672453] ==================================================================