Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.580904] ================================================================== [ 32.580970] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.581031] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.581088] [ 32.581123] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.581231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.581260] Hardware name: linux,dummy-virt (DT) [ 32.581293] Call trace: [ 32.581318] show_stack+0x20/0x38 (C) [ 32.584989] dump_stack_lvl+0x8c/0xd0 [ 32.586117] print_report+0x118/0x5d0 [ 32.586620] kasan_report+0xdc/0x128 [ 32.587004] kasan_check_range+0x100/0x1a8 [ 32.587592] __kasan_check_read+0x20/0x30 [ 32.588330] copy_user_test_oob+0x728/0xec8 [ 32.588398] kunit_try_run_case+0x170/0x3f0 [ 32.588449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.588912] kthread+0x328/0x630 [ 32.589650] ret_from_fork+0x10/0x20 [ 32.589844] [ 32.590348] Allocated by task 316: [ 32.590452] kasan_save_stack+0x3c/0x68 [ 32.591048] kasan_save_track+0x20/0x40 [ 32.591105] kasan_save_alloc_info+0x40/0x58 [ 32.591802] __kasan_kmalloc+0xd4/0xd8 [ 32.591856] __kmalloc_noprof+0x198/0x4c8 [ 32.591899] kunit_kmalloc_array+0x34/0x88 [ 32.592769] copy_user_test_oob+0xac/0xec8 [ 32.593366] kunit_try_run_case+0x170/0x3f0 [ 32.593945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.594389] kthread+0x328/0x630 [ 32.594481] ret_from_fork+0x10/0x20 [ 32.594597] [ 32.594816] The buggy address belongs to the object at fff00000c9bc2900 [ 32.594816] which belongs to the cache kmalloc-128 of size 128 [ 32.594896] The buggy address is located 0 bytes inside of [ 32.594896] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.595839] [ 32.596022] The buggy address belongs to the physical page: [ 32.596224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.596865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.597079] page_type: f5(slab) [ 32.597231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.598023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.598322] page dumped because: kasan: bad access detected [ 32.598358] [ 32.598885] Memory state around the buggy address: [ 32.598995] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.599060] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599108] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.599159] ^ [ 32.599205] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.600009] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.600247] ================================================================== [ 32.622985] ================================================================== [ 32.623052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.623103] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.623265] [ 32.623313] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.623448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.623476] Hardware name: linux,dummy-virt (DT) [ 32.623533] Call trace: [ 32.623558] show_stack+0x20/0x38 (C) [ 32.623627] dump_stack_lvl+0x8c/0xd0 [ 32.623691] print_report+0x118/0x5d0 [ 32.623763] kasan_report+0xdc/0x128 [ 32.623806] kasan_check_range+0x100/0x1a8 [ 32.623854] __kasan_check_read+0x20/0x30 [ 32.623916] copy_user_test_oob+0x4a0/0xec8 [ 32.624012] kunit_try_run_case+0x170/0x3f0 [ 32.624069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624144] kthread+0x328/0x630 [ 32.624188] ret_from_fork+0x10/0x20 [ 32.624235] [ 32.624255] Allocated by task 316: [ 32.624305] kasan_save_stack+0x3c/0x68 [ 32.624347] kasan_save_track+0x20/0x40 [ 32.624388] kasan_save_alloc_info+0x40/0x58 [ 32.624426] __kasan_kmalloc+0xd4/0xd8 [ 32.624466] __kmalloc_noprof+0x198/0x4c8 [ 32.624506] kunit_kmalloc_array+0x34/0x88 [ 32.624547] copy_user_test_oob+0xac/0xec8 [ 32.624588] kunit_try_run_case+0x170/0x3f0 [ 32.624835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624890] kthread+0x328/0x630 [ 32.624968] ret_from_fork+0x10/0x20 [ 32.625016] [ 32.625045] The buggy address belongs to the object at fff00000c9bc2900 [ 32.625045] which belongs to the cache kmalloc-128 of size 128 [ 32.625112] The buggy address is located 0 bytes inside of [ 32.625112] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.625205] [ 32.625245] The buggy address belongs to the physical page: [ 32.625280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.625342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.625542] page_type: f5(slab) [ 32.625590] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.625708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.625773] page dumped because: kasan: bad access detected [ 32.625809] [ 32.625830] Memory state around the buggy address: [ 32.625863] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.625910] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625966] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.626009] ^ [ 32.626051] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.626105] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.626193] ================================================================== [ 32.609807] ================================================================== [ 32.610042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.610119] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.610228] [ 32.610268] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.610523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610555] Hardware name: linux,dummy-virt (DT) [ 32.610588] Call trace: [ 32.610615] show_stack+0x20/0x38 (C) [ 32.610665] dump_stack_lvl+0x8c/0xd0 [ 32.610816] print_report+0x118/0x5d0 [ 32.610874] kasan_report+0xdc/0x128 [ 32.610917] kasan_check_range+0x100/0x1a8 [ 32.610964] __kasan_check_write+0x20/0x30 [ 32.611011] copy_user_test_oob+0x35c/0xec8 [ 32.611061] kunit_try_run_case+0x170/0x3f0 [ 32.611155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.611211] kthread+0x328/0x630 [ 32.611254] ret_from_fork+0x10/0x20 [ 32.611341] [ 32.611405] Allocated by task 316: [ 32.611463] kasan_save_stack+0x3c/0x68 [ 32.611592] kasan_save_track+0x20/0x40 [ 32.611659] kasan_save_alloc_info+0x40/0x58 [ 32.611752] __kasan_kmalloc+0xd4/0xd8 [ 32.611831] __kmalloc_noprof+0x198/0x4c8 [ 32.611929] kunit_kmalloc_array+0x34/0x88 [ 32.612020] copy_user_test_oob+0xac/0xec8 [ 32.612073] kunit_try_run_case+0x170/0x3f0 [ 32.612142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612191] kthread+0x328/0x630 [ 32.612226] ret_from_fork+0x10/0x20 [ 32.612263] [ 32.612284] The buggy address belongs to the object at fff00000c9bc2900 [ 32.612284] which belongs to the cache kmalloc-128 of size 128 [ 32.612347] The buggy address is located 0 bytes inside of [ 32.612347] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.612441] [ 32.612463] The buggy address belongs to the physical page: [ 32.612538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.612636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.612724] page_type: f5(slab) [ 32.612834] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.612924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.612996] page dumped because: kasan: bad access detected [ 32.613069] [ 32.613153] Memory state around the buggy address: [ 32.613229] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.613324] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613414] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.613540] ^ [ 32.613616] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613663] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613851] ================================================================== [ 32.543440] ================================================================== [ 32.543554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.543654] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.543709] [ 32.543756] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.543854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.543883] Hardware name: linux,dummy-virt (DT) [ 32.544471] Call trace: [ 32.545536] show_stack+0x20/0x38 (C) [ 32.546014] dump_stack_lvl+0x8c/0xd0 [ 32.546073] print_report+0x118/0x5d0 [ 32.546121] kasan_report+0xdc/0x128 [ 32.546177] kasan_check_range+0x100/0x1a8 [ 32.546227] __kasan_check_write+0x20/0x30 [ 32.546276] copy_user_test_oob+0x234/0xec8 [ 32.546326] kunit_try_run_case+0x170/0x3f0 [ 32.546382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.546438] kthread+0x328/0x630 [ 32.546483] ret_from_fork+0x10/0x20 [ 32.546535] [ 32.546556] Allocated by task 316: [ 32.546589] kasan_save_stack+0x3c/0x68 [ 32.549477] kasan_save_track+0x20/0x40 [ 32.549913] kasan_save_alloc_info+0x40/0x58 [ 32.550027] __kasan_kmalloc+0xd4/0xd8 [ 32.550099] __kmalloc_noprof+0x198/0x4c8 [ 32.550752] kunit_kmalloc_array+0x34/0x88 [ 32.550811] copy_user_test_oob+0xac/0xec8 [ 32.551582] kunit_try_run_case+0x170/0x3f0 [ 32.551697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.552036] kthread+0x328/0x630 [ 32.553264] ret_from_fork+0x10/0x20 [ 32.553314] [ 32.553994] The buggy address belongs to the object at fff00000c9bc2900 [ 32.553994] which belongs to the cache kmalloc-128 of size 128 [ 32.554233] The buggy address is located 0 bytes inside of [ 32.554233] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.554533] [ 32.554560] The buggy address belongs to the physical page: [ 32.555221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.555348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.555408] page_type: f5(slab) [ 32.555454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.556174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.556948] page dumped because: kasan: bad access detected [ 32.556989] [ 32.557011] Memory state around the buggy address: [ 32.557647] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.557765] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.557994] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.558189] ^ [ 32.558338] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.559653] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.560451] ================================================================== [ 32.614582] ================================================================== [ 32.614656] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.614874] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.614929] [ 32.614960] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.615065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.615093] Hardware name: linux,dummy-virt (DT) [ 32.615181] Call trace: [ 32.615251] show_stack+0x20/0x38 (C) [ 32.615373] dump_stack_lvl+0x8c/0xd0 [ 32.615450] print_report+0x118/0x5d0 [ 32.615510] kasan_report+0xdc/0x128 [ 32.615583] kasan_check_range+0x100/0x1a8 [ 32.615642] __kasan_check_read+0x20/0x30 [ 32.615709] copy_user_test_oob+0x3c8/0xec8 [ 32.615899] kunit_try_run_case+0x170/0x3f0 [ 32.616044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.616153] kthread+0x328/0x630 [ 32.616196] ret_from_fork+0x10/0x20 [ 32.616245] [ 32.616274] Allocated by task 316: [ 32.616303] kasan_save_stack+0x3c/0x68 [ 32.616346] kasan_save_track+0x20/0x40 [ 32.616395] kasan_save_alloc_info+0x40/0x58 [ 32.616458] __kasan_kmalloc+0xd4/0xd8 [ 32.616516] __kmalloc_noprof+0x198/0x4c8 [ 32.616557] kunit_kmalloc_array+0x34/0x88 [ 32.616598] copy_user_test_oob+0xac/0xec8 [ 32.616644] kunit_try_run_case+0x170/0x3f0 [ 32.616685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.616732] kthread+0x328/0x630 [ 32.616766] ret_from_fork+0x10/0x20 [ 32.616803] [ 32.616834] The buggy address belongs to the object at fff00000c9bc2900 [ 32.616834] which belongs to the cache kmalloc-128 of size 128 [ 32.616896] The buggy address is located 0 bytes inside of [ 32.616896] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.616963] [ 32.616987] The buggy address belongs to the physical page: [ 32.617022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.617085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.617152] page_type: f5(slab) [ 32.617192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.617245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.617291] page dumped because: kasan: bad access detected [ 32.617325] [ 32.617366] Memory state around the buggy address: [ 32.617403] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.617450] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617496] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.617538] ^ [ 32.617603] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617647] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617702] ================================================================== [ 32.618022] ================================================================== [ 32.618072] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.618148] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.618203] [ 32.618258] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.618346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.618374] Hardware name: linux,dummy-virt (DT) [ 32.618408] Call trace: [ 32.618433] show_stack+0x20/0x38 (C) [ 32.618481] dump_stack_lvl+0x8c/0xd0 [ 32.618527] print_report+0x118/0x5d0 [ 32.618571] kasan_report+0xdc/0x128 [ 32.618788] kasan_check_range+0x100/0x1a8 [ 32.618840] __kasan_check_write+0x20/0x30 [ 32.618888] copy_user_test_oob+0x434/0xec8 [ 32.618936] kunit_try_run_case+0x170/0x3f0 [ 32.618985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.619040] kthread+0x328/0x630 [ 32.619206] ret_from_fork+0x10/0x20 [ 32.619334] [ 32.619437] Allocated by task 316: [ 32.619496] kasan_save_stack+0x3c/0x68 [ 32.619594] kasan_save_track+0x20/0x40 [ 32.619788] kasan_save_alloc_info+0x40/0x58 [ 32.619847] __kasan_kmalloc+0xd4/0xd8 [ 32.619887] __kmalloc_noprof+0x198/0x4c8 [ 32.619938] kunit_kmalloc_array+0x34/0x88 [ 32.620035] copy_user_test_oob+0xac/0xec8 [ 32.620113] kunit_try_run_case+0x170/0x3f0 [ 32.620237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.620325] kthread+0x328/0x630 [ 32.620390] ret_from_fork+0x10/0x20 [ 32.620512] [ 32.620533] The buggy address belongs to the object at fff00000c9bc2900 [ 32.620533] which belongs to the cache kmalloc-128 of size 128 [ 32.620596] The buggy address is located 0 bytes inside of [ 32.620596] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.620682] [ 32.620703] The buggy address belongs to the physical page: [ 32.620964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.621083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.621227] page_type: f5(slab) [ 32.621295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.621408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.621584] page dumped because: kasan: bad access detected [ 32.621642] [ 32.621662] Memory state around the buggy address: [ 32.621697] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.621762] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.621848] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.621917] ^ [ 32.622045] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.622176] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.622300] ==================================================================
[ 29.228745] ================================================================== [ 29.229173] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 29.229737] Read of size 121 at addr ffff8881060c3d00 by task kunit_try_catch/333 [ 29.230220] [ 29.230333] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.230519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.230537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.230562] Call Trace: [ 29.230578] <TASK> [ 29.230594] dump_stack_lvl+0x73/0xb0 [ 29.230626] print_report+0xd1/0x610 [ 29.230652] ? __virt_addr_valid+0x1db/0x2d0 [ 29.230679] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.230717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.230745] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.230769] kasan_report+0x141/0x180 [ 29.230793] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.230822] kasan_check_range+0x10c/0x1c0 [ 29.230847] __kasan_check_read+0x15/0x20 [ 29.230871] copy_user_test_oob+0x4aa/0x10f0 [ 29.230897] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.230921] ? finish_task_switch.isra.0+0x153/0x700 [ 29.230945] ? __switch_to+0x47/0xf80 [ 29.230972] ? __schedule+0x10cc/0x2b60 [ 29.230997] ? __pfx_read_tsc+0x10/0x10 [ 29.231020] ? ktime_get_ts64+0x86/0x230 [ 29.231045] kunit_try_run_case+0x1a5/0x480 [ 29.231069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.231091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.231117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.231141] ? __kthread_parkme+0x82/0x180 [ 29.231164] ? preempt_count_sub+0x50/0x80 [ 29.231189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.231213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.231239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.231266] kthread+0x337/0x6f0 [ 29.231288] ? trace_preempt_on+0x20/0xc0 [ 29.231312] ? __pfx_kthread+0x10/0x10 [ 29.231335] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.231358] ? calculate_sigpending+0x7b/0xa0 [ 29.231384] ? __pfx_kthread+0x10/0x10 [ 29.231407] ret_from_fork+0x116/0x1d0 [ 29.231428] ? __pfx_kthread+0x10/0x10 [ 29.231450] ret_from_fork_asm+0x1a/0x30 [ 29.231482] </TASK> [ 29.231509] [ 29.241412] Allocated by task 333: [ 29.241897] kasan_save_stack+0x45/0x70 [ 29.242094] kasan_save_track+0x18/0x40 [ 29.242310] kasan_save_alloc_info+0x3b/0x50 [ 29.242739] __kasan_kmalloc+0xb7/0xc0 [ 29.243012] __kmalloc_noprof+0x1c9/0x500 [ 29.243228] kunit_kmalloc_array+0x25/0x60 [ 29.243578] copy_user_test_oob+0xab/0x10f0 [ 29.243807] kunit_try_run_case+0x1a5/0x480 [ 29.244114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.244446] kthread+0x337/0x6f0 [ 29.244752] ret_from_fork+0x116/0x1d0 [ 29.244900] ret_from_fork_asm+0x1a/0x30 [ 29.245231] [ 29.245335] The buggy address belongs to the object at ffff8881060c3d00 [ 29.245335] which belongs to the cache kmalloc-128 of size 128 [ 29.245997] The buggy address is located 0 bytes inside of [ 29.245997] allocated 120-byte region [ffff8881060c3d00, ffff8881060c3d78) [ 29.246725] [ 29.246835] The buggy address belongs to the physical page: [ 29.247203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3 [ 29.247554] flags: 0x200000000000000(node=0|zone=2) [ 29.247954] page_type: f5(slab) [ 29.248201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.248647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.249084] page dumped because: kasan: bad access detected [ 29.249348] [ 29.249597] Memory state around the buggy address: [ 29.249834] ffff8881060c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.250253] ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.250668] >ffff8881060c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.251032] ^ [ 29.251410] ffff8881060c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.251899] ffff8881060c3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252221] ================================================================== [ 29.253015] ================================================================== [ 29.253656] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 29.254069] Write of size 121 at addr ffff8881060c3d00 by task kunit_try_catch/333 [ 29.254437] [ 29.254544] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.254595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.254730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.254889] Call Trace: [ 29.254905] <TASK> [ 29.254923] dump_stack_lvl+0x73/0xb0 [ 29.254954] print_report+0xd1/0x610 [ 29.254977] ? __virt_addr_valid+0x1db/0x2d0 [ 29.255002] ? copy_user_test_oob+0x557/0x10f0 [ 29.255027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.255055] ? copy_user_test_oob+0x557/0x10f0 [ 29.255079] kasan_report+0x141/0x180 [ 29.255102] ? copy_user_test_oob+0x557/0x10f0 [ 29.255131] kasan_check_range+0x10c/0x1c0 [ 29.255156] __kasan_check_write+0x18/0x20 [ 29.255180] copy_user_test_oob+0x557/0x10f0 [ 29.255206] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.255230] ? finish_task_switch.isra.0+0x153/0x700 [ 29.255253] ? __switch_to+0x47/0xf80 [ 29.255281] ? __schedule+0x10cc/0x2b60 [ 29.255304] ? __pfx_read_tsc+0x10/0x10 [ 29.255326] ? ktime_get_ts64+0x86/0x230 [ 29.255352] kunit_try_run_case+0x1a5/0x480 [ 29.255376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.255397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.255421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.255447] ? __kthread_parkme+0x82/0x180 [ 29.255469] ? preempt_count_sub+0x50/0x80 [ 29.255508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.255532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.255559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.255586] kthread+0x337/0x6f0 [ 29.255608] ? trace_preempt_on+0x20/0xc0 [ 29.255632] ? __pfx_kthread+0x10/0x10 [ 29.255654] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.255677] ? calculate_sigpending+0x7b/0xa0 [ 29.255712] ? __pfx_kthread+0x10/0x10 [ 29.255736] ret_from_fork+0x116/0x1d0 [ 29.255757] ? __pfx_kthread+0x10/0x10 [ 29.255780] ret_from_fork_asm+0x1a/0x30 [ 29.255812] </TASK> [ 29.255825] [ 29.265218] Allocated by task 333: [ 29.265387] kasan_save_stack+0x45/0x70 [ 29.265912] kasan_save_track+0x18/0x40 [ 29.266189] kasan_save_alloc_info+0x3b/0x50 [ 29.266394] __kasan_kmalloc+0xb7/0xc0 [ 29.266709] __kmalloc_noprof+0x1c9/0x500 [ 29.266973] kunit_kmalloc_array+0x25/0x60 [ 29.267141] copy_user_test_oob+0xab/0x10f0 [ 29.267335] kunit_try_run_case+0x1a5/0x480 [ 29.267541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.267784] kthread+0x337/0x6f0 [ 29.267972] ret_from_fork+0x116/0x1d0 [ 29.268115] ret_from_fork_asm+0x1a/0x30 [ 29.268315] [ 29.268391] The buggy address belongs to the object at ffff8881060c3d00 [ 29.268391] which belongs to the cache kmalloc-128 of size 128 [ 29.268877] The buggy address is located 0 bytes inside of [ 29.268877] allocated 120-byte region [ffff8881060c3d00, ffff8881060c3d78) [ 29.269345] [ 29.269424] The buggy address belongs to the physical page: [ 29.269646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3 [ 29.270092] flags: 0x200000000000000(node=0|zone=2) [ 29.270351] page_type: f5(slab) [ 29.270533] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.270830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.271119] page dumped because: kasan: bad access detected [ 29.271358] [ 29.271438] Memory state around the buggy address: [ 29.271620] ffff8881060c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.272011] ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.272317] >ffff8881060c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.272565] ^ [ 29.272864] ffff8881060c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.273148] ffff8881060c3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.273366] ================================================================== [ 29.202395] ================================================================== [ 29.202889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 29.203361] Write of size 121 at addr ffff8881060c3d00 by task kunit_try_catch/333 [ 29.204055] [ 29.204185] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.204237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.204251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.204275] Call Trace: [ 29.204290] <TASK> [ 29.204309] dump_stack_lvl+0x73/0xb0 [ 29.204339] print_report+0xd1/0x610 [ 29.204365] ? __virt_addr_valid+0x1db/0x2d0 [ 29.204391] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.204418] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.204445] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.204470] kasan_report+0x141/0x180 [ 29.204607] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.204640] kasan_check_range+0x10c/0x1c0 [ 29.204680] __kasan_check_write+0x18/0x20 [ 29.204714] copy_user_test_oob+0x3fd/0x10f0 [ 29.204740] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.204765] ? finish_task_switch.isra.0+0x153/0x700 [ 29.204789] ? __switch_to+0x47/0xf80 [ 29.204816] ? __schedule+0x10cc/0x2b60 [ 29.204840] ? __pfx_read_tsc+0x10/0x10 [ 29.204863] ? ktime_get_ts64+0x86/0x230 [ 29.204889] kunit_try_run_case+0x1a5/0x480 [ 29.204912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.204934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.204958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.204983] ? __kthread_parkme+0x82/0x180 [ 29.205004] ? preempt_count_sub+0x50/0x80 [ 29.205028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.205053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.205080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.205106] kthread+0x337/0x6f0 [ 29.205128] ? trace_preempt_on+0x20/0xc0 [ 29.205151] ? __pfx_kthread+0x10/0x10 [ 29.205174] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.205197] ? calculate_sigpending+0x7b/0xa0 [ 29.205222] ? __pfx_kthread+0x10/0x10 [ 29.205245] ret_from_fork+0x116/0x1d0 [ 29.205267] ? __pfx_kthread+0x10/0x10 [ 29.205289] ret_from_fork_asm+0x1a/0x30 [ 29.205322] </TASK> [ 29.205335] [ 29.216479] Allocated by task 333: [ 29.216754] kasan_save_stack+0x45/0x70 [ 29.217161] kasan_save_track+0x18/0x40 [ 29.217337] kasan_save_alloc_info+0x3b/0x50 [ 29.217725] __kasan_kmalloc+0xb7/0xc0 [ 29.218014] __kmalloc_noprof+0x1c9/0x500 [ 29.218308] kunit_kmalloc_array+0x25/0x60 [ 29.218655] copy_user_test_oob+0xab/0x10f0 [ 29.218977] kunit_try_run_case+0x1a5/0x480 [ 29.219307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.219668] kthread+0x337/0x6f0 [ 29.219964] ret_from_fork+0x116/0x1d0 [ 29.220245] ret_from_fork_asm+0x1a/0x30 [ 29.220555] [ 29.220660] The buggy address belongs to the object at ffff8881060c3d00 [ 29.220660] which belongs to the cache kmalloc-128 of size 128 [ 29.221459] The buggy address is located 0 bytes inside of [ 29.221459] allocated 120-byte region [ffff8881060c3d00, ffff8881060c3d78) [ 29.222181] [ 29.222264] The buggy address belongs to the physical page: [ 29.222784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3 [ 29.223150] flags: 0x200000000000000(node=0|zone=2) [ 29.223506] page_type: f5(slab) [ 29.223798] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.224126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.224457] page dumped because: kasan: bad access detected [ 29.224777] [ 29.224850] Memory state around the buggy address: [ 29.225357] ffff8881060c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.225733] ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.226200] >ffff8881060c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.226656] ^ [ 29.227100] ffff8881060c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.227490] ffff8881060c3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.227925] ================================================================== [ 29.274021] ================================================================== [ 29.274293] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 29.274673] Read of size 121 at addr ffff8881060c3d00 by task kunit_try_catch/333 [ 29.274963] [ 29.275071] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.275121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.275134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.275158] Call Trace: [ 29.275172] <TASK> [ 29.275188] dump_stack_lvl+0x73/0xb0 [ 29.275216] print_report+0xd1/0x610 [ 29.275239] ? __virt_addr_valid+0x1db/0x2d0 [ 29.275265] ? copy_user_test_oob+0x604/0x10f0 [ 29.275289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.275316] ? copy_user_test_oob+0x604/0x10f0 [ 29.275341] kasan_report+0x141/0x180 [ 29.275365] ? copy_user_test_oob+0x604/0x10f0 [ 29.275393] kasan_check_range+0x10c/0x1c0 [ 29.275418] __kasan_check_read+0x15/0x20 [ 29.275442] copy_user_test_oob+0x604/0x10f0 [ 29.275469] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.275493] ? finish_task_switch.isra.0+0x153/0x700 [ 29.275516] ? __switch_to+0x47/0xf80 [ 29.275543] ? __schedule+0x10cc/0x2b60 [ 29.275566] ? __pfx_read_tsc+0x10/0x10 [ 29.275588] ? ktime_get_ts64+0x86/0x230 [ 29.275614] kunit_try_run_case+0x1a5/0x480 [ 29.275637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.275659] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.275684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.275721] ? __kthread_parkme+0x82/0x180 [ 29.275744] ? preempt_count_sub+0x50/0x80 [ 29.275768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.275802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.275829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.275859] kthread+0x337/0x6f0 [ 29.275881] ? trace_preempt_on+0x20/0xc0 [ 29.275906] ? __pfx_kthread+0x10/0x10 [ 29.275928] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.275951] ? calculate_sigpending+0x7b/0xa0 [ 29.275977] ? __pfx_kthread+0x10/0x10 [ 29.276001] ret_from_fork+0x116/0x1d0 [ 29.276021] ? __pfx_kthread+0x10/0x10 [ 29.276043] ret_from_fork_asm+0x1a/0x30 [ 29.276075] </TASK> [ 29.276088] [ 29.283143] Allocated by task 333: [ 29.283306] kasan_save_stack+0x45/0x70 [ 29.283452] kasan_save_track+0x18/0x40 [ 29.283586] kasan_save_alloc_info+0x3b/0x50 [ 29.283848] __kasan_kmalloc+0xb7/0xc0 [ 29.284039] __kmalloc_noprof+0x1c9/0x500 [ 29.284244] kunit_kmalloc_array+0x25/0x60 [ 29.284451] copy_user_test_oob+0xab/0x10f0 [ 29.284672] kunit_try_run_case+0x1a5/0x480 [ 29.284864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.285165] kthread+0x337/0x6f0 [ 29.285322] ret_from_fork+0x116/0x1d0 [ 29.285484] ret_from_fork_asm+0x1a/0x30 [ 29.285665] [ 29.285745] The buggy address belongs to the object at ffff8881060c3d00 [ 29.285745] which belongs to the cache kmalloc-128 of size 128 [ 29.286105] The buggy address is located 0 bytes inside of [ 29.286105] allocated 120-byte region [ffff8881060c3d00, ffff8881060c3d78) [ 29.286591] [ 29.286683] The buggy address belongs to the physical page: [ 29.286942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3 [ 29.287270] flags: 0x200000000000000(node=0|zone=2) [ 29.287431] page_type: f5(slab) [ 29.287709] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.288052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.288278] page dumped because: kasan: bad access detected [ 29.288457] [ 29.288627] Memory state around the buggy address: [ 29.288862] ffff8881060c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.289185] ffff8881060c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.289508] >ffff8881060c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.289795] ^ [ 29.290047] ffff8881060c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.290261] ffff8881060c3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.290514] ==================================================================