Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 82.072803] ================================================================== [ 82.079793] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 82.086820] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 82.094285] [ 82.095770] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.095825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.095839] Hardware name: WinLink E850-96 board (DT) [ 82.095859] Call trace: [ 82.095874] show_stack+0x20/0x38 (C) [ 82.095908] dump_stack_lvl+0x8c/0xd0 [ 82.095940] print_report+0x118/0x5d0 [ 82.095966] kasan_report+0xdc/0x128 [ 82.095991] kasan_check_range+0x100/0x1a8 [ 82.096025] __kasan_check_read+0x20/0x30 [ 82.096055] copy_user_test_oob+0x4a0/0xec8 [ 82.096089] kunit_try_run_case+0x170/0x3f0 [ 82.096123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.096157] kthread+0x328/0x630 [ 82.096186] ret_from_fork+0x10/0x20 [ 82.096219] [ 82.163120] Allocated by task 369: [ 82.166508] kasan_save_stack+0x3c/0x68 [ 82.170325] kasan_save_track+0x20/0x40 [ 82.174145] kasan_save_alloc_info+0x40/0x58 [ 82.178398] __kasan_kmalloc+0xd4/0xd8 [ 82.182131] __kmalloc_noprof+0x198/0x4c8 [ 82.186123] kunit_kmalloc_array+0x34/0x88 [ 82.190203] copy_user_test_oob+0xac/0xec8 [ 82.194283] kunit_try_run_case+0x170/0x3f0 [ 82.198450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.203918] kthread+0x328/0x630 [ 82.207130] ret_from_fork+0x10/0x20 [ 82.210689] [ 82.212165] The buggy address belongs to the object at ffff0008074f9300 [ 82.212165] which belongs to the cache kmalloc-128 of size 128 [ 82.224666] The buggy address is located 0 bytes inside of [ 82.224666] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.237078] [ 82.238555] The buggy address belongs to the physical page: [ 82.244113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.252095] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.259734] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.266678] page_type: f5(slab) [ 82.269812] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.277535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.285262] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.293073] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.300886] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.308697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.316504] page dumped because: kasan: bad access detected [ 82.322059] [ 82.323535] Memory state around the buggy address: [ 82.328315] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.335518] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.342722] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.349923] ^ [ 82.357045] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.364250] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.371451] ================================================================== [ 80.848610] ================================================================== [ 80.855163] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 80.862186] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 80.869650] [ 80.871136] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 80.871194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.871213] Hardware name: WinLink E850-96 board (DT) [ 80.871235] Call trace: [ 80.871250] show_stack+0x20/0x38 (C) [ 80.871288] dump_stack_lvl+0x8c/0xd0 [ 80.871322] print_report+0x118/0x5d0 [ 80.871354] kasan_report+0xdc/0x128 [ 80.871382] kasan_check_range+0x100/0x1a8 [ 80.871412] __kasan_check_read+0x20/0x30 [ 80.871446] copy_user_test_oob+0x728/0xec8 [ 80.871480] kunit_try_run_case+0x170/0x3f0 [ 80.871519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.871554] kthread+0x328/0x630 [ 80.871582] ret_from_fork+0x10/0x20 [ 80.871619] [ 80.938487] Allocated by task 369: [ 80.941873] kasan_save_stack+0x3c/0x68 [ 80.945691] kasan_save_track+0x20/0x40 [ 80.949512] kasan_save_alloc_info+0x40/0x58 [ 80.953764] __kasan_kmalloc+0xd4/0xd8 [ 80.957496] __kmalloc_noprof+0x198/0x4c8 [ 80.961489] kunit_kmalloc_array+0x34/0x88 [ 80.965569] copy_user_test_oob+0xac/0xec8 [ 80.969649] kunit_try_run_case+0x170/0x3f0 [ 80.973816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.979284] kthread+0x328/0x630 [ 80.982496] ret_from_fork+0x10/0x20 [ 80.986055] [ 80.987532] The buggy address belongs to the object at ffff0008074f9300 [ 80.987532] which belongs to the cache kmalloc-128 of size 128 [ 81.000033] The buggy address is located 0 bytes inside of [ 81.000033] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.012443] [ 81.013922] The buggy address belongs to the physical page: [ 81.019479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.027461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.035104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.042046] page_type: f5(slab) [ 81.045182] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.052901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.060627] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.068438] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.076252] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.084063] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.091869] page dumped because: kasan: bad access detected [ 81.097425] [ 81.098900] Memory state around the buggy address: [ 81.103680] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.110883] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.118088] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.125289] ^ [ 81.132411] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.139616] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.146816] ================================================================== [ 81.460406] ================================================================== [ 81.467478] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 81.474503] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.481968] [ 81.483453] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.483505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.483523] Hardware name: WinLink E850-96 board (DT) [ 81.483543] Call trace: [ 81.483557] show_stack+0x20/0x38 (C) [ 81.483591] dump_stack_lvl+0x8c/0xd0 [ 81.483623] print_report+0x118/0x5d0 [ 81.483652] kasan_report+0xdc/0x128 [ 81.483680] kasan_check_range+0x100/0x1a8 [ 81.483711] __kasan_check_read+0x20/0x30 [ 81.483743] copy_user_test_oob+0x3c8/0xec8 [ 81.483779] kunit_try_run_case+0x170/0x3f0 [ 81.483818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.483851] kthread+0x328/0x630 [ 81.483882] ret_from_fork+0x10/0x20 [ 81.483917] [ 81.550803] Allocated by task 369: [ 81.554191] kasan_save_stack+0x3c/0x68 [ 81.558008] kasan_save_track+0x20/0x40 [ 81.561827] kasan_save_alloc_info+0x40/0x58 [ 81.566081] __kasan_kmalloc+0xd4/0xd8 [ 81.569814] __kmalloc_noprof+0x198/0x4c8 [ 81.573807] kunit_kmalloc_array+0x34/0x88 [ 81.577886] copy_user_test_oob+0xac/0xec8 [ 81.581966] kunit_try_run_case+0x170/0x3f0 [ 81.586133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.591602] kthread+0x328/0x630 [ 81.594813] ret_from_fork+0x10/0x20 [ 81.598372] [ 81.599849] The buggy address belongs to the object at ffff0008074f9300 [ 81.599849] which belongs to the cache kmalloc-128 of size 128 [ 81.612351] The buggy address is located 0 bytes inside of [ 81.612351] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.624761] [ 81.626238] The buggy address belongs to the physical page: [ 81.631796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.639778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.647419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.654361] page_type: f5(slab) [ 81.657497] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.665218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.672944] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.680756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.688569] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.696381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.704186] page dumped because: kasan: bad access detected [ 81.709742] [ 81.711217] Memory state around the buggy address: [ 81.715999] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.723200] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.730405] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.737606] ^ [ 81.744728] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.751932] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.759134] ================================================================== [ 80.536556] ================================================================== [ 80.548913] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 80.555940] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 80.563492] [ 80.564979] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 80.565039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.565058] Hardware name: WinLink E850-96 board (DT) [ 80.565081] Call trace: [ 80.565097] show_stack+0x20/0x38 (C) [ 80.565136] dump_stack_lvl+0x8c/0xd0 [ 80.565172] print_report+0x118/0x5d0 [ 80.565201] kasan_report+0xdc/0x128 [ 80.565229] kasan_check_range+0x100/0x1a8 [ 80.565262] __kasan_check_write+0x20/0x30 [ 80.565296] copy_user_test_oob+0x234/0xec8 [ 80.565331] kunit_try_run_case+0x170/0x3f0 [ 80.565370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.565405] kthread+0x328/0x630 [ 80.565436] ret_from_fork+0x10/0x20 [ 80.565473] [ 80.632416] Allocated by task 369: [ 80.635803] kasan_save_stack+0x3c/0x68 [ 80.639619] kasan_save_track+0x20/0x40 [ 80.643440] kasan_save_alloc_info+0x40/0x58 [ 80.647692] __kasan_kmalloc+0xd4/0xd8 [ 80.651424] __kmalloc_noprof+0x198/0x4c8 [ 80.655418] kunit_kmalloc_array+0x34/0x88 [ 80.659497] copy_user_test_oob+0xac/0xec8 [ 80.663577] kunit_try_run_case+0x170/0x3f0 [ 80.667744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.673212] kthread+0x328/0x630 [ 80.676424] ret_from_fork+0x10/0x20 [ 80.679983] [ 80.681460] The buggy address belongs to the object at ffff0008074f9300 [ 80.681460] which belongs to the cache kmalloc-128 of size 128 [ 80.693962] The buggy address is located 0 bytes inside of [ 80.693962] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 80.706371] [ 80.707850] The buggy address belongs to the physical page: [ 80.713408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 80.721391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 80.729031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 80.735973] page_type: f5(slab) [ 80.739110] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.746829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.754557] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.762367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.770180] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 80.777992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 80.785799] page dumped because: kasan: bad access detected [ 80.791352] [ 80.792828] Memory state around the buggy address: [ 80.797607] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.804811] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.812018] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 80.819219] ^ [ 80.826339] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.833545] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.840746] ================================================================== [ 81.154371] ================================================================== [ 81.161230] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 81.168257] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.175809] [ 81.177294] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.177347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.177365] Hardware name: WinLink E850-96 board (DT) [ 81.177384] Call trace: [ 81.177398] show_stack+0x20/0x38 (C) [ 81.177435] dump_stack_lvl+0x8c/0xd0 [ 81.177470] print_report+0x118/0x5d0 [ 81.177498] kasan_report+0xdc/0x128 [ 81.177526] kasan_check_range+0x100/0x1a8 [ 81.177556] __kasan_check_write+0x20/0x30 [ 81.177589] copy_user_test_oob+0x35c/0xec8 [ 81.177622] kunit_try_run_case+0x170/0x3f0 [ 81.177660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.177692] kthread+0x328/0x630 [ 81.177719] ret_from_fork+0x10/0x20 [ 81.177753] [ 81.244732] Allocated by task 369: [ 81.248119] kasan_save_stack+0x3c/0x68 [ 81.251936] kasan_save_track+0x20/0x40 [ 81.255756] kasan_save_alloc_info+0x40/0x58 [ 81.260009] __kasan_kmalloc+0xd4/0xd8 [ 81.263742] __kmalloc_noprof+0x198/0x4c8 [ 81.267735] kunit_kmalloc_array+0x34/0x88 [ 81.271815] copy_user_test_oob+0xac/0xec8 [ 81.275894] kunit_try_run_case+0x170/0x3f0 [ 81.280061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.285530] kthread+0x328/0x630 [ 81.288741] ret_from_fork+0x10/0x20 [ 81.292300] [ 81.293777] The buggy address belongs to the object at ffff0008074f9300 [ 81.293777] which belongs to the cache kmalloc-128 of size 128 [ 81.306278] The buggy address is located 0 bytes inside of [ 81.306278] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.318689] [ 81.320167] The buggy address belongs to the physical page: [ 81.325725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.333707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.341345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.348290] page_type: f5(slab) [ 81.351425] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.359146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.366873] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.374684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.382497] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.390309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.398115] page dumped because: kasan: bad access detected [ 81.403670] [ 81.405146] Memory state around the buggy address: [ 81.409925] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.417128] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.424333] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.431534] ^ [ 81.438656] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.445860] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.453062] ================================================================== [ 81.766677] ================================================================== [ 81.773551] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 81.780574] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.788126] [ 81.789610] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.789666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.789683] Hardware name: WinLink E850-96 board (DT) [ 81.789704] Call trace: [ 81.789720] show_stack+0x20/0x38 (C) [ 81.789756] dump_stack_lvl+0x8c/0xd0 [ 81.789787] print_report+0x118/0x5d0 [ 81.789815] kasan_report+0xdc/0x128 [ 81.789842] kasan_check_range+0x100/0x1a8 [ 81.789874] __kasan_check_write+0x20/0x30 [ 81.789905] copy_user_test_oob+0x434/0xec8 [ 81.789938] kunit_try_run_case+0x170/0x3f0 [ 81.789974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.790009] kthread+0x328/0x630 [ 81.790038] ret_from_fork+0x10/0x20 [ 81.790073] [ 81.857049] Allocated by task 369: [ 81.860436] kasan_save_stack+0x3c/0x68 [ 81.864254] kasan_save_track+0x20/0x40 [ 81.868073] kasan_save_alloc_info+0x40/0x58 [ 81.872326] __kasan_kmalloc+0xd4/0xd8 [ 81.876059] __kmalloc_noprof+0x198/0x4c8 [ 81.880052] kunit_kmalloc_array+0x34/0x88 [ 81.884132] copy_user_test_oob+0xac/0xec8 [ 81.888211] kunit_try_run_case+0x170/0x3f0 [ 81.892378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.897847] kthread+0x328/0x630 [ 81.901059] ret_from_fork+0x10/0x20 [ 81.904618] [ 81.906093] The buggy address belongs to the object at ffff0008074f9300 [ 81.906093] which belongs to the cache kmalloc-128 of size 128 [ 81.918596] The buggy address is located 0 bytes inside of [ 81.918596] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.931006] [ 81.932483] The buggy address belongs to the physical page: [ 81.938041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.946023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.953665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.960606] page_type: f5(slab) [ 81.963742] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.971463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.979190] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.987001] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.994814] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.002626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.010432] page dumped because: kasan: bad access detected [ 82.015987] [ 82.017463] Memory state around the buggy address: [ 82.022243] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.029446] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.036651] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.043852] ^ [ 82.050973] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.058178] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.065379] ==================================================================
[ 32.876982] ================================================================== [ 32.877145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.877208] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.877262] [ 32.877619] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.877751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.877787] Hardware name: linux,dummy-virt (DT) [ 32.877820] Call trace: [ 32.877940] show_stack+0x20/0x38 (C) [ 32.878035] dump_stack_lvl+0x8c/0xd0 [ 32.878218] print_report+0x118/0x5d0 [ 32.878282] kasan_report+0xdc/0x128 [ 32.878328] kasan_check_range+0x100/0x1a8 [ 32.878383] __kasan_check_write+0x20/0x30 [ 32.878592] copy_user_test_oob+0x35c/0xec8 [ 32.878656] kunit_try_run_case+0x170/0x3f0 [ 32.878708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.878860] kthread+0x328/0x630 [ 32.878916] ret_from_fork+0x10/0x20 [ 32.878981] [ 32.879331] Allocated by task 316: [ 32.879437] kasan_save_stack+0x3c/0x68 [ 32.879532] kasan_save_track+0x20/0x40 [ 32.879578] kasan_save_alloc_info+0x40/0x58 [ 32.879655] __kasan_kmalloc+0xd4/0xd8 [ 32.879776] __kmalloc_noprof+0x198/0x4c8 [ 32.879843] kunit_kmalloc_array+0x34/0x88 [ 32.879901] copy_user_test_oob+0xac/0xec8 [ 32.880178] kunit_try_run_case+0x170/0x3f0 [ 32.881036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.881125] kthread+0x328/0x630 [ 32.881198] ret_from_fork+0x10/0x20 [ 32.881266] [ 32.881343] The buggy address belongs to the object at fff00000c85fcf00 [ 32.881343] which belongs to the cache kmalloc-128 of size 128 [ 32.881418] The buggy address is located 0 bytes inside of [ 32.881418] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.881485] [ 32.881879] The buggy address belongs to the physical page: [ 32.881994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.882446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.882515] page_type: f5(slab) [ 32.882560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.882938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.883324] page dumped because: kasan: bad access detected [ 32.883374] [ 32.883395] Memory state around the buggy address: [ 32.883432] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.883619] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883676] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.883718] ^ [ 32.883791] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883836] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.883895] ================================================================== [ 32.885537] ================================================================== [ 32.885653] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.885708] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.885788] [ 32.886102] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.886215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.886244] Hardware name: linux,dummy-virt (DT) [ 32.886395] Call trace: [ 32.886643] show_stack+0x20/0x38 (C) [ 32.886789] dump_stack_lvl+0x8c/0xd0 [ 32.886842] print_report+0x118/0x5d0 [ 32.886898] kasan_report+0xdc/0x128 [ 32.886948] kasan_check_range+0x100/0x1a8 [ 32.887241] __kasan_check_read+0x20/0x30 [ 32.887542] copy_user_test_oob+0x3c8/0xec8 [ 32.887622] kunit_try_run_case+0x170/0x3f0 [ 32.887716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.887801] kthread+0x328/0x630 [ 32.887845] ret_from_fork+0x10/0x20 [ 32.887994] [ 32.888110] Allocated by task 316: [ 32.888230] kasan_save_stack+0x3c/0x68 [ 32.888279] kasan_save_track+0x20/0x40 [ 32.888668] kasan_save_alloc_info+0x40/0x58 [ 32.889112] __kasan_kmalloc+0xd4/0xd8 [ 32.889237] __kmalloc_noprof+0x198/0x4c8 [ 32.889370] kunit_kmalloc_array+0x34/0x88 [ 32.889435] copy_user_test_oob+0xac/0xec8 [ 32.889515] kunit_try_run_case+0x170/0x3f0 [ 32.889560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.889620] kthread+0x328/0x630 [ 32.889656] ret_from_fork+0x10/0x20 [ 32.889695] [ 32.889718] The buggy address belongs to the object at fff00000c85fcf00 [ 32.889718] which belongs to the cache kmalloc-128 of size 128 [ 32.889802] The buggy address is located 0 bytes inside of [ 32.889802] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.889874] [ 32.889905] The buggy address belongs to the physical page: [ 32.889943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.890002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.890061] page_type: f5(slab) [ 32.890102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.890154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.890213] page dumped because: kasan: bad access detected [ 32.890260] [ 32.890291] Memory state around the buggy address: [ 32.890339] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.890385] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890429] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.890477] ^ [ 32.890530] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890571] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.890612] ================================================================== [ 32.891630] ================================================================== [ 32.891693] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.892007] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.892099] [ 32.892131] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.892384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.892757] Hardware name: linux,dummy-virt (DT) [ 32.892881] Call trace: [ 32.892947] show_stack+0x20/0x38 (C) [ 32.893092] dump_stack_lvl+0x8c/0xd0 [ 32.893241] print_report+0x118/0x5d0 [ 32.893401] kasan_report+0xdc/0x128 [ 32.893554] kasan_check_range+0x100/0x1a8 [ 32.893726] __kasan_check_write+0x20/0x30 [ 32.893947] copy_user_test_oob+0x434/0xec8 [ 32.894400] kunit_try_run_case+0x170/0x3f0 [ 32.894545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.894707] kthread+0x328/0x630 [ 32.894827] ret_from_fork+0x10/0x20 [ 32.894945] [ 32.895226] Allocated by task 316: [ 32.895375] kasan_save_stack+0x3c/0x68 [ 32.895478] kasan_save_track+0x20/0x40 [ 32.895737] kasan_save_alloc_info+0x40/0x58 [ 32.895840] __kasan_kmalloc+0xd4/0xd8 [ 32.895902] __kmalloc_noprof+0x198/0x4c8 [ 32.896107] kunit_kmalloc_array+0x34/0x88 [ 32.896442] copy_user_test_oob+0xac/0xec8 [ 32.896617] kunit_try_run_case+0x170/0x3f0 [ 32.896688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.896750] kthread+0x328/0x630 [ 32.896878] ret_from_fork+0x10/0x20 [ 32.897366] [ 32.897427] The buggy address belongs to the object at fff00000c85fcf00 [ 32.897427] which belongs to the cache kmalloc-128 of size 128 [ 32.897502] The buggy address is located 0 bytes inside of [ 32.897502] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.897855] [ 32.897905] The buggy address belongs to the physical page: [ 32.898091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.898149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.898483] page_type: f5(slab) [ 32.898830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.898912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.898986] page dumped because: kasan: bad access detected [ 32.899166] [ 32.899235] Memory state around the buggy address: [ 32.899296] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.899688] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.899997] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.900119] ^ [ 32.900193] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.900295] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.900872] ================================================================== [ 32.858280] ================================================================== [ 32.858552] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.858922] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.859001] [ 32.859038] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.859464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.859618] Hardware name: linux,dummy-virt (DT) [ 32.859821] Call trace: [ 32.859869] show_stack+0x20/0x38 (C) [ 32.859924] dump_stack_lvl+0x8c/0xd0 [ 32.859975] print_report+0x118/0x5d0 [ 32.860020] kasan_report+0xdc/0x128 [ 32.860076] kasan_check_range+0x100/0x1a8 [ 32.860122] __kasan_check_read+0x20/0x30 [ 32.860176] copy_user_test_oob+0x728/0xec8 [ 32.860226] kunit_try_run_case+0x170/0x3f0 [ 32.860276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.860326] kthread+0x328/0x630 [ 32.860689] ret_from_fork+0x10/0x20 [ 32.861070] [ 32.861147] Allocated by task 316: [ 32.861213] kasan_save_stack+0x3c/0x68 [ 32.861261] kasan_save_track+0x20/0x40 [ 32.861325] kasan_save_alloc_info+0x40/0x58 [ 32.861538] __kasan_kmalloc+0xd4/0xd8 [ 32.861697] __kmalloc_noprof+0x198/0x4c8 [ 32.862118] kunit_kmalloc_array+0x34/0x88 [ 32.862299] copy_user_test_oob+0xac/0xec8 [ 32.862488] kunit_try_run_case+0x170/0x3f0 [ 32.862568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862726] kthread+0x328/0x630 [ 32.862893] ret_from_fork+0x10/0x20 [ 32.863022] [ 32.863055] The buggy address belongs to the object at fff00000c85fcf00 [ 32.863055] which belongs to the cache kmalloc-128 of size 128 [ 32.863387] The buggy address is located 0 bytes inside of [ 32.863387] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.863498] [ 32.863625] The buggy address belongs to the physical page: [ 32.863665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.864027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.864512] page_type: f5(slab) [ 32.864626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.864681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.865076] page dumped because: kasan: bad access detected [ 32.865190] [ 32.865446] Memory state around the buggy address: [ 32.865552] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.866113] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866180] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.866353] ^ [ 32.866400] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.867006] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.867072] ================================================================== [ 32.842358] ================================================================== [ 32.842486] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.842586] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.842640] [ 32.842689] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.842784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.842823] Hardware name: linux,dummy-virt (DT) [ 32.842859] Call trace: [ 32.842917] show_stack+0x20/0x38 (C) [ 32.842990] dump_stack_lvl+0x8c/0xd0 [ 32.843045] print_report+0x118/0x5d0 [ 32.843937] kasan_report+0xdc/0x128 [ 32.844177] kasan_check_range+0x100/0x1a8 [ 32.844438] __kasan_check_write+0x20/0x30 [ 32.844607] copy_user_test_oob+0x234/0xec8 [ 32.844774] kunit_try_run_case+0x170/0x3f0 [ 32.844862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.844939] kthread+0x328/0x630 [ 32.845301] ret_from_fork+0x10/0x20 [ 32.845700] [ 32.845803] Allocated by task 316: [ 32.845850] kasan_save_stack+0x3c/0x68 [ 32.845988] kasan_save_track+0x20/0x40 [ 32.846033] kasan_save_alloc_info+0x40/0x58 [ 32.846366] __kasan_kmalloc+0xd4/0xd8 [ 32.846453] __kmalloc_noprof+0x198/0x4c8 [ 32.846569] kunit_kmalloc_array+0x34/0x88 [ 32.846762] copy_user_test_oob+0xac/0xec8 [ 32.846892] kunit_try_run_case+0x170/0x3f0 [ 32.847025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.847092] kthread+0x328/0x630 [ 32.847562] ret_from_fork+0x10/0x20 [ 32.847638] [ 32.847737] The buggy address belongs to the object at fff00000c85fcf00 [ 32.847737] which belongs to the cache kmalloc-128 of size 128 [ 32.847843] The buggy address is located 0 bytes inside of [ 32.847843] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.847916] [ 32.848245] The buggy address belongs to the physical page: [ 32.848349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.848417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.848474] page_type: f5(slab) [ 32.848739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.848964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.849100] page dumped because: kasan: bad access detected [ 32.849244] [ 32.849325] Memory state around the buggy address: [ 32.849492] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.849553] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.849879] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.849963] ^ [ 32.850189] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.850459] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.850686] ================================================================== [ 32.902888] ================================================================== [ 32.903033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.903131] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.903284] [ 32.903318] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.903412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.903439] Hardware name: linux,dummy-virt (DT) [ 32.903749] Call trace: [ 32.904043] show_stack+0x20/0x38 (C) [ 32.904150] dump_stack_lvl+0x8c/0xd0 [ 32.904378] print_report+0x118/0x5d0 [ 32.904561] kasan_report+0xdc/0x128 [ 32.904623] kasan_check_range+0x100/0x1a8 [ 32.904671] __kasan_check_read+0x20/0x30 [ 32.904719] copy_user_test_oob+0x4a0/0xec8 [ 32.904768] kunit_try_run_case+0x170/0x3f0 [ 32.904952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.905143] kthread+0x328/0x630 [ 32.905359] ret_from_fork+0x10/0x20 [ 32.905727] [ 32.905777] Allocated by task 316: [ 32.905889] kasan_save_stack+0x3c/0x68 [ 32.905999] kasan_save_track+0x20/0x40 [ 32.906141] kasan_save_alloc_info+0x40/0x58 [ 32.906241] __kasan_kmalloc+0xd4/0xd8 [ 32.906412] __kmalloc_noprof+0x198/0x4c8 [ 32.906458] kunit_kmalloc_array+0x34/0x88 [ 32.906834] copy_user_test_oob+0xac/0xec8 [ 32.907109] kunit_try_run_case+0x170/0x3f0 [ 32.907705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.907808] kthread+0x328/0x630 [ 32.907873] ret_from_fork+0x10/0x20 [ 32.908059] [ 32.908085] The buggy address belongs to the object at fff00000c85fcf00 [ 32.908085] which belongs to the cache kmalloc-128 of size 128 [ 32.908482] The buggy address is located 0 bytes inside of [ 32.908482] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.908581] [ 32.908905] The buggy address belongs to the physical page: [ 32.908965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.909022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.909083] page_type: f5(slab) [ 32.909124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.909616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.909780] page dumped because: kasan: bad access detected [ 32.909821] [ 32.909843] Memory state around the buggy address: [ 32.910124] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.910215] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.910398] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.910467] ^ [ 32.910509] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.910554] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.910595] ==================================================================
[ 28.421013] ================================================================== [ 28.421465] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 28.421741] Write of size 121 at addr ffff888105919e00 by task kunit_try_catch/334 [ 28.421978] [ 28.422307] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.422373] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.422388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.422413] Call Trace: [ 28.422433] <TASK> [ 28.422455] dump_stack_lvl+0x73/0xb0 [ 28.422490] print_report+0xd1/0x610 [ 28.422515] ? __virt_addr_valid+0x1db/0x2d0 [ 28.422539] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.422563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.422590] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.422614] kasan_report+0x141/0x180 [ 28.422636] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.422690] kasan_check_range+0x10c/0x1c0 [ 28.422714] __kasan_check_write+0x18/0x20 [ 28.422738] copy_user_test_oob+0x3fd/0x10f0 [ 28.422764] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.422787] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.422819] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.422847] kunit_try_run_case+0x1a5/0x480 [ 28.422871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.422907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.422932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.422957] ? __kthread_parkme+0x82/0x180 [ 28.422980] ? preempt_count_sub+0x50/0x80 [ 28.423005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.423028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.423054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.423080] kthread+0x337/0x6f0 [ 28.423102] ? trace_preempt_on+0x20/0xc0 [ 28.423127] ? __pfx_kthread+0x10/0x10 [ 28.423148] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.423171] ? calculate_sigpending+0x7b/0xa0 [ 28.423196] ? __pfx_kthread+0x10/0x10 [ 28.423219] ret_from_fork+0x116/0x1d0 [ 28.423240] ? __pfx_kthread+0x10/0x10 [ 28.423262] ret_from_fork_asm+0x1a/0x30 [ 28.423294] </TASK> [ 28.423307] [ 28.431943] Allocated by task 334: [ 28.432385] kasan_save_stack+0x45/0x70 [ 28.432687] kasan_save_track+0x18/0x40 [ 28.432902] kasan_save_alloc_info+0x3b/0x50 [ 28.433117] __kasan_kmalloc+0xb7/0xc0 [ 28.433459] __kmalloc_noprof+0x1c9/0x500 [ 28.433622] kunit_kmalloc_array+0x25/0x60 [ 28.434006] copy_user_test_oob+0xab/0x10f0 [ 28.434233] kunit_try_run_case+0x1a5/0x480 [ 28.434539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.434839] kthread+0x337/0x6f0 [ 28.434999] ret_from_fork+0x116/0x1d0 [ 28.435165] ret_from_fork_asm+0x1a/0x30 [ 28.435337] [ 28.435416] The buggy address belongs to the object at ffff888105919e00 [ 28.435416] which belongs to the cache kmalloc-128 of size 128 [ 28.435943] The buggy address is located 0 bytes inside of [ 28.435943] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.436411] [ 28.436506] The buggy address belongs to the physical page: [ 28.437288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.437587] flags: 0x200000000000000(node=0|zone=2) [ 28.438083] page_type: f5(slab) [ 28.438270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.438708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.439104] page dumped because: kasan: bad access detected [ 28.439347] [ 28.439558] Memory state around the buggy address: [ 28.439746] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.440193] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.440570] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.440866] ^ [ 28.441275] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.441663] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.442071] ================================================================== [ 28.477332] ================================================================== [ 28.477699] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 28.478167] Read of size 121 at addr ffff888105919e00 by task kunit_try_catch/334 [ 28.478390] [ 28.478499] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.478553] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.478567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.478591] Call Trace: [ 28.478611] <TASK> [ 28.478632] dump_stack_lvl+0x73/0xb0 [ 28.478676] print_report+0xd1/0x610 [ 28.478700] ? __virt_addr_valid+0x1db/0x2d0 [ 28.478724] ? copy_user_test_oob+0x604/0x10f0 [ 28.478748] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.478775] ? copy_user_test_oob+0x604/0x10f0 [ 28.478798] kasan_report+0x141/0x180 [ 28.478821] ? copy_user_test_oob+0x604/0x10f0 [ 28.478850] kasan_check_range+0x10c/0x1c0 [ 28.478874] __kasan_check_read+0x15/0x20 [ 28.478898] copy_user_test_oob+0x604/0x10f0 [ 28.478923] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.478949] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.478980] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.479008] kunit_try_run_case+0x1a5/0x480 [ 28.479032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.479055] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.479081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.479105] ? __kthread_parkme+0x82/0x180 [ 28.479128] ? preempt_count_sub+0x50/0x80 [ 28.479152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.479176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.479202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.479228] kthread+0x337/0x6f0 [ 28.479249] ? trace_preempt_on+0x20/0xc0 [ 28.479274] ? __pfx_kthread+0x10/0x10 [ 28.479296] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.479319] ? calculate_sigpending+0x7b/0xa0 [ 28.479358] ? __pfx_kthread+0x10/0x10 [ 28.479380] ret_from_fork+0x116/0x1d0 [ 28.479401] ? __pfx_kthread+0x10/0x10 [ 28.479423] ret_from_fork_asm+0x1a/0x30 [ 28.479456] </TASK> [ 28.479468] [ 28.486062] Allocated by task 334: [ 28.486246] kasan_save_stack+0x45/0x70 [ 28.486447] kasan_save_track+0x18/0x40 [ 28.486575] kasan_save_alloc_info+0x3b/0x50 [ 28.486839] __kasan_kmalloc+0xb7/0xc0 [ 28.487039] __kmalloc_noprof+0x1c9/0x500 [ 28.487218] kunit_kmalloc_array+0x25/0x60 [ 28.487396] copy_user_test_oob+0xab/0x10f0 [ 28.487569] kunit_try_run_case+0x1a5/0x480 [ 28.487719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.487980] kthread+0x337/0x6f0 [ 28.488146] ret_from_fork+0x116/0x1d0 [ 28.488283] ret_from_fork_asm+0x1a/0x30 [ 28.488432] [ 28.488524] The buggy address belongs to the object at ffff888105919e00 [ 28.488524] which belongs to the cache kmalloc-128 of size 128 [ 28.489112] The buggy address is located 0 bytes inside of [ 28.489112] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.489537] [ 28.489630] The buggy address belongs to the physical page: [ 28.489876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.490325] flags: 0x200000000000000(node=0|zone=2) [ 28.490546] page_type: f5(slab) [ 28.490719] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.490957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.491176] page dumped because: kasan: bad access detected [ 28.491339] [ 28.491402] Memory state around the buggy address: [ 28.491551] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.491771] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.492021] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.492418] ^ [ 28.492754] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.493066] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.493362] ================================================================== [ 28.442840] ================================================================== [ 28.443448] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 28.443898] Read of size 121 at addr ffff888105919e00 by task kunit_try_catch/334 [ 28.444217] [ 28.444331] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.444387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.444402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.444427] Call Trace: [ 28.444448] <TASK> [ 28.444470] dump_stack_lvl+0x73/0xb0 [ 28.444504] print_report+0xd1/0x610 [ 28.444528] ? __virt_addr_valid+0x1db/0x2d0 [ 28.444555] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.444578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.444605] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.444629] kasan_report+0x141/0x180 [ 28.444665] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.444693] kasan_check_range+0x10c/0x1c0 [ 28.444717] __kasan_check_read+0x15/0x20 [ 28.444740] copy_user_test_oob+0x4aa/0x10f0 [ 28.444767] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.444791] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.444823] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.444851] kunit_try_run_case+0x1a5/0x480 [ 28.444875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.444896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.444921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.444946] ? __kthread_parkme+0x82/0x180 [ 28.444969] ? preempt_count_sub+0x50/0x80 [ 28.444993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.445016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.445042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.445068] kthread+0x337/0x6f0 [ 28.445089] ? trace_preempt_on+0x20/0xc0 [ 28.445115] ? __pfx_kthread+0x10/0x10 [ 28.445136] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.445159] ? calculate_sigpending+0x7b/0xa0 [ 28.445184] ? __pfx_kthread+0x10/0x10 [ 28.445206] ret_from_fork+0x116/0x1d0 [ 28.445227] ? __pfx_kthread+0x10/0x10 [ 28.445249] ret_from_fork_asm+0x1a/0x30 [ 28.445281] </TASK> [ 28.445294] [ 28.451782] Allocated by task 334: [ 28.451972] kasan_save_stack+0x45/0x70 [ 28.452180] kasan_save_track+0x18/0x40 [ 28.452374] kasan_save_alloc_info+0x3b/0x50 [ 28.452569] __kasan_kmalloc+0xb7/0xc0 [ 28.452707] __kmalloc_noprof+0x1c9/0x500 [ 28.453008] kunit_kmalloc_array+0x25/0x60 [ 28.453213] copy_user_test_oob+0xab/0x10f0 [ 28.453393] kunit_try_run_case+0x1a5/0x480 [ 28.453531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.453796] kthread+0x337/0x6f0 [ 28.453960] ret_from_fork+0x116/0x1d0 [ 28.454158] ret_from_fork_asm+0x1a/0x30 [ 28.454293] [ 28.454358] The buggy address belongs to the object at ffff888105919e00 [ 28.454358] which belongs to the cache kmalloc-128 of size 128 [ 28.454954] The buggy address is located 0 bytes inside of [ 28.454954] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.455328] [ 28.455397] The buggy address belongs to the physical page: [ 28.455563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.455889] flags: 0x200000000000000(node=0|zone=2) [ 28.456120] page_type: f5(slab) [ 28.456284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.456577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.456807] page dumped because: kasan: bad access detected [ 28.456972] [ 28.457035] Memory state around the buggy address: [ 28.457282] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.457598] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.458189] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.458503] ^ [ 28.458829] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.459080] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.459286] ================================================================== [ 28.460084] ================================================================== [ 28.461030] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 28.461326] Write of size 121 at addr ffff888105919e00 by task kunit_try_catch/334 [ 28.461551] [ 28.461675] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.461731] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.461746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.461788] Call Trace: [ 28.461809] <TASK> [ 28.461830] dump_stack_lvl+0x73/0xb0 [ 28.461862] print_report+0xd1/0x610 [ 28.461885] ? __virt_addr_valid+0x1db/0x2d0 [ 28.461910] ? copy_user_test_oob+0x557/0x10f0 [ 28.461933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.461960] ? copy_user_test_oob+0x557/0x10f0 [ 28.461984] kasan_report+0x141/0x180 [ 28.462007] ? copy_user_test_oob+0x557/0x10f0 [ 28.462035] kasan_check_range+0x10c/0x1c0 [ 28.462065] __kasan_check_write+0x18/0x20 [ 28.462088] copy_user_test_oob+0x557/0x10f0 [ 28.462114] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.462138] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.462171] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.462198] kunit_try_run_case+0x1a5/0x480 [ 28.462223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.462244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.462270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.462294] ? __kthread_parkme+0x82/0x180 [ 28.462317] ? preempt_count_sub+0x50/0x80 [ 28.462342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.462365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.462391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.462418] kthread+0x337/0x6f0 [ 28.462438] ? trace_preempt_on+0x20/0xc0 [ 28.462464] ? __pfx_kthread+0x10/0x10 [ 28.462486] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.462508] ? calculate_sigpending+0x7b/0xa0 [ 28.462534] ? __pfx_kthread+0x10/0x10 [ 28.462557] ret_from_fork+0x116/0x1d0 [ 28.462577] ? __pfx_kthread+0x10/0x10 [ 28.462600] ret_from_fork_asm+0x1a/0x30 [ 28.462633] </TASK> [ 28.462645] [ 28.469232] Allocated by task 334: [ 28.469425] kasan_save_stack+0x45/0x70 [ 28.469628] kasan_save_track+0x18/0x40 [ 28.469846] kasan_save_alloc_info+0x3b/0x50 [ 28.469991] __kasan_kmalloc+0xb7/0xc0 [ 28.470123] __kmalloc_noprof+0x1c9/0x500 [ 28.470257] kunit_kmalloc_array+0x25/0x60 [ 28.470455] copy_user_test_oob+0xab/0x10f0 [ 28.470667] kunit_try_run_case+0x1a5/0x480 [ 28.471022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.471280] kthread+0x337/0x6f0 [ 28.471424] ret_from_fork+0x116/0x1d0 [ 28.471593] ret_from_fork_asm+0x1a/0x30 [ 28.471837] [ 28.471911] The buggy address belongs to the object at ffff888105919e00 [ 28.471911] which belongs to the cache kmalloc-128 of size 128 [ 28.472382] The buggy address is located 0 bytes inside of [ 28.472382] allocated 120-byte region [ffff888105919e00, ffff888105919e78) [ 28.472878] [ 28.472971] The buggy address belongs to the physical page: [ 28.473145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 28.473449] flags: 0x200000000000000(node=0|zone=2) [ 28.473689] page_type: f5(slab) [ 28.473955] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.474190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.474410] page dumped because: kasan: bad access detected [ 28.474586] [ 28.474682] Memory state around the buggy address: [ 28.474897] ffff888105919d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.475208] ffff888105919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.475517] >ffff888105919e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.476013] ^ [ 28.476271] ffff888105919e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.476488] ffff888105919f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.476728] ==================================================================