Date
July 18, 2025, 1:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.609181] ================================================================== [ 34.609320] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.609445] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.609504] [ 34.609549] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.609638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.609666] Hardware name: linux,dummy-virt (DT) [ 34.609701] Call trace: [ 34.609729] show_stack+0x20/0x38 (C) [ 34.609783] dump_stack_lvl+0x8c/0xd0 [ 34.609835] print_report+0x118/0x5e8 [ 34.609881] kasan_report+0xdc/0x128 [ 34.609924] kasan_check_range+0x100/0x1a8 [ 34.609972] __kasan_check_write+0x20/0x30 [ 34.610038] copy_user_test_oob+0x234/0xec8 [ 34.610250] kunit_try_run_case+0x170/0x3f0 [ 34.610307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.610359] kthread+0x328/0x630 [ 34.610403] ret_from_fork+0x10/0x20 [ 34.610496] [ 34.610524] Allocated by task 316: [ 34.610574] kasan_save_stack+0x3c/0x68 [ 34.610616] kasan_save_track+0x20/0x40 [ 34.610659] kasan_save_alloc_info+0x40/0x58 [ 34.610714] __kasan_kmalloc+0xd4/0xd8 [ 34.610751] __kmalloc_noprof+0x198/0x4c8 [ 34.610793] kunit_kmalloc_array+0x34/0x88 [ 34.610832] copy_user_test_oob+0xac/0xec8 [ 34.610872] kunit_try_run_case+0x170/0x3f0 [ 34.610912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.611804] kthread+0x328/0x630 [ 34.611924] ret_from_fork+0x10/0x20 [ 34.611976] [ 34.612016] The buggy address belongs to the object at fff00000c970b200 [ 34.612016] which belongs to the cache kmalloc-128 of size 128 [ 34.612140] The buggy address is located 0 bytes inside of [ 34.612140] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.612232] [ 34.612288] The buggy address belongs to the physical page: [ 34.612427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.612494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.612577] page_type: f5(slab) [ 34.612665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.612774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.612849] page dumped because: kasan: bad access detected [ 34.612934] [ 34.613003] Memory state around the buggy address: [ 34.613112] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.613187] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613264] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.613340] ^ [ 34.613403] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613445] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613485] ================================================================== [ 34.624935] ================================================================== [ 34.625010] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.625065] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.625148] [ 34.625198] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.625284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.625330] Hardware name: linux,dummy-virt (DT) [ 34.625379] Call trace: [ 34.625405] show_stack+0x20/0x38 (C) [ 34.625471] dump_stack_lvl+0x8c/0xd0 [ 34.625519] print_report+0x118/0x5e8 [ 34.625564] kasan_report+0xdc/0x128 [ 34.625612] kasan_check_range+0x100/0x1a8 [ 34.625698] __kasan_check_write+0x20/0x30 [ 34.625764] copy_user_test_oob+0x35c/0xec8 [ 34.625819] kunit_try_run_case+0x170/0x3f0 [ 34.625867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.625920] kthread+0x328/0x630 [ 34.626088] ret_from_fork+0x10/0x20 [ 34.626142] [ 34.626164] Allocated by task 316: [ 34.626212] kasan_save_stack+0x3c/0x68 [ 34.626271] kasan_save_track+0x20/0x40 [ 34.626326] kasan_save_alloc_info+0x40/0x58 [ 34.626383] __kasan_kmalloc+0xd4/0xd8 [ 34.626419] __kmalloc_noprof+0x198/0x4c8 [ 34.626465] kunit_kmalloc_array+0x34/0x88 [ 34.626519] copy_user_test_oob+0xac/0xec8 [ 34.626562] kunit_try_run_case+0x170/0x3f0 [ 34.626618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.626661] kthread+0x328/0x630 [ 34.626696] ret_from_fork+0x10/0x20 [ 34.626857] [ 34.626880] The buggy address belongs to the object at fff00000c970b200 [ 34.626880] which belongs to the cache kmalloc-128 of size 128 [ 34.626940] The buggy address is located 0 bytes inside of [ 34.626940] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.627044] [ 34.627068] The buggy address belongs to the physical page: [ 34.627128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.627182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.627238] page_type: f5(slab) [ 34.627283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.627357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.627399] page dumped because: kasan: bad access detected [ 34.627449] [ 34.627478] Memory state around the buggy address: [ 34.627512] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.627557] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627626] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.627685] ^ [ 34.627726] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627804] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627841] ================================================================== [ 34.634220] ================================================================== [ 34.634270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.634318] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.634369] [ 34.634444] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.634541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.634577] Hardware name: linux,dummy-virt (DT) [ 34.634741] Call trace: [ 34.634783] show_stack+0x20/0x38 (C) [ 34.634848] dump_stack_lvl+0x8c/0xd0 [ 34.635016] print_report+0x118/0x5e8 [ 34.635270] kasan_report+0xdc/0x128 [ 34.635322] kasan_check_range+0x100/0x1a8 [ 34.635399] __kasan_check_read+0x20/0x30 [ 34.635474] copy_user_test_oob+0x4a0/0xec8 [ 34.635530] kunit_try_run_case+0x170/0x3f0 [ 34.635594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.635692] kthread+0x328/0x630 [ 34.635761] ret_from_fork+0x10/0x20 [ 34.635841] [ 34.635876] Allocated by task 316: [ 34.635905] kasan_save_stack+0x3c/0x68 [ 34.635943] kasan_save_track+0x20/0x40 [ 34.636221] kasan_save_alloc_info+0x40/0x58 [ 34.636274] __kasan_kmalloc+0xd4/0xd8 [ 34.636489] __kmalloc_noprof+0x198/0x4c8 [ 34.636562] kunit_kmalloc_array+0x34/0x88 [ 34.636661] copy_user_test_oob+0xac/0xec8 [ 34.636747] kunit_try_run_case+0x170/0x3f0 [ 34.636978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.637189] kthread+0x328/0x630 [ 34.637264] ret_from_fork+0x10/0x20 [ 34.637310] [ 34.637331] The buggy address belongs to the object at fff00000c970b200 [ 34.637331] which belongs to the cache kmalloc-128 of size 128 [ 34.637584] The buggy address is located 0 bytes inside of [ 34.637584] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.637770] [ 34.637839] The buggy address belongs to the physical page: [ 34.637917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.638138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.638295] page_type: f5(slab) [ 34.638355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.638414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.638694] page dumped because: kasan: bad access detected [ 34.638754] [ 34.638798] Memory state around the buggy address: [ 34.638996] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.639076] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639205] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.639306] ^ [ 34.639380] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639575] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639795] ================================================================== [ 34.628618] ================================================================== [ 34.628770] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.628825] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.628877] [ 34.628906] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.628991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.629019] Hardware name: linux,dummy-virt (DT) [ 34.629051] Call trace: [ 34.629076] show_stack+0x20/0x38 (C) [ 34.629135] dump_stack_lvl+0x8c/0xd0 [ 34.629184] print_report+0x118/0x5e8 [ 34.629228] kasan_report+0xdc/0x128 [ 34.629274] kasan_check_range+0x100/0x1a8 [ 34.629319] __kasan_check_read+0x20/0x30 [ 34.629366] copy_user_test_oob+0x3c8/0xec8 [ 34.629415] kunit_try_run_case+0x170/0x3f0 [ 34.629460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.629512] kthread+0x328/0x630 [ 34.629553] ret_from_fork+0x10/0x20 [ 34.629601] [ 34.629621] Allocated by task 316: [ 34.629650] kasan_save_stack+0x3c/0x68 [ 34.629689] kasan_save_track+0x20/0x40 [ 34.629726] kasan_save_alloc_info+0x40/0x58 [ 34.629764] __kasan_kmalloc+0xd4/0xd8 [ 34.629800] __kmalloc_noprof+0x198/0x4c8 [ 34.629839] kunit_kmalloc_array+0x34/0x88 [ 34.629879] copy_user_test_oob+0xac/0xec8 [ 34.629918] kunit_try_run_case+0x170/0x3f0 [ 34.629955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.629999] kthread+0x328/0x630 [ 34.630040] ret_from_fork+0x10/0x20 [ 34.630076] [ 34.630106] The buggy address belongs to the object at fff00000c970b200 [ 34.630106] which belongs to the cache kmalloc-128 of size 128 [ 34.630165] The buggy address is located 0 bytes inside of [ 34.630165] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.630231] [ 34.630259] The buggy address belongs to the physical page: [ 34.630290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.630343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.630391] page_type: f5(slab) [ 34.630430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.630483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.630525] page dumped because: kasan: bad access detected [ 34.630559] [ 34.630579] Memory state around the buggy address: [ 34.630611] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.630656] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630701] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.630740] ^ [ 34.630779] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630823] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630863] ================================================================== [ 34.617789] ================================================================== [ 34.617843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.617897] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.617948] [ 34.618029] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.618146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.618193] Hardware name: linux,dummy-virt (DT) [ 34.618263] Call trace: [ 34.618289] show_stack+0x20/0x38 (C) [ 34.618356] dump_stack_lvl+0x8c/0xd0 [ 34.618419] print_report+0x118/0x5e8 [ 34.618487] kasan_report+0xdc/0x128 [ 34.618532] kasan_check_range+0x100/0x1a8 [ 34.618577] __kasan_check_read+0x20/0x30 [ 34.618635] copy_user_test_oob+0x728/0xec8 [ 34.618684] kunit_try_run_case+0x170/0x3f0 [ 34.618733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.618786] kthread+0x328/0x630 [ 34.618829] ret_from_fork+0x10/0x20 [ 34.618875] [ 34.618895] Allocated by task 316: [ 34.618925] kasan_save_stack+0x3c/0x68 [ 34.618973] kasan_save_track+0x20/0x40 [ 34.619012] kasan_save_alloc_info+0x40/0x58 [ 34.619059] __kasan_kmalloc+0xd4/0xd8 [ 34.619105] __kmalloc_noprof+0x198/0x4c8 [ 34.619145] kunit_kmalloc_array+0x34/0x88 [ 34.619183] copy_user_test_oob+0xac/0xec8 [ 34.619222] kunit_try_run_case+0x170/0x3f0 [ 34.619262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619304] kthread+0x328/0x630 [ 34.619337] ret_from_fork+0x10/0x20 [ 34.619375] [ 34.619396] The buggy address belongs to the object at fff00000c970b200 [ 34.619396] which belongs to the cache kmalloc-128 of size 128 [ 34.619467] The buggy address is located 0 bytes inside of [ 34.619467] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.619546] [ 34.619571] The buggy address belongs to the physical page: [ 34.619605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.619660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.619709] page_type: f5(slab) [ 34.619746] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.619799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.619881] page dumped because: kasan: bad access detected [ 34.619941] [ 34.619961] Memory state around the buggy address: [ 34.619995] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.620040] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620122] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.620165] ^ [ 34.620208] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620252] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620289] ================================================================== [ 34.630968] ================================================================== [ 34.631007] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.631052] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.631178] [ 34.631226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.631342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.631380] Hardware name: linux,dummy-virt (DT) [ 34.631428] Call trace: [ 34.631468] show_stack+0x20/0x38 (C) [ 34.631557] dump_stack_lvl+0x8c/0xd0 [ 34.631623] print_report+0x118/0x5e8 [ 34.631667] kasan_report+0xdc/0x128 [ 34.631739] kasan_check_range+0x100/0x1a8 [ 34.631814] __kasan_check_write+0x20/0x30 [ 34.631902] copy_user_test_oob+0x434/0xec8 [ 34.631999] kunit_try_run_case+0x170/0x3f0 [ 34.632105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.632175] kthread+0x328/0x630 [ 34.632220] ret_from_fork+0x10/0x20 [ 34.632266] [ 34.632286] Allocated by task 316: [ 34.632315] kasan_save_stack+0x3c/0x68 [ 34.632353] kasan_save_track+0x20/0x40 [ 34.632391] kasan_save_alloc_info+0x40/0x58 [ 34.632431] __kasan_kmalloc+0xd4/0xd8 [ 34.632654] __kmalloc_noprof+0x198/0x4c8 [ 34.632697] kunit_kmalloc_array+0x34/0x88 [ 34.632736] copy_user_test_oob+0xac/0xec8 [ 34.632776] kunit_try_run_case+0x170/0x3f0 [ 34.632849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.632906] kthread+0x328/0x630 [ 34.632952] ret_from_fork+0x10/0x20 [ 34.633046] [ 34.633125] The buggy address belongs to the object at fff00000c970b200 [ 34.633125] which belongs to the cache kmalloc-128 of size 128 [ 34.633196] The buggy address is located 0 bytes inside of [ 34.633196] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.633259] [ 34.633281] The buggy address belongs to the physical page: [ 34.633314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.633377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.633427] page_type: f5(slab) [ 34.633474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.633526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.633584] page dumped because: kasan: bad access detected [ 34.633617] [ 34.633645] Memory state around the buggy address: [ 34.633679] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.633733] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633787] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.633833] ^ [ 34.633874] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633918] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633975] ==================================================================
[ 28.633908] ================================================================== [ 28.634233] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 28.634680] Write of size 121 at addr ffff8881053b7a00 by task kunit_try_catch/333 [ 28.635320] [ 28.635467] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.635524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.635538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.635709] Call Trace: [ 28.635730] <TASK> [ 28.635829] dump_stack_lvl+0x73/0xb0 [ 28.635871] print_report+0xd1/0x640 [ 28.635896] ? __virt_addr_valid+0x1db/0x2d0 [ 28.635921] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.635944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.635970] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.635994] kasan_report+0x141/0x180 [ 28.636016] ? copy_user_test_oob+0x3fd/0x10f0 [ 28.636044] kasan_check_range+0x10c/0x1c0 [ 28.636068] __kasan_check_write+0x18/0x20 [ 28.636091] copy_user_test_oob+0x3fd/0x10f0 [ 28.636117] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.636140] ? finish_task_switch.isra.0+0x153/0x700 [ 28.636162] ? __switch_to+0x47/0xf80 [ 28.636188] ? __schedule+0x10da/0x2b60 [ 28.636212] ? __pfx_read_tsc+0x10/0x10 [ 28.636235] ? ktime_get_ts64+0x86/0x230 [ 28.636260] kunit_try_run_case+0x1a5/0x480 [ 28.636285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.636308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.636358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.636393] ? __kthread_parkme+0x82/0x180 [ 28.636413] ? preempt_count_sub+0x50/0x80 [ 28.636436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.636461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.636485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.636508] kthread+0x337/0x6f0 [ 28.636528] ? trace_preempt_on+0x20/0xc0 [ 28.636552] ? __pfx_kthread+0x10/0x10 [ 28.636573] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.636604] ? calculate_sigpending+0x7b/0xa0 [ 28.636629] ? __pfx_kthread+0x10/0x10 [ 28.636650] ret_from_fork+0x116/0x1d0 [ 28.636669] ? __pfx_kthread+0x10/0x10 [ 28.636690] ret_from_fork_asm+0x1a/0x30 [ 28.636721] </TASK> [ 28.636733] [ 28.645596] Allocated by task 333: [ 28.645777] kasan_save_stack+0x45/0x70 [ 28.645932] kasan_save_track+0x18/0x40 [ 28.646114] kasan_save_alloc_info+0x3b/0x50 [ 28.646294] __kasan_kmalloc+0xb7/0xc0 [ 28.647005] __kmalloc_noprof+0x1ca/0x510 [ 28.647159] kunit_kmalloc_array+0x25/0x60 [ 28.647528] copy_user_test_oob+0xab/0x10f0 [ 28.647815] kunit_try_run_case+0x1a5/0x480 [ 28.647966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.648214] kthread+0x337/0x6f0 [ 28.648360] ret_from_fork+0x116/0x1d0 [ 28.648528] ret_from_fork_asm+0x1a/0x30 [ 28.648704] [ 28.648776] The buggy address belongs to the object at ffff8881053b7a00 [ 28.648776] which belongs to the cache kmalloc-128 of size 128 [ 28.649261] The buggy address is located 0 bytes inside of [ 28.649261] allocated 120-byte region [ffff8881053b7a00, ffff8881053b7a78) [ 28.650114] [ 28.650379] The buggy address belongs to the physical page: [ 28.650706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7 [ 28.651083] flags: 0x200000000000000(node=0|zone=2) [ 28.651414] page_type: f5(slab) [ 28.651545] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.651987] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.652383] page dumped because: kasan: bad access detected [ 28.652696] [ 28.652768] Memory state around the buggy address: [ 28.652978] ffff8881053b7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.653262] ffff8881053b7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.653541] >ffff8881053b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.653817] ^ [ 28.654082] ffff8881053b7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.654705] ffff8881053b7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.654965] ================================================================== [ 28.697938] ================================================================== [ 28.698517] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 28.698843] Read of size 121 at addr ffff8881053b7a00 by task kunit_try_catch/333 [ 28.699149] [ 28.699234] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.699281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.699294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.699317] Call Trace: [ 28.699332] <TASK> [ 28.699358] dump_stack_lvl+0x73/0xb0 [ 28.699389] print_report+0xd1/0x640 [ 28.699412] ? __virt_addr_valid+0x1db/0x2d0 [ 28.699435] ? copy_user_test_oob+0x604/0x10f0 [ 28.699458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.699484] ? copy_user_test_oob+0x604/0x10f0 [ 28.699508] kasan_report+0x141/0x180 [ 28.699530] ? copy_user_test_oob+0x604/0x10f0 [ 28.699558] kasan_check_range+0x10c/0x1c0 [ 28.699582] __kasan_check_read+0x15/0x20 [ 28.699606] copy_user_test_oob+0x604/0x10f0 [ 28.699631] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.699654] ? finish_task_switch.isra.0+0x153/0x700 [ 28.699675] ? __switch_to+0x47/0xf80 [ 28.699701] ? __schedule+0x10da/0x2b60 [ 28.699724] ? __pfx_read_tsc+0x10/0x10 [ 28.699746] ? ktime_get_ts64+0x86/0x230 [ 28.699770] kunit_try_run_case+0x1a5/0x480 [ 28.699795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.699817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.699851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.699885] ? __kthread_parkme+0x82/0x180 [ 28.699906] ? preempt_count_sub+0x50/0x80 [ 28.699930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.699954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.699977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.700001] kthread+0x337/0x6f0 [ 28.700021] ? trace_preempt_on+0x20/0xc0 [ 28.700045] ? __pfx_kthread+0x10/0x10 [ 28.700065] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.700096] ? calculate_sigpending+0x7b/0xa0 [ 28.700119] ? __pfx_kthread+0x10/0x10 [ 28.700141] ret_from_fork+0x116/0x1d0 [ 28.700160] ? __pfx_kthread+0x10/0x10 [ 28.700181] ret_from_fork_asm+0x1a/0x30 [ 28.700212] </TASK> [ 28.700223] [ 28.706732] Allocated by task 333: [ 28.706862] kasan_save_stack+0x45/0x70 [ 28.706996] kasan_save_track+0x18/0x40 [ 28.707184] kasan_save_alloc_info+0x3b/0x50 [ 28.707395] __kasan_kmalloc+0xb7/0xc0 [ 28.707575] __kmalloc_noprof+0x1ca/0x510 [ 28.707768] kunit_kmalloc_array+0x25/0x60 [ 28.707950] copy_user_test_oob+0xab/0x10f0 [ 28.708088] kunit_try_run_case+0x1a5/0x480 [ 28.708227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.708404] kthread+0x337/0x6f0 [ 28.708568] ret_from_fork+0x116/0x1d0 [ 28.708749] ret_from_fork_asm+0x1a/0x30 [ 28.708949] [ 28.709038] The buggy address belongs to the object at ffff8881053b7a00 [ 28.709038] which belongs to the cache kmalloc-128 of size 128 [ 28.709594] The buggy address is located 0 bytes inside of [ 28.709594] allocated 120-byte region [ffff8881053b7a00, ffff8881053b7a78) [ 28.710017] [ 28.710100] The buggy address belongs to the physical page: [ 28.710364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7 [ 28.710679] flags: 0x200000000000000(node=0|zone=2) [ 28.710873] page_type: f5(slab) [ 28.710988] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.711215] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.711443] page dumped because: kasan: bad access detected [ 28.711611] [ 28.711673] Memory state around the buggy address: [ 28.711838] ffff8881053b7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.712161] ffff8881053b7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.712480] >ffff8881053b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.712786] ^ [ 28.713090] ffff8881053b7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.713411] ffff8881053b7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.713674] ================================================================== [ 28.676135] ================================================================== [ 28.677027] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 28.677320] Write of size 121 at addr ffff8881053b7a00 by task kunit_try_catch/333 [ 28.677772] [ 28.677942] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.678045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.678059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.678081] Call Trace: [ 28.678151] <TASK> [ 28.678166] dump_stack_lvl+0x73/0xb0 [ 28.678252] print_report+0xd1/0x640 [ 28.678278] ? __virt_addr_valid+0x1db/0x2d0 [ 28.678301] ? copy_user_test_oob+0x557/0x10f0 [ 28.678324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.678362] ? copy_user_test_oob+0x557/0x10f0 [ 28.678385] kasan_report+0x141/0x180 [ 28.678408] ? copy_user_test_oob+0x557/0x10f0 [ 28.678436] kasan_check_range+0x10c/0x1c0 [ 28.678460] __kasan_check_write+0x18/0x20 [ 28.678485] copy_user_test_oob+0x557/0x10f0 [ 28.678510] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.678534] ? finish_task_switch.isra.0+0x153/0x700 [ 28.678555] ? __switch_to+0x47/0xf80 [ 28.678581] ? __schedule+0x10da/0x2b60 [ 28.678605] ? __pfx_read_tsc+0x10/0x10 [ 28.678627] ? ktime_get_ts64+0x86/0x230 [ 28.678650] kunit_try_run_case+0x1a5/0x480 [ 28.678681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.678703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.678738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.678771] ? __kthread_parkme+0x82/0x180 [ 28.678791] ? preempt_count_sub+0x50/0x80 [ 28.678814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.678837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.678861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.678884] kthread+0x337/0x6f0 [ 28.678904] ? trace_preempt_on+0x20/0xc0 [ 28.678927] ? __pfx_kthread+0x10/0x10 [ 28.678948] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.678978] ? calculate_sigpending+0x7b/0xa0 [ 28.679002] ? __pfx_kthread+0x10/0x10 [ 28.679023] ret_from_fork+0x116/0x1d0 [ 28.679042] ? __pfx_kthread+0x10/0x10 [ 28.679062] ret_from_fork_asm+0x1a/0x30 [ 28.679093] </TASK> [ 28.679105] [ 28.687965] Allocated by task 333: [ 28.688124] kasan_save_stack+0x45/0x70 [ 28.688307] kasan_save_track+0x18/0x40 [ 28.688620] kasan_save_alloc_info+0x3b/0x50 [ 28.688888] __kasan_kmalloc+0xb7/0xc0 [ 28.689158] __kmalloc_noprof+0x1ca/0x510 [ 28.689363] kunit_kmalloc_array+0x25/0x60 [ 28.689666] copy_user_test_oob+0xab/0x10f0 [ 28.689858] kunit_try_run_case+0x1a5/0x480 [ 28.690165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.690378] kthread+0x337/0x6f0 [ 28.690618] ret_from_fork+0x116/0x1d0 [ 28.690844] ret_from_fork_asm+0x1a/0x30 [ 28.691127] [ 28.691325] The buggy address belongs to the object at ffff8881053b7a00 [ 28.691325] which belongs to the cache kmalloc-128 of size 128 [ 28.691933] The buggy address is located 0 bytes inside of [ 28.691933] allocated 120-byte region [ffff8881053b7a00, ffff8881053b7a78) [ 28.692548] [ 28.692654] The buggy address belongs to the physical page: [ 28.692989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7 [ 28.693362] flags: 0x200000000000000(node=0|zone=2) [ 28.693544] page_type: f5(slab) [ 28.693714] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.694143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.694558] page dumped because: kasan: bad access detected [ 28.694789] [ 28.694940] Memory state around the buggy address: [ 28.695175] ffff8881053b7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.695616] ffff8881053b7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.695870] >ffff8881053b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.696157] ^ [ 28.696585] ffff8881053b7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.696952] ffff8881053b7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.697200] ================================================================== [ 28.655772] ================================================================== [ 28.656369] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 28.656713] Read of size 121 at addr ffff8881053b7a00 by task kunit_try_catch/333 [ 28.657016] [ 28.657097] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.657145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.657158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.657182] Call Trace: [ 28.657200] <TASK> [ 28.657215] dump_stack_lvl+0x73/0xb0 [ 28.657246] print_report+0xd1/0x640 [ 28.657472] ? __virt_addr_valid+0x1db/0x2d0 [ 28.657504] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.657614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.657644] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.657668] kasan_report+0x141/0x180 [ 28.657691] ? copy_user_test_oob+0x4aa/0x10f0 [ 28.657719] kasan_check_range+0x10c/0x1c0 [ 28.657743] __kasan_check_read+0x15/0x20 [ 28.657768] copy_user_test_oob+0x4aa/0x10f0 [ 28.657793] ? __pfx_copy_user_test_oob+0x10/0x10 [ 28.657816] ? finish_task_switch.isra.0+0x153/0x700 [ 28.657838] ? __switch_to+0x47/0xf80 [ 28.657863] ? __schedule+0x10da/0x2b60 [ 28.657888] ? __pfx_read_tsc+0x10/0x10 [ 28.657910] ? ktime_get_ts64+0x86/0x230 [ 28.657934] kunit_try_run_case+0x1a5/0x480 [ 28.657959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.657982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.658017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.658049] ? __kthread_parkme+0x82/0x180 [ 28.658071] ? preempt_count_sub+0x50/0x80 [ 28.658094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.658118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.658141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.658164] kthread+0x337/0x6f0 [ 28.658184] ? trace_preempt_on+0x20/0xc0 [ 28.658208] ? __pfx_kthread+0x10/0x10 [ 28.658229] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.658260] ? calculate_sigpending+0x7b/0xa0 [ 28.658284] ? __pfx_kthread+0x10/0x10 [ 28.658306] ret_from_fork+0x116/0x1d0 [ 28.658325] ? __pfx_kthread+0x10/0x10 [ 28.658356] ret_from_fork_asm+0x1a/0x30 [ 28.658387] </TASK> [ 28.658398] [ 28.666871] Allocated by task 333: [ 28.667224] kasan_save_stack+0x45/0x70 [ 28.667491] kasan_save_track+0x18/0x40 [ 28.667666] kasan_save_alloc_info+0x3b/0x50 [ 28.667967] __kasan_kmalloc+0xb7/0xc0 [ 28.668145] __kmalloc_noprof+0x1ca/0x510 [ 28.668312] kunit_kmalloc_array+0x25/0x60 [ 28.668503] copy_user_test_oob+0xab/0x10f0 [ 28.668676] kunit_try_run_case+0x1a5/0x480 [ 28.668852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.669072] kthread+0x337/0x6f0 [ 28.669219] ret_from_fork+0x116/0x1d0 [ 28.669694] ret_from_fork_asm+0x1a/0x30 [ 28.669868] [ 28.669934] The buggy address belongs to the object at ffff8881053b7a00 [ 28.669934] which belongs to the cache kmalloc-128 of size 128 [ 28.670573] The buggy address is located 0 bytes inside of [ 28.670573] allocated 120-byte region [ffff8881053b7a00, ffff8881053b7a78) [ 28.671211] [ 28.671286] The buggy address belongs to the physical page: [ 28.671665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7 [ 28.672023] flags: 0x200000000000000(node=0|zone=2) [ 28.672248] page_type: f5(slab) [ 28.672498] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.672850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.673205] page dumped because: kasan: bad access detected [ 28.673408] [ 28.673567] Memory state around the buggy address: [ 28.673877] ffff8881053b7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.674119] ffff8881053b7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.674425] >ffff8881053b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.674711] ^ [ 28.674986] ffff8881053b7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.675260] ffff8881053b7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.675553] ==================================================================