Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.893372] ================================================================== [ 33.893441] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.893503] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.893689] [ 33.893730] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.893825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.893858] Hardware name: linux,dummy-virt (DT) [ 33.893890] Call trace: [ 33.893929] show_stack+0x20/0x38 (C) [ 33.893978] dump_stack_lvl+0x8c/0xd0 [ 33.894027] print_report+0x118/0x5e8 [ 33.894073] kasan_report+0xdc/0x128 [ 33.894125] kasan_check_range+0x100/0x1a8 [ 33.894345] __kasan_check_read+0x20/0x30 [ 33.894576] copy_user_test_oob+0x728/0xec8 [ 33.894665] kunit_try_run_case+0x170/0x3f0 [ 33.894874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894955] kthread+0x328/0x630 [ 33.894997] ret_from_fork+0x10/0x20 [ 33.895045] [ 33.895065] Allocated by task 318: [ 33.895096] kasan_save_stack+0x3c/0x68 [ 33.895135] kasan_save_track+0x20/0x40 [ 33.895173] kasan_save_alloc_info+0x40/0x58 [ 33.895244] __kasan_kmalloc+0xd4/0xd8 [ 33.895281] __kmalloc_noprof+0x198/0x4c8 [ 33.895324] kunit_kmalloc_array+0x34/0x88 [ 33.895363] copy_user_test_oob+0xac/0xec8 [ 33.895405] kunit_try_run_case+0x170/0x3f0 [ 33.895444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.895489] kthread+0x328/0x630 [ 33.895524] ret_from_fork+0x10/0x20 [ 33.895563] [ 33.895585] The buggy address belongs to the object at fff00000c9c2f300 [ 33.895585] which belongs to the cache kmalloc-128 of size 128 [ 33.895647] The buggy address is located 0 bytes inside of [ 33.895647] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.895712] [ 33.895735] The buggy address belongs to the physical page: [ 33.895800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.895909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.895963] page_type: f5(slab) [ 33.896004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.896057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.896100] page dumped because: kasan: bad access detected [ 33.896132] [ 33.896152] Memory state around the buggy address: [ 33.896186] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.896230] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896275] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.896314] ^ [ 33.896428] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896474] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896543] ================================================================== [ 33.919716] ================================================================== [ 33.919830] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.919887] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.919955] [ 33.919987] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.920076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.920108] Hardware name: linux,dummy-virt (DT) [ 33.920140] Call trace: [ 33.920164] show_stack+0x20/0x38 (C) [ 33.920213] dump_stack_lvl+0x8c/0xd0 [ 33.920260] print_report+0x118/0x5e8 [ 33.920325] kasan_report+0xdc/0x128 [ 33.920379] kasan_check_range+0x100/0x1a8 [ 33.920426] __kasan_check_write+0x20/0x30 [ 33.920486] copy_user_test_oob+0x434/0xec8 [ 33.921210] kunit_try_run_case+0x170/0x3f0 [ 33.921520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.922114] kthread+0x328/0x630 [ 33.922246] ret_from_fork+0x10/0x20 [ 33.922345] [ 33.922374] Allocated by task 318: [ 33.922600] kasan_save_stack+0x3c/0x68 [ 33.922756] kasan_save_track+0x20/0x40 [ 33.923192] kasan_save_alloc_info+0x40/0x58 [ 33.923280] __kasan_kmalloc+0xd4/0xd8 [ 33.923626] __kmalloc_noprof+0x198/0x4c8 [ 33.923970] kunit_kmalloc_array+0x34/0x88 [ 33.924357] copy_user_test_oob+0xac/0xec8 [ 33.924520] kunit_try_run_case+0x170/0x3f0 [ 33.924599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.924655] kthread+0x328/0x630 [ 33.925040] ret_from_fork+0x10/0x20 [ 33.925164] [ 33.925241] The buggy address belongs to the object at fff00000c9c2f300 [ 33.925241] which belongs to the cache kmalloc-128 of size 128 [ 33.925467] The buggy address is located 0 bytes inside of [ 33.925467] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.925953] [ 33.926002] The buggy address belongs to the physical page: [ 33.926051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.926325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.926468] page_type: f5(slab) [ 33.926513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.926727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.927236] page dumped because: kasan: bad access detected [ 33.927298] [ 33.927407] Memory state around the buggy address: [ 33.927474] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.927692] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.927963] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.928126] ^ [ 33.928183] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.928329] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.928404] ================================================================== [ 33.929665] ================================================================== [ 33.929741] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.930098] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.930420] [ 33.930627] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.930757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.930850] Hardware name: linux,dummy-virt (DT) [ 33.930884] Call trace: [ 33.930919] show_stack+0x20/0x38 (C) [ 33.931107] dump_stack_lvl+0x8c/0xd0 [ 33.931369] print_report+0x118/0x5e8 [ 33.931611] kasan_report+0xdc/0x128 [ 33.931674] kasan_check_range+0x100/0x1a8 [ 33.931884] __kasan_check_read+0x20/0x30 [ 33.931965] copy_user_test_oob+0x4a0/0xec8 [ 33.932021] kunit_try_run_case+0x170/0x3f0 [ 33.932238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.932310] kthread+0x328/0x630 [ 33.932353] ret_from_fork+0x10/0x20 [ 33.932406] [ 33.932427] Allocated by task 318: [ 33.932458] kasan_save_stack+0x3c/0x68 [ 33.932501] kasan_save_track+0x20/0x40 [ 33.932927] kasan_save_alloc_info+0x40/0x58 [ 33.933244] __kasan_kmalloc+0xd4/0xd8 [ 33.933334] __kmalloc_noprof+0x198/0x4c8 [ 33.933459] kunit_kmalloc_array+0x34/0x88 [ 33.933767] copy_user_test_oob+0xac/0xec8 [ 33.933933] kunit_try_run_case+0x170/0x3f0 [ 33.934253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.934671] kthread+0x328/0x630 [ 33.934788] ret_from_fork+0x10/0x20 [ 33.934947] [ 33.935001] The buggy address belongs to the object at fff00000c9c2f300 [ 33.935001] which belongs to the cache kmalloc-128 of size 128 [ 33.935326] The buggy address is located 0 bytes inside of [ 33.935326] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.935709] [ 33.935752] The buggy address belongs to the physical page: [ 33.935875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.935975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.936039] page_type: f5(slab) [ 33.936093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.936153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.936195] page dumped because: kasan: bad access detected [ 33.936229] [ 33.936258] Memory state around the buggy address: [ 33.936293] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.936352] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.936398] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.936438] ^ [ 33.936484] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937006] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937075] ================================================================== [ 33.910940] ================================================================== [ 33.910994] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.911047] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.911175] [ 33.911221] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.911588] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.911640] Hardware name: linux,dummy-virt (DT) [ 33.911694] Call trace: [ 33.911723] show_stack+0x20/0x38 (C) [ 33.911776] dump_stack_lvl+0x8c/0xd0 [ 33.911951] print_report+0x118/0x5e8 [ 33.912120] kasan_report+0xdc/0x128 [ 33.912203] kasan_check_range+0x100/0x1a8 [ 33.912279] __kasan_check_read+0x20/0x30 [ 33.912345] copy_user_test_oob+0x3c8/0xec8 [ 33.912439] kunit_try_run_case+0x170/0x3f0 [ 33.912486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.912833] kthread+0x328/0x630 [ 33.912936] ret_from_fork+0x10/0x20 [ 33.913015] [ 33.913355] Allocated by task 318: [ 33.913421] kasan_save_stack+0x3c/0x68 [ 33.913628] kasan_save_track+0x20/0x40 [ 33.913888] kasan_save_alloc_info+0x40/0x58 [ 33.913998] __kasan_kmalloc+0xd4/0xd8 [ 33.914324] __kmalloc_noprof+0x198/0x4c8 [ 33.914472] kunit_kmalloc_array+0x34/0x88 [ 33.914516] copy_user_test_oob+0xac/0xec8 [ 33.914567] kunit_try_run_case+0x170/0x3f0 [ 33.914930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.915157] kthread+0x328/0x630 [ 33.915258] ret_from_fork+0x10/0x20 [ 33.915473] [ 33.915499] The buggy address belongs to the object at fff00000c9c2f300 [ 33.915499] which belongs to the cache kmalloc-128 of size 128 [ 33.915869] The buggy address is located 0 bytes inside of [ 33.915869] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.916178] [ 33.916554] The buggy address belongs to the physical page: [ 33.916790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.916864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.917125] page_type: f5(slab) [ 33.917213] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.917280] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.917323] page dumped because: kasan: bad access detected [ 33.917360] [ 33.917380] Memory state around the buggy address: [ 33.917721] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.917951] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.918290] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.918380] ^ [ 33.918877] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.919042] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.919106] ================================================================== [ 33.883229] ================================================================== [ 33.883398] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.883628] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.883720] [ 33.883825] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.884291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.884485] Hardware name: linux,dummy-virt (DT) [ 33.884784] Call trace: [ 33.884906] show_stack+0x20/0x38 (C) [ 33.884967] dump_stack_lvl+0x8c/0xd0 [ 33.885038] print_report+0x118/0x5e8 [ 33.885084] kasan_report+0xdc/0x128 [ 33.885127] kasan_check_range+0x100/0x1a8 [ 33.885333] __kasan_check_write+0x20/0x30 [ 33.885454] copy_user_test_oob+0x234/0xec8 [ 33.885508] kunit_try_run_case+0x170/0x3f0 [ 33.885560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.885638] kthread+0x328/0x630 [ 33.885695] ret_from_fork+0x10/0x20 [ 33.885810] [ 33.885956] Allocated by task 318: [ 33.885990] kasan_save_stack+0x3c/0x68 [ 33.886035] kasan_save_track+0x20/0x40 [ 33.886073] kasan_save_alloc_info+0x40/0x58 [ 33.886124] __kasan_kmalloc+0xd4/0xd8 [ 33.886161] __kmalloc_noprof+0x198/0x4c8 [ 33.886204] kunit_kmalloc_array+0x34/0x88 [ 33.886330] copy_user_test_oob+0xac/0xec8 [ 33.886469] kunit_try_run_case+0x170/0x3f0 [ 33.886549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.886685] kthread+0x328/0x630 [ 33.886755] ret_from_fork+0x10/0x20 [ 33.886801] [ 33.886822] The buggy address belongs to the object at fff00000c9c2f300 [ 33.886822] which belongs to the cache kmalloc-128 of size 128 [ 33.887033] The buggy address is located 0 bytes inside of [ 33.887033] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.887394] [ 33.887425] The buggy address belongs to the physical page: [ 33.887490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.887648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.887705] page_type: f5(slab) [ 33.887749] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.887802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.887848] page dumped because: kasan: bad access detected [ 33.887944] [ 33.888038] Memory state around the buggy address: [ 33.888215] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.888279] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888497] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.888624] ^ [ 33.888672] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888716] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888756] ================================================================== [ 33.902160] ================================================================== [ 33.902248] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.902317] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.902379] [ 33.902553] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.902797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.902831] Hardware name: linux,dummy-virt (DT) [ 33.902865] Call trace: [ 33.902890] show_stack+0x20/0x38 (C) [ 33.902959] dump_stack_lvl+0x8c/0xd0 [ 33.903287] print_report+0x118/0x5e8 [ 33.903368] kasan_report+0xdc/0x128 [ 33.903477] kasan_check_range+0x100/0x1a8 [ 33.903531] __kasan_check_write+0x20/0x30 [ 33.903578] copy_user_test_oob+0x35c/0xec8 [ 33.903915] kunit_try_run_case+0x170/0x3f0 [ 33.904007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.904104] kthread+0x328/0x630 [ 33.904146] ret_from_fork+0x10/0x20 [ 33.904462] [ 33.904499] Allocated by task 318: [ 33.904543] kasan_save_stack+0x3c/0x68 [ 33.904841] kasan_save_track+0x20/0x40 [ 33.904926] kasan_save_alloc_info+0x40/0x58 [ 33.905066] __kasan_kmalloc+0xd4/0xd8 [ 33.905167] __kmalloc_noprof+0x198/0x4c8 [ 33.905307] kunit_kmalloc_array+0x34/0x88 [ 33.905360] copy_user_test_oob+0xac/0xec8 [ 33.905716] kunit_try_run_case+0x170/0x3f0 [ 33.905814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.905949] kthread+0x328/0x630 [ 33.906026] ret_from_fork+0x10/0x20 [ 33.906082] [ 33.906104] The buggy address belongs to the object at fff00000c9c2f300 [ 33.906104] which belongs to the cache kmalloc-128 of size 128 [ 33.906464] The buggy address is located 0 bytes inside of [ 33.906464] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.906540] [ 33.906574] The buggy address belongs to the physical page: [ 33.906871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.907262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.907395] page_type: f5(slab) [ 33.907442] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.907799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.907892] page dumped because: kasan: bad access detected [ 33.908200] [ 33.908476] Memory state around the buggy address: [ 33.908565] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.908663] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.908995] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.909044] ^ [ 33.909337] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.909398] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.909687] ==================================================================
[ 29.360486] ================================================================== [ 29.360889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 29.361116] Read of size 121 at addr ffff8881060a7500 by task kunit_try_catch/334 [ 29.361471] [ 29.361580] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.361631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.361645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.361669] Call Trace: [ 29.361689] <TASK> [ 29.361709] dump_stack_lvl+0x73/0xb0 [ 29.361750] print_report+0xd1/0x640 [ 29.361774] ? __virt_addr_valid+0x1db/0x2d0 [ 29.361812] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.361838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.361866] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.361891] kasan_report+0x141/0x180 [ 29.361915] ? copy_user_test_oob+0x4aa/0x10f0 [ 29.361943] kasan_check_range+0x10c/0x1c0 [ 29.361968] __kasan_check_read+0x15/0x20 [ 29.361994] copy_user_test_oob+0x4aa/0x10f0 [ 29.362022] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.362046] ? finish_task_switch.isra.0+0x153/0x700 [ 29.362070] ? __switch_to+0x47/0xf80 [ 29.362098] ? __schedule+0x10da/0x2b60 [ 29.362125] ? __pfx_read_tsc+0x10/0x10 [ 29.362157] ? ktime_get_ts64+0x86/0x230 [ 29.362199] kunit_try_run_case+0x1a5/0x480 [ 29.362225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.362259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.362285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.362312] ? __kthread_parkme+0x82/0x180 [ 29.362333] ? preempt_count_sub+0x50/0x80 [ 29.362357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.362384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.362411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.362437] kthread+0x337/0x6f0 [ 29.362458] ? trace_preempt_on+0x20/0xc0 [ 29.362483] ? __pfx_kthread+0x10/0x10 [ 29.362506] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.362530] ? calculate_sigpending+0x7b/0xa0 [ 29.362555] ? __pfx_kthread+0x10/0x10 [ 29.362578] ret_from_fork+0x116/0x1d0 [ 29.362598] ? __pfx_kthread+0x10/0x10 [ 29.362620] ret_from_fork_asm+0x1a/0x30 [ 29.362652] </TASK> [ 29.362664] [ 29.369826] Allocated by task 334: [ 29.369976] kasan_save_stack+0x45/0x70 [ 29.370222] kasan_save_track+0x18/0x40 [ 29.370411] kasan_save_alloc_info+0x3b/0x50 [ 29.370616] __kasan_kmalloc+0xb7/0xc0 [ 29.370798] __kmalloc_noprof+0x1ca/0x510 [ 29.371047] kunit_kmalloc_array+0x25/0x60 [ 29.371274] copy_user_test_oob+0xab/0x10f0 [ 29.371433] kunit_try_run_case+0x1a5/0x480 [ 29.371575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.371749] kthread+0x337/0x6f0 [ 29.371887] ret_from_fork+0x116/0x1d0 [ 29.372237] ret_from_fork_asm+0x1a/0x30 [ 29.372458] [ 29.372554] The buggy address belongs to the object at ffff8881060a7500 [ 29.372554] which belongs to the cache kmalloc-128 of size 128 [ 29.373139] The buggy address is located 0 bytes inside of [ 29.373139] allocated 120-byte region [ffff8881060a7500, ffff8881060a7578) [ 29.373500] [ 29.373568] The buggy address belongs to the physical page: [ 29.373742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7 [ 29.373990] flags: 0x200000000000000(node=0|zone=2) [ 29.374230] page_type: f5(slab) [ 29.374396] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.374730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.375056] page dumped because: kasan: bad access detected [ 29.375333] [ 29.375421] Memory state around the buggy address: [ 29.375645] ffff8881060a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.375988] ffff8881060a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376208] >ffff8881060a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.376416] ^ [ 29.376742] ffff8881060a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377215] ffff8881060a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377530] ================================================================== [ 29.335664] ================================================================== [ 29.336516] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 29.336780] Write of size 121 at addr ffff8881060a7500 by task kunit_try_catch/334 [ 29.337677] [ 29.337993] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.338075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.338090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.338114] Call Trace: [ 29.338129] <TASK> [ 29.338159] dump_stack_lvl+0x73/0xb0 [ 29.338193] print_report+0xd1/0x640 [ 29.338218] ? __virt_addr_valid+0x1db/0x2d0 [ 29.338245] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.338270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.338298] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.338323] kasan_report+0x141/0x180 [ 29.338347] ? copy_user_test_oob+0x3fd/0x10f0 [ 29.338376] kasan_check_range+0x10c/0x1c0 [ 29.338401] __kasan_check_write+0x18/0x20 [ 29.338427] copy_user_test_oob+0x3fd/0x10f0 [ 29.338454] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.338478] ? finish_task_switch.isra.0+0x153/0x700 [ 29.338503] ? __switch_to+0x47/0xf80 [ 29.338531] ? __schedule+0x10da/0x2b60 [ 29.338558] ? __pfx_read_tsc+0x10/0x10 [ 29.338582] ? ktime_get_ts64+0x86/0x230 [ 29.338608] kunit_try_run_case+0x1a5/0x480 [ 29.338633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.338657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.338682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.338709] ? __kthread_parkme+0x82/0x180 [ 29.338731] ? preempt_count_sub+0x50/0x80 [ 29.338755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.338779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.338805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.338830] kthread+0x337/0x6f0 [ 29.338852] ? trace_preempt_on+0x20/0xc0 [ 29.338878] ? __pfx_kthread+0x10/0x10 [ 29.338899] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.338924] ? calculate_sigpending+0x7b/0xa0 [ 29.338950] ? __pfx_kthread+0x10/0x10 [ 29.338972] ret_from_fork+0x116/0x1d0 [ 29.338995] ? __pfx_kthread+0x10/0x10 [ 29.339016] ret_from_fork_asm+0x1a/0x30 [ 29.339049] </TASK> [ 29.339061] [ 29.351461] Allocated by task 334: [ 29.351605] kasan_save_stack+0x45/0x70 [ 29.351758] kasan_save_track+0x18/0x40 [ 29.351890] kasan_save_alloc_info+0x3b/0x50 [ 29.352072] __kasan_kmalloc+0xb7/0xc0 [ 29.352235] __kmalloc_noprof+0x1ca/0x510 [ 29.352456] kunit_kmalloc_array+0x25/0x60 [ 29.352656] copy_user_test_oob+0xab/0x10f0 [ 29.352830] kunit_try_run_case+0x1a5/0x480 [ 29.353187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.353661] kthread+0x337/0x6f0 [ 29.353816] ret_from_fork+0x116/0x1d0 [ 29.354280] ret_from_fork_asm+0x1a/0x30 [ 29.354627] [ 29.354698] The buggy address belongs to the object at ffff8881060a7500 [ 29.354698] which belongs to the cache kmalloc-128 of size 128 [ 29.355088] The buggy address is located 0 bytes inside of [ 29.355088] allocated 120-byte region [ffff8881060a7500, ffff8881060a7578) [ 29.355550] [ 29.355626] The buggy address belongs to the physical page: [ 29.355879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7 [ 29.356209] flags: 0x200000000000000(node=0|zone=2) [ 29.356670] page_type: f5(slab) [ 29.356805] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.357199] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.357514] page dumped because: kasan: bad access detected [ 29.357749] [ 29.357843] Memory state around the buggy address: [ 29.358063] ffff8881060a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.358377] ffff8881060a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.358610] >ffff8881060a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.358844] ^ [ 29.359194] ffff8881060a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359463] ffff8881060a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359869] ================================================================== [ 29.378120] ================================================================== [ 29.378503] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 29.378823] Write of size 121 at addr ffff8881060a7500 by task kunit_try_catch/334 [ 29.379175] [ 29.379290] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.379351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.379365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.379389] Call Trace: [ 29.379422] <TASK> [ 29.379442] dump_stack_lvl+0x73/0xb0 [ 29.379474] print_report+0xd1/0x640 [ 29.379498] ? __virt_addr_valid+0x1db/0x2d0 [ 29.379525] ? copy_user_test_oob+0x557/0x10f0 [ 29.379550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.379577] ? copy_user_test_oob+0x557/0x10f0 [ 29.379603] kasan_report+0x141/0x180 [ 29.379632] ? copy_user_test_oob+0x557/0x10f0 [ 29.379663] kasan_check_range+0x10c/0x1c0 [ 29.379692] __kasan_check_write+0x18/0x20 [ 29.379716] copy_user_test_oob+0x557/0x10f0 [ 29.379743] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.379766] ? finish_task_switch.isra.0+0x153/0x700 [ 29.379800] ? __switch_to+0x47/0xf80 [ 29.379828] ? __schedule+0x10da/0x2b60 [ 29.379866] ? __pfx_read_tsc+0x10/0x10 [ 29.379890] ? ktime_get_ts64+0x86/0x230 [ 29.379916] kunit_try_run_case+0x1a5/0x480 [ 29.379942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.379966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.379991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.380018] ? __kthread_parkme+0x82/0x180 [ 29.380040] ? preempt_count_sub+0x50/0x80 [ 29.380063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.380088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.380113] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.380137] kthread+0x337/0x6f0 [ 29.380167] ? trace_preempt_on+0x20/0xc0 [ 29.380201] ? __pfx_kthread+0x10/0x10 [ 29.380223] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.380248] ? calculate_sigpending+0x7b/0xa0 [ 29.380274] ? __pfx_kthread+0x10/0x10 [ 29.380296] ret_from_fork+0x116/0x1d0 [ 29.380317] ? __pfx_kthread+0x10/0x10 [ 29.380339] ret_from_fork_asm+0x1a/0x30 [ 29.380372] </TASK> [ 29.380384] [ 29.387837] Allocated by task 334: [ 29.388028] kasan_save_stack+0x45/0x70 [ 29.388251] kasan_save_track+0x18/0x40 [ 29.388444] kasan_save_alloc_info+0x3b/0x50 [ 29.388653] __kasan_kmalloc+0xb7/0xc0 [ 29.388834] __kmalloc_noprof+0x1ca/0x510 [ 29.389047] kunit_kmalloc_array+0x25/0x60 [ 29.389237] copy_user_test_oob+0xab/0x10f0 [ 29.389432] kunit_try_run_case+0x1a5/0x480 [ 29.389635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.389819] kthread+0x337/0x6f0 [ 29.390021] ret_from_fork+0x116/0x1d0 [ 29.390213] ret_from_fork_asm+0x1a/0x30 [ 29.390390] [ 29.390459] The buggy address belongs to the object at ffff8881060a7500 [ 29.390459] which belongs to the cache kmalloc-128 of size 128 [ 29.390998] The buggy address is located 0 bytes inside of [ 29.390998] allocated 120-byte region [ffff8881060a7500, ffff8881060a7578) [ 29.391424] [ 29.391494] The buggy address belongs to the physical page: [ 29.391675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7 [ 29.391918] flags: 0x200000000000000(node=0|zone=2) [ 29.392369] page_type: f5(slab) [ 29.393832] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.394498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.394845] page dumped because: kasan: bad access detected [ 29.396045] [ 29.396310] Memory state around the buggy address: [ 29.396486] ffff8881060a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.397068] ffff8881060a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.397466] >ffff8881060a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.397861] ^ [ 29.398188] ffff8881060a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398639] ffff8881060a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.399009] ================================================================== [ 29.399850] ================================================================== [ 29.400223] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 29.400656] Read of size 121 at addr ffff8881060a7500 by task kunit_try_catch/334 [ 29.401233] [ 29.401365] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.401554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.401625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.401710] Call Trace: [ 29.401732] <TASK> [ 29.401756] dump_stack_lvl+0x73/0xb0 [ 29.401789] print_report+0xd1/0x640 [ 29.401814] ? __virt_addr_valid+0x1db/0x2d0 [ 29.401843] ? copy_user_test_oob+0x604/0x10f0 [ 29.401868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.401896] ? copy_user_test_oob+0x604/0x10f0 [ 29.401920] kasan_report+0x141/0x180 [ 29.401953] ? copy_user_test_oob+0x604/0x10f0 [ 29.401982] kasan_check_range+0x10c/0x1c0 [ 29.402008] __kasan_check_read+0x15/0x20 [ 29.402033] copy_user_test_oob+0x604/0x10f0 [ 29.402060] ? __pfx_copy_user_test_oob+0x10/0x10 [ 29.402085] ? finish_task_switch.isra.0+0x153/0x700 [ 29.402109] ? __switch_to+0x47/0xf80 [ 29.402137] ? __schedule+0x10da/0x2b60 [ 29.402177] ? __pfx_read_tsc+0x10/0x10 [ 29.402200] ? ktime_get_ts64+0x86/0x230 [ 29.402225] kunit_try_run_case+0x1a5/0x480 [ 29.402252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.402276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.402303] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.402329] ? __kthread_parkme+0x82/0x180 [ 29.402350] ? preempt_count_sub+0x50/0x80 [ 29.402374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.402400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.402424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.402449] kthread+0x337/0x6f0 [ 29.402470] ? trace_preempt_on+0x20/0xc0 [ 29.402497] ? __pfx_kthread+0x10/0x10 [ 29.402519] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.402544] ? calculate_sigpending+0x7b/0xa0 [ 29.402569] ? __pfx_kthread+0x10/0x10 [ 29.402591] ret_from_fork+0x116/0x1d0 [ 29.402613] ? __pfx_kthread+0x10/0x10 [ 29.402634] ret_from_fork_asm+0x1a/0x30 [ 29.402667] </TASK> [ 29.402680] [ 29.412656] Allocated by task 334: [ 29.412811] kasan_save_stack+0x45/0x70 [ 29.413190] kasan_save_track+0x18/0x40 [ 29.413370] kasan_save_alloc_info+0x3b/0x50 [ 29.413658] __kasan_kmalloc+0xb7/0xc0 [ 29.413802] __kmalloc_noprof+0x1ca/0x510 [ 29.414104] kunit_kmalloc_array+0x25/0x60 [ 29.414345] copy_user_test_oob+0xab/0x10f0 [ 29.414676] kunit_try_run_case+0x1a5/0x480 [ 29.414998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.415240] kthread+0x337/0x6f0 [ 29.415557] ret_from_fork+0x116/0x1d0 [ 29.415739] ret_from_fork_asm+0x1a/0x30 [ 29.416154] [ 29.416232] The buggy address belongs to the object at ffff8881060a7500 [ 29.416232] which belongs to the cache kmalloc-128 of size 128 [ 29.416868] The buggy address is located 0 bytes inside of [ 29.416868] allocated 120-byte region [ffff8881060a7500, ffff8881060a7578) [ 29.417465] [ 29.417572] The buggy address belongs to the physical page: [ 29.418015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7 [ 29.418471] flags: 0x200000000000000(node=0|zone=2) [ 29.418675] page_type: f5(slab) [ 29.418982] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 29.419426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.419822] page dumped because: kasan: bad access detected [ 29.420091] [ 29.420308] Memory state around the buggy address: [ 29.420504] ffff8881060a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.420821] ffff8881060a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.421336] >ffff8881060a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.421643] ^ [ 29.422069] ffff8881060a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.422476] ffff8881060a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.422836] ==================================================================