Date
July 25, 2025, 3:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.617301] ================================================================== [ 35.617534] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 35.617622] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.617982] [ 35.618043] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.618382] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.618486] Hardware name: linux,dummy-virt (DT) [ 35.618566] Call trace: [ 35.618615] show_stack+0x20/0x38 (C) [ 35.618751] dump_stack_lvl+0x8c/0xd0 [ 35.618844] print_report+0x118/0x5e8 [ 35.618894] kasan_report+0xdc/0x128 [ 35.618997] kasan_check_range+0x100/0x1a8 [ 35.619098] __kasan_check_write+0x20/0x30 [ 35.619333] copy_user_test_oob+0x234/0xec8 [ 35.619576] kunit_try_run_case+0x170/0x3f0 [ 35.619761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619860] kthread+0x328/0x630 [ 35.619945] ret_from_fork+0x10/0x20 [ 35.620042] [ 35.620087] Allocated by task 317: [ 35.620134] kasan_save_stack+0x3c/0x68 [ 35.620186] kasan_save_track+0x20/0x40 [ 35.620224] kasan_save_alloc_info+0x40/0x58 [ 35.620265] __kasan_kmalloc+0xd4/0xd8 [ 35.620301] __kmalloc_noprof+0x198/0x4c8 [ 35.620343] kunit_kmalloc_array+0x34/0x88 [ 35.620383] copy_user_test_oob+0xac/0xec8 [ 35.620424] kunit_try_run_case+0x170/0x3f0 [ 35.620472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.620517] kthread+0x328/0x630 [ 35.620553] ret_from_fork+0x10/0x20 [ 35.620601] [ 35.620624] The buggy address belongs to the object at fff00000c9a8b900 [ 35.620624] which belongs to the cache kmalloc-128 of size 128 [ 35.621206] The buggy address is located 0 bytes inside of [ 35.621206] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.621666] [ 35.621870] The buggy address belongs to the physical page: [ 35.621967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.622148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.622265] page_type: f5(slab) [ 35.622829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.622900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.623046] page dumped because: kasan: bad access detected [ 35.623114] [ 35.623233] Memory state around the buggy address: [ 35.623350] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.623397] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.623448] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.623878] ^ [ 35.623973] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.624145] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.624208] ================================================================== [ 35.677243] ================================================================== [ 35.677307] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 35.677368] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.677436] [ 35.677472] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.677564] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.677598] Hardware name: linux,dummy-virt (DT) [ 35.677802] Call trace: [ 35.677842] show_stack+0x20/0x38 (C) [ 35.677897] dump_stack_lvl+0x8c/0xd0 [ 35.677950] print_report+0x118/0x5e8 [ 35.678000] kasan_report+0xdc/0x128 [ 35.678046] kasan_check_range+0x100/0x1a8 [ 35.678102] __kasan_check_read+0x20/0x30 [ 35.678150] copy_user_test_oob+0x4a0/0xec8 [ 35.678210] kunit_try_run_case+0x170/0x3f0 [ 35.678260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.678323] kthread+0x328/0x630 [ 35.678369] ret_from_fork+0x10/0x20 [ 35.678418] [ 35.678440] Allocated by task 317: [ 35.678480] kasan_save_stack+0x3c/0x68 [ 35.678523] kasan_save_track+0x20/0x40 [ 35.678561] kasan_save_alloc_info+0x40/0x58 [ 35.678601] __kasan_kmalloc+0xd4/0xd8 [ 35.678926] __kmalloc_noprof+0x198/0x4c8 [ 35.679024] kunit_kmalloc_array+0x34/0x88 [ 35.679438] copy_user_test_oob+0xac/0xec8 [ 35.679918] kunit_try_run_case+0x170/0x3f0 [ 35.680003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.680086] kthread+0x328/0x630 [ 35.680164] ret_from_fork+0x10/0x20 [ 35.680612] [ 35.681030] The buggy address belongs to the object at fff00000c9a8b900 [ 35.681030] which belongs to the cache kmalloc-128 of size 128 [ 35.681323] The buggy address is located 0 bytes inside of [ 35.681323] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.681427] [ 35.681585] The buggy address belongs to the physical page: [ 35.681800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.682253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.682967] page_type: f5(slab) [ 35.683093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.683155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.683327] page dumped because: kasan: bad access detected [ 35.683497] [ 35.683693] Memory state around the buggy address: [ 35.684147] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.684343] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.684408] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.684616] ^ [ 35.684826] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.684967] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.685082] ================================================================== [ 35.668193] ================================================================== [ 35.668397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 35.668458] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.668776] [ 35.668942] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.669308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.669449] Hardware name: linux,dummy-virt (DT) [ 35.669517] Call trace: [ 35.669544] show_stack+0x20/0x38 (C) [ 35.669597] dump_stack_lvl+0x8c/0xd0 [ 35.669700] print_report+0x118/0x5e8 [ 35.669748] kasan_report+0xdc/0x128 [ 35.669822] kasan_check_range+0x100/0x1a8 [ 35.670061] __kasan_check_write+0x20/0x30 [ 35.670396] copy_user_test_oob+0x434/0xec8 [ 35.670489] kunit_try_run_case+0x170/0x3f0 [ 35.670541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670597] kthread+0x328/0x630 [ 35.670748] ret_from_fork+0x10/0x20 [ 35.670802] [ 35.670842] Allocated by task 317: [ 35.670877] kasan_save_stack+0x3c/0x68 [ 35.670927] kasan_save_track+0x20/0x40 [ 35.671004] kasan_save_alloc_info+0x40/0x58 [ 35.671052] __kasan_kmalloc+0xd4/0xd8 [ 35.671091] __kmalloc_noprof+0x198/0x4c8 [ 35.671135] kunit_kmalloc_array+0x34/0x88 [ 35.671321] copy_user_test_oob+0xac/0xec8 [ 35.671635] kunit_try_run_case+0x170/0x3f0 [ 35.671729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.671916] kthread+0x328/0x630 [ 35.671967] ret_from_fork+0x10/0x20 [ 35.672170] [ 35.672215] The buggy address belongs to the object at fff00000c9a8b900 [ 35.672215] which belongs to the cache kmalloc-128 of size 128 [ 35.672719] The buggy address is located 0 bytes inside of [ 35.672719] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.673153] [ 35.673257] The buggy address belongs to the physical page: [ 35.673337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.673424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.674003] page_type: f5(slab) [ 35.674249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.674418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.674462] page dumped because: kasan: bad access detected [ 35.674814] [ 35.674950] Memory state around the buggy address: [ 35.675130] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.675366] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.675467] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.675614] ^ [ 35.675859] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.676151] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.676277] ================================================================== [ 35.630017] ================================================================== [ 35.630981] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 35.631114] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.631711] [ 35.631810] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.631951] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.632270] Hardware name: linux,dummy-virt (DT) [ 35.632338] Call trace: [ 35.632427] show_stack+0x20/0x38 (C) [ 35.632502] dump_stack_lvl+0x8c/0xd0 [ 35.632720] print_report+0x118/0x5e8 [ 35.632810] kasan_report+0xdc/0x128 [ 35.632857] kasan_check_range+0x100/0x1a8 [ 35.633278] __kasan_check_read+0x20/0x30 [ 35.633620] copy_user_test_oob+0x728/0xec8 [ 35.633712] kunit_try_run_case+0x170/0x3f0 [ 35.633849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.633918] kthread+0x328/0x630 [ 35.634246] ret_from_fork+0x10/0x20 [ 35.634360] [ 35.634418] Allocated by task 317: [ 35.634450] kasan_save_stack+0x3c/0x68 [ 35.634692] kasan_save_track+0x20/0x40 [ 35.634777] kasan_save_alloc_info+0x40/0x58 [ 35.634959] __kasan_kmalloc+0xd4/0xd8 [ 35.635221] __kmalloc_noprof+0x198/0x4c8 [ 35.635376] kunit_kmalloc_array+0x34/0x88 [ 35.635494] copy_user_test_oob+0xac/0xec8 [ 35.635595] kunit_try_run_case+0x170/0x3f0 [ 35.635917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.636080] kthread+0x328/0x630 [ 35.636167] ret_from_fork+0x10/0x20 [ 35.636626] [ 35.636796] The buggy address belongs to the object at fff00000c9a8b900 [ 35.636796] which belongs to the cache kmalloc-128 of size 128 [ 35.636901] The buggy address is located 0 bytes inside of [ 35.636901] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.637304] [ 35.637584] The buggy address belongs to the physical page: [ 35.638036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.638115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.638427] page_type: f5(slab) [ 35.638537] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.638841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.638986] page dumped because: kasan: bad access detected [ 35.639024] [ 35.639045] Memory state around the buggy address: [ 35.639095] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.639355] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.639674] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.639766] ^ [ 35.640176] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.640612] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.640742] ================================================================== [ 35.650656] ================================================================== [ 35.650987] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 35.651419] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.651490] [ 35.651843] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.652309] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.652426] Hardware name: linux,dummy-virt (DT) [ 35.652471] Call trace: [ 35.652533] show_stack+0x20/0x38 (C) [ 35.652656] dump_stack_lvl+0x8c/0xd0 [ 35.652723] print_report+0x118/0x5e8 [ 35.652769] kasan_report+0xdc/0x128 [ 35.652815] kasan_check_range+0x100/0x1a8 [ 35.652862] __kasan_check_write+0x20/0x30 [ 35.652911] copy_user_test_oob+0x35c/0xec8 [ 35.652961] kunit_try_run_case+0x170/0x3f0 [ 35.653025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.653085] kthread+0x328/0x630 [ 35.653138] ret_from_fork+0x10/0x20 [ 35.653214] [ 35.653251] Allocated by task 317: [ 35.653283] kasan_save_stack+0x3c/0x68 [ 35.653324] kasan_save_track+0x20/0x40 [ 35.653372] kasan_save_alloc_info+0x40/0x58 [ 35.653413] __kasan_kmalloc+0xd4/0xd8 [ 35.653451] __kmalloc_noprof+0x198/0x4c8 [ 35.653494] kunit_kmalloc_array+0x34/0x88 [ 35.653533] copy_user_test_oob+0xac/0xec8 [ 35.653574] kunit_try_run_case+0x170/0x3f0 [ 35.653613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.653668] kthread+0x328/0x630 [ 35.653713] ret_from_fork+0x10/0x20 [ 35.653761] [ 35.653783] The buggy address belongs to the object at fff00000c9a8b900 [ 35.653783] which belongs to the cache kmalloc-128 of size 128 [ 35.653861] The buggy address is located 0 bytes inside of [ 35.653861] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.653946] [ 35.653970] The buggy address belongs to the physical page: [ 35.654010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.654074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.654125] page_type: f5(slab) [ 35.654167] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.654231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.654282] page dumped because: kasan: bad access detected [ 35.654314] [ 35.654344] Memory state around the buggy address: [ 35.654385] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.654453] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654507] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.654562] ^ [ 35.654605] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654661] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.655006] ================================================================== [ 35.656292] ================================================================== [ 35.656724] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 35.657032] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.657095] [ 35.657129] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.657220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.657254] Hardware name: linux,dummy-virt (DT) [ 35.657557] Call trace: [ 35.657666] show_stack+0x20/0x38 (C) [ 35.657752] dump_stack_lvl+0x8c/0xd0 [ 35.657968] print_report+0x118/0x5e8 [ 35.658236] kasan_report+0xdc/0x128 [ 35.658306] kasan_check_range+0x100/0x1a8 [ 35.658392] __kasan_check_read+0x20/0x30 [ 35.658564] copy_user_test_oob+0x3c8/0xec8 [ 35.658670] kunit_try_run_case+0x170/0x3f0 [ 35.658925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.659088] kthread+0x328/0x630 [ 35.659141] ret_from_fork+0x10/0x20 [ 35.659206] [ 35.659227] Allocated by task 317: [ 35.659267] kasan_save_stack+0x3c/0x68 [ 35.659878] kasan_save_track+0x20/0x40 [ 35.660180] kasan_save_alloc_info+0x40/0x58 [ 35.660442] __kasan_kmalloc+0xd4/0xd8 [ 35.660942] __kmalloc_noprof+0x198/0x4c8 [ 35.661027] kunit_kmalloc_array+0x34/0x88 [ 35.661350] copy_user_test_oob+0xac/0xec8 [ 35.661931] kunit_try_run_case+0x170/0x3f0 [ 35.662075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.662142] kthread+0x328/0x630 [ 35.662745] ret_from_fork+0x10/0x20 [ 35.662865] [ 35.662939] The buggy address belongs to the object at fff00000c9a8b900 [ 35.662939] which belongs to the cache kmalloc-128 of size 128 [ 35.663215] The buggy address is located 0 bytes inside of [ 35.663215] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.663377] [ 35.663472] The buggy address belongs to the physical page: [ 35.663769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.664051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.664473] page_type: f5(slab) [ 35.664624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.664851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.665074] page dumped because: kasan: bad access detected [ 35.665151] [ 35.665516] Memory state around the buggy address: [ 35.665714] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.665859] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666027] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.666096] ^ [ 35.666521] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666596] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666688] ==================================================================
[ 30.152686] ================================================================== [ 30.153542] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 30.154134] Read of size 121 at addr ffff888106253800 by task kunit_try_catch/334 [ 30.154729] [ 30.155033] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 30.155232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.155247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.155270] Call Trace: [ 30.155287] <TASK> [ 30.155304] dump_stack_lvl+0x73/0xb0 [ 30.155377] print_report+0xd1/0x640 [ 30.155402] ? __virt_addr_valid+0x1db/0x2d0 [ 30.155427] ? copy_user_test_oob+0x604/0x10f0 [ 30.155452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.155481] ? copy_user_test_oob+0x604/0x10f0 [ 30.155506] kasan_report+0x141/0x180 [ 30.155530] ? copy_user_test_oob+0x604/0x10f0 [ 30.155560] kasan_check_range+0x10c/0x1c0 [ 30.155585] __kasan_check_read+0x15/0x20 [ 30.155611] copy_user_test_oob+0x604/0x10f0 [ 30.155639] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.155665] ? finish_task_switch.isra.0+0x153/0x700 [ 30.155689] ? __switch_to+0x47/0xf80 [ 30.155716] ? __schedule+0x10da/0x2b60 [ 30.155739] ? __pfx_read_tsc+0x10/0x10 [ 30.155762] ? ktime_get_ts64+0x86/0x230 [ 30.155809] kunit_try_run_case+0x1a5/0x480 [ 30.155836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.155861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.155883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.155911] ? __kthread_parkme+0x82/0x180 [ 30.155933] ? preempt_count_sub+0x50/0x80 [ 30.155968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.155993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.156019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.156062] kthread+0x337/0x6f0 [ 30.156084] ? trace_preempt_on+0x20/0xc0 [ 30.156110] ? __pfx_kthread+0x10/0x10 [ 30.156133] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.156158] ? calculate_sigpending+0x7b/0xa0 [ 30.156184] ? __pfx_kthread+0x10/0x10 [ 30.156207] ret_from_fork+0x116/0x1d0 [ 30.156228] ? __pfx_kthread+0x10/0x10 [ 30.156250] ret_from_fork_asm+0x1a/0x30 [ 30.156282] </TASK> [ 30.156295] [ 30.166631] Allocated by task 334: [ 30.166803] kasan_save_stack+0x45/0x70 [ 30.167077] kasan_save_track+0x18/0x40 [ 30.167303] kasan_save_alloc_info+0x3b/0x50 [ 30.167545] __kasan_kmalloc+0xb7/0xc0 [ 30.167730] __kmalloc_noprof+0x1ca/0x510 [ 30.167927] kunit_kmalloc_array+0x25/0x60 [ 30.168153] copy_user_test_oob+0xab/0x10f0 [ 30.168395] kunit_try_run_case+0x1a5/0x480 [ 30.168651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.168999] kthread+0x337/0x6f0 [ 30.169154] ret_from_fork+0x116/0x1d0 [ 30.169465] ret_from_fork_asm+0x1a/0x30 [ 30.169692] [ 30.169793] The buggy address belongs to the object at ffff888106253800 [ 30.169793] which belongs to the cache kmalloc-128 of size 128 [ 30.170522] The buggy address is located 0 bytes inside of [ 30.170522] allocated 120-byte region [ffff888106253800, ffff888106253878) [ 30.171124] [ 30.171286] The buggy address belongs to the physical page: [ 30.171510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 30.171883] flags: 0x200000000000000(node=0|zone=2) [ 30.172233] page_type: f5(slab) [ 30.172396] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.172750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.173105] page dumped because: kasan: bad access detected [ 30.173363] [ 30.173454] Memory state around the buggy address: [ 30.173675] ffff888106253700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.173977] ffff888106253780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.174317] >ffff888106253800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.174735] ^ [ 30.175079] ffff888106253880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.175395] ffff888106253900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.175755] ================================================================== [ 30.068477] ================================================================== [ 30.068821] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 30.069305] Write of size 121 at addr ffff888106253800 by task kunit_try_catch/334 [ 30.069542] [ 30.069621] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 30.069670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.069684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.069705] Call Trace: [ 30.069719] <TASK> [ 30.069735] dump_stack_lvl+0x73/0xb0 [ 30.069765] print_report+0xd1/0x640 [ 30.069820] ? __virt_addr_valid+0x1db/0x2d0 [ 30.069847] ? copy_user_test_oob+0x3fd/0x10f0 [ 30.069872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.069923] ? copy_user_test_oob+0x3fd/0x10f0 [ 30.069973] kasan_report+0x141/0x180 [ 30.070012] ? copy_user_test_oob+0x3fd/0x10f0 [ 30.070062] kasan_check_range+0x10c/0x1c0 [ 30.070088] __kasan_check_write+0x18/0x20 [ 30.070114] copy_user_test_oob+0x3fd/0x10f0 [ 30.070142] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.070168] ? finish_task_switch.isra.0+0x153/0x700 [ 30.070192] ? __switch_to+0x47/0xf80 [ 30.070219] ? __schedule+0x10da/0x2b60 [ 30.070241] ? __pfx_read_tsc+0x10/0x10 [ 30.070264] ? ktime_get_ts64+0x86/0x230 [ 30.070291] kunit_try_run_case+0x1a5/0x480 [ 30.070317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.070342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.070366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.070394] ? __kthread_parkme+0x82/0x180 [ 30.070415] ? preempt_count_sub+0x50/0x80 [ 30.070440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.070487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.070512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.070539] kthread+0x337/0x6f0 [ 30.070561] ? trace_preempt_on+0x20/0xc0 [ 30.070585] ? __pfx_kthread+0x10/0x10 [ 30.070608] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.070635] ? calculate_sigpending+0x7b/0xa0 [ 30.070676] ? __pfx_kthread+0x10/0x10 [ 30.070700] ret_from_fork+0x116/0x1d0 [ 30.070721] ? __pfx_kthread+0x10/0x10 [ 30.070744] ret_from_fork_asm+0x1a/0x30 [ 30.070793] </TASK> [ 30.070813] [ 30.084954] Allocated by task 334: [ 30.085357] kasan_save_stack+0x45/0x70 [ 30.085766] kasan_save_track+0x18/0x40 [ 30.086205] kasan_save_alloc_info+0x3b/0x50 [ 30.086610] __kasan_kmalloc+0xb7/0xc0 [ 30.087024] __kmalloc_noprof+0x1ca/0x510 [ 30.087451] kunit_kmalloc_array+0x25/0x60 [ 30.087910] copy_user_test_oob+0xab/0x10f0 [ 30.088322] kunit_try_run_case+0x1a5/0x480 [ 30.088738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.089292] kthread+0x337/0x6f0 [ 30.089623] ret_from_fork+0x116/0x1d0 [ 30.089977] ret_from_fork_asm+0x1a/0x30 [ 30.090386] [ 30.090557] The buggy address belongs to the object at ffff888106253800 [ 30.090557] which belongs to the cache kmalloc-128 of size 128 [ 30.091158] The buggy address is located 0 bytes inside of [ 30.091158] allocated 120-byte region [ffff888106253800, ffff888106253878) [ 30.092482] [ 30.092639] The buggy address belongs to the physical page: [ 30.093235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 30.093657] flags: 0x200000000000000(node=0|zone=2) [ 30.093929] page_type: f5(slab) [ 30.094280] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.095047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.095801] page dumped because: kasan: bad access detected [ 30.096054] [ 30.096244] Memory state around the buggy address: [ 30.096689] ffff888106253700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.097214] ffff888106253780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.097578] >ffff888106253800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.097811] ^ [ 30.098114] ffff888106253880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.098871] ffff888106253900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099603] ================================================================== [ 30.100105] ================================================================== [ 30.100817] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 30.101512] Read of size 121 at addr ffff888106253800 by task kunit_try_catch/334 [ 30.101772] [ 30.102025] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 30.102077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.102109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.102132] Call Trace: [ 30.102148] <TASK> [ 30.102165] dump_stack_lvl+0x73/0xb0 [ 30.102208] print_report+0xd1/0x640 [ 30.102247] ? __virt_addr_valid+0x1db/0x2d0 [ 30.102272] ? copy_user_test_oob+0x4aa/0x10f0 [ 30.102297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.102325] ? copy_user_test_oob+0x4aa/0x10f0 [ 30.102351] kasan_report+0x141/0x180 [ 30.102375] ? copy_user_test_oob+0x4aa/0x10f0 [ 30.102405] kasan_check_range+0x10c/0x1c0 [ 30.102431] __kasan_check_read+0x15/0x20 [ 30.102455] copy_user_test_oob+0x4aa/0x10f0 [ 30.102483] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.102508] ? finish_task_switch.isra.0+0x153/0x700 [ 30.102532] ? __switch_to+0x47/0xf80 [ 30.102559] ? __schedule+0x10da/0x2b60 [ 30.102581] ? __pfx_read_tsc+0x10/0x10 [ 30.102604] ? ktime_get_ts64+0x86/0x230 [ 30.102630] kunit_try_run_case+0x1a5/0x480 [ 30.102656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.102681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.102705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.102733] ? __kthread_parkme+0x82/0x180 [ 30.102754] ? preempt_count_sub+0x50/0x80 [ 30.102779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.102806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.102831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.102857] kthread+0x337/0x6f0 [ 30.102879] ? trace_preempt_on+0x20/0xc0 [ 30.102904] ? __pfx_kthread+0x10/0x10 [ 30.102927] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.102976] ? calculate_sigpending+0x7b/0xa0 [ 30.103002] ? __pfx_kthread+0x10/0x10 [ 30.103026] ret_from_fork+0x116/0x1d0 [ 30.103047] ? __pfx_kthread+0x10/0x10 [ 30.103076] ret_from_fork_asm+0x1a/0x30 [ 30.103109] </TASK> [ 30.103122] [ 30.117739] Allocated by task 334: [ 30.117868] kasan_save_stack+0x45/0x70 [ 30.118049] kasan_save_track+0x18/0x40 [ 30.118434] kasan_save_alloc_info+0x3b/0x50 [ 30.118694] __kasan_kmalloc+0xb7/0xc0 [ 30.119059] __kmalloc_noprof+0x1ca/0x510 [ 30.119505] kunit_kmalloc_array+0x25/0x60 [ 30.119925] copy_user_test_oob+0xab/0x10f0 [ 30.120374] kunit_try_run_case+0x1a5/0x480 [ 30.120613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.120801] kthread+0x337/0x6f0 [ 30.121051] ret_from_fork+0x116/0x1d0 [ 30.121416] ret_from_fork_asm+0x1a/0x30 [ 30.121754] [ 30.121823] The buggy address belongs to the object at ffff888106253800 [ 30.121823] which belongs to the cache kmalloc-128 of size 128 [ 30.122743] The buggy address is located 0 bytes inside of [ 30.122743] allocated 120-byte region [ffff888106253800, ffff888106253878) [ 30.123581] [ 30.123651] The buggy address belongs to the physical page: [ 30.123822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 30.124076] flags: 0x200000000000000(node=0|zone=2) [ 30.124416] page_type: f5(slab) [ 30.124573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.124984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.125250] page dumped because: kasan: bad access detected [ 30.125570] [ 30.125647] Memory state around the buggy address: [ 30.125875] ffff888106253700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.126243] ffff888106253780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.126580] >ffff888106253800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.126807] ^ [ 30.127207] ffff888106253880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.127542] ffff888106253900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.127840] ================================================================== [ 30.128352] ================================================================== [ 30.128677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 30.129289] Write of size 121 at addr ffff888106253800 by task kunit_try_catch/334 [ 30.129524] [ 30.129607] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 30.129656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.129670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.129692] Call Trace: [ 30.129709] <TASK> [ 30.129725] dump_stack_lvl+0x73/0xb0 [ 30.129755] print_report+0xd1/0x640 [ 30.129780] ? __virt_addr_valid+0x1db/0x2d0 [ 30.129806] ? copy_user_test_oob+0x557/0x10f0 [ 30.129831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.129859] ? copy_user_test_oob+0x557/0x10f0 [ 30.129885] kasan_report+0x141/0x180 [ 30.130531] ? copy_user_test_oob+0x557/0x10f0 [ 30.130563] kasan_check_range+0x10c/0x1c0 [ 30.130590] __kasan_check_write+0x18/0x20 [ 30.130615] copy_user_test_oob+0x557/0x10f0 [ 30.130643] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.130669] ? finish_task_switch.isra.0+0x153/0x700 [ 30.130695] ? __switch_to+0x47/0xf80 [ 30.130723] ? __schedule+0x10da/0x2b60 [ 30.130747] ? __pfx_read_tsc+0x10/0x10 [ 30.130770] ? ktime_get_ts64+0x86/0x230 [ 30.130796] kunit_try_run_case+0x1a5/0x480 [ 30.130823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.130866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.130890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.130918] ? __kthread_parkme+0x82/0x180 [ 30.130940] ? preempt_count_sub+0x50/0x80 [ 30.130977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.131003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.131029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.131079] kthread+0x337/0x6f0 [ 30.131101] ? trace_preempt_on+0x20/0xc0 [ 30.131128] ? __pfx_kthread+0x10/0x10 [ 30.131151] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.131176] ? calculate_sigpending+0x7b/0xa0 [ 30.131203] ? __pfx_kthread+0x10/0x10 [ 30.131226] ret_from_fork+0x116/0x1d0 [ 30.131248] ? __pfx_kthread+0x10/0x10 [ 30.131270] ret_from_fork_asm+0x1a/0x30 [ 30.131304] </TASK> [ 30.131316] [ 30.138622] Allocated by task 334: [ 30.138788] kasan_save_stack+0x45/0x70 [ 30.138977] kasan_save_track+0x18/0x40 [ 30.139148] kasan_save_alloc_info+0x3b/0x50 [ 30.139339] __kasan_kmalloc+0xb7/0xc0 [ 30.139495] __kmalloc_noprof+0x1ca/0x510 [ 30.139663] kunit_kmalloc_array+0x25/0x60 [ 30.139833] copy_user_test_oob+0xab/0x10f0 [ 30.140431] kunit_try_run_case+0x1a5/0x480 [ 30.141354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.141584] kthread+0x337/0x6f0 [ 30.141729] ret_from_fork+0x116/0x1d0 [ 30.142666] ret_from_fork_asm+0x1a/0x30 [ 30.143143] [ 30.143397] The buggy address belongs to the object at ffff888106253800 [ 30.143397] which belongs to the cache kmalloc-128 of size 128 [ 30.144268] The buggy address is located 0 bytes inside of [ 30.144268] allocated 120-byte region [ffff888106253800, ffff888106253878) [ 30.145393] [ 30.145660] The buggy address belongs to the physical page: [ 30.146405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 30.147031] flags: 0x200000000000000(node=0|zone=2) [ 30.147507] page_type: f5(slab) [ 30.147675] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.147995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.148293] page dumped because: kasan: bad access detected [ 30.148517] [ 30.148598] Memory state around the buggy address: [ 30.148796] ffff888106253700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.149090] ffff888106253780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.149366] >ffff888106253800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.149632] ^ [ 30.149899] ffff888106253880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.150913] ffff888106253900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.151553] ==================================================================