Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.433807] ================================================================== [ 21.433901] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.434260] Write of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.434381] [ 21.434437] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.434861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.434912] Hardware name: linux,dummy-virt (DT) [ 21.434989] Call trace: [ 21.435046] show_stack+0x20/0x38 (C) [ 21.435107] dump_stack_lvl+0x8c/0xd0 [ 21.435249] print_report+0x118/0x608 [ 21.435304] kasan_report+0xdc/0x128 [ 21.435370] kasan_check_range+0x100/0x1a8 [ 21.436601] __kasan_check_write+0x20/0x30 [ 21.436679] copy_user_test_oob+0x35c/0xec8 [ 21.437262] kunit_try_run_case+0x170/0x3f0 [ 21.437352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.437410] kthread+0x328/0x630 [ 21.437456] ret_from_fork+0x10/0x20 [ 21.437508] [ 21.437529] Allocated by task 285: [ 21.437561] kasan_save_stack+0x3c/0x68 [ 21.440631] kasan_save_track+0x20/0x40 [ 21.440738] kasan_save_alloc_info+0x40/0x58 [ 21.440818] __kasan_kmalloc+0xd4/0xd8 [ 21.440859] __kmalloc_noprof+0x198/0x4c8 [ 21.440902] kunit_kmalloc_array+0x34/0x88 [ 21.440943] copy_user_test_oob+0xac/0xec8 [ 21.440983] kunit_try_run_case+0x170/0x3f0 [ 21.441022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.441068] kthread+0x328/0x630 [ 21.441103] ret_from_fork+0x10/0x20 [ 21.441249] [ 21.441286] The buggy address belongs to the object at fff00000c7041900 [ 21.441286] which belongs to the cache kmalloc-128 of size 128 [ 21.441455] The buggy address is located 0 bytes inside of [ 21.441455] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.441760] [ 21.441839] The buggy address belongs to the physical page: [ 21.441920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.441976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.442049] page_type: f5(slab) [ 21.442105] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.442157] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.442206] page dumped because: kasan: bad access detected [ 21.442378] [ 21.442400] Memory state around the buggy address: [ 21.442436] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.442652] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.442880] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.442922] ^ [ 21.442980] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.443027] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.443202] ================================================================== [ 21.443902] ================================================================== [ 21.443958] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.444007] Read of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.444060] [ 21.444095] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.444184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.444212] Hardware name: linux,dummy-virt (DT) [ 21.444246] Call trace: [ 21.444290] show_stack+0x20/0x38 (C) [ 21.444355] dump_stack_lvl+0x8c/0xd0 [ 21.444411] print_report+0x118/0x608 [ 21.444540] kasan_report+0xdc/0x128 [ 21.444598] kasan_check_range+0x100/0x1a8 [ 21.444650] __kasan_check_read+0x20/0x30 [ 21.444723] copy_user_test_oob+0x3c8/0xec8 [ 21.444772] kunit_try_run_case+0x170/0x3f0 [ 21.444822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.444877] kthread+0x328/0x630 [ 21.444922] ret_from_fork+0x10/0x20 [ 21.445070] [ 21.445093] Allocated by task 285: [ 21.445187] kasan_save_stack+0x3c/0x68 [ 21.445230] kasan_save_track+0x20/0x40 [ 21.445271] kasan_save_alloc_info+0x40/0x58 [ 21.445314] __kasan_kmalloc+0xd4/0xd8 [ 21.445361] __kmalloc_noprof+0x198/0x4c8 [ 21.445402] kunit_kmalloc_array+0x34/0x88 [ 21.445441] copy_user_test_oob+0xac/0xec8 [ 21.445482] kunit_try_run_case+0x170/0x3f0 [ 21.445521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.445588] kthread+0x328/0x630 [ 21.445717] ret_from_fork+0x10/0x20 [ 21.445814] [ 21.445880] The buggy address belongs to the object at fff00000c7041900 [ 21.445880] which belongs to the cache kmalloc-128 of size 128 [ 21.445973] The buggy address is located 0 bytes inside of [ 21.445973] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.446121] [ 21.446152] The buggy address belongs to the physical page: [ 21.446185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.446237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.446286] page_type: f5(slab) [ 21.446324] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.446376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.446418] page dumped because: kasan: bad access detected [ 21.446453] [ 21.446472] Memory state around the buggy address: [ 21.446525] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.446572] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.446628] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.446671] ^ [ 21.446781] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.446872] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.446924] ================================================================== [ 21.398276] ================================================================== [ 21.398407] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.399122] Write of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.399559] [ 21.399649] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.399813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.399846] Hardware name: linux,dummy-virt (DT) [ 21.399958] Call trace: [ 21.400005] show_stack+0x20/0x38 (C) [ 21.400065] dump_stack_lvl+0x8c/0xd0 [ 21.400374] print_report+0x118/0x608 [ 21.400471] kasan_report+0xdc/0x128 [ 21.400617] kasan_check_range+0x100/0x1a8 [ 21.400755] __kasan_check_write+0x20/0x30 [ 21.400861] copy_user_test_oob+0x234/0xec8 [ 21.400949] kunit_try_run_case+0x170/0x3f0 [ 21.401292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.401392] kthread+0x328/0x630 [ 21.401492] ret_from_fork+0x10/0x20 [ 21.401674] [ 21.401732] Allocated by task 285: [ 21.401782] kasan_save_stack+0x3c/0x68 [ 21.402123] kasan_save_track+0x20/0x40 [ 21.402212] kasan_save_alloc_info+0x40/0x58 [ 21.402329] __kasan_kmalloc+0xd4/0xd8 [ 21.402408] __kmalloc_noprof+0x198/0x4c8 [ 21.402755] kunit_kmalloc_array+0x34/0x88 [ 21.402850] copy_user_test_oob+0xac/0xec8 [ 21.402910] kunit_try_run_case+0x170/0x3f0 [ 21.402952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.403013] kthread+0x328/0x630 [ 21.403050] ret_from_fork+0x10/0x20 [ 21.403088] [ 21.403132] The buggy address belongs to the object at fff00000c7041900 [ 21.403132] which belongs to the cache kmalloc-128 of size 128 [ 21.403215] The buggy address is located 0 bytes inside of [ 21.403215] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.403282] [ 21.403306] The buggy address belongs to the physical page: [ 21.403345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.403412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.403468] page_type: f5(slab) [ 21.403523] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.403599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.403904] page dumped because: kasan: bad access detected [ 21.404192] [ 21.404268] Memory state around the buggy address: [ 21.404333] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.404615] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.404821] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.404918] ^ [ 21.405000] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.405345] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.405517] ================================================================== [ 21.416155] ================================================================== [ 21.417121] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.417217] Read of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.417571] [ 21.417626] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.417999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.418117] Hardware name: linux,dummy-virt (DT) [ 21.418172] Call trace: [ 21.418207] show_stack+0x20/0x38 (C) [ 21.418303] dump_stack_lvl+0x8c/0xd0 [ 21.418358] print_report+0x118/0x608 [ 21.418419] kasan_report+0xdc/0x128 [ 21.418483] kasan_check_range+0x100/0x1a8 [ 21.418550] __kasan_check_read+0x20/0x30 [ 21.418610] copy_user_test_oob+0x728/0xec8 [ 21.418660] kunit_try_run_case+0x170/0x3f0 [ 21.418711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.418767] kthread+0x328/0x630 [ 21.418813] ret_from_fork+0x10/0x20 [ 21.418881] [ 21.418911] Allocated by task 285: [ 21.418973] kasan_save_stack+0x3c/0x68 [ 21.419025] kasan_save_track+0x20/0x40 [ 21.419081] kasan_save_alloc_info+0x40/0x58 [ 21.419122] __kasan_kmalloc+0xd4/0xd8 [ 21.419164] __kmalloc_noprof+0x198/0x4c8 [ 21.419214] kunit_kmalloc_array+0x34/0x88 [ 21.419269] copy_user_test_oob+0xac/0xec8 [ 21.419308] kunit_try_run_case+0x170/0x3f0 [ 21.419356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.419402] kthread+0x328/0x630 [ 21.419436] ret_from_fork+0x10/0x20 [ 21.419491] [ 21.419513] The buggy address belongs to the object at fff00000c7041900 [ 21.419513] which belongs to the cache kmalloc-128 of size 128 [ 21.419584] The buggy address is located 0 bytes inside of [ 21.419584] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.419896] [ 21.420189] The buggy address belongs to the physical page: [ 21.420350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.420851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.421057] page_type: f5(slab) [ 21.421455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.422227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.422424] page dumped because: kasan: bad access detected [ 21.422543] [ 21.422893] Memory state around the buggy address: [ 21.423097] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.423180] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423293] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.423369] ^ [ 21.423443] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423734] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423919] ================================================================== [ 21.452209] ================================================================== [ 21.452265] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.452313] Read of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.452366] [ 21.452398] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.452480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.452509] Hardware name: linux,dummy-virt (DT) [ 21.452541] Call trace: [ 21.452564] show_stack+0x20/0x38 (C) [ 21.452778] dump_stack_lvl+0x8c/0xd0 [ 21.452881] print_report+0x118/0x608 [ 21.452965] kasan_report+0xdc/0x128 [ 21.453012] kasan_check_range+0x100/0x1a8 [ 21.453063] __kasan_check_read+0x20/0x30 [ 21.453109] copy_user_test_oob+0x4a0/0xec8 [ 21.453159] kunit_try_run_case+0x170/0x3f0 [ 21.453217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.453307] kthread+0x328/0x630 [ 21.453374] ret_from_fork+0x10/0x20 [ 21.453426] [ 21.453446] Allocated by task 285: [ 21.453477] kasan_save_stack+0x3c/0x68 [ 21.453519] kasan_save_track+0x20/0x40 [ 21.453559] kasan_save_alloc_info+0x40/0x58 [ 21.453611] __kasan_kmalloc+0xd4/0xd8 [ 21.453651] __kmalloc_noprof+0x198/0x4c8 [ 21.453690] kunit_kmalloc_array+0x34/0x88 [ 21.453742] copy_user_test_oob+0xac/0xec8 [ 21.453788] kunit_try_run_case+0x170/0x3f0 [ 21.453858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.453906] kthread+0x328/0x630 [ 21.453941] ret_from_fork+0x10/0x20 [ 21.454275] [ 21.454348] The buggy address belongs to the object at fff00000c7041900 [ 21.454348] which belongs to the cache kmalloc-128 of size 128 [ 21.454427] The buggy address is located 0 bytes inside of [ 21.454427] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.454491] [ 21.454539] The buggy address belongs to the physical page: [ 21.454596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.454841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.454892] page_type: f5(slab) [ 21.454930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.455041] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.455237] page dumped because: kasan: bad access detected [ 21.455392] [ 21.455432] Memory state around the buggy address: [ 21.455537] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.456079] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456127] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.456211] ^ [ 21.456298] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456388] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456728] ================================================================== [ 21.447434] ================================================================== [ 21.447613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.447663] Write of size 121 at addr fff00000c7041900 by task kunit_try_catch/285 [ 21.447804] [ 21.447836] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.447924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.447951] Hardware name: linux,dummy-virt (DT) [ 21.447985] Call trace: [ 21.448009] show_stack+0x20/0x38 (C) [ 21.448058] dump_stack_lvl+0x8c/0xd0 [ 21.448109] print_report+0x118/0x608 [ 21.448166] kasan_report+0xdc/0x128 [ 21.448387] kasan_check_range+0x100/0x1a8 [ 21.448635] __kasan_check_write+0x20/0x30 [ 21.448767] copy_user_test_oob+0x434/0xec8 [ 21.448817] kunit_try_run_case+0x170/0x3f0 [ 21.448868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.448922] kthread+0x328/0x630 [ 21.448966] ret_from_fork+0x10/0x20 [ 21.449015] [ 21.449035] Allocated by task 285: [ 21.449066] kasan_save_stack+0x3c/0x68 [ 21.449109] kasan_save_track+0x20/0x40 [ 21.449149] kasan_save_alloc_info+0x40/0x58 [ 21.449192] __kasan_kmalloc+0xd4/0xd8 [ 21.449230] __kmalloc_noprof+0x198/0x4c8 [ 21.449325] kunit_kmalloc_array+0x34/0x88 [ 21.449464] copy_user_test_oob+0xac/0xec8 [ 21.449505] kunit_try_run_case+0x170/0x3f0 [ 21.449565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.449649] kthread+0x328/0x630 [ 21.449685] ret_from_fork+0x10/0x20 [ 21.449746] [ 21.449769] The buggy address belongs to the object at fff00000c7041900 [ 21.449769] which belongs to the cache kmalloc-128 of size 128 [ 21.449829] The buggy address is located 0 bytes inside of [ 21.449829] allocated 120-byte region [fff00000c7041900, fff00000c7041978) [ 21.449893] [ 21.449915] The buggy address belongs to the physical page: [ 21.449948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041 [ 21.450001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.450050] page_type: f5(slab) [ 21.450088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.450140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.450247] page dumped because: kasan: bad access detected [ 21.450310] [ 21.450330] Memory state around the buggy address: [ 21.450462] fff00000c7041800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.450815] fff00000c7041880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.450902] >fff00000c7041900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.450945] ^ [ 21.450990] fff00000c7041980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.451037] fff00000c7041a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.451079] ==================================================================
[ 15.468450] ================================================================== [ 15.468749] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 15.469366] Write of size 121 at addr ffff888102c8ba00 by task kunit_try_catch/304 [ 15.469709] [ 15.470332] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.470390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.470403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.470425] Call Trace: [ 15.470441] <TASK> [ 15.470457] dump_stack_lvl+0x73/0xb0 [ 15.470486] print_report+0xd1/0x650 [ 15.470509] ? __virt_addr_valid+0x1db/0x2d0 [ 15.470533] ? copy_user_test_oob+0x557/0x10f0 [ 15.470557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.470580] ? copy_user_test_oob+0x557/0x10f0 [ 15.470604] kasan_report+0x141/0x180 [ 15.470627] ? copy_user_test_oob+0x557/0x10f0 [ 15.470772] kasan_check_range+0x10c/0x1c0 [ 15.470799] __kasan_check_write+0x18/0x20 [ 15.470820] copy_user_test_oob+0x557/0x10f0 [ 15.470846] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.470879] ? finish_task_switch.isra.0+0x153/0x700 [ 15.470905] ? __switch_to+0x47/0xf50 [ 15.470942] ? __schedule+0x10cc/0x2b60 [ 15.470966] ? __pfx_read_tsc+0x10/0x10 [ 15.470987] ? ktime_get_ts64+0x86/0x230 [ 15.471011] kunit_try_run_case+0x1a5/0x480 [ 15.471036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.471085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.471109] ? __kthread_parkme+0x82/0x180 [ 15.471131] ? preempt_count_sub+0x50/0x80 [ 15.471155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.471236] kthread+0x337/0x6f0 [ 15.471257] ? trace_preempt_on+0x20/0xc0 [ 15.471281] ? __pfx_kthread+0x10/0x10 [ 15.471313] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.471335] ? calculate_sigpending+0x7b/0xa0 [ 15.471368] ? __pfx_kthread+0x10/0x10 [ 15.471391] ret_from_fork+0x116/0x1d0 [ 15.471418] ? __pfx_kthread+0x10/0x10 [ 15.471439] ret_from_fork_asm+0x1a/0x30 [ 15.471470] </TASK> [ 15.471493] [ 15.479163] Allocated by task 304: [ 15.479378] kasan_save_stack+0x45/0x70 [ 15.479573] kasan_save_track+0x18/0x40 [ 15.479819] kasan_save_alloc_info+0x3b/0x50 [ 15.479993] __kasan_kmalloc+0xb7/0xc0 [ 15.480173] __kmalloc_noprof+0x1c9/0x500 [ 15.480315] kunit_kmalloc_array+0x25/0x60 [ 15.480472] copy_user_test_oob+0xab/0x10f0 [ 15.480667] kunit_try_run_case+0x1a5/0x480 [ 15.480879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.481131] kthread+0x337/0x6f0 [ 15.481297] ret_from_fork+0x116/0x1d0 [ 15.481551] ret_from_fork_asm+0x1a/0x30 [ 15.481692] [ 15.481828] The buggy address belongs to the object at ffff888102c8ba00 [ 15.481828] which belongs to the cache kmalloc-128 of size 128 [ 15.482364] The buggy address is located 0 bytes inside of [ 15.482364] allocated 120-byte region [ffff888102c8ba00, ffff888102c8ba78) [ 15.482966] [ 15.483058] The buggy address belongs to the physical page: [ 15.483304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b [ 15.483644] flags: 0x200000000000000(node=0|zone=2) [ 15.483940] page_type: f5(slab) [ 15.484111] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.484372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.484603] page dumped because: kasan: bad access detected [ 15.484776] [ 15.484847] Memory state around the buggy address: [ 15.485015] ffff888102c8b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.485430] ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485746] >ffff888102c8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.486043] ^ [ 15.486253] ffff888102c8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486822] ffff888102c8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.487124] ================================================================== [ 15.450067] ================================================================== [ 15.450437] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 15.450762] Read of size 121 at addr ffff888102c8ba00 by task kunit_try_catch/304 [ 15.451042] [ 15.451126] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.451182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.451194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.451216] Call Trace: [ 15.451230] <TASK> [ 15.451247] dump_stack_lvl+0x73/0xb0 [ 15.451272] print_report+0xd1/0x650 [ 15.451296] ? __virt_addr_valid+0x1db/0x2d0 [ 15.451330] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.451372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.451395] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.451419] kasan_report+0x141/0x180 [ 15.451442] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.451471] kasan_check_range+0x10c/0x1c0 [ 15.451505] __kasan_check_read+0x15/0x20 [ 15.451524] copy_user_test_oob+0x4aa/0x10f0 [ 15.451550] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.451584] ? finish_task_switch.isra.0+0x153/0x700 [ 15.451607] ? __switch_to+0x47/0xf50 [ 15.451633] ? __schedule+0x10cc/0x2b60 [ 15.451659] ? __pfx_read_tsc+0x10/0x10 [ 15.451691] ? ktime_get_ts64+0x86/0x230 [ 15.451715] kunit_try_run_case+0x1a5/0x480 [ 15.451753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.451784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.451808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.451832] ? __kthread_parkme+0x82/0x180 [ 15.451854] ? preempt_count_sub+0x50/0x80 [ 15.451878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.451913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.451936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.451970] kthread+0x337/0x6f0 [ 15.451990] ? trace_preempt_on+0x20/0xc0 [ 15.452015] ? __pfx_kthread+0x10/0x10 [ 15.452036] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.452066] ? calculate_sigpending+0x7b/0xa0 [ 15.452091] ? __pfx_kthread+0x10/0x10 [ 15.452114] ret_from_fork+0x116/0x1d0 [ 15.452144] ? __pfx_kthread+0x10/0x10 [ 15.452165] ret_from_fork_asm+0x1a/0x30 [ 15.452195] </TASK> [ 15.452216] [ 15.460092] Allocated by task 304: [ 15.460255] kasan_save_stack+0x45/0x70 [ 15.460408] kasan_save_track+0x18/0x40 [ 15.460547] kasan_save_alloc_info+0x3b/0x50 [ 15.460697] __kasan_kmalloc+0xb7/0xc0 [ 15.460831] __kmalloc_noprof+0x1c9/0x500 [ 15.460985] kunit_kmalloc_array+0x25/0x60 [ 15.461230] copy_user_test_oob+0xab/0x10f0 [ 15.461478] kunit_try_run_case+0x1a5/0x480 [ 15.461722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.461993] kthread+0x337/0x6f0 [ 15.462227] ret_from_fork+0x116/0x1d0 [ 15.462376] ret_from_fork_asm+0x1a/0x30 [ 15.462573] [ 15.462671] The buggy address belongs to the object at ffff888102c8ba00 [ 15.462671] which belongs to the cache kmalloc-128 of size 128 [ 15.463127] The buggy address is located 0 bytes inside of [ 15.463127] allocated 120-byte region [ffff888102c8ba00, ffff888102c8ba78) [ 15.463659] [ 15.463806] The buggy address belongs to the physical page: [ 15.464035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b [ 15.464388] flags: 0x200000000000000(node=0|zone=2) [ 15.464587] page_type: f5(slab) [ 15.464781] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.465096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.465441] page dumped because: kasan: bad access detected [ 15.465683] [ 15.465818] Memory state around the buggy address: [ 15.466036] ffff888102c8b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.466307] ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.466532] >ffff888102c8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.466934] ^ [ 15.467271] ffff888102c8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.467577] ffff888102c8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.467949] ================================================================== [ 15.431712] ================================================================== [ 15.432042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 15.432376] Write of size 121 at addr ffff888102c8ba00 by task kunit_try_catch/304 [ 15.432778] [ 15.432914] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.432960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.432994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.433016] Call Trace: [ 15.433031] <TASK> [ 15.433059] dump_stack_lvl+0x73/0xb0 [ 15.433089] print_report+0xd1/0x650 [ 15.433113] ? __virt_addr_valid+0x1db/0x2d0 [ 15.433138] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.433171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.433194] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.433219] kasan_report+0x141/0x180 [ 15.433257] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.433287] kasan_check_range+0x10c/0x1c0 [ 15.433312] __kasan_check_write+0x18/0x20 [ 15.433350] copy_user_test_oob+0x3fd/0x10f0 [ 15.433378] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.433412] ? finish_task_switch.isra.0+0x153/0x700 [ 15.433435] ? __switch_to+0x47/0xf50 [ 15.433464] ? __schedule+0x10cc/0x2b60 [ 15.433489] ? __pfx_read_tsc+0x10/0x10 [ 15.433520] ? ktime_get_ts64+0x86/0x230 [ 15.433545] kunit_try_run_case+0x1a5/0x480 [ 15.433571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.433605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.433629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.433653] ? __kthread_parkme+0x82/0x180 [ 15.433675] ? preempt_count_sub+0x50/0x80 [ 15.433700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.433724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.433772] kthread+0x337/0x6f0 [ 15.433793] ? trace_preempt_on+0x20/0xc0 [ 15.433818] ? __pfx_kthread+0x10/0x10 [ 15.433839] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.433862] ? calculate_sigpending+0x7b/0xa0 [ 15.433886] ? __pfx_kthread+0x10/0x10 [ 15.433909] ret_from_fork+0x116/0x1d0 [ 15.433929] ? __pfx_kthread+0x10/0x10 [ 15.433950] ret_from_fork_asm+0x1a/0x30 [ 15.433982] </TASK> [ 15.433993] [ 15.441314] Allocated by task 304: [ 15.441540] kasan_save_stack+0x45/0x70 [ 15.441706] kasan_save_track+0x18/0x40 [ 15.441911] kasan_save_alloc_info+0x3b/0x50 [ 15.442071] __kasan_kmalloc+0xb7/0xc0 [ 15.442237] __kmalloc_noprof+0x1c9/0x500 [ 15.442474] kunit_kmalloc_array+0x25/0x60 [ 15.442673] copy_user_test_oob+0xab/0x10f0 [ 15.442920] kunit_try_run_case+0x1a5/0x480 [ 15.443141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.443396] kthread+0x337/0x6f0 [ 15.443583] ret_from_fork+0x116/0x1d0 [ 15.443762] ret_from_fork_asm+0x1a/0x30 [ 15.443968] [ 15.444077] The buggy address belongs to the object at ffff888102c8ba00 [ 15.444077] which belongs to the cache kmalloc-128 of size 128 [ 15.444614] The buggy address is located 0 bytes inside of [ 15.444614] allocated 120-byte region [ffff888102c8ba00, ffff888102c8ba78) [ 15.445153] [ 15.445245] The buggy address belongs to the physical page: [ 15.445451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b [ 15.445763] flags: 0x200000000000000(node=0|zone=2) [ 15.445930] page_type: f5(slab) [ 15.446055] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.446286] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.446631] page dumped because: kasan: bad access detected [ 15.447134] [ 15.447245] Memory state around the buggy address: [ 15.447477] ffff888102c8b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.447755] ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.447973] >ffff888102c8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.448187] ^ [ 15.448649] ffff888102c8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449296] ffff888102c8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449653] ================================================================== [ 15.487519] ================================================================== [ 15.488241] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 15.488536] Read of size 121 at addr ffff888102c8ba00 by task kunit_try_catch/304 [ 15.488949] [ 15.489037] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.489079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.489092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.489115] Call Trace: [ 15.489130] <TASK> [ 15.489148] dump_stack_lvl+0x73/0xb0 [ 15.489174] print_report+0xd1/0x650 [ 15.489197] ? __virt_addr_valid+0x1db/0x2d0 [ 15.489220] ? copy_user_test_oob+0x604/0x10f0 [ 15.489244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.489266] ? copy_user_test_oob+0x604/0x10f0 [ 15.489291] kasan_report+0x141/0x180 [ 15.489314] ? copy_user_test_oob+0x604/0x10f0 [ 15.489354] kasan_check_range+0x10c/0x1c0 [ 15.489389] __kasan_check_read+0x15/0x20 [ 15.489410] copy_user_test_oob+0x604/0x10f0 [ 15.489436] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.489470] ? finish_task_switch.isra.0+0x153/0x700 [ 15.489494] ? __switch_to+0x47/0xf50 [ 15.489519] ? __schedule+0x10cc/0x2b60 [ 15.489542] ? __pfx_read_tsc+0x10/0x10 [ 15.489572] ? ktime_get_ts64+0x86/0x230 [ 15.489596] kunit_try_run_case+0x1a5/0x480 [ 15.489632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.489679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.489703] ? __kthread_parkme+0x82/0x180 [ 15.489734] ? preempt_count_sub+0x50/0x80 [ 15.489764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.489823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.489847] kthread+0x337/0x6f0 [ 15.489867] ? trace_preempt_on+0x20/0xc0 [ 15.489892] ? __pfx_kthread+0x10/0x10 [ 15.489923] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.489945] ? calculate_sigpending+0x7b/0xa0 [ 15.489969] ? __pfx_kthread+0x10/0x10 [ 15.490002] ret_from_fork+0x116/0x1d0 [ 15.490021] ? __pfx_kthread+0x10/0x10 [ 15.490042] ret_from_fork_asm+0x1a/0x30 [ 15.490082] </TASK> [ 15.490094] [ 15.497334] Allocated by task 304: [ 15.497527] kasan_save_stack+0x45/0x70 [ 15.497728] kasan_save_track+0x18/0x40 [ 15.497924] kasan_save_alloc_info+0x3b/0x50 [ 15.498234] __kasan_kmalloc+0xb7/0xc0 [ 15.498476] __kmalloc_noprof+0x1c9/0x500 [ 15.498617] kunit_kmalloc_array+0x25/0x60 [ 15.498760] copy_user_test_oob+0xab/0x10f0 [ 15.498906] kunit_try_run_case+0x1a5/0x480 [ 15.499072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.499329] kthread+0x337/0x6f0 [ 15.499530] ret_from_fork+0x116/0x1d0 [ 15.499727] ret_from_fork_asm+0x1a/0x30 [ 15.500082] [ 15.500180] The buggy address belongs to the object at ffff888102c8ba00 [ 15.500180] which belongs to the cache kmalloc-128 of size 128 [ 15.500827] The buggy address is located 0 bytes inside of [ 15.500827] allocated 120-byte region [ffff888102c8ba00, ffff888102c8ba78) [ 15.501284] [ 15.501370] The buggy address belongs to the physical page: [ 15.501559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b [ 15.502155] flags: 0x200000000000000(node=0|zone=2) [ 15.502361] page_type: f5(slab) [ 15.502550] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.502946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.503266] page dumped because: kasan: bad access detected [ 15.503509] [ 15.503625] Memory state around the buggy address: [ 15.503866] ffff888102c8b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.504165] ffff888102c8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504468] >ffff888102c8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.504860] ^ [ 15.505145] ffff888102c8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.505483] ffff888102c8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.505701] ==================================================================