Date
July 10, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.090634] ================================================================== [ 19.090727] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.090781] Read of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.090849] [ 19.090881] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.090964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.090993] Hardware name: linux,dummy-virt (DT) [ 19.091024] Call trace: [ 19.091048] show_stack+0x20/0x38 (C) [ 19.091108] dump_stack_lvl+0x8c/0xd0 [ 19.091160] print_report+0x118/0x608 [ 19.091207] kasan_report+0xdc/0x128 [ 19.091258] kasan_check_range+0x100/0x1a8 [ 19.091308] __kasan_check_read+0x20/0x30 [ 19.091355] copy_user_test_oob+0x3c8/0xec8 [ 19.091405] kunit_try_run_case+0x170/0x3f0 [ 19.091456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.091513] kthread+0x328/0x630 [ 19.091556] ret_from_fork+0x10/0x20 [ 19.091611] [ 19.091634] Allocated by task 285: [ 19.091662] kasan_save_stack+0x3c/0x68 [ 19.091717] kasan_save_track+0x20/0x40 [ 19.091766] kasan_save_alloc_info+0x40/0x58 [ 19.091819] __kasan_kmalloc+0xd4/0xd8 [ 19.091857] __kmalloc_noprof+0x198/0x4c8 [ 19.091898] kunit_kmalloc_array+0x34/0x88 [ 19.091937] copy_user_test_oob+0xac/0xec8 [ 19.091977] kunit_try_run_case+0x170/0x3f0 [ 19.092027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.092092] kthread+0x328/0x630 [ 19.092127] ret_from_fork+0x10/0x20 [ 19.092164] [ 19.092186] The buggy address belongs to the object at fff00000c6454900 [ 19.092186] which belongs to the cache kmalloc-128 of size 128 [ 19.092243] The buggy address is located 0 bytes inside of [ 19.092243] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.092306] [ 19.092327] The buggy address belongs to the physical page: [ 19.092360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.092412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.092459] page_type: f5(slab) [ 19.092500] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.092552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.092594] page dumped because: kasan: bad access detected [ 19.092628] [ 19.092647] Memory state around the buggy address: [ 19.092680] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.092726] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.092770] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.092809] ^ [ 19.092851] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.092896] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.092937] ================================================================== [ 19.093044] ================================================================== [ 19.093098] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.093143] Write of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.093194] [ 19.093224] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.093304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.093333] Hardware name: linux,dummy-virt (DT) [ 19.093363] Call trace: [ 19.093386] show_stack+0x20/0x38 (C) [ 19.093435] dump_stack_lvl+0x8c/0xd0 [ 19.093485] print_report+0x118/0x608 [ 19.093534] kasan_report+0xdc/0x128 [ 19.093581] kasan_check_range+0x100/0x1a8 [ 19.093632] __kasan_check_write+0x20/0x30 [ 19.093681] copy_user_test_oob+0x434/0xec8 [ 19.093737] kunit_try_run_case+0x170/0x3f0 [ 19.093786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.093849] kthread+0x328/0x630 [ 19.093892] ret_from_fork+0x10/0x20 [ 19.094337] [ 19.094377] Allocated by task 285: [ 19.094407] kasan_save_stack+0x3c/0x68 [ 19.094452] kasan_save_track+0x20/0x40 [ 19.094493] kasan_save_alloc_info+0x40/0x58 [ 19.094537] __kasan_kmalloc+0xd4/0xd8 [ 19.094578] __kmalloc_noprof+0x198/0x4c8 [ 19.094644] kunit_kmalloc_array+0x34/0x88 [ 19.094737] copy_user_test_oob+0xac/0xec8 [ 19.094789] kunit_try_run_case+0x170/0x3f0 [ 19.094831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.094878] kthread+0x328/0x630 [ 19.094914] ret_from_fork+0x10/0x20 [ 19.094954] [ 19.094975] The buggy address belongs to the object at fff00000c6454900 [ 19.094975] which belongs to the cache kmalloc-128 of size 128 [ 19.095034] The buggy address is located 0 bytes inside of [ 19.095034] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.095109] [ 19.095130] The buggy address belongs to the physical page: [ 19.095162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.095216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.095262] page_type: f5(slab) [ 19.095299] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.095351] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.095394] page dumped because: kasan: bad access detected [ 19.095427] [ 19.095450] Memory state around the buggy address: [ 19.095482] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.095528] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.095571] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.095612] ^ [ 19.095655] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.095699] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.095739] ================================================================== [ 19.076093] ================================================================== [ 19.076153] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.076208] Read of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.076262] [ 19.076295] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.076380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.076700] Hardware name: linux,dummy-virt (DT) [ 19.076744] Call trace: [ 19.076789] show_stack+0x20/0x38 (C) [ 19.076864] dump_stack_lvl+0x8c/0xd0 [ 19.076943] print_report+0x118/0x608 [ 19.076996] kasan_report+0xdc/0x128 [ 19.077064] kasan_check_range+0x100/0x1a8 [ 19.077140] __kasan_check_read+0x20/0x30 [ 19.077189] copy_user_test_oob+0x728/0xec8 [ 19.077237] kunit_try_run_case+0x170/0x3f0 [ 19.077287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.077344] kthread+0x328/0x630 [ 19.077558] ret_from_fork+0x10/0x20 [ 19.077623] [ 19.077663] Allocated by task 285: [ 19.077737] kasan_save_stack+0x3c/0x68 [ 19.077832] kasan_save_track+0x20/0x40 [ 19.077956] kasan_save_alloc_info+0x40/0x58 [ 19.078042] __kasan_kmalloc+0xd4/0xd8 [ 19.078172] __kmalloc_noprof+0x198/0x4c8 [ 19.078261] kunit_kmalloc_array+0x34/0x88 [ 19.078357] copy_user_test_oob+0xac/0xec8 [ 19.078443] kunit_try_run_case+0x170/0x3f0 [ 19.078483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.078530] kthread+0x328/0x630 [ 19.078688] ret_from_fork+0x10/0x20 [ 19.078737] [ 19.078762] The buggy address belongs to the object at fff00000c6454900 [ 19.078762] which belongs to the cache kmalloc-128 of size 128 [ 19.078862] The buggy address is located 0 bytes inside of [ 19.078862] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.078948] [ 19.079056] The buggy address belongs to the physical page: [ 19.079134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.079224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.079324] page_type: f5(slab) [ 19.079413] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.079556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.079653] page dumped because: kasan: bad access detected [ 19.079717] [ 19.079807] Memory state around the buggy address: [ 19.079863] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.079910] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.079996] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.080263] ^ [ 19.080373] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.080469] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.080592] ================================================================== [ 19.086997] ================================================================== [ 19.087062] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.087133] Write of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.087187] [ 19.087221] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.087325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.087354] Hardware name: linux,dummy-virt (DT) [ 19.087385] Call trace: [ 19.087435] show_stack+0x20/0x38 (C) [ 19.087486] dump_stack_lvl+0x8c/0xd0 [ 19.087535] print_report+0x118/0x608 [ 19.087594] kasan_report+0xdc/0x128 [ 19.087649] kasan_check_range+0x100/0x1a8 [ 19.087701] __kasan_check_write+0x20/0x30 [ 19.087747] copy_user_test_oob+0x35c/0xec8 [ 19.087797] kunit_try_run_case+0x170/0x3f0 [ 19.087846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.087909] kthread+0x328/0x630 [ 19.087962] ret_from_fork+0x10/0x20 [ 19.088014] [ 19.088034] Allocated by task 285: [ 19.088069] kasan_save_stack+0x3c/0x68 [ 19.088124] kasan_save_track+0x20/0x40 [ 19.088170] kasan_save_alloc_info+0x40/0x58 [ 19.088215] __kasan_kmalloc+0xd4/0xd8 [ 19.088255] __kmalloc_noprof+0x198/0x4c8 [ 19.088294] kunit_kmalloc_array+0x34/0x88 [ 19.088334] copy_user_test_oob+0xac/0xec8 [ 19.088373] kunit_try_run_case+0x170/0x3f0 [ 19.088413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.088458] kthread+0x328/0x630 [ 19.088500] ret_from_fork+0x10/0x20 [ 19.088540] [ 19.088560] The buggy address belongs to the object at fff00000c6454900 [ 19.088560] which belongs to the cache kmalloc-128 of size 128 [ 19.088620] The buggy address is located 0 bytes inside of [ 19.088620] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.088686] [ 19.088708] The buggy address belongs to the physical page: [ 19.089150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.089249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.089304] page_type: f5(slab) [ 19.089365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.089433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.089478] page dumped because: kasan: bad access detected [ 19.089539] [ 19.089569] Memory state around the buggy address: [ 19.089604] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.089649] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.089694] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.089734] ^ [ 19.089992] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.090105] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.090177] ================================================================== [ 19.096201] ================================================================== [ 19.096276] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.096329] Read of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.096404] [ 19.096436] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.096518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.096545] Hardware name: linux,dummy-virt (DT) [ 19.096575] Call trace: [ 19.096599] show_stack+0x20/0x38 (C) [ 19.096649] dump_stack_lvl+0x8c/0xd0 [ 19.096849] print_report+0x118/0x608 [ 19.096900] kasan_report+0xdc/0x128 [ 19.096948] kasan_check_range+0x100/0x1a8 [ 19.097019] __kasan_check_read+0x20/0x30 [ 19.097096] copy_user_test_oob+0x4a0/0xec8 [ 19.097179] kunit_try_run_case+0x170/0x3f0 [ 19.097245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.097320] kthread+0x328/0x630 [ 19.097366] ret_from_fork+0x10/0x20 [ 19.097432] [ 19.097471] Allocated by task 285: [ 19.097728] kasan_save_stack+0x3c/0x68 [ 19.097784] kasan_save_track+0x20/0x40 [ 19.097866] kasan_save_alloc_info+0x40/0x58 [ 19.097932] __kasan_kmalloc+0xd4/0xd8 [ 19.097998] __kmalloc_noprof+0x198/0x4c8 [ 19.098115] kunit_kmalloc_array+0x34/0x88 [ 19.098197] copy_user_test_oob+0xac/0xec8 [ 19.098271] kunit_try_run_case+0x170/0x3f0 [ 19.098339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.098424] kthread+0x328/0x630 [ 19.098461] ret_from_fork+0x10/0x20 [ 19.098498] [ 19.098520] The buggy address belongs to the object at fff00000c6454900 [ 19.098520] which belongs to the cache kmalloc-128 of size 128 [ 19.098580] The buggy address is located 0 bytes inside of [ 19.098580] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.098642] [ 19.098665] The buggy address belongs to the physical page: [ 19.098696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.098884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.098983] page_type: f5(slab) [ 19.099061] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.099167] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.099458] page dumped because: kasan: bad access detected [ 19.099518] [ 19.099538] Memory state around the buggy address: [ 19.099575] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.099851] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.099939] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.100033] ^ [ 19.100113] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.100354] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.100458] ================================================================== [ 19.067332] ================================================================== [ 19.067678] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.067799] Write of size 121 at addr fff00000c6454900 by task kunit_try_catch/285 [ 19.067882] [ 19.067935] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.068074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.068140] Hardware name: linux,dummy-virt (DT) [ 19.068197] Call trace: [ 19.068233] show_stack+0x20/0x38 (C) [ 19.068302] dump_stack_lvl+0x8c/0xd0 [ 19.068378] print_report+0x118/0x608 [ 19.068442] kasan_report+0xdc/0x128 [ 19.068490] kasan_check_range+0x100/0x1a8 [ 19.068721] __kasan_check_write+0x20/0x30 [ 19.068785] copy_user_test_oob+0x234/0xec8 [ 19.068835] kunit_try_run_case+0x170/0x3f0 [ 19.069105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.069179] kthread+0x328/0x630 [ 19.069295] ret_from_fork+0x10/0x20 [ 19.069371] [ 19.069410] Allocated by task 285: [ 19.069444] kasan_save_stack+0x3c/0x68 [ 19.069505] kasan_save_track+0x20/0x40 [ 19.069548] kasan_save_alloc_info+0x40/0x58 [ 19.069589] __kasan_kmalloc+0xd4/0xd8 [ 19.069630] __kmalloc_noprof+0x198/0x4c8 [ 19.069673] kunit_kmalloc_array+0x34/0x88 [ 19.069712] copy_user_test_oob+0xac/0xec8 [ 19.069769] kunit_try_run_case+0x170/0x3f0 [ 19.069810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.069861] kthread+0x328/0x630 [ 19.069895] ret_from_fork+0x10/0x20 [ 19.069943] [ 19.069973] The buggy address belongs to the object at fff00000c6454900 [ 19.069973] which belongs to the cache kmalloc-128 of size 128 [ 19.070035] The buggy address is located 0 bytes inside of [ 19.070035] allocated 120-byte region [fff00000c6454900, fff00000c6454978) [ 19.070107] [ 19.070132] The buggy address belongs to the physical page: [ 19.070166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 19.070399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.070469] page_type: f5(slab) [ 19.070516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.070567] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.070611] page dumped because: kasan: bad access detected [ 19.070646] [ 19.070666] Memory state around the buggy address: [ 19.070704] fff00000c6454800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.070750] fff00000c6454880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.070955] >fff00000c6454900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.071029] ^ [ 19.071121] fff00000c6454980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.071211] fff00000c6454a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.071321] ==================================================================
[ 16.679369] ================================================================== [ 16.679744] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.680134] Read of size 121 at addr ffff888103a2f000 by task kunit_try_catch/303 [ 16.680527] [ 16.680645] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.680688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.680713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.680734] Call Trace: [ 16.680747] <TASK> [ 16.680791] dump_stack_lvl+0x73/0xb0 [ 16.680822] print_report+0xd1/0x650 [ 16.680845] ? __virt_addr_valid+0x1db/0x2d0 [ 16.680879] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.680904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.680929] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.680954] kasan_report+0x141/0x180 [ 16.680977] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.681006] kasan_check_range+0x10c/0x1c0 [ 16.681031] __kasan_check_read+0x15/0x20 [ 16.681051] copy_user_test_oob+0x4aa/0x10f0 [ 16.681078] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.681102] ? finish_task_switch.isra.0+0x153/0x700 [ 16.681125] ? __switch_to+0x47/0xf50 [ 16.681151] ? __schedule+0x10cc/0x2b60 [ 16.681174] ? __pfx_read_tsc+0x10/0x10 [ 16.681196] ? ktime_get_ts64+0x86/0x230 [ 16.681220] kunit_try_run_case+0x1a5/0x480 [ 16.681245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.681270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.681294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.681320] ? __kthread_parkme+0x82/0x180 [ 16.681353] ? preempt_count_sub+0x50/0x80 [ 16.681378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.681404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.681449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.681490] kthread+0x337/0x6f0 [ 16.681524] ? trace_preempt_on+0x20/0xc0 [ 16.681562] ? __pfx_kthread+0x10/0x10 [ 16.681583] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.681619] ? calculate_sigpending+0x7b/0xa0 [ 16.681658] ? __pfx_kthread+0x10/0x10 [ 16.681681] ret_from_fork+0x116/0x1d0 [ 16.681711] ? __pfx_kthread+0x10/0x10 [ 16.681733] ret_from_fork_asm+0x1a/0x30 [ 16.681775] </TASK> [ 16.681786] [ 16.690186] Allocated by task 303: [ 16.690393] kasan_save_stack+0x45/0x70 [ 16.690698] kasan_save_track+0x18/0x40 [ 16.690893] kasan_save_alloc_info+0x3b/0x50 [ 16.691135] __kasan_kmalloc+0xb7/0xc0 [ 16.691371] __kmalloc_noprof+0x1c9/0x500 [ 16.691596] kunit_kmalloc_array+0x25/0x60 [ 16.691886] copy_user_test_oob+0xab/0x10f0 [ 16.692132] kunit_try_run_case+0x1a5/0x480 [ 16.692425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.692680] kthread+0x337/0x6f0 [ 16.692834] ret_from_fork+0x116/0x1d0 [ 16.692967] ret_from_fork_asm+0x1a/0x30 [ 16.693139] [ 16.693232] The buggy address belongs to the object at ffff888103a2f000 [ 16.693232] which belongs to the cache kmalloc-128 of size 128 [ 16.693906] The buggy address is located 0 bytes inside of [ 16.693906] allocated 120-byte region [ffff888103a2f000, ffff888103a2f078) [ 16.694500] [ 16.694620] The buggy address belongs to the physical page: [ 16.694876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a2f [ 16.695241] flags: 0x200000000000000(node=0|zone=2) [ 16.695530] page_type: f5(slab) [ 16.695727] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.696067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.696442] page dumped because: kasan: bad access detected [ 16.696723] [ 16.696825] Memory state around the buggy address: [ 16.697017] ffff888103a2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.697405] ffff888103a2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.697753] >ffff888103a2f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.698046] ^ [ 16.698324] ffff888103a2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.698743] ffff888103a2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.699092] ================================================================== [ 16.699761] ================================================================== [ 16.700119] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.700533] Write of size 121 at addr ffff888103a2f000 by task kunit_try_catch/303 [ 16.700859] [ 16.700967] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.701008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.701021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.701041] Call Trace: [ 16.701054] <TASK> [ 16.701067] dump_stack_lvl+0x73/0xb0 [ 16.701096] print_report+0xd1/0x650 [ 16.701119] ? __virt_addr_valid+0x1db/0x2d0 [ 16.701142] ? copy_user_test_oob+0x557/0x10f0 [ 16.701166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.701191] ? copy_user_test_oob+0x557/0x10f0 [ 16.701216] kasan_report+0x141/0x180 [ 16.701238] ? copy_user_test_oob+0x557/0x10f0 [ 16.701295] kasan_check_range+0x10c/0x1c0 [ 16.701321] __kasan_check_write+0x18/0x20 [ 16.701376] copy_user_test_oob+0x557/0x10f0 [ 16.701424] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.701449] ? finish_task_switch.isra.0+0x153/0x700 [ 16.701472] ? __switch_to+0x47/0xf50 [ 16.701507] ? __schedule+0x10cc/0x2b60 [ 16.701530] ? __pfx_read_tsc+0x10/0x10 [ 16.701552] ? ktime_get_ts64+0x86/0x230 [ 16.701586] kunit_try_run_case+0x1a5/0x480 [ 16.701611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.701638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.701692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.701719] ? __kthread_parkme+0x82/0x180 [ 16.701769] ? preempt_count_sub+0x50/0x80 [ 16.701795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.701821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.701848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.701875] kthread+0x337/0x6f0 [ 16.701895] ? trace_preempt_on+0x20/0xc0 [ 16.701945] ? __pfx_kthread+0x10/0x10 [ 16.701967] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.701990] ? calculate_sigpending+0x7b/0xa0 [ 16.702048] ? __pfx_kthread+0x10/0x10 [ 16.702071] ret_from_fork+0x116/0x1d0 [ 16.702091] ? __pfx_kthread+0x10/0x10 [ 16.702123] ret_from_fork_asm+0x1a/0x30 [ 16.702154] </TASK> [ 16.702165] [ 16.710200] Allocated by task 303: [ 16.710419] kasan_save_stack+0x45/0x70 [ 16.710642] kasan_save_track+0x18/0x40 [ 16.710829] kasan_save_alloc_info+0x3b/0x50 [ 16.711073] __kasan_kmalloc+0xb7/0xc0 [ 16.711288] __kmalloc_noprof+0x1c9/0x500 [ 16.711532] kunit_kmalloc_array+0x25/0x60 [ 16.711779] copy_user_test_oob+0xab/0x10f0 [ 16.711970] kunit_try_run_case+0x1a5/0x480 [ 16.712118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.712360] kthread+0x337/0x6f0 [ 16.712661] ret_from_fork+0x116/0x1d0 [ 16.712869] ret_from_fork_asm+0x1a/0x30 [ 16.713047] [ 16.713120] The buggy address belongs to the object at ffff888103a2f000 [ 16.713120] which belongs to the cache kmalloc-128 of size 128 [ 16.713714] The buggy address is located 0 bytes inside of [ 16.713714] allocated 120-byte region [ffff888103a2f000, ffff888103a2f078) [ 16.714289] [ 16.714379] The buggy address belongs to the physical page: [ 16.714882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a2f [ 16.715328] flags: 0x200000000000000(node=0|zone=2) [ 16.715641] page_type: f5(slab) [ 16.715836] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.716252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.716619] page dumped because: kasan: bad access detected [ 16.716930] [ 16.717013] Memory state around the buggy address: [ 16.717270] ffff888103a2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.717630] ffff888103a2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.718074] >ffff888103a2f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.718401] ^ [ 16.718797] ffff888103a2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719138] ffff888103a2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719493] ================================================================== [ 16.720228] ================================================================== [ 16.720595] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.721062] Read of size 121 at addr ffff888103a2f000 by task kunit_try_catch/303 [ 16.721430] [ 16.721510] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.721551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.721563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.721583] Call Trace: [ 16.721600] <TASK> [ 16.721616] dump_stack_lvl+0x73/0xb0 [ 16.721645] print_report+0xd1/0x650 [ 16.721668] ? __virt_addr_valid+0x1db/0x2d0 [ 16.721689] ? copy_user_test_oob+0x604/0x10f0 [ 16.721712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.721735] ? copy_user_test_oob+0x604/0x10f0 [ 16.721759] kasan_report+0x141/0x180 [ 16.721780] ? copy_user_test_oob+0x604/0x10f0 [ 16.721808] kasan_check_range+0x10c/0x1c0 [ 16.721832] __kasan_check_read+0x15/0x20 [ 16.721852] copy_user_test_oob+0x604/0x10f0 [ 16.721876] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.721899] ? finish_task_switch.isra.0+0x153/0x700 [ 16.721921] ? __switch_to+0x47/0xf50 [ 16.721946] ? __schedule+0x10cc/0x2b60 [ 16.721967] ? __pfx_read_tsc+0x10/0x10 [ 16.721989] ? ktime_get_ts64+0x86/0x230 [ 16.722012] kunit_try_run_case+0x1a5/0x480 [ 16.722053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.722077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.722102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.722127] ? __kthread_parkme+0x82/0x180 [ 16.722149] ? preempt_count_sub+0x50/0x80 [ 16.722173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.722199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.722257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.722285] kthread+0x337/0x6f0 [ 16.722331] ? trace_preempt_on+0x20/0xc0 [ 16.722379] ? __pfx_kthread+0x10/0x10 [ 16.722431] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.722455] ? calculate_sigpending+0x7b/0xa0 [ 16.722507] ? __pfx_kthread+0x10/0x10 [ 16.722555] ret_from_fork+0x116/0x1d0 [ 16.722576] ? __pfx_kthread+0x10/0x10 [ 16.722614] ret_from_fork_asm+0x1a/0x30 [ 16.722695] </TASK> [ 16.722707] [ 16.731014] Allocated by task 303: [ 16.731217] kasan_save_stack+0x45/0x70 [ 16.731395] kasan_save_track+0x18/0x40 [ 16.731629] kasan_save_alloc_info+0x3b/0x50 [ 16.731841] __kasan_kmalloc+0xb7/0xc0 [ 16.732054] __kmalloc_noprof+0x1c9/0x500 [ 16.732250] kunit_kmalloc_array+0x25/0x60 [ 16.732474] copy_user_test_oob+0xab/0x10f0 [ 16.732729] kunit_try_run_case+0x1a5/0x480 [ 16.732981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.733271] kthread+0x337/0x6f0 [ 16.733451] ret_from_fork+0x116/0x1d0 [ 16.733767] ret_from_fork_asm+0x1a/0x30 [ 16.733962] [ 16.734056] The buggy address belongs to the object at ffff888103a2f000 [ 16.734056] which belongs to the cache kmalloc-128 of size 128 [ 16.734580] The buggy address is located 0 bytes inside of [ 16.734580] allocated 120-byte region [ffff888103a2f000, ffff888103a2f078) [ 16.734980] [ 16.735051] The buggy address belongs to the physical page: [ 16.735215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a2f [ 16.735457] flags: 0x200000000000000(node=0|zone=2) [ 16.735750] page_type: f5(slab) [ 16.735917] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.736364] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.736831] page dumped because: kasan: bad access detected [ 16.737139] [ 16.737299] Memory state around the buggy address: [ 16.737583] ffff888103a2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.737950] ffff888103a2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.738269] >ffff888103a2f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.738664] ^ [ 16.739024] ffff888103a2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.739254] ffff888103a2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.739622] ================================================================== [ 16.658971] ================================================================== [ 16.659292] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.659714] Write of size 121 at addr ffff888103a2f000 by task kunit_try_catch/303 [ 16.660087] [ 16.660251] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.660367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.660382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.660403] Call Trace: [ 16.660418] <TASK> [ 16.660433] dump_stack_lvl+0x73/0xb0 [ 16.660464] print_report+0xd1/0x650 [ 16.660488] ? __virt_addr_valid+0x1db/0x2d0 [ 16.660513] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.660537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.660607] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.660633] kasan_report+0x141/0x180 [ 16.660666] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.660696] kasan_check_range+0x10c/0x1c0 [ 16.660721] __kasan_check_write+0x18/0x20 [ 16.660741] copy_user_test_oob+0x3fd/0x10f0 [ 16.660768] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.660792] ? finish_task_switch.isra.0+0x153/0x700 [ 16.660817] ? __switch_to+0x47/0xf50 [ 16.660843] ? __schedule+0x10cc/0x2b60 [ 16.660867] ? __pfx_read_tsc+0x10/0x10 [ 16.660888] ? ktime_get_ts64+0x86/0x230 [ 16.660912] kunit_try_run_case+0x1a5/0x480 [ 16.660937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.660962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.660987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.661012] ? __kthread_parkme+0x82/0x180 [ 16.661034] ? preempt_count_sub+0x50/0x80 [ 16.661059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.661085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.661111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.661137] kthread+0x337/0x6f0 [ 16.661157] ? trace_preempt_on+0x20/0xc0 [ 16.661181] ? __pfx_kthread+0x10/0x10 [ 16.661203] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.661226] ? calculate_sigpending+0x7b/0xa0 [ 16.661251] ? __pfx_kthread+0x10/0x10 [ 16.661273] ret_from_fork+0x116/0x1d0 [ 16.661293] ? __pfx_kthread+0x10/0x10 [ 16.661315] ret_from_fork_asm+0x1a/0x30 [ 16.661355] </TASK> [ 16.661367] [ 16.669913] Allocated by task 303: [ 16.670121] kasan_save_stack+0x45/0x70 [ 16.670376] kasan_save_track+0x18/0x40 [ 16.670572] kasan_save_alloc_info+0x3b/0x50 [ 16.670830] __kasan_kmalloc+0xb7/0xc0 [ 16.671062] __kmalloc_noprof+0x1c9/0x500 [ 16.671363] kunit_kmalloc_array+0x25/0x60 [ 16.671539] copy_user_test_oob+0xab/0x10f0 [ 16.671687] kunit_try_run_case+0x1a5/0x480 [ 16.671852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.672106] kthread+0x337/0x6f0 [ 16.672361] ret_from_fork+0x116/0x1d0 [ 16.672727] ret_from_fork_asm+0x1a/0x30 [ 16.672925] [ 16.673007] The buggy address belongs to the object at ffff888103a2f000 [ 16.673007] which belongs to the cache kmalloc-128 of size 128 [ 16.673623] The buggy address is located 0 bytes inside of [ 16.673623] allocated 120-byte region [ffff888103a2f000, ffff888103a2f078) [ 16.674152] [ 16.674234] The buggy address belongs to the physical page: [ 16.674444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a2f [ 16.674807] flags: 0x200000000000000(node=0|zone=2) [ 16.675020] page_type: f5(slab) [ 16.675215] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.675584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.675917] page dumped because: kasan: bad access detected [ 16.676277] [ 16.676378] Memory state around the buggy address: [ 16.676592] ffff888103a2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.676806] ffff888103a2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.677263] >ffff888103a2f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.677760] ^ [ 16.678167] ffff888103a2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678439] ffff888103a2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678822] ==================================================================