Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.764323] ================================================================== [ 19.764383] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.764436] Write of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.764500] [ 19.764662] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.764976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.765124] Hardware name: linux,dummy-virt (DT) [ 19.765273] Call trace: [ 19.765332] show_stack+0x20/0x38 (C) [ 19.765444] dump_stack_lvl+0x8c/0xd0 [ 19.765640] print_report+0x118/0x608 [ 19.765741] kasan_report+0xdc/0x128 [ 19.766136] kasan_check_range+0x100/0x1a8 [ 19.766381] __kasan_check_write+0x20/0x30 [ 19.766523] copy_user_test_oob+0x35c/0xec8 [ 19.766572] kunit_try_run_case+0x170/0x3f0 [ 19.766620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.766675] kthread+0x328/0x630 [ 19.767667] ret_from_fork+0x10/0x20 [ 19.767858] [ 19.767881] Allocated by task 286: [ 19.767911] kasan_save_stack+0x3c/0x68 [ 19.767956] kasan_save_track+0x20/0x40 [ 19.767994] kasan_save_alloc_info+0x40/0x58 [ 19.768037] __kasan_kmalloc+0xd4/0xd8 [ 19.768075] __kmalloc_noprof+0x198/0x4c8 [ 19.768115] kunit_kmalloc_array+0x34/0x88 [ 19.768154] copy_user_test_oob+0xac/0xec8 [ 19.768192] kunit_try_run_case+0x170/0x3f0 [ 19.768231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.768275] kthread+0x328/0x630 [ 19.768310] ret_from_fork+0x10/0x20 [ 19.768348] [ 19.768368] The buggy address belongs to the object at fff00000c5903800 [ 19.768368] which belongs to the cache kmalloc-128 of size 128 [ 19.768429] The buggy address is located 0 bytes inside of [ 19.768429] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.768493] [ 19.768515] The buggy address belongs to the physical page: [ 19.768548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.768600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.768652] page_type: f5(slab) [ 19.768692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.768744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.768797] page dumped because: kasan: bad access detected [ 19.768830] [ 19.768862] Memory state around the buggy address: [ 19.768897] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.768942] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768986] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.769027] ^ [ 19.769070] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769114] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769154] ================================================================== [ 19.788110] ================================================================== [ 19.788166] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.788217] Write of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.788270] [ 19.788304] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.788388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.788417] Hardware name: linux,dummy-virt (DT) [ 19.788448] Call trace: [ 19.788471] show_stack+0x20/0x38 (C) [ 19.788521] dump_stack_lvl+0x8c/0xd0 [ 19.788569] print_report+0x118/0x608 [ 19.788617] kasan_report+0xdc/0x128 [ 19.788663] kasan_check_range+0x100/0x1a8 [ 19.788713] __kasan_check_write+0x20/0x30 [ 19.788760] copy_user_test_oob+0x434/0xec8 [ 19.788810] kunit_try_run_case+0x170/0x3f0 [ 19.788871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788925] kthread+0x328/0x630 [ 19.788967] ret_from_fork+0x10/0x20 [ 19.789017] [ 19.789037] Allocated by task 286: [ 19.789867] kasan_save_stack+0x3c/0x68 [ 19.789930] kasan_save_track+0x20/0x40 [ 19.790062] kasan_save_alloc_info+0x40/0x58 [ 19.790117] __kasan_kmalloc+0xd4/0xd8 [ 19.790156] __kmalloc_noprof+0x198/0x4c8 [ 19.790205] kunit_kmalloc_array+0x34/0x88 [ 19.790244] copy_user_test_oob+0xac/0xec8 [ 19.790294] kunit_try_run_case+0x170/0x3f0 [ 19.790345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.790389] kthread+0x328/0x630 [ 19.790435] ret_from_fork+0x10/0x20 [ 19.790472] [ 19.790527] The buggy address belongs to the object at fff00000c5903800 [ 19.790527] which belongs to the cache kmalloc-128 of size 128 [ 19.790732] The buggy address is located 0 bytes inside of [ 19.790732] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.791727] [ 19.791778] The buggy address belongs to the physical page: [ 19.792800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.793124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793438] page_type: f5(slab) [ 19.793757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.793915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.793961] page dumped because: kasan: bad access detected [ 19.794608] [ 19.794633] Memory state around the buggy address: [ 19.794673] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.794722] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.794769] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.795456] ^ [ 19.795519] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.795566] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.795607] ================================================================== [ 19.752581] ================================================================== [ 19.752640] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.752697] Read of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.752915] [ 19.752973] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.753158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.753205] Hardware name: linux,dummy-virt (DT) [ 19.753236] Call trace: [ 19.753340] show_stack+0x20/0x38 (C) [ 19.753437] dump_stack_lvl+0x8c/0xd0 [ 19.753484] print_report+0x118/0x608 [ 19.753531] kasan_report+0xdc/0x128 [ 19.753579] kasan_check_range+0x100/0x1a8 [ 19.753627] __kasan_check_read+0x20/0x30 [ 19.753673] copy_user_test_oob+0x728/0xec8 [ 19.753720] kunit_try_run_case+0x170/0x3f0 [ 19.753770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753825] kthread+0x328/0x630 [ 19.754018] ret_from_fork+0x10/0x20 [ 19.754074] [ 19.754097] Allocated by task 286: [ 19.754126] kasan_save_stack+0x3c/0x68 [ 19.754167] kasan_save_track+0x20/0x40 [ 19.754206] kasan_save_alloc_info+0x40/0x58 [ 19.754249] __kasan_kmalloc+0xd4/0xd8 [ 19.754286] __kmalloc_noprof+0x198/0x4c8 [ 19.754341] kunit_kmalloc_array+0x34/0x88 [ 19.754380] copy_user_test_oob+0xac/0xec8 [ 19.754419] kunit_try_run_case+0x170/0x3f0 [ 19.754626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.754829] kthread+0x328/0x630 [ 19.754975] ret_from_fork+0x10/0x20 [ 19.755040] [ 19.755123] The buggy address belongs to the object at fff00000c5903800 [ 19.755123] which belongs to the cache kmalloc-128 of size 128 [ 19.755182] The buggy address is located 0 bytes inside of [ 19.755182] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.755248] [ 19.755347] The buggy address belongs to the physical page: [ 19.755394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.755542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.755686] page_type: f5(slab) [ 19.755726] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.756000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.756135] page dumped because: kasan: bad access detected [ 19.756223] [ 19.756243] Memory state around the buggy address: [ 19.756285] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.756337] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.756553] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.756594] ^ [ 19.756637] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.756713] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.756919] ================================================================== [ 19.737577] ================================================================== [ 19.737863] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.738195] Write of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.738752] [ 19.739151] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.739304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.739341] Hardware name: linux,dummy-virt (DT) [ 19.739376] Call trace: [ 19.739408] show_stack+0x20/0x38 (C) [ 19.739754] dump_stack_lvl+0x8c/0xd0 [ 19.739947] print_report+0x118/0x608 [ 19.740184] kasan_report+0xdc/0x128 [ 19.740231] kasan_check_range+0x100/0x1a8 [ 19.740322] __kasan_check_write+0x20/0x30 [ 19.740558] copy_user_test_oob+0x234/0xec8 [ 19.740607] kunit_try_run_case+0x170/0x3f0 [ 19.740659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.740762] kthread+0x328/0x630 [ 19.741123] ret_from_fork+0x10/0x20 [ 19.741525] [ 19.741640] Allocated by task 286: [ 19.741801] kasan_save_stack+0x3c/0x68 [ 19.741863] kasan_save_track+0x20/0x40 [ 19.742109] kasan_save_alloc_info+0x40/0x58 [ 19.742189] __kasan_kmalloc+0xd4/0xd8 [ 19.742318] __kmalloc_noprof+0x198/0x4c8 [ 19.742363] kunit_kmalloc_array+0x34/0x88 [ 19.742422] copy_user_test_oob+0xac/0xec8 [ 19.742484] kunit_try_run_case+0x170/0x3f0 [ 19.742545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.742623] kthread+0x328/0x630 [ 19.742657] ret_from_fork+0x10/0x20 [ 19.743809] [ 19.743848] The buggy address belongs to the object at fff00000c5903800 [ 19.743848] which belongs to the cache kmalloc-128 of size 128 [ 19.743914] The buggy address is located 0 bytes inside of [ 19.743914] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.744510] [ 19.744558] The buggy address belongs to the physical page: [ 19.744865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.744995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.745082] page_type: f5(slab) [ 19.745185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.745313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.745386] page dumped because: kasan: bad access detected [ 19.745504] [ 19.745568] Memory state around the buggy address: [ 19.745659] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.745760] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.745858] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.745899] ^ [ 19.745972] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.746030] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.746172] ================================================================== [ 19.772468] ================================================================== [ 19.772525] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.772577] Read of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.772629] [ 19.772673] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.772759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.772789] Hardware name: linux,dummy-virt (DT) [ 19.772820] Call trace: [ 19.772857] show_stack+0x20/0x38 (C) [ 19.772905] dump_stack_lvl+0x8c/0xd0 [ 19.772956] print_report+0x118/0x608 [ 19.773002] kasan_report+0xdc/0x128 [ 19.773049] kasan_check_range+0x100/0x1a8 [ 19.773097] __kasan_check_read+0x20/0x30 [ 19.773143] copy_user_test_oob+0x3c8/0xec8 [ 19.773191] kunit_try_run_case+0x170/0x3f0 [ 19.773239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773293] kthread+0x328/0x630 [ 19.773335] ret_from_fork+0x10/0x20 [ 19.773383] [ 19.773405] Allocated by task 286: [ 19.773433] kasan_save_stack+0x3c/0x68 [ 19.773476] kasan_save_track+0x20/0x40 [ 19.773514] kasan_save_alloc_info+0x40/0x58 [ 19.773556] __kasan_kmalloc+0xd4/0xd8 [ 19.773593] __kmalloc_noprof+0x198/0x4c8 [ 19.773633] kunit_kmalloc_array+0x34/0x88 [ 19.773671] copy_user_test_oob+0xac/0xec8 [ 19.773710] kunit_try_run_case+0x170/0x3f0 [ 19.773750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773794] kthread+0x328/0x630 [ 19.773827] ret_from_fork+0x10/0x20 [ 19.775691] [ 19.775720] The buggy address belongs to the object at fff00000c5903800 [ 19.775720] which belongs to the cache kmalloc-128 of size 128 [ 19.776134] The buggy address is located 0 bytes inside of [ 19.776134] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.777287] [ 19.777441] The buggy address belongs to the physical page: [ 19.777790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.778173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.778268] page_type: f5(slab) [ 19.778876] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.778989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.779186] page dumped because: kasan: bad access detected [ 19.779437] [ 19.780770] Memory state around the buggy address: [ 19.780813] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.785497] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785682] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.785930] ^ [ 19.786177] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786317] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786692] ================================================================== [ 19.808634] ================================================================== [ 19.809337] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.809597] Read of size 121 at addr fff00000c5903800 by task kunit_try_catch/286 [ 19.809829] [ 19.810080] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.810735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.810818] Hardware name: linux,dummy-virt (DT) [ 19.810974] Call trace: [ 19.811001] show_stack+0x20/0x38 (C) [ 19.811056] dump_stack_lvl+0x8c/0xd0 [ 19.811896] print_report+0x118/0x608 [ 19.812245] kasan_report+0xdc/0x128 [ 19.812517] kasan_check_range+0x100/0x1a8 [ 19.813180] __kasan_check_read+0x20/0x30 [ 19.813269] copy_user_test_oob+0x4a0/0xec8 [ 19.813321] kunit_try_run_case+0x170/0x3f0 [ 19.813372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.814018] kthread+0x328/0x630 [ 19.814476] ret_from_fork+0x10/0x20 [ 19.814865] [ 19.815142] Allocated by task 286: [ 19.815182] kasan_save_stack+0x3c/0x68 [ 19.815239] kasan_save_track+0x20/0x40 [ 19.815284] kasan_save_alloc_info+0x40/0x58 [ 19.815469] __kasan_kmalloc+0xd4/0xd8 [ 19.815939] __kmalloc_noprof+0x198/0x4c8 [ 19.816129] kunit_kmalloc_array+0x34/0x88 [ 19.816245] copy_user_test_oob+0xac/0xec8 [ 19.816429] kunit_try_run_case+0x170/0x3f0 [ 19.816471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.816799] kthread+0x328/0x630 [ 19.817192] ret_from_fork+0x10/0x20 [ 19.817337] [ 19.817374] The buggy address belongs to the object at fff00000c5903800 [ 19.817374] which belongs to the cache kmalloc-128 of size 128 [ 19.817672] The buggy address is located 0 bytes inside of [ 19.817672] allocated 120-byte region [fff00000c5903800, fff00000c5903878) [ 19.817906] [ 19.817930] The buggy address belongs to the physical page: [ 19.818103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903 [ 19.818438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.818582] page_type: f5(slab) [ 19.818627] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.819023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.819172] page dumped because: kasan: bad access detected [ 19.819369] [ 19.819436] Memory state around the buggy address: [ 19.819538] fff00000c5903700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.819779] fff00000c5903780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.819916] >fff00000c5903800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.820124] ^ [ 19.820866] fff00000c5903880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.821075] fff00000c5903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.821118] ==================================================================
[ 16.481511] ================================================================== [ 16.481948] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.482383] Read of size 121 at addr ffff888103953e00 by task kunit_try_catch/302 [ 16.482636] [ 16.482773] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.482815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.482828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.482866] Call Trace: [ 16.482882] <TASK> [ 16.482897] dump_stack_lvl+0x73/0xb0 [ 16.482955] print_report+0xd1/0x650 [ 16.482977] ? __virt_addr_valid+0x1db/0x2d0 [ 16.483001] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.483026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.483050] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.483075] kasan_report+0x141/0x180 [ 16.483098] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.483158] kasan_check_range+0x10c/0x1c0 [ 16.483196] __kasan_check_read+0x15/0x20 [ 16.483217] copy_user_test_oob+0x4aa/0x10f0 [ 16.483243] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.483267] ? finish_task_switch.isra.0+0x153/0x700 [ 16.483290] ? __switch_to+0x47/0xf50 [ 16.483317] ? irqentry_exit+0x2a/0x60 [ 16.483338] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.483364] ? __pfx_read_tsc+0x10/0x10 [ 16.483386] ? ktime_get_ts64+0x86/0x230 [ 16.483411] kunit_try_run_case+0x1a5/0x480 [ 16.483436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.483464] ? __kthread_parkme+0x8f/0x180 [ 16.483486] ? __kthread_parkme+0xfa/0x180 [ 16.483508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.483534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.483578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.483605] kthread+0x337/0x6f0 [ 16.483625] ? trace_preempt_on+0x20/0xc0 [ 16.483649] ? __pfx_kthread+0x10/0x10 [ 16.483671] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.483694] ? calculate_sigpending+0x7b/0xa0 [ 16.483719] ? __pfx_kthread+0x10/0x10 [ 16.483742] ret_from_fork+0x116/0x1d0 [ 16.483761] ? __pfx_kthread+0x10/0x10 [ 16.483793] ret_from_fork_asm+0x1a/0x30 [ 16.483826] </TASK> [ 16.483836] [ 16.491153] Allocated by task 302: [ 16.491287] kasan_save_stack+0x45/0x70 [ 16.491480] kasan_save_track+0x18/0x40 [ 16.491672] kasan_save_alloc_info+0x3b/0x50 [ 16.491900] __kasan_kmalloc+0xb7/0xc0 [ 16.492046] __kmalloc_noprof+0x1c9/0x500 [ 16.492186] kunit_kmalloc_array+0x25/0x60 [ 16.492410] copy_user_test_oob+0xab/0x10f0 [ 16.492645] kunit_try_run_case+0x1a5/0x480 [ 16.492891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.493154] kthread+0x337/0x6f0 [ 16.493385] ret_from_fork+0x116/0x1d0 [ 16.493568] ret_from_fork_asm+0x1a/0x30 [ 16.493781] [ 16.493852] The buggy address belongs to the object at ffff888103953e00 [ 16.493852] which belongs to the cache kmalloc-128 of size 128 [ 16.494352] The buggy address is located 0 bytes inside of [ 16.494352] allocated 120-byte region [ffff888103953e00, ffff888103953e78) [ 16.494789] [ 16.494904] The buggy address belongs to the physical page: [ 16.495245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953 [ 16.495536] flags: 0x200000000000000(node=0|zone=2) [ 16.495831] page_type: f5(slab) [ 16.495964] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.496356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.496753] page dumped because: kasan: bad access detected [ 16.497008] [ 16.497104] Memory state around the buggy address: [ 16.497321] ffff888103953d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.497630] ffff888103953d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.497952] >ffff888103953e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.498159] ^ [ 16.498365] ffff888103953e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498584] ffff888103953f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498797] ================================================================== [ 16.517977] ================================================================== [ 16.518332] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.518624] Read of size 121 at addr ffff888103953e00 by task kunit_try_catch/302 [ 16.519015] [ 16.519114] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.519177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.519190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.519211] Call Trace: [ 16.519226] <TASK> [ 16.519243] dump_stack_lvl+0x73/0xb0 [ 16.519271] print_report+0xd1/0x650 [ 16.519294] ? __virt_addr_valid+0x1db/0x2d0 [ 16.519317] ? copy_user_test_oob+0x604/0x10f0 [ 16.519342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.519369] ? copy_user_test_oob+0x604/0x10f0 [ 16.519395] kasan_report+0x141/0x180 [ 16.519420] ? copy_user_test_oob+0x604/0x10f0 [ 16.519450] kasan_check_range+0x10c/0x1c0 [ 16.519474] __kasan_check_read+0x15/0x20 [ 16.519495] copy_user_test_oob+0x604/0x10f0 [ 16.519522] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.519546] ? finish_task_switch.isra.0+0x153/0x700 [ 16.519570] ? __switch_to+0x47/0xf50 [ 16.519597] ? irqentry_exit+0x2a/0x60 [ 16.519619] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.519644] ? __pfx_read_tsc+0x10/0x10 [ 16.519667] ? ktime_get_ts64+0x86/0x230 [ 16.519692] kunit_try_run_case+0x1a5/0x480 [ 16.519718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.519746] ? __kthread_parkme+0x8f/0x180 [ 16.519769] ? __kthread_parkme+0xfa/0x180 [ 16.519791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.519818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.519843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.519869] kthread+0x337/0x6f0 [ 16.519890] ? trace_preempt_on+0x20/0xc0 [ 16.519913] ? __pfx_kthread+0x10/0x10 [ 16.519945] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.519968] ? calculate_sigpending+0x7b/0xa0 [ 16.519993] ? __pfx_kthread+0x10/0x10 [ 16.520016] ret_from_fork+0x116/0x1d0 [ 16.520035] ? __pfx_kthread+0x10/0x10 [ 16.520056] ret_from_fork_asm+0x1a/0x30 [ 16.520089] </TASK> [ 16.520099] [ 16.526939] Allocated by task 302: [ 16.527085] kasan_save_stack+0x45/0x70 [ 16.527275] kasan_save_track+0x18/0x40 [ 16.527452] kasan_save_alloc_info+0x3b/0x50 [ 16.527601] __kasan_kmalloc+0xb7/0xc0 [ 16.527736] __kmalloc_noprof+0x1c9/0x500 [ 16.527874] kunit_kmalloc_array+0x25/0x60 [ 16.528094] copy_user_test_oob+0xab/0x10f0 [ 16.528308] kunit_try_run_case+0x1a5/0x480 [ 16.528513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.528765] kthread+0x337/0x6f0 [ 16.528952] ret_from_fork+0x116/0x1d0 [ 16.529151] ret_from_fork_asm+0x1a/0x30 [ 16.529342] [ 16.529417] The buggy address belongs to the object at ffff888103953e00 [ 16.529417] which belongs to the cache kmalloc-128 of size 128 [ 16.529906] The buggy address is located 0 bytes inside of [ 16.529906] allocated 120-byte region [ffff888103953e00, ffff888103953e78) [ 16.530316] [ 16.530387] The buggy address belongs to the physical page: [ 16.530599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953 [ 16.531086] flags: 0x200000000000000(node=0|zone=2) [ 16.531335] page_type: f5(slab) [ 16.531497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.531828] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.532113] page dumped because: kasan: bad access detected [ 16.532316] [ 16.532386] Memory state around the buggy address: [ 16.532568] ffff888103953d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.533055] ffff888103953d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.533338] >ffff888103953e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.533599] ^ [ 16.534015] ffff888103953e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.534248] ffff888103953f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.534463] ================================================================== [ 16.499484] ================================================================== [ 16.499817] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.500211] Write of size 121 at addr ffff888103953e00 by task kunit_try_catch/302 [ 16.500549] [ 16.500683] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.500742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.500754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.500784] Call Trace: [ 16.500798] <TASK> [ 16.500811] dump_stack_lvl+0x73/0xb0 [ 16.500858] print_report+0xd1/0x650 [ 16.500881] ? __virt_addr_valid+0x1db/0x2d0 [ 16.500932] ? copy_user_test_oob+0x557/0x10f0 [ 16.500957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.500982] ? copy_user_test_oob+0x557/0x10f0 [ 16.501007] kasan_report+0x141/0x180 [ 16.501030] ? copy_user_test_oob+0x557/0x10f0 [ 16.501060] kasan_check_range+0x10c/0x1c0 [ 16.501101] __kasan_check_write+0x18/0x20 [ 16.501135] copy_user_test_oob+0x557/0x10f0 [ 16.501175] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.501212] ? finish_task_switch.isra.0+0x153/0x700 [ 16.501236] ? __switch_to+0x47/0xf50 [ 16.501262] ? irqentry_exit+0x2a/0x60 [ 16.501284] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.501310] ? __pfx_read_tsc+0x10/0x10 [ 16.501331] ? ktime_get_ts64+0x86/0x230 [ 16.501356] kunit_try_run_case+0x1a5/0x480 [ 16.501381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501410] ? __kthread_parkme+0x8f/0x180 [ 16.501432] ? __kthread_parkme+0xfa/0x180 [ 16.501455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.501506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.501533] kthread+0x337/0x6f0 [ 16.501552] ? trace_preempt_on+0x20/0xc0 [ 16.501577] ? __pfx_kthread+0x10/0x10 [ 16.501599] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.501623] ? calculate_sigpending+0x7b/0xa0 [ 16.501648] ? __pfx_kthread+0x10/0x10 [ 16.501671] ret_from_fork+0x116/0x1d0 [ 16.501691] ? __pfx_kthread+0x10/0x10 [ 16.501712] ret_from_fork_asm+0x1a/0x30 [ 16.501744] </TASK> [ 16.501762] [ 16.509424] Allocated by task 302: [ 16.509552] kasan_save_stack+0x45/0x70 [ 16.509762] kasan_save_track+0x18/0x40 [ 16.509990] kasan_save_alloc_info+0x3b/0x50 [ 16.510204] __kasan_kmalloc+0xb7/0xc0 [ 16.510411] __kmalloc_noprof+0x1c9/0x500 [ 16.510633] kunit_kmalloc_array+0x25/0x60 [ 16.510942] copy_user_test_oob+0xab/0x10f0 [ 16.511149] kunit_try_run_case+0x1a5/0x480 [ 16.511356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.511607] kthread+0x337/0x6f0 [ 16.511759] ret_from_fork+0x116/0x1d0 [ 16.511957] ret_from_fork_asm+0x1a/0x30 [ 16.512116] [ 16.512185] The buggy address belongs to the object at ffff888103953e00 [ 16.512185] which belongs to the cache kmalloc-128 of size 128 [ 16.512657] The buggy address is located 0 bytes inside of [ 16.512657] allocated 120-byte region [ffff888103953e00, ffff888103953e78) [ 16.513320] [ 16.513406] The buggy address belongs to the physical page: [ 16.513652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953 [ 16.514039] flags: 0x200000000000000(node=0|zone=2) [ 16.514259] page_type: f5(slab) [ 16.514425] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.514750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.515062] page dumped because: kasan: bad access detected [ 16.515296] [ 16.515368] Memory state around the buggy address: [ 16.515590] ffff888103953d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.515952] ffff888103953d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.516226] >ffff888103953e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.516508] ^ [ 16.516829] ffff888103953e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.517154] ffff888103953f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.517436] ================================================================== [ 16.458472] ================================================================== [ 16.458826] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.459238] Write of size 121 at addr ffff888103953e00 by task kunit_try_catch/302 [ 16.459573] [ 16.459687] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.459730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.459743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.459764] Call Trace: [ 16.459777] <TASK> [ 16.459792] dump_stack_lvl+0x73/0xb0 [ 16.459846] print_report+0xd1/0x650 [ 16.459876] ? __virt_addr_valid+0x1db/0x2d0 [ 16.459900] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.459936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.459961] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.459986] kasan_report+0x141/0x180 [ 16.460009] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.460038] kasan_check_range+0x10c/0x1c0 [ 16.460062] __kasan_check_write+0x18/0x20 [ 16.460102] copy_user_test_oob+0x3fd/0x10f0 [ 16.460128] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.460153] ? finish_task_switch.isra.0+0x153/0x700 [ 16.460177] ? __switch_to+0x47/0xf50 [ 16.460204] ? irqentry_exit+0x2a/0x60 [ 16.460226] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 16.460251] ? __pfx_read_tsc+0x10/0x10 [ 16.460274] ? ktime_get_ts64+0x86/0x230 [ 16.460298] kunit_try_run_case+0x1a5/0x480 [ 16.460343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.460371] ? __kthread_parkme+0x8f/0x180 [ 16.460394] ? __kthread_parkme+0xfa/0x180 [ 16.460416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.460442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.460468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.460510] kthread+0x337/0x6f0 [ 16.460530] ? trace_preempt_on+0x20/0xc0 [ 16.460555] ? __pfx_kthread+0x10/0x10 [ 16.460577] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.460602] ? calculate_sigpending+0x7b/0xa0 [ 16.460628] ? __pfx_kthread+0x10/0x10 [ 16.460651] ret_from_fork+0x116/0x1d0 [ 16.460671] ? __pfx_kthread+0x10/0x10 [ 16.460692] ret_from_fork_asm+0x1a/0x30 [ 16.460726] </TASK> [ 16.460736] [ 16.472882] Allocated by task 302: [ 16.473255] kasan_save_stack+0x45/0x70 [ 16.473432] kasan_save_track+0x18/0x40 [ 16.473569] kasan_save_alloc_info+0x3b/0x50 [ 16.473712] __kasan_kmalloc+0xb7/0xc0 [ 16.473875] __kmalloc_noprof+0x1c9/0x500 [ 16.474145] kunit_kmalloc_array+0x25/0x60 [ 16.474356] copy_user_test_oob+0xab/0x10f0 [ 16.474562] kunit_try_run_case+0x1a5/0x480 [ 16.474772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.475026] kthread+0x337/0x6f0 [ 16.475169] ret_from_fork+0x116/0x1d0 [ 16.475346] ret_from_fork_asm+0x1a/0x30 [ 16.475482] [ 16.475576] The buggy address belongs to the object at ffff888103953e00 [ 16.475576] which belongs to the cache kmalloc-128 of size 128 [ 16.476192] The buggy address is located 0 bytes inside of [ 16.476192] allocated 120-byte region [ffff888103953e00, ffff888103953e78) [ 16.476665] [ 16.476737] The buggy address belongs to the physical page: [ 16.476902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953 [ 16.477289] flags: 0x200000000000000(node=0|zone=2) [ 16.477632] page_type: f5(slab) [ 16.477802] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.478188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.478439] page dumped because: kasan: bad access detected [ 16.478627] [ 16.478740] Memory state around the buggy address: [ 16.479049] ffff888103953d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.479411] ffff888103953d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.479727] >ffff888103953e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.480056] ^ [ 16.480333] ffff888103953e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480567] ffff888103953f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480964] ==================================================================