Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.687492] ================================================================== [ 19.687546] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.687812] Read of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.687969] [ 19.688003] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.688086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.688136] Hardware name: linux,dummy-virt (DT) [ 19.688169] Call trace: [ 19.688400] show_stack+0x20/0x38 (C) [ 19.688582] dump_stack_lvl+0x8c/0xd0 [ 19.688631] print_report+0x118/0x608 [ 19.688749] kasan_report+0xdc/0x128 [ 19.688796] kasan_check_range+0x100/0x1a8 [ 19.688847] __kasan_check_read+0x20/0x30 [ 19.688891] copy_user_test_oob+0x4a0/0xec8 [ 19.688940] kunit_try_run_case+0x170/0x3f0 [ 19.689204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.689284] kthread+0x328/0x630 [ 19.689330] ret_from_fork+0x10/0x20 [ 19.689390] [ 19.689486] Allocated by task 285: [ 19.689901] kasan_save_stack+0x3c/0x68 [ 19.689960] kasan_save_track+0x20/0x40 [ 19.690126] kasan_save_alloc_info+0x40/0x58 [ 19.690170] __kasan_kmalloc+0xd4/0xd8 [ 19.690208] __kmalloc_noprof+0x198/0x4c8 [ 19.690249] kunit_kmalloc_array+0x34/0x88 [ 19.690287] copy_user_test_oob+0xac/0xec8 [ 19.690492] kunit_try_run_case+0x170/0x3f0 [ 19.690590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.690766] kthread+0x328/0x630 [ 19.690803] ret_from_fork+0x10/0x20 [ 19.690840] [ 19.690896] The buggy address belongs to the object at fff00000c76aff00 [ 19.690896] which belongs to the cache kmalloc-128 of size 128 [ 19.690960] The buggy address is located 0 bytes inside of [ 19.690960] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.691024] [ 19.691364] The buggy address belongs to the physical page: [ 19.691717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.691801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.691951] page_type: f5(slab) [ 19.691992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.692045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.692484] page dumped because: kasan: bad access detected [ 19.692527] [ 19.692547] Memory state around the buggy address: [ 19.692588] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.692895] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.693026] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.693101] ^ [ 19.693406] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.693618] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.693895] ================================================================== [ 19.674824] ================================================================== [ 19.674878] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.675201] Read of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.675466] [ 19.675629] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.675953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.676204] Hardware name: linux,dummy-virt (DT) [ 19.676242] Call trace: [ 19.676266] show_stack+0x20/0x38 (C) [ 19.676319] dump_stack_lvl+0x8c/0xd0 [ 19.676373] print_report+0x118/0x608 [ 19.676495] kasan_report+0xdc/0x128 [ 19.676808] kasan_check_range+0x100/0x1a8 [ 19.676861] __kasan_check_read+0x20/0x30 [ 19.676908] copy_user_test_oob+0x3c8/0xec8 [ 19.676957] kunit_try_run_case+0x170/0x3f0 [ 19.677338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.677432] kthread+0x328/0x630 [ 19.677477] ret_from_fork+0x10/0x20 [ 19.677536] [ 19.677781] Allocated by task 285: [ 19.677831] kasan_save_stack+0x3c/0x68 [ 19.677909] kasan_save_track+0x20/0x40 [ 19.677992] kasan_save_alloc_info+0x40/0x58 [ 19.678192] __kasan_kmalloc+0xd4/0xd8 [ 19.678233] __kmalloc_noprof+0x198/0x4c8 [ 19.678274] kunit_kmalloc_array+0x34/0x88 [ 19.678312] copy_user_test_oob+0xac/0xec8 [ 19.678352] kunit_try_run_case+0x170/0x3f0 [ 19.678393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678440] kthread+0x328/0x630 [ 19.678485] ret_from_fork+0x10/0x20 [ 19.678522] [ 19.678617] The buggy address belongs to the object at fff00000c76aff00 [ 19.678617] which belongs to the cache kmalloc-128 of size 128 [ 19.679165] The buggy address is located 0 bytes inside of [ 19.679165] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.679400] [ 19.679431] The buggy address belongs to the physical page: [ 19.679610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.679710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.679759] page_type: f5(slab) [ 19.679798] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.679886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.680250] page dumped because: kasan: bad access detected [ 19.680290] [ 19.680421] Memory state around the buggy address: [ 19.680482] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.680529] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680574] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.680721] ^ [ 19.680770] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680818] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.680875] ================================================================== [ 19.638505] ================================================================== [ 19.638617] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.638710] Write of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.638766] [ 19.638815] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.638906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.638936] Hardware name: linux,dummy-virt (DT) [ 19.638974] Call trace: [ 19.639000] show_stack+0x20/0x38 (C) [ 19.639056] dump_stack_lvl+0x8c/0xd0 [ 19.639110] print_report+0x118/0x608 [ 19.639184] kasan_report+0xdc/0x128 [ 19.639424] kasan_check_range+0x100/0x1a8 [ 19.639604] __kasan_check_write+0x20/0x30 [ 19.639896] copy_user_test_oob+0x234/0xec8 [ 19.639951] kunit_try_run_case+0x170/0x3f0 [ 19.640011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.640456] kthread+0x328/0x630 [ 19.640506] ret_from_fork+0x10/0x20 [ 19.640565] [ 19.640636] Allocated by task 285: [ 19.640744] kasan_save_stack+0x3c/0x68 [ 19.640791] kasan_save_track+0x20/0x40 [ 19.640832] kasan_save_alloc_info+0x40/0x58 [ 19.640873] __kasan_kmalloc+0xd4/0xd8 [ 19.640913] __kmalloc_noprof+0x198/0x4c8 [ 19.640991] kunit_kmalloc_array+0x34/0x88 [ 19.641050] copy_user_test_oob+0xac/0xec8 [ 19.641151] kunit_try_run_case+0x170/0x3f0 [ 19.641189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.641234] kthread+0x328/0x630 [ 19.641495] ret_from_fork+0x10/0x20 [ 19.641637] [ 19.641684] The buggy address belongs to the object at fff00000c76aff00 [ 19.641684] which belongs to the cache kmalloc-128 of size 128 [ 19.641748] The buggy address is located 0 bytes inside of [ 19.641748] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.642047] [ 19.642111] The buggy address belongs to the physical page: [ 19.642158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.642238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.642523] page_type: f5(slab) [ 19.642702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.642792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.642860] page dumped because: kasan: bad access detected [ 19.642957] [ 19.642977] Memory state around the buggy address: [ 19.643015] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.643326] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.643910] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.644213] ^ [ 19.644267] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.644338] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.644381] ================================================================== [ 19.681918] ================================================================== [ 19.681973] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.682023] Write of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.682076] [ 19.682204] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.682467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.682497] Hardware name: linux,dummy-virt (DT) [ 19.682528] Call trace: [ 19.682552] show_stack+0x20/0x38 (C) [ 19.683046] dump_stack_lvl+0x8c/0xd0 [ 19.683358] print_report+0x118/0x608 [ 19.683409] kasan_report+0xdc/0x128 [ 19.683481] kasan_check_range+0x100/0x1a8 [ 19.683749] __kasan_check_write+0x20/0x30 [ 19.683799] copy_user_test_oob+0x434/0xec8 [ 19.683851] kunit_try_run_case+0x170/0x3f0 [ 19.683898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.683952] kthread+0x328/0x630 [ 19.683994] ret_from_fork+0x10/0x20 [ 19.684044] [ 19.684065] Allocated by task 285: [ 19.684096] kasan_save_stack+0x3c/0x68 [ 19.684150] kasan_save_track+0x20/0x40 [ 19.684190] kasan_save_alloc_info+0x40/0x58 [ 19.684232] __kasan_kmalloc+0xd4/0xd8 [ 19.684272] __kmalloc_noprof+0x198/0x4c8 [ 19.684311] kunit_kmalloc_array+0x34/0x88 [ 19.684351] copy_user_test_oob+0xac/0xec8 [ 19.684391] kunit_try_run_case+0x170/0x3f0 [ 19.684750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685015] kthread+0x328/0x630 [ 19.685111] ret_from_fork+0x10/0x20 [ 19.685163] [ 19.685194] The buggy address belongs to the object at fff00000c76aff00 [ 19.685194] which belongs to the cache kmalloc-128 of size 128 [ 19.685326] The buggy address is located 0 bytes inside of [ 19.685326] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.685471] [ 19.685529] The buggy address belongs to the physical page: [ 19.685562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.685613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.685662] page_type: f5(slab) [ 19.685726] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.685781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.685948] page dumped because: kasan: bad access detected [ 19.686132] [ 19.686232] Memory state around the buggy address: [ 19.686357] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.686404] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686449] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.686490] ^ [ 19.686589] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686766] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.686809] ================================================================== [ 19.667938] ================================================================== [ 19.668000] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.668055] Write of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.668147] [ 19.668188] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.668817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.668849] Hardware name: linux,dummy-virt (DT) [ 19.668882] Call trace: [ 19.668908] show_stack+0x20/0x38 (C) [ 19.669073] dump_stack_lvl+0x8c/0xd0 [ 19.669137] print_report+0x118/0x608 [ 19.669234] kasan_report+0xdc/0x128 [ 19.669315] kasan_check_range+0x100/0x1a8 [ 19.669372] __kasan_check_write+0x20/0x30 [ 19.669566] copy_user_test_oob+0x35c/0xec8 [ 19.669615] kunit_try_run_case+0x170/0x3f0 [ 19.669708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.669763] kthread+0x328/0x630 [ 19.669812] ret_from_fork+0x10/0x20 [ 19.670048] [ 19.670069] Allocated by task 285: [ 19.670099] kasan_save_stack+0x3c/0x68 [ 19.670230] kasan_save_track+0x20/0x40 [ 19.670319] kasan_save_alloc_info+0x40/0x58 [ 19.670363] __kasan_kmalloc+0xd4/0xd8 [ 19.670402] __kmalloc_noprof+0x198/0x4c8 [ 19.670447] kunit_kmalloc_array+0x34/0x88 [ 19.670644] copy_user_test_oob+0xac/0xec8 [ 19.670737] kunit_try_run_case+0x170/0x3f0 [ 19.670810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.670860] kthread+0x328/0x630 [ 19.670989] ret_from_fork+0x10/0x20 [ 19.671050] [ 19.671072] The buggy address belongs to the object at fff00000c76aff00 [ 19.671072] which belongs to the cache kmalloc-128 of size 128 [ 19.671513] The buggy address is located 0 bytes inside of [ 19.671513] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.671640] [ 19.671671] The buggy address belongs to the physical page: [ 19.671705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.671769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.672381] page_type: f5(slab) [ 19.672754] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.672822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.672866] page dumped because: kasan: bad access detected [ 19.672901] [ 19.672934] Memory state around the buggy address: [ 19.672970] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.673293] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.673346] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.673387] ^ [ 19.673431] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.673679] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.673762] ================================================================== [ 19.655088] ================================================================== [ 19.655452] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.655589] Read of size 121 at addr fff00000c76aff00 by task kunit_try_catch/285 [ 19.655731] [ 19.655809] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.656296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.656395] Hardware name: linux,dummy-virt (DT) [ 19.656490] Call trace: [ 19.656516] show_stack+0x20/0x38 (C) [ 19.656609] dump_stack_lvl+0x8c/0xd0 [ 19.656663] print_report+0x118/0x608 [ 19.656866] kasan_report+0xdc/0x128 [ 19.656932] kasan_check_range+0x100/0x1a8 [ 19.656981] __kasan_check_read+0x20/0x30 [ 19.657028] copy_user_test_oob+0x728/0xec8 [ 19.657075] kunit_try_run_case+0x170/0x3f0 [ 19.657136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.657192] kthread+0x328/0x630 [ 19.657234] ret_from_fork+0x10/0x20 [ 19.657285] [ 19.657317] Allocated by task 285: [ 19.657349] kasan_save_stack+0x3c/0x68 [ 19.657569] kasan_save_track+0x20/0x40 [ 19.657651] kasan_save_alloc_info+0x40/0x58 [ 19.657920] __kasan_kmalloc+0xd4/0xd8 [ 19.658047] __kmalloc_noprof+0x198/0x4c8 [ 19.658219] kunit_kmalloc_array+0x34/0x88 [ 19.658258] copy_user_test_oob+0xac/0xec8 [ 19.658442] kunit_try_run_case+0x170/0x3f0 [ 19.658626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.658671] kthread+0x328/0x630 [ 19.658708] ret_from_fork+0x10/0x20 [ 19.658746] [ 19.658769] The buggy address belongs to the object at fff00000c76aff00 [ 19.658769] which belongs to the cache kmalloc-128 of size 128 [ 19.658831] The buggy address is located 0 bytes inside of [ 19.658831] allocated 120-byte region [fff00000c76aff00, fff00000c76aff78) [ 19.658895] [ 19.658949] The buggy address belongs to the physical page: [ 19.658991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 19.659429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.659799] page_type: f5(slab) [ 19.660029] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.660148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.660202] page dumped because: kasan: bad access detected [ 19.660331] [ 19.660351] Memory state around the buggy address: [ 19.660387] fff00000c76afe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.660433] fff00000c76afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660478] >fff00000c76aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.660545] ^ [ 19.660626] fff00000c76aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660674] fff00000c76b0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.660716] ==================================================================
[ 16.642934] ================================================================== [ 16.643626] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.643954] Read of size 121 at addr ffff8881031fd400 by task kunit_try_catch/302 [ 16.644258] [ 16.644392] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.644432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.644444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.644465] Call Trace: [ 16.644478] <TASK> [ 16.644492] dump_stack_lvl+0x73/0xb0 [ 16.644532] print_report+0xd1/0x650 [ 16.644555] ? __virt_addr_valid+0x1db/0x2d0 [ 16.644578] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.644614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.644639] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.644664] kasan_report+0x141/0x180 [ 16.644687] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.644735] kasan_check_range+0x10c/0x1c0 [ 16.644760] __kasan_check_read+0x15/0x20 [ 16.644781] copy_user_test_oob+0x4aa/0x10f0 [ 16.644817] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.644841] ? finish_task_switch.isra.0+0x153/0x700 [ 16.644865] ? __switch_to+0x47/0xf50 [ 16.644891] ? __schedule+0x10cc/0x2b60 [ 16.644922] ? __pfx_read_tsc+0x10/0x10 [ 16.644944] ? ktime_get_ts64+0x86/0x230 [ 16.644968] kunit_try_run_case+0x1a5/0x480 [ 16.645005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.645030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.645067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.645101] ? __kthread_parkme+0x82/0x180 [ 16.645123] ? preempt_count_sub+0x50/0x80 [ 16.645148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.645184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.645210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.645237] kthread+0x337/0x6f0 [ 16.645256] ? trace_preempt_on+0x20/0xc0 [ 16.645280] ? __pfx_kthread+0x10/0x10 [ 16.645301] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.645324] ? calculate_sigpending+0x7b/0xa0 [ 16.645350] ? __pfx_kthread+0x10/0x10 [ 16.645372] ret_from_fork+0x116/0x1d0 [ 16.645392] ? __pfx_kthread+0x10/0x10 [ 16.645422] ret_from_fork_asm+0x1a/0x30 [ 16.645454] </TASK> [ 16.645464] [ 16.652918] Allocated by task 302: [ 16.653047] kasan_save_stack+0x45/0x70 [ 16.653191] kasan_save_track+0x18/0x40 [ 16.653366] kasan_save_alloc_info+0x3b/0x50 [ 16.653618] __kasan_kmalloc+0xb7/0xc0 [ 16.653830] __kmalloc_noprof+0x1c9/0x500 [ 16.654036] kunit_kmalloc_array+0x25/0x60 [ 16.654318] copy_user_test_oob+0xab/0x10f0 [ 16.654496] kunit_try_run_case+0x1a5/0x480 [ 16.654643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.654830] kthread+0x337/0x6f0 [ 16.654950] ret_from_fork+0x116/0x1d0 [ 16.655247] ret_from_fork_asm+0x1a/0x30 [ 16.655445] [ 16.655539] The buggy address belongs to the object at ffff8881031fd400 [ 16.655539] which belongs to the cache kmalloc-128 of size 128 [ 16.656242] The buggy address is located 0 bytes inside of [ 16.656242] allocated 120-byte region [ffff8881031fd400, ffff8881031fd478) [ 16.656733] [ 16.656830] The buggy address belongs to the physical page: [ 16.657143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031fd [ 16.657384] flags: 0x200000000000000(node=0|zone=2) [ 16.657546] page_type: f5(slab) [ 16.657667] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.657909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.658288] page dumped because: kasan: bad access detected [ 16.658537] [ 16.658628] Memory state around the buggy address: [ 16.658858] ffff8881031fd300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.659344] ffff8881031fd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.659628] >ffff8881031fd400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.659928] ^ [ 16.660257] ffff8881031fd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660479] ffff8881031fd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660693] ================================================================== [ 16.625117] ================================================================== [ 16.625461] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.625798] Write of size 121 at addr ffff8881031fd400 by task kunit_try_catch/302 [ 16.626111] [ 16.626238] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.626281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.626294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.626316] Call Trace: [ 16.626330] <TASK> [ 16.626347] dump_stack_lvl+0x73/0xb0 [ 16.626390] print_report+0xd1/0x650 [ 16.626414] ? __virt_addr_valid+0x1db/0x2d0 [ 16.626451] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.626476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.626502] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.626538] kasan_report+0x141/0x180 [ 16.626560] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.626590] kasan_check_range+0x10c/0x1c0 [ 16.626616] __kasan_check_write+0x18/0x20 [ 16.626637] copy_user_test_oob+0x3fd/0x10f0 [ 16.626664] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.626696] ? finish_task_switch.isra.0+0x153/0x700 [ 16.626739] ? __switch_to+0x47/0xf50 [ 16.626765] ? __schedule+0x10cc/0x2b60 [ 16.626801] ? __pfx_read_tsc+0x10/0x10 [ 16.626823] ? ktime_get_ts64+0x86/0x230 [ 16.626848] kunit_try_run_case+0x1a5/0x480 [ 16.626883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.626908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.626934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.626959] ? __kthread_parkme+0x82/0x180 [ 16.626981] ? preempt_count_sub+0x50/0x80 [ 16.627006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.627032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.627067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.627094] kthread+0x337/0x6f0 [ 16.627114] ? trace_preempt_on+0x20/0xc0 [ 16.627139] ? __pfx_kthread+0x10/0x10 [ 16.627160] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.627183] ? calculate_sigpending+0x7b/0xa0 [ 16.627209] ? __pfx_kthread+0x10/0x10 [ 16.627231] ret_from_fork+0x116/0x1d0 [ 16.627251] ? __pfx_kthread+0x10/0x10 [ 16.627273] ret_from_fork_asm+0x1a/0x30 [ 16.627305] </TASK> [ 16.627316] [ 16.634757] Allocated by task 302: [ 16.634932] kasan_save_stack+0x45/0x70 [ 16.635157] kasan_save_track+0x18/0x40 [ 16.635295] kasan_save_alloc_info+0x3b/0x50 [ 16.635466] __kasan_kmalloc+0xb7/0xc0 [ 16.635668] __kmalloc_noprof+0x1c9/0x500 [ 16.635887] kunit_kmalloc_array+0x25/0x60 [ 16.636142] copy_user_test_oob+0xab/0x10f0 [ 16.636322] kunit_try_run_case+0x1a5/0x480 [ 16.636528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.636778] kthread+0x337/0x6f0 [ 16.636900] ret_from_fork+0x116/0x1d0 [ 16.637112] ret_from_fork_asm+0x1a/0x30 [ 16.637323] [ 16.637433] The buggy address belongs to the object at ffff8881031fd400 [ 16.637433] which belongs to the cache kmalloc-128 of size 128 [ 16.637945] The buggy address is located 0 bytes inside of [ 16.637945] allocated 120-byte region [ffff8881031fd400, ffff8881031fd478) [ 16.638435] [ 16.638508] The buggy address belongs to the physical page: [ 16.638681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031fd [ 16.639071] flags: 0x200000000000000(node=0|zone=2) [ 16.639285] page_type: f5(slab) [ 16.639406] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.639767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.640139] page dumped because: kasan: bad access detected [ 16.640426] [ 16.640522] Memory state around the buggy address: [ 16.640748] ffff8881031fd300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.640965] ffff8881031fd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.641181] >ffff8881031fd400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.641499] ^ [ 16.641819] ffff8881031fd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.642304] ffff8881031fd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.642517] ================================================================== [ 16.690324] ================================================================== [ 16.690796] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.691435] Read of size 121 at addr ffff8881031fd400 by task kunit_try_catch/302 [ 16.692166] [ 16.692300] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.692352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.692366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.692387] Call Trace: [ 16.692401] <TASK> [ 16.692416] dump_stack_lvl+0x73/0xb0 [ 16.692448] print_report+0xd1/0x650 [ 16.692471] ? __virt_addr_valid+0x1db/0x2d0 [ 16.692495] ? copy_user_test_oob+0x604/0x10f0 [ 16.692521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.692545] ? copy_user_test_oob+0x604/0x10f0 [ 16.692570] kasan_report+0x141/0x180 [ 16.692593] ? copy_user_test_oob+0x604/0x10f0 [ 16.692623] kasan_check_range+0x10c/0x1c0 [ 16.692648] __kasan_check_read+0x15/0x20 [ 16.692670] copy_user_test_oob+0x604/0x10f0 [ 16.692696] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.692735] ? finish_task_switch.isra.0+0x153/0x700 [ 16.692758] ? __switch_to+0x47/0xf50 [ 16.692784] ? __schedule+0x10cc/0x2b60 [ 16.692806] ? __pfx_read_tsc+0x10/0x10 [ 16.692828] ? ktime_get_ts64+0x86/0x230 [ 16.692853] kunit_try_run_case+0x1a5/0x480 [ 16.692878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.692902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.692939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.692964] ? __kthread_parkme+0x82/0x180 [ 16.692986] ? preempt_count_sub+0x50/0x80 [ 16.693022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.693049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.693075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.693111] kthread+0x337/0x6f0 [ 16.693131] ? trace_preempt_on+0x20/0xc0 [ 16.693155] ? __pfx_kthread+0x10/0x10 [ 16.693177] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.693199] ? calculate_sigpending+0x7b/0xa0 [ 16.693225] ? __pfx_kthread+0x10/0x10 [ 16.693248] ret_from_fork+0x116/0x1d0 [ 16.693267] ? __pfx_kthread+0x10/0x10 [ 16.693289] ret_from_fork_asm+0x1a/0x30 [ 16.693320] </TASK> [ 16.693332] [ 16.700725] Allocated by task 302: [ 16.700907] kasan_save_stack+0x45/0x70 [ 16.701129] kasan_save_track+0x18/0x40 [ 16.701333] kasan_save_alloc_info+0x3b/0x50 [ 16.701732] __kasan_kmalloc+0xb7/0xc0 [ 16.701947] __kmalloc_noprof+0x1c9/0x500 [ 16.702094] kunit_kmalloc_array+0x25/0x60 [ 16.702253] copy_user_test_oob+0xab/0x10f0 [ 16.702500] kunit_try_run_case+0x1a5/0x480 [ 16.702719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.702977] kthread+0x337/0x6f0 [ 16.703165] ret_from_fork+0x116/0x1d0 [ 16.703353] ret_from_fork_asm+0x1a/0x30 [ 16.703541] [ 16.703642] The buggy address belongs to the object at ffff8881031fd400 [ 16.703642] which belongs to the cache kmalloc-128 of size 128 [ 16.704071] The buggy address is located 0 bytes inside of [ 16.704071] allocated 120-byte region [ffff8881031fd400, ffff8881031fd478) [ 16.704432] [ 16.704521] The buggy address belongs to the physical page: [ 16.704816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031fd [ 16.705160] flags: 0x200000000000000(node=0|zone=2) [ 16.705429] page_type: f5(slab) [ 16.705550] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.705790] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.706319] page dumped because: kasan: bad access detected [ 16.706573] [ 16.706679] Memory state around the buggy address: [ 16.706918] ffff8881031fd300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.707292] ffff8881031fd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.707504] >ffff8881031fd400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.707993] ^ [ 16.708671] ffff8881031fd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.708941] ffff8881031fd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709456] ================================================================== [ 16.661340] ================================================================== [ 16.662802] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.663580] Write of size 121 at addr ffff8881031fd400 by task kunit_try_catch/302 [ 16.664530] [ 16.664891] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.665084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.665099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.665158] Call Trace: [ 16.665176] <TASK> [ 16.665192] dump_stack_lvl+0x73/0xb0 [ 16.665225] print_report+0xd1/0x650 [ 16.665249] ? __virt_addr_valid+0x1db/0x2d0 [ 16.665273] ? copy_user_test_oob+0x557/0x10f0 [ 16.665298] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.665323] ? copy_user_test_oob+0x557/0x10f0 [ 16.665348] kasan_report+0x141/0x180 [ 16.665370] ? copy_user_test_oob+0x557/0x10f0 [ 16.665399] kasan_check_range+0x10c/0x1c0 [ 16.665424] __kasan_check_write+0x18/0x20 [ 16.665445] copy_user_test_oob+0x557/0x10f0 [ 16.665471] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.665495] ? finish_task_switch.isra.0+0x153/0x700 [ 16.665519] ? __switch_to+0x47/0xf50 [ 16.665546] ? __schedule+0x10cc/0x2b60 [ 16.665569] ? __pfx_read_tsc+0x10/0x10 [ 16.665591] ? ktime_get_ts64+0x86/0x230 [ 16.665616] kunit_try_run_case+0x1a5/0x480 [ 16.665641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.665666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.665692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.665729] ? __kthread_parkme+0x82/0x180 [ 16.665752] ? preempt_count_sub+0x50/0x80 [ 16.665777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.665802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.665828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.665855] kthread+0x337/0x6f0 [ 16.665875] ? trace_preempt_on+0x20/0xc0 [ 16.665900] ? __pfx_kthread+0x10/0x10 [ 16.665922] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.665945] ? calculate_sigpending+0x7b/0xa0 [ 16.665970] ? __pfx_kthread+0x10/0x10 [ 16.665993] ret_from_fork+0x116/0x1d0 [ 16.666013] ? __pfx_kthread+0x10/0x10 [ 16.666034] ret_from_fork_asm+0x1a/0x30 [ 16.666079] </TASK> [ 16.666090] [ 16.676643] Allocated by task 302: [ 16.677105] kasan_save_stack+0x45/0x70 [ 16.677380] kasan_save_track+0x18/0x40 [ 16.677808] kasan_save_alloc_info+0x3b/0x50 [ 16.678103] __kasan_kmalloc+0xb7/0xc0 [ 16.678426] __kmalloc_noprof+0x1c9/0x500 [ 16.678611] kunit_kmalloc_array+0x25/0x60 [ 16.678815] copy_user_test_oob+0xab/0x10f0 [ 16.679014] kunit_try_run_case+0x1a5/0x480 [ 16.679504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.679983] kthread+0x337/0x6f0 [ 16.680257] ret_from_fork+0x116/0x1d0 [ 16.680549] ret_from_fork_asm+0x1a/0x30 [ 16.680959] [ 16.681202] The buggy address belongs to the object at ffff8881031fd400 [ 16.681202] which belongs to the cache kmalloc-128 of size 128 [ 16.682018] The buggy address is located 0 bytes inside of [ 16.682018] allocated 120-byte region [ffff8881031fd400, ffff8881031fd478) [ 16.682510] [ 16.682604] The buggy address belongs to the physical page: [ 16.683232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031fd [ 16.683710] flags: 0x200000000000000(node=0|zone=2) [ 16.684140] page_type: f5(slab) [ 16.684459] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.684805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.685328] page dumped because: kasan: bad access detected [ 16.685774] [ 16.685872] Memory state around the buggy address: [ 16.686497] ffff8881031fd300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.686840] ffff8881031fd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.687279] >ffff8881031fd400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.687873] ^ [ 16.688321] ffff8881031fd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.688619] ffff8881031fd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.688919] ==================================================================