Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.751383] ================================================================== [ 18.751755] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 18.752329] Write of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.752532] [ 18.752791] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.753653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.753774] Hardware name: linux,dummy-virt (DT) [ 18.753859] Call trace: [ 18.753894] show_stack+0x20/0x38 (C) [ 18.754050] dump_stack_lvl+0x8c/0xd0 [ 18.754127] print_report+0x118/0x5d0 [ 18.754175] kasan_report+0xdc/0x128 [ 18.754232] kasan_check_range+0x100/0x1a8 [ 18.754562] __kasan_check_write+0x20/0x30 [ 18.754679] copy_user_test_oob+0x234/0xec8 [ 18.754728] kunit_try_run_case+0x170/0x3f0 [ 18.754783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.754850] kthread+0x328/0x630 [ 18.754895] ret_from_fork+0x10/0x20 [ 18.755504] [ 18.755578] Allocated by task 286: [ 18.755662] kasan_save_stack+0x3c/0x68 [ 18.755763] kasan_save_track+0x20/0x40 [ 18.755930] kasan_save_alloc_info+0x40/0x58 [ 18.755992] __kasan_kmalloc+0xd4/0xd8 [ 18.756030] __kmalloc_noprof+0x198/0x4c8 [ 18.756137] kunit_kmalloc_array+0x34/0x88 [ 18.756177] copy_user_test_oob+0xac/0xec8 [ 18.756227] kunit_try_run_case+0x170/0x3f0 [ 18.756266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.756312] kthread+0x328/0x630 [ 18.756345] ret_from_fork+0x10/0x20 [ 18.756590] [ 18.756839] The buggy address belongs to the object at fff00000c593d300 [ 18.756839] which belongs to the cache kmalloc-128 of size 128 [ 18.757254] The buggy address is located 0 bytes inside of [ 18.757254] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.757501] [ 18.757745] The buggy address belongs to the physical page: [ 18.757786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.757847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.757931] page_type: f5(slab) [ 18.757975] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.758380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.758552] page dumped because: kasan: bad access detected [ 18.758643] [ 18.758673] Memory state around the buggy address: [ 18.758727] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.758775] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.759175] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.759258] ^ [ 18.759409] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.759467] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.759749] ================================================================== [ 18.784054] ================================================================== [ 18.784119] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 18.784176] Write of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.784247] [ 18.784295] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.784383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.784665] Hardware name: linux,dummy-virt (DT) [ 18.785018] Call trace: [ 18.785616] show_stack+0x20/0x38 (C) [ 18.785776] dump_stack_lvl+0x8c/0xd0 [ 18.785824] print_report+0x118/0x5d0 [ 18.785871] kasan_report+0xdc/0x128 [ 18.785918] kasan_check_range+0x100/0x1a8 [ 18.786332] __kasan_check_write+0x20/0x30 [ 18.786523] copy_user_test_oob+0x35c/0xec8 [ 18.786575] kunit_try_run_case+0x170/0x3f0 [ 18.786654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.786709] kthread+0x328/0x630 [ 18.786754] ret_from_fork+0x10/0x20 [ 18.786803] [ 18.786878] Allocated by task 286: [ 18.787041] kasan_save_stack+0x3c/0x68 [ 18.787133] kasan_save_track+0x20/0x40 [ 18.787174] kasan_save_alloc_info+0x40/0x58 [ 18.787228] __kasan_kmalloc+0xd4/0xd8 [ 18.787266] __kmalloc_noprof+0x198/0x4c8 [ 18.787304] kunit_kmalloc_array+0x34/0x88 [ 18.787345] copy_user_test_oob+0xac/0xec8 [ 18.787384] kunit_try_run_case+0x170/0x3f0 [ 18.787956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.788196] kthread+0x328/0x630 [ 18.788233] ret_from_fork+0x10/0x20 [ 18.788315] [ 18.788712] The buggy address belongs to the object at fff00000c593d300 [ 18.788712] which belongs to the cache kmalloc-128 of size 128 [ 18.788782] The buggy address is located 0 bytes inside of [ 18.788782] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.789000] [ 18.789097] The buggy address belongs to the physical page: [ 18.789135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.789203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.789255] page_type: f5(slab) [ 18.789297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.789484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.789553] page dumped because: kasan: bad access detected [ 18.789588] [ 18.789609] Memory state around the buggy address: [ 18.789644] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.789690] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.789736] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.789778] ^ [ 18.789892] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.790057] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.790099] ================================================================== [ 18.817773] ================================================================== [ 18.817829] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 18.817883] Read of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.817944] [ 18.818107] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.818262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.818324] Hardware name: linux,dummy-virt (DT) [ 18.818744] Call trace: [ 18.818790] show_stack+0x20/0x38 (C) [ 18.818977] dump_stack_lvl+0x8c/0xd0 [ 18.819374] print_report+0x118/0x5d0 [ 18.819469] kasan_report+0xdc/0x128 [ 18.819527] kasan_check_range+0x100/0x1a8 [ 18.819870] __kasan_check_read+0x20/0x30 [ 18.820115] copy_user_test_oob+0x4a0/0xec8 [ 18.820170] kunit_try_run_case+0x170/0x3f0 [ 18.820229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.820287] kthread+0x328/0x630 [ 18.820330] ret_from_fork+0x10/0x20 [ 18.820378] [ 18.820399] Allocated by task 286: [ 18.820428] kasan_save_stack+0x3c/0x68 [ 18.820489] kasan_save_track+0x20/0x40 [ 18.820528] kasan_save_alloc_info+0x40/0x58 [ 18.820680] __kasan_kmalloc+0xd4/0xd8 [ 18.821060] __kmalloc_noprof+0x198/0x4c8 [ 18.821409] kunit_kmalloc_array+0x34/0x88 [ 18.821456] copy_user_test_oob+0xac/0xec8 [ 18.821496] kunit_try_run_case+0x170/0x3f0 [ 18.821535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.821580] kthread+0x328/0x630 [ 18.821615] ret_from_fork+0x10/0x20 [ 18.821653] [ 18.821674] The buggy address belongs to the object at fff00000c593d300 [ 18.821674] which belongs to the cache kmalloc-128 of size 128 [ 18.822120] The buggy address is located 0 bytes inside of [ 18.822120] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.822231] [ 18.822253] The buggy address belongs to the physical page: [ 18.822588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.822651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.822701] page_type: f5(slab) [ 18.822739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.822793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.822848] page dumped because: kasan: bad access detected [ 18.822882] [ 18.823331] Memory state around the buggy address: [ 18.823434] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.823482] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823577] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.823619] ^ [ 18.823719] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823765] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823807] ================================================================== [ 18.806144] ================================================================== [ 18.806226] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 18.806284] Read of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.806338] [ 18.806371] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.806456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.806485] Hardware name: linux,dummy-virt (DT) [ 18.806519] Call trace: [ 18.806542] show_stack+0x20/0x38 (C) [ 18.806590] dump_stack_lvl+0x8c/0xd0 [ 18.806637] print_report+0x118/0x5d0 [ 18.806683] kasan_report+0xdc/0x128 [ 18.806728] kasan_check_range+0x100/0x1a8 [ 18.806777] __kasan_check_read+0x20/0x30 [ 18.806822] copy_user_test_oob+0x3c8/0xec8 [ 18.806870] kunit_try_run_case+0x170/0x3f0 [ 18.806916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.806970] kthread+0x328/0x630 [ 18.807012] ret_from_fork+0x10/0x20 [ 18.807061] [ 18.807081] Allocated by task 286: [ 18.807109] kasan_save_stack+0x3c/0x68 [ 18.807151] kasan_save_track+0x20/0x40 [ 18.807200] kasan_save_alloc_info+0x40/0x58 [ 18.807243] __kasan_kmalloc+0xd4/0xd8 [ 18.807427] __kmalloc_noprof+0x198/0x4c8 [ 18.807484] kunit_kmalloc_array+0x34/0x88 [ 18.807526] copy_user_test_oob+0xac/0xec8 [ 18.807567] kunit_try_run_case+0x170/0x3f0 [ 18.807785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.807850] kthread+0x328/0x630 [ 18.808192] ret_from_fork+0x10/0x20 [ 18.808276] [ 18.808301] The buggy address belongs to the object at fff00000c593d300 [ 18.808301] which belongs to the cache kmalloc-128 of size 128 [ 18.808613] The buggy address is located 0 bytes inside of [ 18.808613] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.808718] [ 18.808767] The buggy address belongs to the physical page: [ 18.808816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.808875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.808925] page_type: f5(slab) [ 18.808965] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.809019] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.809207] page dumped because: kasan: bad access detected [ 18.809248] [ 18.809270] Memory state around the buggy address: [ 18.809306] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.809353] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.809398] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.809702] ^ [ 18.809757] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.810014] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.810061] ================================================================== [ 18.810985] ================================================================== [ 18.811052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 18.811103] Write of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.811446] [ 18.811489] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.811586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.811617] Hardware name: linux,dummy-virt (DT) [ 18.811649] Call trace: [ 18.811673] show_stack+0x20/0x38 (C) [ 18.811722] dump_stack_lvl+0x8c/0xd0 [ 18.811771] print_report+0x118/0x5d0 [ 18.811816] kasan_report+0xdc/0x128 [ 18.811861] kasan_check_range+0x100/0x1a8 [ 18.811931] __kasan_check_write+0x20/0x30 [ 18.811978] copy_user_test_oob+0x434/0xec8 [ 18.812024] kunit_try_run_case+0x170/0x3f0 [ 18.812072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.812129] kthread+0x328/0x630 [ 18.812173] ret_from_fork+0x10/0x20 [ 18.812232] [ 18.812263] Allocated by task 286: [ 18.812294] kasan_save_stack+0x3c/0x68 [ 18.812337] kasan_save_track+0x20/0x40 [ 18.812377] kasan_save_alloc_info+0x40/0x58 [ 18.812417] __kasan_kmalloc+0xd4/0xd8 [ 18.812460] __kmalloc_noprof+0x198/0x4c8 [ 18.812507] kunit_kmalloc_array+0x34/0x88 [ 18.812559] copy_user_test_oob+0xac/0xec8 [ 18.812597] kunit_try_run_case+0x170/0x3f0 [ 18.812637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.812728] kthread+0x328/0x630 [ 18.812768] ret_from_fork+0x10/0x20 [ 18.813193] [ 18.813229] The buggy address belongs to the object at fff00000c593d300 [ 18.813229] which belongs to the cache kmalloc-128 of size 128 [ 18.813351] The buggy address is located 0 bytes inside of [ 18.813351] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.813429] [ 18.813452] The buggy address belongs to the physical page: [ 18.813484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.813718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.814333] page_type: f5(slab) [ 18.814387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.814441] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.814788] page dumped because: kasan: bad access detected [ 18.814828] [ 18.814927] Memory state around the buggy address: [ 18.815267] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.815358] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.815448] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.815492] ^ [ 18.815622] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.815729] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.815771] ================================================================== [ 18.767039] ================================================================== [ 18.767364] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 18.767524] Read of size 121 at addr fff00000c593d300 by task kunit_try_catch/286 [ 18.767834] [ 18.767904] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.768313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.768346] Hardware name: linux,dummy-virt (DT) [ 18.768380] Call trace: [ 18.768403] show_stack+0x20/0x38 (C) [ 18.768611] dump_stack_lvl+0x8c/0xd0 [ 18.768658] print_report+0x118/0x5d0 [ 18.768704] kasan_report+0xdc/0x128 [ 18.768751] kasan_check_range+0x100/0x1a8 [ 18.769055] __kasan_check_read+0x20/0x30 [ 18.769116] copy_user_test_oob+0x728/0xec8 [ 18.769166] kunit_try_run_case+0x170/0x3f0 [ 18.769611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.770176] kthread+0x328/0x630 [ 18.770340] ret_from_fork+0x10/0x20 [ 18.770530] [ 18.770551] Allocated by task 286: [ 18.770581] kasan_save_stack+0x3c/0x68 [ 18.770672] kasan_save_track+0x20/0x40 [ 18.770758] kasan_save_alloc_info+0x40/0x58 [ 18.770835] __kasan_kmalloc+0xd4/0xd8 [ 18.770873] __kmalloc_noprof+0x198/0x4c8 [ 18.770919] kunit_kmalloc_array+0x34/0x88 [ 18.771085] copy_user_test_oob+0xac/0xec8 [ 18.771132] kunit_try_run_case+0x170/0x3f0 [ 18.771189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.771308] kthread+0x328/0x630 [ 18.771348] ret_from_fork+0x10/0x20 [ 18.771525] [ 18.771546] The buggy address belongs to the object at fff00000c593d300 [ 18.771546] which belongs to the cache kmalloc-128 of size 128 [ 18.771633] The buggy address is located 0 bytes inside of [ 18.771633] allocated 120-byte region [fff00000c593d300, fff00000c593d378) [ 18.771782] [ 18.771829] The buggy address belongs to the physical page: [ 18.771886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10593d [ 18.771998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.772105] page_type: f5(slab) [ 18.772150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.772236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.772281] page dumped because: kasan: bad access detected [ 18.772315] [ 18.772335] Memory state around the buggy address: [ 18.772371] fff00000c593d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.772419] fff00000c593d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.772471] >fff00000c593d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.772512] ^ [ 18.772555] fff00000c593d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.772600] fff00000c593d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.772640] ==================================================================
[ 16.560649] ================================================================== [ 16.560915] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.561145] Read of size 121 at addr ffff8881038e2900 by task kunit_try_catch/302 [ 16.561692] [ 16.561875] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.561944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.561958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.561978] Call Trace: [ 16.562009] <TASK> [ 16.562023] dump_stack_lvl+0x73/0xb0 [ 16.562068] print_report+0xd1/0x610 [ 16.562106] ? __virt_addr_valid+0x1db/0x2d0 [ 16.562144] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.562183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.562235] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.562261] kasan_report+0x141/0x180 [ 16.562298] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.562342] kasan_check_range+0x10c/0x1c0 [ 16.562368] __kasan_check_read+0x15/0x20 [ 16.562395] copy_user_test_oob+0x4aa/0x10f0 [ 16.562424] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.562450] ? finish_task_switch.isra.0+0x153/0x700 [ 16.562474] ? __switch_to+0x47/0xf50 [ 16.562501] ? __schedule+0x10cc/0x2b60 [ 16.562524] ? __pfx_read_tsc+0x10/0x10 [ 16.562546] ? ktime_get_ts64+0x86/0x230 [ 16.562578] kunit_try_run_case+0x1a5/0x480 [ 16.562604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.562630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.562655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.562681] ? __kthread_parkme+0x82/0x180 [ 16.562704] ? preempt_count_sub+0x50/0x80 [ 16.562729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.562766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.562794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.562821] kthread+0x337/0x6f0 [ 16.562842] ? trace_preempt_on+0x20/0xc0 [ 16.562866] ? __pfx_kthread+0x10/0x10 [ 16.562888] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.562912] ? calculate_sigpending+0x7b/0xa0 [ 16.562937] ? __pfx_kthread+0x10/0x10 [ 16.562960] ret_from_fork+0x116/0x1d0 [ 16.562980] ? __pfx_kthread+0x10/0x10 [ 16.563002] ret_from_fork_asm+0x1a/0x30 [ 16.563033] </TASK> [ 16.563043] [ 16.571002] Allocated by task 302: [ 16.571194] kasan_save_stack+0x45/0x70 [ 16.571417] kasan_save_track+0x18/0x40 [ 16.571609] kasan_save_alloc_info+0x3b/0x50 [ 16.571842] __kasan_kmalloc+0xb7/0xc0 [ 16.572001] __kmalloc_noprof+0x1c9/0x500 [ 16.572143] kunit_kmalloc_array+0x25/0x60 [ 16.572292] copy_user_test_oob+0xab/0x10f0 [ 16.572543] kunit_try_run_case+0x1a5/0x480 [ 16.572771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.573032] kthread+0x337/0x6f0 [ 16.573201] ret_from_fork+0x116/0x1d0 [ 16.573425] ret_from_fork_asm+0x1a/0x30 [ 16.573683] [ 16.573804] The buggy address belongs to the object at ffff8881038e2900 [ 16.573804] which belongs to the cache kmalloc-128 of size 128 [ 16.574172] The buggy address is located 0 bytes inside of [ 16.574172] allocated 120-byte region [ffff8881038e2900, ffff8881038e2978) [ 16.574700] [ 16.574836] The buggy address belongs to the physical page: [ 16.575076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e2 [ 16.575316] flags: 0x200000000000000(node=0|zone=2) [ 16.575479] page_type: f5(slab) [ 16.575601] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.575993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.576337] page dumped because: kasan: bad access detected [ 16.576729] [ 16.576833] Memory state around the buggy address: [ 16.577021] ffff8881038e2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.577239] ffff8881038e2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.577489] >ffff8881038e2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.577855] ^ [ 16.578269] ffff8881038e2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.578942] ffff8881038e2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.579284] ================================================================== [ 16.601671] ================================================================== [ 16.602000] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.602398] Read of size 121 at addr ffff8881038e2900 by task kunit_try_catch/302 [ 16.602830] [ 16.602914] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.602955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.602968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.603039] Call Trace: [ 16.603055] <TASK> [ 16.603070] dump_stack_lvl+0x73/0xb0 [ 16.603159] print_report+0xd1/0x610 [ 16.603195] ? __virt_addr_valid+0x1db/0x2d0 [ 16.603218] ? copy_user_test_oob+0x604/0x10f0 [ 16.603246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.603272] ? copy_user_test_oob+0x604/0x10f0 [ 16.603297] kasan_report+0x141/0x180 [ 16.603320] ? copy_user_test_oob+0x604/0x10f0 [ 16.603351] kasan_check_range+0x10c/0x1c0 [ 16.603377] __kasan_check_read+0x15/0x20 [ 16.603398] copy_user_test_oob+0x604/0x10f0 [ 16.603465] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.603490] ? finish_task_switch.isra.0+0x153/0x700 [ 16.603531] ? __switch_to+0x47/0xf50 [ 16.603558] ? __schedule+0x10cc/0x2b60 [ 16.603624] ? __pfx_read_tsc+0x10/0x10 [ 16.603647] ? ktime_get_ts64+0x86/0x230 [ 16.603682] kunit_try_run_case+0x1a5/0x480 [ 16.603710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.603734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.603769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.603796] ? __kthread_parkme+0x82/0x180 [ 16.603818] ? preempt_count_sub+0x50/0x80 [ 16.603842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.603869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.603895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.603922] kthread+0x337/0x6f0 [ 16.603943] ? trace_preempt_on+0x20/0xc0 [ 16.603967] ? __pfx_kthread+0x10/0x10 [ 16.603989] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.604013] ? calculate_sigpending+0x7b/0xa0 [ 16.604039] ? __pfx_kthread+0x10/0x10 [ 16.604062] ret_from_fork+0x116/0x1d0 [ 16.604082] ? __pfx_kthread+0x10/0x10 [ 16.604103] ret_from_fork_asm+0x1a/0x30 [ 16.604135] </TASK> [ 16.604146] [ 16.612921] Allocated by task 302: [ 16.613144] kasan_save_stack+0x45/0x70 [ 16.613443] kasan_save_track+0x18/0x40 [ 16.613807] kasan_save_alloc_info+0x3b/0x50 [ 16.614078] __kasan_kmalloc+0xb7/0xc0 [ 16.614214] __kmalloc_noprof+0x1c9/0x500 [ 16.614351] kunit_kmalloc_array+0x25/0x60 [ 16.614669] copy_user_test_oob+0xab/0x10f0 [ 16.615084] kunit_try_run_case+0x1a5/0x480 [ 16.615291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.615555] kthread+0x337/0x6f0 [ 16.615809] ret_from_fork+0x116/0x1d0 [ 16.615989] ret_from_fork_asm+0x1a/0x30 [ 16.616256] [ 16.616353] The buggy address belongs to the object at ffff8881038e2900 [ 16.616353] which belongs to the cache kmalloc-128 of size 128 [ 16.616828] The buggy address is located 0 bytes inside of [ 16.616828] allocated 120-byte region [ffff8881038e2900, ffff8881038e2978) [ 16.617294] [ 16.617394] The buggy address belongs to the physical page: [ 16.617692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e2 [ 16.617936] flags: 0x200000000000000(node=0|zone=2) [ 16.618172] page_type: f5(slab) [ 16.618342] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.618875] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.619234] page dumped because: kasan: bad access detected [ 16.619555] [ 16.619643] Memory state around the buggy address: [ 16.619930] ffff8881038e2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.620208] ffff8881038e2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620640] >ffff8881038e2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.620907] ^ [ 16.621357] ffff8881038e2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.621717] ffff8881038e2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.622093] ================================================================== [ 16.579682] ================================================================== [ 16.580204] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.580739] Write of size 121 at addr ffff8881038e2900 by task kunit_try_catch/302 [ 16.581133] [ 16.581346] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.581444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.581458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.581480] Call Trace: [ 16.581495] <TASK> [ 16.581510] dump_stack_lvl+0x73/0xb0 [ 16.581540] print_report+0xd1/0x610 [ 16.581563] ? __virt_addr_valid+0x1db/0x2d0 [ 16.581587] ? copy_user_test_oob+0x557/0x10f0 [ 16.581613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.581638] ? copy_user_test_oob+0x557/0x10f0 [ 16.581663] kasan_report+0x141/0x180 [ 16.581687] ? copy_user_test_oob+0x557/0x10f0 [ 16.581717] kasan_check_range+0x10c/0x1c0 [ 16.581742] __kasan_check_write+0x18/0x20 [ 16.581775] copy_user_test_oob+0x557/0x10f0 [ 16.581837] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.581862] ? finish_task_switch.isra.0+0x153/0x700 [ 16.581888] ? __switch_to+0x47/0xf50 [ 16.581914] ? __schedule+0x10cc/0x2b60 [ 16.581970] ? __pfx_read_tsc+0x10/0x10 [ 16.581993] ? ktime_get_ts64+0x86/0x230 [ 16.582018] kunit_try_run_case+0x1a5/0x480 [ 16.582045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.582070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.582127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.582154] ? __kthread_parkme+0x82/0x180 [ 16.582177] ? preempt_count_sub+0x50/0x80 [ 16.582202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.582259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.582286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.582314] kthread+0x337/0x6f0 [ 16.582335] ? trace_preempt_on+0x20/0xc0 [ 16.582360] ? __pfx_kthread+0x10/0x10 [ 16.582420] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.582445] ? calculate_sigpending+0x7b/0xa0 [ 16.582470] ? __pfx_kthread+0x10/0x10 [ 16.582504] ret_from_fork+0x116/0x1d0 [ 16.582526] ? __pfx_kthread+0x10/0x10 [ 16.582580] ret_from_fork_asm+0x1a/0x30 [ 16.582613] </TASK> [ 16.582625] [ 16.591876] Allocated by task 302: [ 16.592062] kasan_save_stack+0x45/0x70 [ 16.592359] kasan_save_track+0x18/0x40 [ 16.592589] kasan_save_alloc_info+0x3b/0x50 [ 16.592861] __kasan_kmalloc+0xb7/0xc0 [ 16.592996] __kmalloc_noprof+0x1c9/0x500 [ 16.593176] kunit_kmalloc_array+0x25/0x60 [ 16.593489] copy_user_test_oob+0xab/0x10f0 [ 16.593776] kunit_try_run_case+0x1a5/0x480 [ 16.593971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.594191] kthread+0x337/0x6f0 [ 16.594310] ret_from_fork+0x116/0x1d0 [ 16.594616] ret_from_fork_asm+0x1a/0x30 [ 16.594913] [ 16.594987] The buggy address belongs to the object at ffff8881038e2900 [ 16.594987] which belongs to the cache kmalloc-128 of size 128 [ 16.595489] The buggy address is located 0 bytes inside of [ 16.595489] allocated 120-byte region [ffff8881038e2900, ffff8881038e2978) [ 16.596117] [ 16.596273] The buggy address belongs to the physical page: [ 16.596523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e2 [ 16.596944] flags: 0x200000000000000(node=0|zone=2) [ 16.597142] page_type: f5(slab) [ 16.597351] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.597780] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.598146] page dumped because: kasan: bad access detected [ 16.598359] [ 16.598495] Memory state around the buggy address: [ 16.598773] ffff8881038e2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.599115] ffff8881038e2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599398] >ffff8881038e2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.599988] ^ [ 16.600271] ffff8881038e2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.600708] ffff8881038e2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.601007] ================================================================== [ 16.541997] ================================================================== [ 16.542334] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.542672] Write of size 121 at addr ffff8881038e2900 by task kunit_try_catch/302 [ 16.542978] [ 16.543093] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.543139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.543152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.543174] Call Trace: [ 16.543186] <TASK> [ 16.543204] dump_stack_lvl+0x73/0xb0 [ 16.543234] print_report+0xd1/0x610 [ 16.543257] ? __virt_addr_valid+0x1db/0x2d0 [ 16.543282] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.543308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.543333] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.543359] kasan_report+0x141/0x180 [ 16.543382] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.543412] kasan_check_range+0x10c/0x1c0 [ 16.543448] __kasan_check_write+0x18/0x20 [ 16.543470] copy_user_test_oob+0x3fd/0x10f0 [ 16.543498] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.543522] ? finish_task_switch.isra.0+0x153/0x700 [ 16.543548] ? __switch_to+0x47/0xf50 [ 16.543574] ? __schedule+0x10cc/0x2b60 [ 16.543598] ? __pfx_read_tsc+0x10/0x10 [ 16.543620] ? ktime_get_ts64+0x86/0x230 [ 16.543646] kunit_try_run_case+0x1a5/0x480 [ 16.543672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.543697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.543723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.543749] ? __kthread_parkme+0x82/0x180 [ 16.543784] ? preempt_count_sub+0x50/0x80 [ 16.543809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.543836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.543862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.543890] kthread+0x337/0x6f0 [ 16.543911] ? trace_preempt_on+0x20/0xc0 [ 16.543936] ? __pfx_kthread+0x10/0x10 [ 16.543958] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.543982] ? calculate_sigpending+0x7b/0xa0 [ 16.544008] ? __pfx_kthread+0x10/0x10 [ 16.544031] ret_from_fork+0x116/0x1d0 [ 16.544051] ? __pfx_kthread+0x10/0x10 [ 16.544073] ret_from_fork_asm+0x1a/0x30 [ 16.544105] </TASK> [ 16.544116] [ 16.551457] Allocated by task 302: [ 16.551630] kasan_save_stack+0x45/0x70 [ 16.551825] kasan_save_track+0x18/0x40 [ 16.551996] kasan_save_alloc_info+0x3b/0x50 [ 16.552184] __kasan_kmalloc+0xb7/0xc0 [ 16.552339] __kmalloc_noprof+0x1c9/0x500 [ 16.552560] kunit_kmalloc_array+0x25/0x60 [ 16.552896] copy_user_test_oob+0xab/0x10f0 [ 16.553085] kunit_try_run_case+0x1a5/0x480 [ 16.553264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.553587] kthread+0x337/0x6f0 [ 16.553768] ret_from_fork+0x116/0x1d0 [ 16.553930] ret_from_fork_asm+0x1a/0x30 [ 16.554153] [ 16.554233] The buggy address belongs to the object at ffff8881038e2900 [ 16.554233] which belongs to the cache kmalloc-128 of size 128 [ 16.554827] The buggy address is located 0 bytes inside of [ 16.554827] allocated 120-byte region [ffff8881038e2900, ffff8881038e2978) [ 16.555572] [ 16.555669] The buggy address belongs to the physical page: [ 16.555992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e2 [ 16.556247] flags: 0x200000000000000(node=0|zone=2) [ 16.556411] page_type: f5(slab) [ 16.556763] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.557122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.557396] page dumped because: kasan: bad access detected [ 16.557568] [ 16.557699] Memory state around the buggy address: [ 16.557957] ffff8881038e2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.558317] ffff8881038e2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.558849] >ffff8881038e2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.559111] ^ [ 16.559326] ffff8881038e2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.559584] ffff8881038e2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.559912] ==================================================================