Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.213235] ================================================================== [ 18.213305] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 18.213357] Read of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.213413] [ 18.213444] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.213529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.213559] Hardware name: linux,dummy-virt (DT) [ 18.213592] Call trace: [ 18.213621] show_stack+0x20/0x38 (C) [ 18.213669] dump_stack_lvl+0x8c/0xd0 [ 18.213740] print_report+0x118/0x5d0 [ 18.213789] kasan_report+0xdc/0x128 [ 18.213835] kasan_check_range+0x100/0x1a8 [ 18.213892] __kasan_check_read+0x20/0x30 [ 18.213946] copy_user_test_oob+0x3c8/0xec8 [ 18.213995] kunit_try_run_case+0x170/0x3f0 [ 18.214042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.214095] kthread+0x328/0x630 [ 18.214138] ret_from_fork+0x10/0x20 [ 18.214187] [ 18.214210] Allocated by task 285: [ 18.214238] kasan_save_stack+0x3c/0x68 [ 18.214280] kasan_save_track+0x20/0x40 [ 18.214318] kasan_save_alloc_info+0x40/0x58 [ 18.214370] __kasan_kmalloc+0xd4/0xd8 [ 18.214416] __kmalloc_noprof+0x198/0x4c8 [ 18.214465] kunit_kmalloc_array+0x34/0x88 [ 18.214505] copy_user_test_oob+0xac/0xec8 [ 18.214544] kunit_try_run_case+0x170/0x3f0 [ 18.214582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.214627] kthread+0x328/0x630 [ 18.214662] ret_from_fork+0x10/0x20 [ 18.214909] [ 18.214937] The buggy address belongs to the object at fff00000c790e600 [ 18.214937] which belongs to the cache kmalloc-128 of size 128 [ 18.215000] The buggy address is located 0 bytes inside of [ 18.215000] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.215451] [ 18.215702] The buggy address belongs to the physical page: [ 18.215755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.216077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.216590] page_type: f5(slab) [ 18.216992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.217306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.217934] page dumped because: kasan: bad access detected [ 18.218013] [ 18.218057] Memory state around the buggy address: [ 18.218377] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.218473] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.219369] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.219424] ^ [ 18.219473] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.219545] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.219608] ================================================================== [ 18.203402] ================================================================== [ 18.203498] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 18.203669] Write of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.203740] [ 18.203782] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.203873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.204304] Hardware name: linux,dummy-virt (DT) [ 18.204389] Call trace: [ 18.204491] show_stack+0x20/0x38 (C) [ 18.204551] dump_stack_lvl+0x8c/0xd0 [ 18.204627] print_report+0x118/0x5d0 [ 18.204677] kasan_report+0xdc/0x128 [ 18.204736] kasan_check_range+0x100/0x1a8 [ 18.205208] __kasan_check_write+0x20/0x30 [ 18.205304] copy_user_test_oob+0x35c/0xec8 [ 18.205466] kunit_try_run_case+0x170/0x3f0 [ 18.205558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.205945] kthread+0x328/0x630 [ 18.206018] ret_from_fork+0x10/0x20 [ 18.206083] [ 18.206436] Allocated by task 285: [ 18.206507] kasan_save_stack+0x3c/0x68 [ 18.206645] kasan_save_track+0x20/0x40 [ 18.206713] kasan_save_alloc_info+0x40/0x58 [ 18.206832] __kasan_kmalloc+0xd4/0xd8 [ 18.207176] __kmalloc_noprof+0x198/0x4c8 [ 18.207332] kunit_kmalloc_array+0x34/0x88 [ 18.207533] copy_user_test_oob+0xac/0xec8 [ 18.207716] kunit_try_run_case+0x170/0x3f0 [ 18.207796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.207960] kthread+0x328/0x630 [ 18.208027] ret_from_fork+0x10/0x20 [ 18.208065] [ 18.208088] The buggy address belongs to the object at fff00000c790e600 [ 18.208088] which belongs to the cache kmalloc-128 of size 128 [ 18.208156] The buggy address is located 0 bytes inside of [ 18.208156] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.208393] [ 18.208607] The buggy address belongs to the physical page: [ 18.208658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.209070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.209230] page_type: f5(slab) [ 18.209305] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.209384] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.209429] page dumped because: kasan: bad access detected [ 18.209927] [ 18.209966] Memory state around the buggy address: [ 18.210186] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.210253] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210385] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.210427] ^ [ 18.210475] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210952] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.211139] ================================================================== [ 18.170657] ================================================================== [ 18.170798] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 18.170892] Write of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.171546] [ 18.171671] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.172072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.172182] Hardware name: linux,dummy-virt (DT) [ 18.172268] Call trace: [ 18.172627] show_stack+0x20/0x38 (C) [ 18.172713] dump_stack_lvl+0x8c/0xd0 [ 18.172908] print_report+0x118/0x5d0 [ 18.173348] kasan_report+0xdc/0x128 [ 18.173466] kasan_check_range+0x100/0x1a8 [ 18.173585] __kasan_check_write+0x20/0x30 [ 18.173817] copy_user_test_oob+0x234/0xec8 [ 18.173986] kunit_try_run_case+0x170/0x3f0 [ 18.174083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.174186] kthread+0x328/0x630 [ 18.174239] ret_from_fork+0x10/0x20 [ 18.174698] [ 18.174767] Allocated by task 285: [ 18.174822] kasan_save_stack+0x3c/0x68 [ 18.175270] kasan_save_track+0x20/0x40 [ 18.175609] kasan_save_alloc_info+0x40/0x58 [ 18.175762] __kasan_kmalloc+0xd4/0xd8 [ 18.176157] __kmalloc_noprof+0x198/0x4c8 [ 18.176213] kunit_kmalloc_array+0x34/0x88 [ 18.176256] copy_user_test_oob+0xac/0xec8 [ 18.176494] kunit_try_run_case+0x170/0x3f0 [ 18.176929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.177107] kthread+0x328/0x630 [ 18.177217] ret_from_fork+0x10/0x20 [ 18.177391] [ 18.177415] The buggy address belongs to the object at fff00000c790e600 [ 18.177415] which belongs to the cache kmalloc-128 of size 128 [ 18.177629] The buggy address is located 0 bytes inside of [ 18.177629] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.177835] [ 18.177886] The buggy address belongs to the physical page: [ 18.177973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.178060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.178127] page_type: f5(slab) [ 18.178189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.178252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.178309] page dumped because: kasan: bad access detected [ 18.178343] [ 18.178373] Memory state around the buggy address: [ 18.178419] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.178478] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178536] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.178577] ^ [ 18.178631] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178675] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178744] ================================================================== [ 18.221922] ================================================================== [ 18.221987] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 18.222211] Write of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.222280] [ 18.222312] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.222718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.222770] Hardware name: linux,dummy-virt (DT) [ 18.222804] Call trace: [ 18.223100] show_stack+0x20/0x38 (C) [ 18.223256] dump_stack_lvl+0x8c/0xd0 [ 18.223312] print_report+0x118/0x5d0 [ 18.223359] kasan_report+0xdc/0x128 [ 18.223411] kasan_check_range+0x100/0x1a8 [ 18.223641] __kasan_check_write+0x20/0x30 [ 18.223910] copy_user_test_oob+0x434/0xec8 [ 18.223969] kunit_try_run_case+0x170/0x3f0 [ 18.224017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.224071] kthread+0x328/0x630 [ 18.224115] ret_from_fork+0x10/0x20 [ 18.224787] [ 18.224902] Allocated by task 285: [ 18.224972] kasan_save_stack+0x3c/0x68 [ 18.225131] kasan_save_track+0x20/0x40 [ 18.225174] kasan_save_alloc_info+0x40/0x58 [ 18.225217] __kasan_kmalloc+0xd4/0xd8 [ 18.225266] __kmalloc_noprof+0x198/0x4c8 [ 18.225307] kunit_kmalloc_array+0x34/0x88 [ 18.225356] copy_user_test_oob+0xac/0xec8 [ 18.225403] kunit_try_run_case+0x170/0x3f0 [ 18.225443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225497] kthread+0x328/0x630 [ 18.225533] ret_from_fork+0x10/0x20 [ 18.225569] [ 18.225593] The buggy address belongs to the object at fff00000c790e600 [ 18.225593] which belongs to the cache kmalloc-128 of size 128 [ 18.225656] The buggy address is located 0 bytes inside of [ 18.225656] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.225739] [ 18.225780] The buggy address belongs to the physical page: [ 18.225820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.225895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.225958] page_type: f5(slab) [ 18.225997] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.226057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.226108] page dumped because: kasan: bad access detected [ 18.226163] [ 18.226197] Memory state around the buggy address: [ 18.226233] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.226279] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226325] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.226365] ^ [ 18.226409] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226453] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226495] ================================================================== [ 18.227381] ================================================================== [ 18.228084] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 18.228155] Read of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.228209] [ 18.228242] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.228326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.228356] Hardware name: linux,dummy-virt (DT) [ 18.228387] Call trace: [ 18.228411] show_stack+0x20/0x38 (C) [ 18.228460] dump_stack_lvl+0x8c/0xd0 [ 18.228507] print_report+0x118/0x5d0 [ 18.228554] kasan_report+0xdc/0x128 [ 18.228601] kasan_check_range+0x100/0x1a8 [ 18.228651] __kasan_check_read+0x20/0x30 [ 18.228710] copy_user_test_oob+0x4a0/0xec8 [ 18.228757] kunit_try_run_case+0x170/0x3f0 [ 18.228806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.228860] kthread+0x328/0x630 [ 18.228904] ret_from_fork+0x10/0x20 [ 18.228952] [ 18.228973] Allocated by task 285: [ 18.229002] kasan_save_stack+0x3c/0x68 [ 18.229044] kasan_save_track+0x20/0x40 [ 18.229083] kasan_save_alloc_info+0x40/0x58 [ 18.229126] __kasan_kmalloc+0xd4/0xd8 [ 18.229165] __kmalloc_noprof+0x198/0x4c8 [ 18.229204] kunit_kmalloc_array+0x34/0x88 [ 18.229242] copy_user_test_oob+0xac/0xec8 [ 18.229281] kunit_try_run_case+0x170/0x3f0 [ 18.229319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229364] kthread+0x328/0x630 [ 18.229397] ret_from_fork+0x10/0x20 [ 18.229434] [ 18.229455] The buggy address belongs to the object at fff00000c790e600 [ 18.229455] which belongs to the cache kmalloc-128 of size 128 [ 18.229514] The buggy address is located 0 bytes inside of [ 18.229514] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.229576] [ 18.229597] The buggy address belongs to the physical page: [ 18.229636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.229770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.229846] page_type: f5(slab) [ 18.229995] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.230346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.230487] page dumped because: kasan: bad access detected [ 18.230741] [ 18.230803] Memory state around the buggy address: [ 18.230840] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.230895] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231055] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.231122] ^ [ 18.231228] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231305] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231524] ================================================================== [ 18.186618] ================================================================== [ 18.186746] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 18.187213] Read of size 121 at addr fff00000c790e600 by task kunit_try_catch/285 [ 18.187310] [ 18.187345] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.187743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.187774] Hardware name: linux,dummy-virt (DT) [ 18.187808] Call trace: [ 18.188205] show_stack+0x20/0x38 (C) [ 18.188369] dump_stack_lvl+0x8c/0xd0 [ 18.188492] print_report+0x118/0x5d0 [ 18.188544] kasan_report+0xdc/0x128 [ 18.188591] kasan_check_range+0x100/0x1a8 [ 18.188876] __kasan_check_read+0x20/0x30 [ 18.189046] copy_user_test_oob+0x728/0xec8 [ 18.189146] kunit_try_run_case+0x170/0x3f0 [ 18.189222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.189403] kthread+0x328/0x630 [ 18.189569] ret_from_fork+0x10/0x20 [ 18.189655] [ 18.189677] Allocated by task 285: [ 18.189729] kasan_save_stack+0x3c/0x68 [ 18.190041] kasan_save_track+0x20/0x40 [ 18.190136] kasan_save_alloc_info+0x40/0x58 [ 18.190298] __kasan_kmalloc+0xd4/0xd8 [ 18.190343] __kmalloc_noprof+0x198/0x4c8 [ 18.190383] kunit_kmalloc_array+0x34/0x88 [ 18.190558] copy_user_test_oob+0xac/0xec8 [ 18.190638] kunit_try_run_case+0x170/0x3f0 [ 18.190708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.190754] kthread+0x328/0x630 [ 18.190788] ret_from_fork+0x10/0x20 [ 18.190828] [ 18.190870] The buggy address belongs to the object at fff00000c790e600 [ 18.190870] which belongs to the cache kmalloc-128 of size 128 [ 18.190941] The buggy address is located 0 bytes inside of [ 18.190941] allocated 120-byte region [fff00000c790e600, fff00000c790e678) [ 18.191014] [ 18.191045] The buggy address belongs to the physical page: [ 18.191079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e [ 18.191152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.191203] page_type: f5(slab) [ 18.191242] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.191295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.191338] page dumped because: kasan: bad access detected [ 18.191381] [ 18.191403] Memory state around the buggy address: [ 18.191437] fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.191483] fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.191529] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.191570] ^ [ 18.191613] fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.191659] fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.191710] ==================================================================
[ 16.023436] ================================================================== [ 16.023779] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.024121] Read of size 121 at addr ffff888102fd1e00 by task kunit_try_catch/303 [ 16.024464] [ 16.024551] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.024592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.024605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.024626] Call Trace: [ 16.024640] <TASK> [ 16.024655] dump_stack_lvl+0x73/0xb0 [ 16.024681] print_report+0xd1/0x610 [ 16.024705] ? __virt_addr_valid+0x1db/0x2d0 [ 16.024727] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.024752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.024774] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.024798] kasan_report+0x141/0x180 [ 16.024820] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.024848] kasan_check_range+0x10c/0x1c0 [ 16.024872] __kasan_check_read+0x15/0x20 [ 16.024891] copy_user_test_oob+0x4aa/0x10f0 [ 16.024918] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.024941] ? finish_task_switch.isra.0+0x153/0x700 [ 16.024963] ? __switch_to+0x47/0xf50 [ 16.024995] ? __schedule+0x10cc/0x2b60 [ 16.025028] ? __pfx_read_tsc+0x10/0x10 [ 16.025050] ? ktime_get_ts64+0x86/0x230 [ 16.025073] kunit_try_run_case+0x1a5/0x480 [ 16.025097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.025120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.025144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.025168] ? __kthread_parkme+0x82/0x180 [ 16.025189] ? preempt_count_sub+0x50/0x80 [ 16.025213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.025237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.025261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.025285] kthread+0x337/0x6f0 [ 16.025306] ? trace_preempt_on+0x20/0xc0 [ 16.025329] ? __pfx_kthread+0x10/0x10 [ 16.025350] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.025371] ? calculate_sigpending+0x7b/0xa0 [ 16.025408] ? __pfx_kthread+0x10/0x10 [ 16.025430] ret_from_fork+0x116/0x1d0 [ 16.025450] ? __pfx_kthread+0x10/0x10 [ 16.025470] ret_from_fork_asm+0x1a/0x30 [ 16.025500] </TASK> [ 16.025510] [ 16.032757] Allocated by task 303: [ 16.032934] kasan_save_stack+0x45/0x70 [ 16.033121] kasan_save_track+0x18/0x40 [ 16.033289] kasan_save_alloc_info+0x3b/0x50 [ 16.033566] __kasan_kmalloc+0xb7/0xc0 [ 16.033745] __kmalloc_noprof+0x1c9/0x500 [ 16.033907] kunit_kmalloc_array+0x25/0x60 [ 16.034059] copy_user_test_oob+0xab/0x10f0 [ 16.034274] kunit_try_run_case+0x1a5/0x480 [ 16.034576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.034775] kthread+0x337/0x6f0 [ 16.034942] ret_from_fork+0x116/0x1d0 [ 16.035104] ret_from_fork_asm+0x1a/0x30 [ 16.035302] [ 16.035394] The buggy address belongs to the object at ffff888102fd1e00 [ 16.035394] which belongs to the cache kmalloc-128 of size 128 [ 16.035844] The buggy address is located 0 bytes inside of [ 16.035844] allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78) [ 16.036329] [ 16.036404] The buggy address belongs to the physical page: [ 16.036653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 16.036949] flags: 0x200000000000000(node=0|zone=2) [ 16.037174] page_type: f5(slab) [ 16.037313] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.037713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.037947] page dumped because: kasan: bad access detected [ 16.038184] [ 16.038279] Memory state around the buggy address: [ 16.038620] ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.038850] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.039180] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.039497] ^ [ 16.039719] ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.039941] ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.040240] ================================================================== [ 16.006103] ================================================================== [ 16.006476] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.006757] Write of size 121 at addr ffff888102fd1e00 by task kunit_try_catch/303 [ 16.007087] [ 16.007172] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.007214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.007226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.007246] Call Trace: [ 16.007259] <TASK> [ 16.007273] dump_stack_lvl+0x73/0xb0 [ 16.007302] print_report+0xd1/0x610 [ 16.007324] ? __virt_addr_valid+0x1db/0x2d0 [ 16.007347] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.007371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.007393] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.007431] kasan_report+0x141/0x180 [ 16.007454] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.007482] kasan_check_range+0x10c/0x1c0 [ 16.007506] __kasan_check_write+0x18/0x20 [ 16.007525] copy_user_test_oob+0x3fd/0x10f0 [ 16.007550] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.007573] ? finish_task_switch.isra.0+0x153/0x700 [ 16.007595] ? __switch_to+0x47/0xf50 [ 16.007620] ? __schedule+0x10cc/0x2b60 [ 16.007643] ? __pfx_read_tsc+0x10/0x10 [ 16.007665] ? ktime_get_ts64+0x86/0x230 [ 16.007688] kunit_try_run_case+0x1a5/0x480 [ 16.007713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.007736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.007760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.007784] ? __kthread_parkme+0x82/0x180 [ 16.007804] ? preempt_count_sub+0x50/0x80 [ 16.007828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.007852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.007877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.007902] kthread+0x337/0x6f0 [ 16.007921] ? trace_preempt_on+0x20/0xc0 [ 16.007944] ? __pfx_kthread+0x10/0x10 [ 16.007966] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.007987] ? calculate_sigpending+0x7b/0xa0 [ 16.008021] ? __pfx_kthread+0x10/0x10 [ 16.008043] ret_from_fork+0x116/0x1d0 [ 16.008062] ? __pfx_kthread+0x10/0x10 [ 16.008083] ret_from_fork_asm+0x1a/0x30 [ 16.008113] </TASK> [ 16.008123] [ 16.015242] Allocated by task 303: [ 16.015452] kasan_save_stack+0x45/0x70 [ 16.015652] kasan_save_track+0x18/0x40 [ 16.015850] kasan_save_alloc_info+0x3b/0x50 [ 16.016074] __kasan_kmalloc+0xb7/0xc0 [ 16.016237] __kmalloc_noprof+0x1c9/0x500 [ 16.016376] kunit_kmalloc_array+0x25/0x60 [ 16.016588] copy_user_test_oob+0xab/0x10f0 [ 16.016800] kunit_try_run_case+0x1a5/0x480 [ 16.017001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017188] kthread+0x337/0x6f0 [ 16.017360] ret_from_fork+0x116/0x1d0 [ 16.017558] ret_from_fork_asm+0x1a/0x30 [ 16.017737] [ 16.017825] The buggy address belongs to the object at ffff888102fd1e00 [ 16.017825] which belongs to the cache kmalloc-128 of size 128 [ 16.018307] The buggy address is located 0 bytes inside of [ 16.018307] allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78) [ 16.018805] [ 16.018904] The buggy address belongs to the physical page: [ 16.019118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 16.019478] flags: 0x200000000000000(node=0|zone=2) [ 16.019647] page_type: f5(slab) [ 16.019767] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.019998] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.020233] page dumped because: kasan: bad access detected [ 16.020404] [ 16.020473] Memory state around the buggy address: [ 16.020670] ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.021356] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.021673] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.021985] ^ [ 16.022305] ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.022619] ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.022955] ================================================================== [ 16.040890] ================================================================== [ 16.041427] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.041706] Write of size 121 at addr ffff888102fd1e00 by task kunit_try_catch/303 [ 16.041994] [ 16.042114] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.042157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.042168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.042190] Call Trace: [ 16.042203] <TASK> [ 16.042218] dump_stack_lvl+0x73/0xb0 [ 16.042245] print_report+0xd1/0x610 [ 16.042268] ? __virt_addr_valid+0x1db/0x2d0 [ 16.042290] ? copy_user_test_oob+0x557/0x10f0 [ 16.042313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.042335] ? copy_user_test_oob+0x557/0x10f0 [ 16.042359] kasan_report+0x141/0x180 [ 16.042383] ? copy_user_test_oob+0x557/0x10f0 [ 16.042419] kasan_check_range+0x10c/0x1c0 [ 16.042443] __kasan_check_write+0x18/0x20 [ 16.042462] copy_user_test_oob+0x557/0x10f0 [ 16.042488] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.042511] ? finish_task_switch.isra.0+0x153/0x700 [ 16.042532] ? __switch_to+0x47/0xf50 [ 16.042557] ? __schedule+0x10cc/0x2b60 [ 16.042579] ? __pfx_read_tsc+0x10/0x10 [ 16.042602] ? ktime_get_ts64+0x86/0x230 [ 16.042626] kunit_try_run_case+0x1a5/0x480 [ 16.042651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.042674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.042698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.042722] ? __kthread_parkme+0x82/0x180 [ 16.042743] ? preempt_count_sub+0x50/0x80 [ 16.042766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.042790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.042814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.042838] kthread+0x337/0x6f0 [ 16.042857] ? trace_preempt_on+0x20/0xc0 [ 16.042880] ? __pfx_kthread+0x10/0x10 [ 16.042901] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.042923] ? calculate_sigpending+0x7b/0xa0 [ 16.042947] ? __pfx_kthread+0x10/0x10 [ 16.042968] ret_from_fork+0x116/0x1d0 [ 16.042987] ? __pfx_kthread+0x10/0x10 [ 16.043018] ret_from_fork_asm+0x1a/0x30 [ 16.043049] </TASK> [ 16.043059] [ 16.049852] Allocated by task 303: [ 16.050040] kasan_save_stack+0x45/0x70 [ 16.050304] kasan_save_track+0x18/0x40 [ 16.050626] kasan_save_alloc_info+0x3b/0x50 [ 16.050836] __kasan_kmalloc+0xb7/0xc0 [ 16.051036] __kmalloc_noprof+0x1c9/0x500 [ 16.051191] kunit_kmalloc_array+0x25/0x60 [ 16.051336] copy_user_test_oob+0xab/0x10f0 [ 16.051722] kunit_try_run_case+0x1a5/0x480 [ 16.051927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.052113] kthread+0x337/0x6f0 [ 16.052235] ret_from_fork+0x116/0x1d0 [ 16.052367] ret_from_fork_asm+0x1a/0x30 [ 16.052572] [ 16.052666] The buggy address belongs to the object at ffff888102fd1e00 [ 16.052666] which belongs to the cache kmalloc-128 of size 128 [ 16.053226] The buggy address is located 0 bytes inside of [ 16.053226] allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78) [ 16.053738] [ 16.053826] The buggy address belongs to the physical page: [ 16.054049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 16.054290] flags: 0x200000000000000(node=0|zone=2) [ 16.054682] page_type: f5(slab) [ 16.054848] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.055178] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.055503] page dumped because: kasan: bad access detected [ 16.055719] [ 16.055789] Memory state around the buggy address: [ 16.056021] ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.056308] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.056603] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.056903] ^ [ 16.057204] ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.057529] ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.057812] ================================================================== [ 16.058280] ================================================================== [ 16.058614] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.058898] Read of size 121 at addr ffff888102fd1e00 by task kunit_try_catch/303 [ 16.059221] [ 16.059304] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.059343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.059356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.059375] Call Trace: [ 16.059388] <TASK> [ 16.059401] dump_stack_lvl+0x73/0xb0 [ 16.059427] print_report+0xd1/0x610 [ 16.059450] ? __virt_addr_valid+0x1db/0x2d0 [ 16.059472] ? copy_user_test_oob+0x604/0x10f0 [ 16.059496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.059518] ? copy_user_test_oob+0x604/0x10f0 [ 16.059542] kasan_report+0x141/0x180 [ 16.059564] ? copy_user_test_oob+0x604/0x10f0 [ 16.059592] kasan_check_range+0x10c/0x1c0 [ 16.059616] __kasan_check_read+0x15/0x20 [ 16.059635] copy_user_test_oob+0x604/0x10f0 [ 16.059660] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.059683] ? finish_task_switch.isra.0+0x153/0x700 [ 16.059705] ? __switch_to+0x47/0xf50 [ 16.059730] ? __schedule+0x10cc/0x2b60 [ 16.059753] ? __pfx_read_tsc+0x10/0x10 [ 16.059774] ? ktime_get_ts64+0x86/0x230 [ 16.059798] kunit_try_run_case+0x1a5/0x480 [ 16.059823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.059846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.059870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.059894] ? __kthread_parkme+0x82/0x180 [ 16.059916] ? preempt_count_sub+0x50/0x80 [ 16.059941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.059967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.059991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.060025] kthread+0x337/0x6f0 [ 16.060046] ? trace_preempt_on+0x20/0xc0 [ 16.060068] ? __pfx_kthread+0x10/0x10 [ 16.060090] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.060111] ? calculate_sigpending+0x7b/0xa0 [ 16.060135] ? __pfx_kthread+0x10/0x10 [ 16.060158] ret_from_fork+0x116/0x1d0 [ 16.060178] ? __pfx_kthread+0x10/0x10 [ 16.060198] ret_from_fork_asm+0x1a/0x30 [ 16.060229] </TASK> [ 16.060239] [ 16.067554] Allocated by task 303: [ 16.067762] kasan_save_stack+0x45/0x70 [ 16.067962] kasan_save_track+0x18/0x40 [ 16.068164] kasan_save_alloc_info+0x3b/0x50 [ 16.068372] __kasan_kmalloc+0xb7/0xc0 [ 16.068565] __kmalloc_noprof+0x1c9/0x500 [ 16.068713] kunit_kmalloc_array+0x25/0x60 [ 16.068856] copy_user_test_oob+0xab/0x10f0 [ 16.069016] kunit_try_run_case+0x1a5/0x480 [ 16.069230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.069601] kthread+0x337/0x6f0 [ 16.069770] ret_from_fork+0x116/0x1d0 [ 16.069962] ret_from_fork_asm+0x1a/0x30 [ 16.070142] [ 16.070235] The buggy address belongs to the object at ffff888102fd1e00 [ 16.070235] which belongs to the cache kmalloc-128 of size 128 [ 16.070714] The buggy address is located 0 bytes inside of [ 16.070714] allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78) [ 16.071178] [ 16.071272] The buggy address belongs to the physical page: [ 16.071518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 16.071838] flags: 0x200000000000000(node=0|zone=2) [ 16.072039] page_type: f5(slab) [ 16.072196] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.072519] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.072836] page dumped because: kasan: bad access detected [ 16.073081] [ 16.073151] Memory state around the buggy address: [ 16.073304] ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.073761] ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.074114] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.074338] ^ [ 16.074725] ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.075151] ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.075393] ==================================================================