Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.628465] ================================================================== [ 18.628617] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 18.628677] Read of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.628732] [ 18.628764] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.628846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.628904] Hardware name: linux,dummy-virt (DT) [ 18.628946] Call trace: [ 18.628972] show_stack+0x20/0x38 (C) [ 18.629019] dump_stack_lvl+0x8c/0xd0 [ 18.629075] print_report+0x118/0x5d0 [ 18.629185] kasan_report+0xdc/0x128 [ 18.629231] kasan_check_range+0x100/0x1a8 [ 18.629278] __kasan_check_read+0x20/0x30 [ 18.629324] copy_user_test_oob+0x3c8/0xec8 [ 18.629371] kunit_try_run_case+0x170/0x3f0 [ 18.629420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.629473] kthread+0x328/0x630 [ 18.629514] ret_from_fork+0x10/0x20 [ 18.629738] [ 18.629834] Allocated by task 285: [ 18.629915] kasan_save_stack+0x3c/0x68 [ 18.629957] kasan_save_track+0x20/0x40 [ 18.630098] kasan_save_alloc_info+0x40/0x58 [ 18.630300] __kasan_kmalloc+0xd4/0xd8 [ 18.630361] __kmalloc_noprof+0x198/0x4c8 [ 18.630405] kunit_kmalloc_array+0x34/0x88 [ 18.630618] copy_user_test_oob+0xac/0xec8 [ 18.630659] kunit_try_run_case+0x170/0x3f0 [ 18.630707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.630751] kthread+0x328/0x630 [ 18.630784] ret_from_fork+0x10/0x20 [ 18.630822] [ 18.630843] The buggy address belongs to the object at fff00000c7025e00 [ 18.630843] which belongs to the cache kmalloc-128 of size 128 [ 18.630902] The buggy address is located 0 bytes inside of [ 18.630902] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.630963] [ 18.630986] The buggy address belongs to the physical page: [ 18.631025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.631080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.631126] page_type: f5(slab) [ 18.631166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.631217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.631273] page dumped because: kasan: bad access detected [ 18.631342] [ 18.631382] Memory state around the buggy address: [ 18.631730] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.631776] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.631821] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.631861] ^ [ 18.631904] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.631950] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.632005] ================================================================== [ 18.623019] ================================================================== [ 18.623097] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 18.623153] Write of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.623207] [ 18.623240] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.623325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.623354] Hardware name: linux,dummy-virt (DT) [ 18.623387] Call trace: [ 18.623414] show_stack+0x20/0x38 (C) [ 18.623479] dump_stack_lvl+0x8c/0xd0 [ 18.623528] print_report+0x118/0x5d0 [ 18.623577] kasan_report+0xdc/0x128 [ 18.623623] kasan_check_range+0x100/0x1a8 [ 18.623837] __kasan_check_write+0x20/0x30 [ 18.623970] copy_user_test_oob+0x35c/0xec8 [ 18.624129] kunit_try_run_case+0x170/0x3f0 [ 18.624191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.624246] kthread+0x328/0x630 [ 18.624288] ret_from_fork+0x10/0x20 [ 18.624363] [ 18.624421] Allocated by task 285: [ 18.624477] kasan_save_stack+0x3c/0x68 [ 18.624653] kasan_save_track+0x20/0x40 [ 18.624725] kasan_save_alloc_info+0x40/0x58 [ 18.624831] __kasan_kmalloc+0xd4/0xd8 [ 18.624891] __kmalloc_noprof+0x198/0x4c8 [ 18.625063] kunit_kmalloc_array+0x34/0x88 [ 18.625129] copy_user_test_oob+0xac/0xec8 [ 18.625179] kunit_try_run_case+0x170/0x3f0 [ 18.625221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.625268] kthread+0x328/0x630 [ 18.625302] ret_from_fork+0x10/0x20 [ 18.625386] [ 18.625472] The buggy address belongs to the object at fff00000c7025e00 [ 18.625472] which belongs to the cache kmalloc-128 of size 128 [ 18.625577] The buggy address is located 0 bytes inside of [ 18.625577] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.626474] [ 18.626507] The buggy address belongs to the physical page: [ 18.626568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.626681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.626733] page_type: f5(slab) [ 18.626773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.626824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.626870] page dumped because: kasan: bad access detected [ 18.626902] [ 18.626923] Memory state around the buggy address: [ 18.626959] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.627024] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.627135] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.627276] ^ [ 18.627466] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.627510] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.627604] ================================================================== [ 18.637205] ================================================================== [ 18.637256] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 18.637303] Read of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.637355] [ 18.637388] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.637697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.637730] Hardware name: linux,dummy-virt (DT) [ 18.637762] Call trace: [ 18.637786] show_stack+0x20/0x38 (C) [ 18.637835] dump_stack_lvl+0x8c/0xd0 [ 18.637881] print_report+0x118/0x5d0 [ 18.637927] kasan_report+0xdc/0x128 [ 18.637974] kasan_check_range+0x100/0x1a8 [ 18.638024] __kasan_check_read+0x20/0x30 [ 18.638078] copy_user_test_oob+0x4a0/0xec8 [ 18.638235] kunit_try_run_case+0x170/0x3f0 [ 18.638326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.638581] kthread+0x328/0x630 [ 18.639194] ret_from_fork+0x10/0x20 [ 18.639566] [ 18.639928] Allocated by task 285: [ 18.639980] kasan_save_stack+0x3c/0x68 [ 18.640026] kasan_save_track+0x20/0x40 [ 18.640066] kasan_save_alloc_info+0x40/0x58 [ 18.640283] __kasan_kmalloc+0xd4/0xd8 [ 18.640493] __kmalloc_noprof+0x198/0x4c8 [ 18.640534] kunit_kmalloc_array+0x34/0x88 [ 18.640573] copy_user_test_oob+0xac/0xec8 [ 18.640772] kunit_try_run_case+0x170/0x3f0 [ 18.640815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.640881] kthread+0x328/0x630 [ 18.640915] ret_from_fork+0x10/0x20 [ 18.640953] [ 18.640975] The buggy address belongs to the object at fff00000c7025e00 [ 18.640975] which belongs to the cache kmalloc-128 of size 128 [ 18.641342] The buggy address is located 0 bytes inside of [ 18.641342] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.641408] [ 18.641430] The buggy address belongs to the physical page: [ 18.641462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.641515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.641567] page_type: f5(slab) [ 18.641606] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.641884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.642051] page dumped because: kasan: bad access detected [ 18.642087] [ 18.642109] Memory state around the buggy address: [ 18.642168] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.642533] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.642695] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.642736] ^ [ 18.642782] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643072] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643135] ================================================================== [ 18.632329] ================================================================== [ 18.632382] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 18.632430] Write of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.632482] [ 18.632523] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.632606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.632635] Hardware name: linux,dummy-virt (DT) [ 18.632680] Call trace: [ 18.632703] show_stack+0x20/0x38 (C) [ 18.632750] dump_stack_lvl+0x8c/0xd0 [ 18.632808] print_report+0x118/0x5d0 [ 18.632856] kasan_report+0xdc/0x128 [ 18.632901] kasan_check_range+0x100/0x1a8 [ 18.632961] __kasan_check_write+0x20/0x30 [ 18.633008] copy_user_test_oob+0x434/0xec8 [ 18.633056] kunit_try_run_case+0x170/0x3f0 [ 18.633102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.633156] kthread+0x328/0x630 [ 18.633197] ret_from_fork+0x10/0x20 [ 18.633262] [ 18.633285] Allocated by task 285: [ 18.633313] kasan_save_stack+0x3c/0x68 [ 18.633354] kasan_save_track+0x20/0x40 [ 18.633393] kasan_save_alloc_info+0x40/0x58 [ 18.633435] __kasan_kmalloc+0xd4/0xd8 [ 18.633473] __kmalloc_noprof+0x198/0x4c8 [ 18.633514] kunit_kmalloc_array+0x34/0x88 [ 18.633553] copy_user_test_oob+0xac/0xec8 [ 18.633592] kunit_try_run_case+0x170/0x3f0 [ 18.633637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.633878] kthread+0x328/0x630 [ 18.633920] ret_from_fork+0x10/0x20 [ 18.634077] [ 18.634103] The buggy address belongs to the object at fff00000c7025e00 [ 18.634103] which belongs to the cache kmalloc-128 of size 128 [ 18.634260] The buggy address is located 0 bytes inside of [ 18.634260] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.634437] [ 18.634458] The buggy address belongs to the physical page: [ 18.634495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.635288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.635735] page_type: f5(slab) [ 18.635847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.635973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.636081] page dumped because: kasan: bad access detected [ 18.636135] [ 18.636256] Memory state around the buggy address: [ 18.636290] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.636342] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636391] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.636709] ^ [ 18.636752] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636797] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.636838] ================================================================== [ 18.606827] ================================================================== [ 18.606889] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 18.606943] Read of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.606996] [ 18.608248] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.608354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.608691] Hardware name: linux,dummy-virt (DT) [ 18.609297] Call trace: [ 18.609414] show_stack+0x20/0x38 (C) [ 18.609831] dump_stack_lvl+0x8c/0xd0 [ 18.610066] print_report+0x118/0x5d0 [ 18.610318] kasan_report+0xdc/0x128 [ 18.610423] kasan_check_range+0x100/0x1a8 [ 18.610616] __kasan_check_read+0x20/0x30 [ 18.610782] copy_user_test_oob+0x728/0xec8 [ 18.611029] kunit_try_run_case+0x170/0x3f0 [ 18.611143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.611308] kthread+0x328/0x630 [ 18.611585] ret_from_fork+0x10/0x20 [ 18.611705] [ 18.611778] Allocated by task 285: [ 18.611842] kasan_save_stack+0x3c/0x68 [ 18.612200] kasan_save_track+0x20/0x40 [ 18.612368] kasan_save_alloc_info+0x40/0x58 [ 18.612449] __kasan_kmalloc+0xd4/0xd8 [ 18.612605] __kmalloc_noprof+0x198/0x4c8 [ 18.612647] kunit_kmalloc_array+0x34/0x88 [ 18.612973] copy_user_test_oob+0xac/0xec8 [ 18.613034] kunit_try_run_case+0x170/0x3f0 [ 18.613077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.613123] kthread+0x328/0x630 [ 18.613157] ret_from_fork+0x10/0x20 [ 18.613195] [ 18.613218] The buggy address belongs to the object at fff00000c7025e00 [ 18.613218] which belongs to the cache kmalloc-128 of size 128 [ 18.613280] The buggy address is located 0 bytes inside of [ 18.613280] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.613345] [ 18.613369] The buggy address belongs to the physical page: [ 18.613499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.613582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.613634] page_type: f5(slab) [ 18.613696] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.613760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.613819] page dumped because: kasan: bad access detected [ 18.613852] [ 18.613872] Memory state around the buggy address: [ 18.613906] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.613952] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.614007] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.614057] ^ [ 18.614099] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.614143] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.614185] ================================================================== [ 18.589773] ================================================================== [ 18.590052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 18.590467] Write of size 121 at addr fff00000c7025e00 by task kunit_try_catch/285 [ 18.590545] [ 18.590892] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.591007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.591038] Hardware name: linux,dummy-virt (DT) [ 18.591425] Call trace: [ 18.591493] show_stack+0x20/0x38 (C) [ 18.591731] dump_stack_lvl+0x8c/0xd0 [ 18.592085] print_report+0x118/0x5d0 [ 18.592190] kasan_report+0xdc/0x128 [ 18.592258] kasan_check_range+0x100/0x1a8 [ 18.592604] __kasan_check_write+0x20/0x30 [ 18.592728] copy_user_test_oob+0x234/0xec8 [ 18.592842] kunit_try_run_case+0x170/0x3f0 [ 18.593206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.593544] kthread+0x328/0x630 [ 18.593652] ret_from_fork+0x10/0x20 [ 18.594095] [ 18.594144] Allocated by task 285: [ 18.594232] kasan_save_stack+0x3c/0x68 [ 18.594329] kasan_save_track+0x20/0x40 [ 18.594482] kasan_save_alloc_info+0x40/0x58 [ 18.594541] __kasan_kmalloc+0xd4/0xd8 [ 18.594930] __kmalloc_noprof+0x198/0x4c8 [ 18.595063] kunit_kmalloc_array+0x34/0x88 [ 18.595156] copy_user_test_oob+0xac/0xec8 [ 18.595322] kunit_try_run_case+0x170/0x3f0 [ 18.595725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.595808] kthread+0x328/0x630 [ 18.595950] ret_from_fork+0x10/0x20 [ 18.596028] [ 18.596142] The buggy address belongs to the object at fff00000c7025e00 [ 18.596142] which belongs to the cache kmalloc-128 of size 128 [ 18.596209] The buggy address is located 0 bytes inside of [ 18.596209] allocated 120-byte region [fff00000c7025e00, fff00000c7025e78) [ 18.596274] [ 18.597086] The buggy address belongs to the physical page: [ 18.597231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025 [ 18.597328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.597894] page_type: f5(slab) [ 18.598004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.598070] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.598204] page dumped because: kasan: bad access detected [ 18.598265] [ 18.598286] Memory state around the buggy address: [ 18.598371] fff00000c7025d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.598741] fff00000c7025d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.598951] >fff00000c7025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.599037] ^ [ 18.599371] fff00000c7025e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.599544] fff00000c7025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.599612] ==================================================================
[ 16.404614] ================================================================== [ 16.405085] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.405332] Read of size 121 at addr ffff888102ad4e00 by task kunit_try_catch/303 [ 16.405698] [ 16.405803] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.405845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.405857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.405878] Call Trace: [ 16.405892] <TASK> [ 16.405917] dump_stack_lvl+0x73/0xb0 [ 16.405944] print_report+0xd1/0x610 [ 16.405965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.405988] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.406011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.406033] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.406056] kasan_report+0x141/0x180 [ 16.406078] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.406106] kasan_check_range+0x10c/0x1c0 [ 16.406129] __kasan_check_read+0x15/0x20 [ 16.406148] copy_user_test_oob+0x4aa/0x10f0 [ 16.406174] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.406197] ? finish_task_switch.isra.0+0x153/0x700 [ 16.406220] ? __switch_to+0x47/0xf50 [ 16.406245] ? __schedule+0x10cc/0x2b60 [ 16.406268] ? __pfx_read_tsc+0x10/0x10 [ 16.406288] ? ktime_get_ts64+0x86/0x230 [ 16.406311] kunit_try_run_case+0x1a5/0x480 [ 16.406335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.406357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.406379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.406402] ? __kthread_parkme+0x82/0x180 [ 16.406422] ? preempt_count_sub+0x50/0x80 [ 16.406445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.406470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.406493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.406516] kthread+0x337/0x6f0 [ 16.406536] ? trace_preempt_on+0x20/0xc0 [ 16.406558] ? __pfx_kthread+0x10/0x10 [ 16.406579] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.406600] ? calculate_sigpending+0x7b/0xa0 [ 16.406624] ? __pfx_kthread+0x10/0x10 [ 16.406645] ret_from_fork+0x116/0x1d0 [ 16.406663] ? __pfx_kthread+0x10/0x10 [ 16.406694] ret_from_fork_asm+0x1a/0x30 [ 16.406724] </TASK> [ 16.406734] [ 16.413925] Allocated by task 303: [ 16.414106] kasan_save_stack+0x45/0x70 [ 16.414316] kasan_save_track+0x18/0x40 [ 16.414512] kasan_save_alloc_info+0x3b/0x50 [ 16.414681] __kasan_kmalloc+0xb7/0xc0 [ 16.414848] __kmalloc_noprof+0x1c9/0x500 [ 16.415019] kunit_kmalloc_array+0x25/0x60 [ 16.415232] copy_user_test_oob+0xab/0x10f0 [ 16.415408] kunit_try_run_case+0x1a5/0x480 [ 16.415555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.415757] kthread+0x337/0x6f0 [ 16.415948] ret_from_fork+0x116/0x1d0 [ 16.416136] ret_from_fork_asm+0x1a/0x30 [ 16.416331] [ 16.416427] The buggy address belongs to the object at ffff888102ad4e00 [ 16.416427] which belongs to the cache kmalloc-128 of size 128 [ 16.416965] The buggy address is located 0 bytes inside of [ 16.416965] allocated 120-byte region [ffff888102ad4e00, ffff888102ad4e78) [ 16.417381] [ 16.417480] The buggy address belongs to the physical page: [ 16.417789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.418092] flags: 0x200000000000000(node=0|zone=2) [ 16.418316] page_type: f5(slab) [ 16.418451] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.418682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.419030] page dumped because: kasan: bad access detected [ 16.419307] [ 16.419399] Memory state around the buggy address: [ 16.419571] ffff888102ad4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.419961] ffff888102ad4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.420220] >ffff888102ad4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.420514] ^ [ 16.420840] ffff888102ad4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.421146] ffff888102ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.421426] ================================================================== [ 16.387312] ================================================================== [ 16.387646] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.388057] Write of size 121 at addr ffff888102ad4e00 by task kunit_try_catch/303 [ 16.388373] [ 16.388495] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.388539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.388563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.388585] Call Trace: [ 16.388597] <TASK> [ 16.388614] dump_stack_lvl+0x73/0xb0 [ 16.388641] print_report+0xd1/0x610 [ 16.388673] ? __virt_addr_valid+0x1db/0x2d0 [ 16.388695] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.388718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.388752] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.388776] kasan_report+0x141/0x180 [ 16.388798] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.388826] kasan_check_range+0x10c/0x1c0 [ 16.388849] __kasan_check_write+0x18/0x20 [ 16.388869] copy_user_test_oob+0x3fd/0x10f0 [ 16.388894] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.388925] ? finish_task_switch.isra.0+0x153/0x700 [ 16.388947] ? __switch_to+0x47/0xf50 [ 16.388973] ? __schedule+0x10cc/0x2b60 [ 16.389004] ? __pfx_read_tsc+0x10/0x10 [ 16.389025] ? ktime_get_ts64+0x86/0x230 [ 16.389049] kunit_try_run_case+0x1a5/0x480 [ 16.389078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.389101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.389123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.389147] ? __kthread_parkme+0x82/0x180 [ 16.389167] ? preempt_count_sub+0x50/0x80 [ 16.389190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.389214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.389238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.389263] kthread+0x337/0x6f0 [ 16.389283] ? trace_preempt_on+0x20/0xc0 [ 16.389304] ? __pfx_kthread+0x10/0x10 [ 16.389325] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.389346] ? calculate_sigpending+0x7b/0xa0 [ 16.389370] ? __pfx_kthread+0x10/0x10 [ 16.389392] ret_from_fork+0x116/0x1d0 [ 16.389410] ? __pfx_kthread+0x10/0x10 [ 16.389431] ret_from_fork_asm+0x1a/0x30 [ 16.389462] </TASK> [ 16.389472] [ 16.396390] Allocated by task 303: [ 16.396521] kasan_save_stack+0x45/0x70 [ 16.396665] kasan_save_track+0x18/0x40 [ 16.396865] kasan_save_alloc_info+0x3b/0x50 [ 16.397089] __kasan_kmalloc+0xb7/0xc0 [ 16.397276] __kmalloc_noprof+0x1c9/0x500 [ 16.397482] kunit_kmalloc_array+0x25/0x60 [ 16.397695] copy_user_test_oob+0xab/0x10f0 [ 16.397915] kunit_try_run_case+0x1a5/0x480 [ 16.398104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398316] kthread+0x337/0x6f0 [ 16.398486] ret_from_fork+0x116/0x1d0 [ 16.398653] ret_from_fork_asm+0x1a/0x30 [ 16.398867] [ 16.398961] The buggy address belongs to the object at ffff888102ad4e00 [ 16.398961] which belongs to the cache kmalloc-128 of size 128 [ 16.399429] The buggy address is located 0 bytes inside of [ 16.399429] allocated 120-byte region [ffff888102ad4e00, ffff888102ad4e78) [ 16.399945] [ 16.400024] The buggy address belongs to the physical page: [ 16.400238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.400551] flags: 0x200000000000000(node=0|zone=2) [ 16.400812] page_type: f5(slab) [ 16.400970] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.401280] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.401509] page dumped because: kasan: bad access detected [ 16.401687] [ 16.401785] Memory state around the buggy address: [ 16.402142] ffff888102ad4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.402462] ffff888102ad4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.402775] >ffff888102ad4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.403132] ^ [ 16.403389] ffff888102ad4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403687] ffff888102ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403961] ================================================================== [ 16.421883] ================================================================== [ 16.422190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.422553] Write of size 121 at addr ffff888102ad4e00 by task kunit_try_catch/303 [ 16.422857] [ 16.422948] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.422990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.423002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.423023] Call Trace: [ 16.423036] <TASK> [ 16.423054] dump_stack_lvl+0x73/0xb0 [ 16.423081] print_report+0xd1/0x610 [ 16.423102] ? __virt_addr_valid+0x1db/0x2d0 [ 16.423124] ? copy_user_test_oob+0x557/0x10f0 [ 16.423148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.423170] ? copy_user_test_oob+0x557/0x10f0 [ 16.423193] kasan_report+0x141/0x180 [ 16.423216] ? copy_user_test_oob+0x557/0x10f0 [ 16.423243] kasan_check_range+0x10c/0x1c0 [ 16.423267] __kasan_check_write+0x18/0x20 [ 16.423288] copy_user_test_oob+0x557/0x10f0 [ 16.423313] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.423336] ? finish_task_switch.isra.0+0x153/0x700 [ 16.423358] ? __switch_to+0x47/0xf50 [ 16.423382] ? __schedule+0x10cc/0x2b60 [ 16.423405] ? __pfx_read_tsc+0x10/0x10 [ 16.423426] ? ktime_get_ts64+0x86/0x230 [ 16.423450] kunit_try_run_case+0x1a5/0x480 [ 16.423474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.423496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.423518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.423543] ? __kthread_parkme+0x82/0x180 [ 16.423563] ? preempt_count_sub+0x50/0x80 [ 16.423585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.423609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.423633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.423655] kthread+0x337/0x6f0 [ 16.423675] ? trace_preempt_on+0x20/0xc0 [ 16.423697] ? __pfx_kthread+0x10/0x10 [ 16.423718] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.423739] ? calculate_sigpending+0x7b/0xa0 [ 16.423763] ? __pfx_kthread+0x10/0x10 [ 16.423785] ret_from_fork+0x116/0x1d0 [ 16.423811] ? __pfx_kthread+0x10/0x10 [ 16.423832] ret_from_fork_asm+0x1a/0x30 [ 16.423862] </TASK> [ 16.423872] [ 16.431284] Allocated by task 303: [ 16.431411] kasan_save_stack+0x45/0x70 [ 16.431554] kasan_save_track+0x18/0x40 [ 16.431689] kasan_save_alloc_info+0x3b/0x50 [ 16.431836] __kasan_kmalloc+0xb7/0xc0 [ 16.432023] __kmalloc_noprof+0x1c9/0x500 [ 16.432227] kunit_kmalloc_array+0x25/0x60 [ 16.432431] copy_user_test_oob+0xab/0x10f0 [ 16.432636] kunit_try_run_case+0x1a5/0x480 [ 16.432842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.433107] kthread+0x337/0x6f0 [ 16.433236] ret_from_fork+0x116/0x1d0 [ 16.433368] ret_from_fork_asm+0x1a/0x30 [ 16.433507] [ 16.433577] The buggy address belongs to the object at ffff888102ad4e00 [ 16.433577] which belongs to the cache kmalloc-128 of size 128 [ 16.433939] The buggy address is located 0 bytes inside of [ 16.433939] allocated 120-byte region [ffff888102ad4e00, ffff888102ad4e78) [ 16.435121] [ 16.435220] The buggy address belongs to the physical page: [ 16.435475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.435796] flags: 0x200000000000000(node=0|zone=2) [ 16.435968] page_type: f5(slab) [ 16.436088] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.436319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.436543] page dumped because: kasan: bad access detected [ 16.436716] [ 16.436784] Memory state around the buggy address: [ 16.436957] ffff888102ad4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.437283] ffff888102ad4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.437602] >ffff888102ad4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.438253] ^ [ 16.438566] ffff888102ad4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.439170] ffff888102ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.439485] ================================================================== [ 16.440053] ================================================================== [ 16.440379] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.440672] Read of size 121 at addr ffff888102ad4e00 by task kunit_try_catch/303 [ 16.440944] [ 16.441030] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.441070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.441082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.441104] Call Trace: [ 16.441117] <TASK> [ 16.441137] dump_stack_lvl+0x73/0xb0 [ 16.441162] print_report+0xd1/0x610 [ 16.441184] ? __virt_addr_valid+0x1db/0x2d0 [ 16.441207] ? copy_user_test_oob+0x604/0x10f0 [ 16.441230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.441253] ? copy_user_test_oob+0x604/0x10f0 [ 16.441276] kasan_report+0x141/0x180 [ 16.441298] ? copy_user_test_oob+0x604/0x10f0 [ 16.441325] kasan_check_range+0x10c/0x1c0 [ 16.441349] __kasan_check_read+0x15/0x20 [ 16.441368] copy_user_test_oob+0x604/0x10f0 [ 16.441393] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.441415] ? finish_task_switch.isra.0+0x153/0x700 [ 16.441438] ? __switch_to+0x47/0xf50 [ 16.441463] ? __schedule+0x10cc/0x2b60 [ 16.441485] ? __pfx_read_tsc+0x10/0x10 [ 16.441506] ? ktime_get_ts64+0x86/0x230 [ 16.441530] kunit_try_run_case+0x1a5/0x480 [ 16.441554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.441576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.441598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.441622] ? __kthread_parkme+0x82/0x180 [ 16.441642] ? preempt_count_sub+0x50/0x80 [ 16.441665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.441689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.441735] kthread+0x337/0x6f0 [ 16.441755] ? trace_preempt_on+0x20/0xc0 [ 16.441777] ? __pfx_kthread+0x10/0x10 [ 16.441798] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.441819] ? calculate_sigpending+0x7b/0xa0 [ 16.441842] ? __pfx_kthread+0x10/0x10 [ 16.441864] ret_from_fork+0x116/0x1d0 [ 16.441882] ? __pfx_kthread+0x10/0x10 [ 16.441903] ret_from_fork_asm+0x1a/0x30 [ 16.441942] </TASK> [ 16.441953] [ 16.454363] Allocated by task 303: [ 16.454801] kasan_save_stack+0x45/0x70 [ 16.455129] kasan_save_track+0x18/0x40 [ 16.455295] kasan_save_alloc_info+0x3b/0x50 [ 16.455506] __kasan_kmalloc+0xb7/0xc0 [ 16.455926] __kmalloc_noprof+0x1c9/0x500 [ 16.456119] kunit_kmalloc_array+0x25/0x60 [ 16.456430] copy_user_test_oob+0xab/0x10f0 [ 16.456629] kunit_try_run_case+0x1a5/0x480 [ 16.456955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.457365] kthread+0x337/0x6f0 [ 16.457528] ret_from_fork+0x116/0x1d0 [ 16.457808] ret_from_fork_asm+0x1a/0x30 [ 16.457979] [ 16.458070] The buggy address belongs to the object at ffff888102ad4e00 [ 16.458070] which belongs to the cache kmalloc-128 of size 128 [ 16.458586] The buggy address is located 0 bytes inside of [ 16.458586] allocated 120-byte region [ffff888102ad4e00, ffff888102ad4e78) [ 16.459346] [ 16.459641] The buggy address belongs to the physical page: [ 16.460029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 16.460410] flags: 0x200000000000000(node=0|zone=2) [ 16.460695] page_type: f5(slab) [ 16.460929] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.461262] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.461570] page dumped because: kasan: bad access detected [ 16.462020] [ 16.462110] Memory state around the buggy address: [ 16.462452] ffff888102ad4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.462969] ffff888102ad4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.463371] >ffff888102ad4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.463677] ^ [ 16.463987] ffff888102ad4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464290] ffff888102ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464600] ==================================================================