Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.566461] ================================================================== [ 18.566522] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 18.566575] Write of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.566629] [ 18.566659] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.566807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.566866] Hardware name: linux,dummy-virt (DT) [ 18.566898] Call trace: [ 18.566921] show_stack+0x20/0x38 (C) [ 18.566970] dump_stack_lvl+0x8c/0xd0 [ 18.567031] print_report+0x118/0x5d0 [ 18.567077] kasan_report+0xdc/0x128 [ 18.567122] kasan_check_range+0x100/0x1a8 [ 18.567171] __kasan_check_write+0x20/0x30 [ 18.567216] copy_user_test_oob+0x35c/0xec8 [ 18.567447] kunit_try_run_case+0x170/0x3f0 [ 18.567498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.567552] kthread+0x328/0x630 [ 18.567844] ret_from_fork+0x10/0x20 [ 18.567894] [ 18.567913] Allocated by task 286: [ 18.567941] kasan_save_stack+0x3c/0x68 [ 18.567994] kasan_save_track+0x20/0x40 [ 18.568035] kasan_save_alloc_info+0x40/0x58 [ 18.568076] __kasan_kmalloc+0xd4/0xd8 [ 18.568115] __kmalloc_noprof+0x198/0x4c8 [ 18.568161] kunit_kmalloc_array+0x34/0x88 [ 18.568364] copy_user_test_oob+0xac/0xec8 [ 18.568555] kunit_try_run_case+0x170/0x3f0 [ 18.568745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.568849] kthread+0x328/0x630 [ 18.568883] ret_from_fork+0x10/0x20 [ 18.568921] [ 18.568942] The buggy address belongs to the object at fff00000c65eec00 [ 18.568942] which belongs to the cache kmalloc-128 of size 128 [ 18.569013] The buggy address is located 0 bytes inside of [ 18.569013] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.569080] [ 18.569101] The buggy address belongs to the physical page: [ 18.569134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.569188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.569264] page_type: f5(slab) [ 18.569384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.569438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.569482] page dumped because: kasan: bad access detected [ 18.569515] [ 18.569536] Memory state around the buggy address: [ 18.569569] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.569617] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569665] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.569709] ^ [ 18.569755] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569801] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569861] ================================================================== [ 18.575523] ================================================================== [ 18.575571] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 18.575618] Write of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.575692] [ 18.575760] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.575844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.575874] Hardware name: linux,dummy-virt (DT) [ 18.575907] Call trace: [ 18.575929] show_stack+0x20/0x38 (C) [ 18.575976] dump_stack_lvl+0x8c/0xd0 [ 18.576034] print_report+0x118/0x5d0 [ 18.576081] kasan_report+0xdc/0x128 [ 18.576126] kasan_check_range+0x100/0x1a8 [ 18.576174] __kasan_check_write+0x20/0x30 [ 18.576221] copy_user_test_oob+0x434/0xec8 [ 18.576267] kunit_try_run_case+0x170/0x3f0 [ 18.576379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.576588] kthread+0x328/0x630 [ 18.576632] ret_from_fork+0x10/0x20 [ 18.576960] [ 18.577058] Allocated by task 286: [ 18.577100] kasan_save_stack+0x3c/0x68 [ 18.577143] kasan_save_track+0x20/0x40 [ 18.577224] kasan_save_alloc_info+0x40/0x58 [ 18.577436] __kasan_kmalloc+0xd4/0xd8 [ 18.577477] __kmalloc_noprof+0x198/0x4c8 [ 18.577542] kunit_kmalloc_array+0x34/0x88 [ 18.577582] copy_user_test_oob+0xac/0xec8 [ 18.577686] kunit_try_run_case+0x170/0x3f0 [ 18.577769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.577815] kthread+0x328/0x630 [ 18.577849] ret_from_fork+0x10/0x20 [ 18.577887] [ 18.577908] The buggy address belongs to the object at fff00000c65eec00 [ 18.577908] which belongs to the cache kmalloc-128 of size 128 [ 18.577969] The buggy address is located 0 bytes inside of [ 18.577969] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.578047] [ 18.578071] The buggy address belongs to the physical page: [ 18.578105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.578160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.578209] page_type: f5(slab) [ 18.578247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.578302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.578392] page dumped because: kasan: bad access detected [ 18.578479] [ 18.578562] Memory state around the buggy address: [ 18.578604] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.578693] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.578936] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.578988] ^ [ 18.579045] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.579096] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.579289] ================================================================== [ 18.570344] ================================================================== [ 18.570660] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 18.570811] Read of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.570864] [ 18.570895] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.570990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.571020] Hardware name: linux,dummy-virt (DT) [ 18.571052] Call trace: [ 18.571077] show_stack+0x20/0x38 (C) [ 18.571123] dump_stack_lvl+0x8c/0xd0 [ 18.571169] print_report+0x118/0x5d0 [ 18.571257] kasan_report+0xdc/0x128 [ 18.571305] kasan_check_range+0x100/0x1a8 [ 18.571492] __kasan_check_read+0x20/0x30 [ 18.571540] copy_user_test_oob+0x3c8/0xec8 [ 18.571589] kunit_try_run_case+0x170/0x3f0 [ 18.571644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.571884] kthread+0x328/0x630 [ 18.572445] ret_from_fork+0x10/0x20 [ 18.572607] [ 18.572722] Allocated by task 286: [ 18.572758] kasan_save_stack+0x3c/0x68 [ 18.572883] kasan_save_track+0x20/0x40 [ 18.572933] kasan_save_alloc_info+0x40/0x58 [ 18.573006] __kasan_kmalloc+0xd4/0xd8 [ 18.573143] __kmalloc_noprof+0x198/0x4c8 [ 18.573184] kunit_kmalloc_array+0x34/0x88 [ 18.573233] copy_user_test_oob+0xac/0xec8 [ 18.573271] kunit_try_run_case+0x170/0x3f0 [ 18.573327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.573373] kthread+0x328/0x630 [ 18.573532] ret_from_fork+0x10/0x20 [ 18.573716] [ 18.573748] The buggy address belongs to the object at fff00000c65eec00 [ 18.573748] which belongs to the cache kmalloc-128 of size 128 [ 18.573837] The buggy address is located 0 bytes inside of [ 18.573837] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.574159] [ 18.574211] The buggy address belongs to the physical page: [ 18.574243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.574296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.574345] page_type: f5(slab) [ 18.574391] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.574650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.574860] page dumped because: kasan: bad access detected [ 18.575000] [ 18.575020] Memory state around the buggy address: [ 18.575054] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.575101] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575147] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.575187] ^ [ 18.575231] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575276] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575317] ================================================================== [ 18.558657] ================================================================== [ 18.558720] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 18.558774] Read of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.558829] [ 18.558863] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.558947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.558976] Hardware name: linux,dummy-virt (DT) [ 18.559035] Call trace: [ 18.559108] show_stack+0x20/0x38 (C) [ 18.559159] dump_stack_lvl+0x8c/0xd0 [ 18.559207] print_report+0x118/0x5d0 [ 18.559254] kasan_report+0xdc/0x128 [ 18.559300] kasan_check_range+0x100/0x1a8 [ 18.559348] __kasan_check_read+0x20/0x30 [ 18.559394] copy_user_test_oob+0x728/0xec8 [ 18.559445] kunit_try_run_case+0x170/0x3f0 [ 18.559493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.559546] kthread+0x328/0x630 [ 18.559677] ret_from_fork+0x10/0x20 [ 18.559772] [ 18.559792] Allocated by task 286: [ 18.559887] kasan_save_stack+0x3c/0x68 [ 18.559937] kasan_save_track+0x20/0x40 [ 18.560330] kasan_save_alloc_info+0x40/0x58 [ 18.560417] __kasan_kmalloc+0xd4/0xd8 [ 18.560457] __kmalloc_noprof+0x198/0x4c8 [ 18.560518] kunit_kmalloc_array+0x34/0x88 [ 18.560559] copy_user_test_oob+0xac/0xec8 [ 18.560597] kunit_try_run_case+0x170/0x3f0 [ 18.560638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.560684] kthread+0x328/0x630 [ 18.560718] ret_from_fork+0x10/0x20 [ 18.560756] [ 18.560802] The buggy address belongs to the object at fff00000c65eec00 [ 18.560802] which belongs to the cache kmalloc-128 of size 128 [ 18.560916] The buggy address is located 0 bytes inside of [ 18.560916] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.561196] [ 18.561219] The buggy address belongs to the physical page: [ 18.561252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.561306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.561357] page_type: f5(slab) [ 18.561396] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.561448] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.561519] page dumped because: kasan: bad access detected [ 18.561691] [ 18.561760] Memory state around the buggy address: [ 18.561849] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.561956] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562011] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.562075] ^ [ 18.562120] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562166] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562208] ================================================================== [ 18.549370] ================================================================== [ 18.549680] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 18.549761] Write of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.549819] [ 18.549858] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.549948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.549990] Hardware name: linux,dummy-virt (DT) [ 18.550025] Call trace: [ 18.550049] show_stack+0x20/0x38 (C) [ 18.550101] dump_stack_lvl+0x8c/0xd0 [ 18.550154] print_report+0x118/0x5d0 [ 18.550205] kasan_report+0xdc/0x128 [ 18.550259] kasan_check_range+0x100/0x1a8 [ 18.550353] __kasan_check_write+0x20/0x30 [ 18.550401] copy_user_test_oob+0x234/0xec8 [ 18.550448] kunit_try_run_case+0x170/0x3f0 [ 18.550499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.550554] kthread+0x328/0x630 [ 18.550599] ret_from_fork+0x10/0x20 [ 18.550664] [ 18.550684] Allocated by task 286: [ 18.550718] kasan_save_stack+0x3c/0x68 [ 18.550760] kasan_save_track+0x20/0x40 [ 18.550800] kasan_save_alloc_info+0x40/0x58 [ 18.550843] __kasan_kmalloc+0xd4/0xd8 [ 18.550880] __kmalloc_noprof+0x198/0x4c8 [ 18.550921] kunit_kmalloc_array+0x34/0x88 [ 18.550961] copy_user_test_oob+0xac/0xec8 [ 18.551012] kunit_try_run_case+0x170/0x3f0 [ 18.551060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.551106] kthread+0x328/0x630 [ 18.551290] ret_from_fork+0x10/0x20 [ 18.551490] [ 18.551602] The buggy address belongs to the object at fff00000c65eec00 [ 18.551602] which belongs to the cache kmalloc-128 of size 128 [ 18.551667] The buggy address is located 0 bytes inside of [ 18.551667] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.551733] [ 18.551757] The buggy address belongs to the physical page: [ 18.551799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.552483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.552667] page_type: f5(slab) [ 18.552747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.552865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.552929] page dumped because: kasan: bad access detected [ 18.552964] [ 18.552993] Memory state around the buggy address: [ 18.553028] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.553073] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.553120] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.553162] ^ [ 18.553206] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.553251] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.553293] ================================================================== [ 18.579824] ================================================================== [ 18.579884] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 18.580021] Read of size 121 at addr fff00000c65eec00 by task kunit_try_catch/286 [ 18.580074] [ 18.580105] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.580188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.580218] Hardware name: linux,dummy-virt (DT) [ 18.580249] Call trace: [ 18.580271] show_stack+0x20/0x38 (C) [ 18.580320] dump_stack_lvl+0x8c/0xd0 [ 18.580365] print_report+0x118/0x5d0 [ 18.580412] kasan_report+0xdc/0x128 [ 18.580459] kasan_check_range+0x100/0x1a8 [ 18.580508] __kasan_check_read+0x20/0x30 [ 18.580553] copy_user_test_oob+0x4a0/0xec8 [ 18.580599] kunit_try_run_case+0x170/0x3f0 [ 18.580648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.580804] kthread+0x328/0x630 [ 18.580855] ret_from_fork+0x10/0x20 [ 18.580903] [ 18.580923] Allocated by task 286: [ 18.580952] kasan_save_stack+0x3c/0x68 [ 18.581020] kasan_save_track+0x20/0x40 [ 18.581062] kasan_save_alloc_info+0x40/0x58 [ 18.581105] __kasan_kmalloc+0xd4/0xd8 [ 18.581145] __kmalloc_noprof+0x198/0x4c8 [ 18.581200] kunit_kmalloc_array+0x34/0x88 [ 18.581239] copy_user_test_oob+0xac/0xec8 [ 18.581279] kunit_try_run_case+0x170/0x3f0 [ 18.581319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.581364] kthread+0x328/0x630 [ 18.581397] ret_from_fork+0x10/0x20 [ 18.581436] [ 18.581456] The buggy address belongs to the object at fff00000c65eec00 [ 18.581456] which belongs to the cache kmalloc-128 of size 128 [ 18.581535] The buggy address is located 0 bytes inside of [ 18.581535] allocated 120-byte region [fff00000c65eec00, fff00000c65eec78) [ 18.581612] [ 18.581633] The buggy address belongs to the physical page: [ 18.581667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 18.581720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.581768] page_type: f5(slab) [ 18.581807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.581858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.581901] page dumped because: kasan: bad access detected [ 18.581936] [ 18.581956] Memory state around the buggy address: [ 18.582000] fff00000c65eeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.582046] fff00000c65eeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.582092] >fff00000c65eec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.582133] ^ [ 18.582186] fff00000c65eec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.582232] fff00000c65eed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.582273] ==================================================================
[ 17.219412] ================================================================== [ 17.219795] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 17.220042] Read of size 121 at addr ffff8881025ccc00 by task kunit_try_catch/302 [ 17.220408] [ 17.220491] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.220533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.220546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.220579] Call Trace: [ 17.220594] <TASK> [ 17.220610] dump_stack_lvl+0x73/0xb0 [ 17.220636] print_report+0xd1/0x610 [ 17.220659] ? __virt_addr_valid+0x1db/0x2d0 [ 17.220682] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.220706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.220730] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.220755] kasan_report+0x141/0x180 [ 17.220777] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.220805] kasan_check_range+0x10c/0x1c0 [ 17.220830] __kasan_check_read+0x15/0x20 [ 17.220862] copy_user_test_oob+0x4aa/0x10f0 [ 17.220890] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.220916] ? __kasan_check_write+0x18/0x20 [ 17.220937] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.220963] ? irqentry_exit+0x2a/0x60 [ 17.220986] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.221012] ? trace_hardirqs_on+0x37/0xe0 [ 17.221037] ? __pfx_read_tsc+0x10/0x10 [ 17.221060] ? ktime_get_ts64+0x86/0x230 [ 17.221085] kunit_try_run_case+0x1a5/0x480 [ 17.221110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.221137] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.221163] ? __kthread_parkme+0x82/0x180 [ 17.221185] ? preempt_count_sub+0x50/0x80 [ 17.221209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.221236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.221262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.221289] kthread+0x337/0x6f0 [ 17.221309] ? trace_preempt_on+0x20/0xc0 [ 17.221333] ? __pfx_kthread+0x10/0x10 [ 17.221355] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.221378] ? calculate_sigpending+0x7b/0xa0 [ 17.221403] ? __pfx_kthread+0x10/0x10 [ 17.221426] ret_from_fork+0x116/0x1d0 [ 17.221446] ? __pfx_kthread+0x10/0x10 [ 17.221468] ret_from_fork_asm+0x1a/0x30 [ 17.221500] </TASK> [ 17.221510] [ 17.229084] Allocated by task 302: [ 17.229265] kasan_save_stack+0x45/0x70 [ 17.229536] kasan_save_track+0x18/0x40 [ 17.229694] kasan_save_alloc_info+0x3b/0x50 [ 17.229845] __kasan_kmalloc+0xb7/0xc0 [ 17.229981] __kmalloc_noprof+0x1c9/0x500 [ 17.230122] kunit_kmalloc_array+0x25/0x60 [ 17.230268] copy_user_test_oob+0xab/0x10f0 [ 17.230415] kunit_try_run_case+0x1a5/0x480 [ 17.230677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.230932] kthread+0x337/0x6f0 [ 17.231101] ret_from_fork+0x116/0x1d0 [ 17.231286] ret_from_fork_asm+0x1a/0x30 [ 17.231481] [ 17.231589] The buggy address belongs to the object at ffff8881025ccc00 [ 17.231589] which belongs to the cache kmalloc-128 of size 128 [ 17.232195] The buggy address is located 0 bytes inside of [ 17.232195] allocated 120-byte region [ffff8881025ccc00, ffff8881025ccc78) [ 17.232546] [ 17.232625] The buggy address belongs to the physical page: [ 17.232795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 17.233523] flags: 0x200000000000000(node=0|zone=2) [ 17.233768] page_type: f5(slab) [ 17.233940] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.234291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.234735] page dumped because: kasan: bad access detected [ 17.234984] [ 17.235064] Memory state around the buggy address: [ 17.235274] ffff8881025ccb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.235613] ffff8881025ccb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.235889] >ffff8881025ccc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.236202] ^ [ 17.236536] ffff8881025ccc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.236814] ffff8881025ccd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.237084] ================================================================== [ 17.255888] ================================================================== [ 17.256150] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 17.257071] Read of size 121 at addr ffff8881025ccc00 by task kunit_try_catch/302 [ 17.257447] [ 17.257575] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.257621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.257635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.257657] Call Trace: [ 17.257672] <TASK> [ 17.257687] dump_stack_lvl+0x73/0xb0 [ 17.257717] print_report+0xd1/0x610 [ 17.257741] ? __virt_addr_valid+0x1db/0x2d0 [ 17.257765] ? copy_user_test_oob+0x604/0x10f0 [ 17.257790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.257816] ? copy_user_test_oob+0x604/0x10f0 [ 17.257842] kasan_report+0x141/0x180 [ 17.257866] ? copy_user_test_oob+0x604/0x10f0 [ 17.257897] kasan_check_range+0x10c/0x1c0 [ 17.257924] __kasan_check_read+0x15/0x20 [ 17.257946] copy_user_test_oob+0x604/0x10f0 [ 17.257975] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.258003] ? __kasan_check_write+0x18/0x20 [ 17.258025] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.258050] ? irqentry_exit+0x2a/0x60 [ 17.258073] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.258099] ? trace_hardirqs_on+0x37/0xe0 [ 17.258124] ? __pfx_read_tsc+0x10/0x10 [ 17.258148] ? ktime_get_ts64+0x86/0x230 [ 17.258174] kunit_try_run_case+0x1a5/0x480 [ 17.258200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.258228] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.258254] ? __kthread_parkme+0x82/0x180 [ 17.258276] ? preempt_count_sub+0x50/0x80 [ 17.258302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.258329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.258356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.258383] kthread+0x337/0x6f0 [ 17.258404] ? trace_preempt_on+0x20/0xc0 [ 17.258439] ? __pfx_kthread+0x10/0x10 [ 17.258461] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.258485] ? calculate_sigpending+0x7b/0xa0 [ 17.258510] ? __pfx_kthread+0x10/0x10 [ 17.258533] ret_from_fork+0x116/0x1d0 [ 17.258564] ? __pfx_kthread+0x10/0x10 [ 17.258587] ret_from_fork_asm+0x1a/0x30 [ 17.258621] </TASK> [ 17.258632] [ 17.265919] Allocated by task 302: [ 17.266047] kasan_save_stack+0x45/0x70 [ 17.266189] kasan_save_track+0x18/0x40 [ 17.266327] kasan_save_alloc_info+0x3b/0x50 [ 17.266594] __kasan_kmalloc+0xb7/0xc0 [ 17.266787] __kmalloc_noprof+0x1c9/0x500 [ 17.266990] kunit_kmalloc_array+0x25/0x60 [ 17.267290] copy_user_test_oob+0xab/0x10f0 [ 17.267659] kunit_try_run_case+0x1a5/0x480 [ 17.267875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.268070] kthread+0x337/0x6f0 [ 17.268193] ret_from_fork+0x116/0x1d0 [ 17.268329] ret_from_fork_asm+0x1a/0x30 [ 17.268472] [ 17.268543] The buggy address belongs to the object at ffff8881025ccc00 [ 17.268543] which belongs to the cache kmalloc-128 of size 128 [ 17.269005] The buggy address is located 0 bytes inside of [ 17.269005] allocated 120-byte region [ffff8881025ccc00, ffff8881025ccc78) [ 17.269692] [ 17.269788] The buggy address belongs to the physical page: [ 17.270041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 17.270390] flags: 0x200000000000000(node=0|zone=2) [ 17.270586] page_type: f5(slab) [ 17.270709] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.270944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.271174] page dumped because: kasan: bad access detected [ 17.271348] [ 17.271418] Memory state around the buggy address: [ 17.271652] ffff8881025ccb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.271975] ffff8881025ccb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.272310] >ffff8881025ccc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.272643] ^ [ 17.272939] ffff8881025ccc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.273158] ffff8881025ccd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.273473] ================================================================== [ 17.237624] ================================================================== [ 17.237908] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 17.238217] Write of size 121 at addr ffff8881025ccc00 by task kunit_try_catch/302 [ 17.238519] [ 17.238611] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.238653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.238666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.238688] Call Trace: [ 17.238701] <TASK> [ 17.238714] dump_stack_lvl+0x73/0xb0 [ 17.238742] print_report+0xd1/0x610 [ 17.238764] ? __virt_addr_valid+0x1db/0x2d0 [ 17.238787] ? copy_user_test_oob+0x557/0x10f0 [ 17.238811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.238834] ? copy_user_test_oob+0x557/0x10f0 [ 17.238859] kasan_report+0x141/0x180 [ 17.238881] ? copy_user_test_oob+0x557/0x10f0 [ 17.238910] kasan_check_range+0x10c/0x1c0 [ 17.238935] __kasan_check_write+0x18/0x20 [ 17.238955] copy_user_test_oob+0x557/0x10f0 [ 17.238981] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.239006] ? __kasan_check_write+0x18/0x20 [ 17.239026] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.239065] ? irqentry_exit+0x2a/0x60 [ 17.239089] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.239116] ? trace_hardirqs_on+0x37/0xe0 [ 17.239140] ? __pfx_read_tsc+0x10/0x10 [ 17.239162] ? ktime_get_ts64+0x86/0x230 [ 17.239186] kunit_try_run_case+0x1a5/0x480 [ 17.239213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.239239] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.239265] ? __kthread_parkme+0x82/0x180 [ 17.239287] ? preempt_count_sub+0x50/0x80 [ 17.239312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.239339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.239365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.239393] kthread+0x337/0x6f0 [ 17.239422] ? trace_preempt_on+0x20/0xc0 [ 17.239445] ? __pfx_kthread+0x10/0x10 [ 17.239467] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.239491] ? calculate_sigpending+0x7b/0xa0 [ 17.239516] ? __pfx_kthread+0x10/0x10 [ 17.239539] ret_from_fork+0x116/0x1d0 [ 17.239570] ? __pfx_kthread+0x10/0x10 [ 17.239592] ret_from_fork_asm+0x1a/0x30 [ 17.239625] </TASK> [ 17.239635] [ 17.247557] Allocated by task 302: [ 17.247742] kasan_save_stack+0x45/0x70 [ 17.247941] kasan_save_track+0x18/0x40 [ 17.248130] kasan_save_alloc_info+0x3b/0x50 [ 17.248313] __kasan_kmalloc+0xb7/0xc0 [ 17.248537] __kmalloc_noprof+0x1c9/0x500 [ 17.248747] kunit_kmalloc_array+0x25/0x60 [ 17.248894] copy_user_test_oob+0xab/0x10f0 [ 17.249042] kunit_try_run_case+0x1a5/0x480 [ 17.249188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.249365] kthread+0x337/0x6f0 [ 17.249527] ret_from_fork+0x116/0x1d0 [ 17.249722] ret_from_fork_asm+0x1a/0x30 [ 17.249919] [ 17.250019] The buggy address belongs to the object at ffff8881025ccc00 [ 17.250019] which belongs to the cache kmalloc-128 of size 128 [ 17.250572] The buggy address is located 0 bytes inside of [ 17.250572] allocated 120-byte region [ffff8881025ccc00, ffff8881025ccc78) [ 17.250925] [ 17.250996] The buggy address belongs to the physical page: [ 17.251166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 17.251403] flags: 0x200000000000000(node=0|zone=2) [ 17.251725] page_type: f5(slab) [ 17.251896] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.252243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.252790] page dumped because: kasan: bad access detected [ 17.253056] [ 17.253156] Memory state around the buggy address: [ 17.253340] ffff8881025ccb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.253782] ffff8881025ccb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.254078] >ffff8881025ccc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.254357] ^ [ 17.254694] ffff8881025ccc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.254983] ffff8881025ccd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.255255] ================================================================== [ 17.201515] ================================================================== [ 17.202053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 17.202370] Write of size 121 at addr ffff8881025ccc00 by task kunit_try_catch/302 [ 17.202734] [ 17.202852] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.202895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.202908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.202933] Call Trace: [ 17.202947] <TASK> [ 17.202964] dump_stack_lvl+0x73/0xb0 [ 17.202996] print_report+0xd1/0x610 [ 17.203019] ? __virt_addr_valid+0x1db/0x2d0 [ 17.203044] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.203071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.203096] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.203123] kasan_report+0x141/0x180 [ 17.203148] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.203178] kasan_check_range+0x10c/0x1c0 [ 17.203204] __kasan_check_write+0x18/0x20 [ 17.203226] copy_user_test_oob+0x3fd/0x10f0 [ 17.203253] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.203281] ? __kasan_check_write+0x18/0x20 [ 17.203313] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.203339] ? irqentry_exit+0x2a/0x60 [ 17.203362] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.203388] ? trace_hardirqs_on+0x37/0xe0 [ 17.203412] ? __pfx_read_tsc+0x10/0x10 [ 17.203435] ? ktime_get_ts64+0x86/0x230 [ 17.203460] kunit_try_run_case+0x1a5/0x480 [ 17.203487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.203514] ? queued_spin_lock_slowpath+0x116/0xb40 [ 17.203547] ? __kthread_parkme+0x82/0x180 [ 17.203581] ? preempt_count_sub+0x50/0x80 [ 17.203606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.203632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.203659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.203686] kthread+0x337/0x6f0 [ 17.203714] ? trace_preempt_on+0x20/0xc0 [ 17.203738] ? __pfx_kthread+0x10/0x10 [ 17.203759] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.203783] ? calculate_sigpending+0x7b/0xa0 [ 17.203809] ? __pfx_kthread+0x10/0x10 [ 17.203831] ret_from_fork+0x116/0x1d0 [ 17.203852] ? __pfx_kthread+0x10/0x10 [ 17.203873] ret_from_fork_asm+0x1a/0x30 [ 17.203905] </TASK> [ 17.203916] [ 17.211009] Allocated by task 302: [ 17.211204] kasan_save_stack+0x45/0x70 [ 17.211408] kasan_save_track+0x18/0x40 [ 17.211624] kasan_save_alloc_info+0x3b/0x50 [ 17.211839] __kasan_kmalloc+0xb7/0xc0 [ 17.212031] __kmalloc_noprof+0x1c9/0x500 [ 17.212248] kunit_kmalloc_array+0x25/0x60 [ 17.212505] copy_user_test_oob+0xab/0x10f0 [ 17.212729] kunit_try_run_case+0x1a5/0x480 [ 17.212909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.213140] kthread+0x337/0x6f0 [ 17.213261] ret_from_fork+0x116/0x1d0 [ 17.213490] ret_from_fork_asm+0x1a/0x30 [ 17.213704] [ 17.213800] The buggy address belongs to the object at ffff8881025ccc00 [ 17.213800] which belongs to the cache kmalloc-128 of size 128 [ 17.214290] The buggy address is located 0 bytes inside of [ 17.214290] allocated 120-byte region [ffff8881025ccc00, ffff8881025ccc78) [ 17.214811] [ 17.214886] The buggy address belongs to the physical page: [ 17.215130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 17.215422] flags: 0x200000000000000(node=0|zone=2) [ 17.215666] page_type: f5(slab) [ 17.215827] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.216097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.216442] page dumped because: kasan: bad access detected [ 17.216689] [ 17.216781] Memory state around the buggy address: [ 17.216969] ffff8881025ccb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.217229] ffff8881025ccb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.217640] >ffff8881025ccc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.217911] ^ [ 17.218174] ffff8881025ccc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.218508] ffff8881025ccd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.218820] ==================================================================