Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.083382] ================================================================== [ 19.084814] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.084876] Read of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.084929] [ 19.084969] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.085055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.085085] Hardware name: linux,dummy-virt (DT) [ 19.085119] Call trace: [ 19.085143] show_stack+0x20/0x38 (C) [ 19.085194] dump_stack_lvl+0x8c/0xd0 [ 19.085253] print_report+0x118/0x5d0 [ 19.085301] kasan_report+0xdc/0x128 [ 19.085346] kasan_check_range+0x100/0x1a8 [ 19.085394] __kasan_check_read+0x20/0x30 [ 19.085449] copy_user_test_oob+0x3c8/0xec8 [ 19.085497] kunit_try_run_case+0x170/0x3f0 [ 19.085545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.085604] kthread+0x328/0x630 [ 19.085647] ret_from_fork+0x10/0x20 [ 19.085698] [ 19.085724] Allocated by task 286: [ 19.085752] kasan_save_stack+0x3c/0x68 [ 19.085795] kasan_save_track+0x20/0x40 [ 19.085834] kasan_save_alloc_info+0x40/0x58 [ 19.085876] __kasan_kmalloc+0xd4/0xd8 [ 19.085914] __kmalloc_noprof+0x198/0x4c8 [ 19.085956] kunit_kmalloc_array+0x34/0x88 [ 19.085994] copy_user_test_oob+0xac/0xec8 [ 19.086034] kunit_try_run_case+0x170/0x3f0 [ 19.086078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.086125] kthread+0x328/0x630 [ 19.086163] ret_from_fork+0x10/0x20 [ 19.086214] [ 19.086234] The buggy address belongs to the object at fff00000c58c3b00 [ 19.086234] which belongs to the cache kmalloc-128 of size 128 [ 19.086296] The buggy address is located 0 bytes inside of [ 19.086296] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.086362] [ 19.086383] The buggy address belongs to the physical page: [ 19.086416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.086469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.086517] page_type: f5(slab) [ 19.086572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.086694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.086831] page dumped because: kasan: bad access detected [ 19.086868] [ 19.086889] Memory state around the buggy address: [ 19.087190] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.087373] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.087745] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.087831] ^ [ 19.087879] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.087925] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.087967] ================================================================== [ 19.036339] ================================================================== [ 19.036457] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.036850] Write of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.036908] [ 19.036958] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.037048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.037078] Hardware name: linux,dummy-virt (DT) [ 19.037114] Call trace: [ 19.037142] show_stack+0x20/0x38 (C) [ 19.037210] dump_stack_lvl+0x8c/0xd0 [ 19.037266] print_report+0x118/0x5d0 [ 19.037313] kasan_report+0xdc/0x128 [ 19.037360] kasan_check_range+0x100/0x1a8 [ 19.037410] __kasan_check_write+0x20/0x30 [ 19.037455] copy_user_test_oob+0x234/0xec8 [ 19.037502] kunit_try_run_case+0x170/0x3f0 [ 19.037554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.037608] kthread+0x328/0x630 [ 19.037652] ret_from_fork+0x10/0x20 [ 19.037702] [ 19.037724] Allocated by task 286: [ 19.037756] kasan_save_stack+0x3c/0x68 [ 19.037801] kasan_save_track+0x20/0x40 [ 19.037841] kasan_save_alloc_info+0x40/0x58 [ 19.037882] __kasan_kmalloc+0xd4/0xd8 [ 19.037921] __kmalloc_noprof+0x198/0x4c8 [ 19.037962] kunit_kmalloc_array+0x34/0x88 [ 19.038001] copy_user_test_oob+0xac/0xec8 [ 19.038039] kunit_try_run_case+0x170/0x3f0 [ 19.038080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.038126] kthread+0x328/0x630 [ 19.038159] ret_from_fork+0x10/0x20 [ 19.040484] [ 19.040520] The buggy address belongs to the object at fff00000c58c3b00 [ 19.040520] which belongs to the cache kmalloc-128 of size 128 [ 19.040772] The buggy address is located 0 bytes inside of [ 19.040772] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.040851] [ 19.040879] The buggy address belongs to the physical page: [ 19.040947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.041014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.041070] page_type: f5(slab) [ 19.041117] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.041172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.041227] page dumped because: kasan: bad access detected [ 19.041260] [ 19.041280] Memory state around the buggy address: [ 19.041317] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.041365] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.041411] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.041453] ^ [ 19.041496] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.041542] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.041584] ================================================================== [ 19.088652] ================================================================== [ 19.088707] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.088761] Write of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.088974] [ 19.089026] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.089161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.089192] Hardware name: linux,dummy-virt (DT) [ 19.089247] Call trace: [ 19.089303] show_stack+0x20/0x38 (C) [ 19.089354] dump_stack_lvl+0x8c/0xd0 [ 19.089402] print_report+0x118/0x5d0 [ 19.089458] kasan_report+0xdc/0x128 [ 19.089504] kasan_check_range+0x100/0x1a8 [ 19.089554] __kasan_check_write+0x20/0x30 [ 19.089600] copy_user_test_oob+0x434/0xec8 [ 19.089648] kunit_try_run_case+0x170/0x3f0 [ 19.089695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.089749] kthread+0x328/0x630 [ 19.089791] ret_from_fork+0x10/0x20 [ 19.089839] [ 19.089859] Allocated by task 286: [ 19.089887] kasan_save_stack+0x3c/0x68 [ 19.089930] kasan_save_track+0x20/0x40 [ 19.089978] kasan_save_alloc_info+0x40/0x58 [ 19.090021] __kasan_kmalloc+0xd4/0xd8 [ 19.090065] __kmalloc_noprof+0x198/0x4c8 [ 19.090105] kunit_kmalloc_array+0x34/0x88 [ 19.090154] copy_user_test_oob+0xac/0xec8 [ 19.090192] kunit_try_run_case+0x170/0x3f0 [ 19.090485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.090533] kthread+0x328/0x630 [ 19.090569] ret_from_fork+0x10/0x20 [ 19.090614] [ 19.090637] The buggy address belongs to the object at fff00000c58c3b00 [ 19.090637] which belongs to the cache kmalloc-128 of size 128 [ 19.090700] The buggy address is located 0 bytes inside of [ 19.090700] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.090765] [ 19.090786] The buggy address belongs to the physical page: [ 19.090818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.090873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.090921] page_type: f5(slab) [ 19.090958] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.091011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.091053] page dumped because: kasan: bad access detected [ 19.091090] [ 19.091111] Memory state around the buggy address: [ 19.091144] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.091190] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.091248] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.091289] ^ [ 19.091333] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.091378] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.091419] ================================================================== [ 19.091534] ================================================================== [ 19.091576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.091621] Read of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.091673] [ 19.091702] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.091859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.091894] Hardware name: linux,dummy-virt (DT) [ 19.091941] Call trace: [ 19.091965] show_stack+0x20/0x38 (C) [ 19.092223] dump_stack_lvl+0x8c/0xd0 [ 19.092819] print_report+0x118/0x5d0 [ 19.092918] kasan_report+0xdc/0x128 [ 19.093063] kasan_check_range+0x100/0x1a8 [ 19.093159] __kasan_check_read+0x20/0x30 [ 19.093493] copy_user_test_oob+0x4a0/0xec8 [ 19.093556] kunit_try_run_case+0x170/0x3f0 [ 19.093605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.093662] kthread+0x328/0x630 [ 19.093703] ret_from_fork+0x10/0x20 [ 19.093751] [ 19.093772] Allocated by task 286: [ 19.093801] kasan_save_stack+0x3c/0x68 [ 19.093844] kasan_save_track+0x20/0x40 [ 19.093886] kasan_save_alloc_info+0x40/0x58 [ 19.093930] __kasan_kmalloc+0xd4/0xd8 [ 19.093968] __kmalloc_noprof+0x198/0x4c8 [ 19.094008] kunit_kmalloc_array+0x34/0x88 [ 19.094046] copy_user_test_oob+0xac/0xec8 [ 19.094085] kunit_try_run_case+0x170/0x3f0 [ 19.094125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.094169] kthread+0x328/0x630 [ 19.094222] ret_from_fork+0x10/0x20 [ 19.094260] [ 19.094282] The buggy address belongs to the object at fff00000c58c3b00 [ 19.094282] which belongs to the cache kmalloc-128 of size 128 [ 19.094343] The buggy address is located 0 bytes inside of [ 19.094343] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.094491] [ 19.094571] The buggy address belongs to the physical page: [ 19.094738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.094876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.094931] page_type: f5(slab) [ 19.095079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.095313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.095459] page dumped because: kasan: bad access detected [ 19.095777] [ 19.095851] Memory state around the buggy address: [ 19.095913] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.096008] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.096090] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.096132] ^ [ 19.096176] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.096471] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.096547] ================================================================== [ 19.050379] ================================================================== [ 19.050444] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.050501] Read of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.050554] [ 19.050589] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.050675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.050704] Hardware name: linux,dummy-virt (DT) [ 19.050738] Call trace: [ 19.050762] show_stack+0x20/0x38 (C) [ 19.050813] dump_stack_lvl+0x8c/0xd0 [ 19.053109] print_report+0x118/0x5d0 [ 19.053176] kasan_report+0xdc/0x128 [ 19.053238] kasan_check_range+0x100/0x1a8 [ 19.053290] __kasan_check_read+0x20/0x30 [ 19.053335] copy_user_test_oob+0x728/0xec8 [ 19.053382] kunit_try_run_case+0x170/0x3f0 [ 19.053433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.053488] kthread+0x328/0x630 [ 19.053531] ret_from_fork+0x10/0x20 [ 19.053588] [ 19.053608] Allocated by task 286: [ 19.053637] kasan_save_stack+0x3c/0x68 [ 19.053682] kasan_save_track+0x20/0x40 [ 19.053721] kasan_save_alloc_info+0x40/0x58 [ 19.053763] __kasan_kmalloc+0xd4/0xd8 [ 19.053801] __kmalloc_noprof+0x198/0x4c8 [ 19.053842] kunit_kmalloc_array+0x34/0x88 [ 19.053882] copy_user_test_oob+0xac/0xec8 [ 19.053923] kunit_try_run_case+0x170/0x3f0 [ 19.053964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.054010] kthread+0x328/0x630 [ 19.054044] ret_from_fork+0x10/0x20 [ 19.054082] [ 19.054103] The buggy address belongs to the object at fff00000c58c3b00 [ 19.054103] which belongs to the cache kmalloc-128 of size 128 [ 19.054165] The buggy address is located 0 bytes inside of [ 19.054165] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.054246] [ 19.054269] The buggy address belongs to the physical page: [ 19.054304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.054361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.054411] page_type: f5(slab) [ 19.054452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.054507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.054552] page dumped because: kasan: bad access detected [ 19.054587] [ 19.054611] Memory state around the buggy address: [ 19.054648] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.054694] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.054741] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.054783] ^ [ 19.054826] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.054872] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.054913] ================================================================== [ 19.070450] ================================================================== [ 19.070784] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.070848] Write of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.070904] [ 19.070939] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.071025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.071054] Hardware name: linux,dummy-virt (DT) [ 19.071088] Call trace: [ 19.071112] show_stack+0x20/0x38 (C) [ 19.071163] dump_stack_lvl+0x8c/0xd0 [ 19.071227] print_report+0x118/0x5d0 [ 19.071276] kasan_report+0xdc/0x128 [ 19.071334] kasan_check_range+0x100/0x1a8 [ 19.071383] __kasan_check_write+0x20/0x30 [ 19.071738] copy_user_test_oob+0x35c/0xec8 [ 19.072033] kunit_try_run_case+0x170/0x3f0 [ 19.072112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.073970] kthread+0x328/0x630 [ 19.074189] ret_from_fork+0x10/0x20 [ 19.074508] [ 19.074817] Allocated by task 286: [ 19.075235] kasan_save_stack+0x3c/0x68 [ 19.075723] kasan_save_track+0x20/0x40 [ 19.075780] kasan_save_alloc_info+0x40/0x58 [ 19.076413] __kasan_kmalloc+0xd4/0xd8 [ 19.077882] __kmalloc_noprof+0x198/0x4c8 [ 19.078331] kunit_kmalloc_array+0x34/0x88 [ 19.078739] copy_user_test_oob+0xac/0xec8 [ 19.079325] kunit_try_run_case+0x170/0x3f0 [ 19.079520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.080226] kthread+0x328/0x630 [ 19.080635] ret_from_fork+0x10/0x20 [ 19.080729] [ 19.080825] The buggy address belongs to the object at fff00000c58c3b00 [ 19.080825] which belongs to the cache kmalloc-128 of size 128 [ 19.080942] The buggy address is located 0 bytes inside of [ 19.080942] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.081865] [ 19.082216] The buggy address belongs to the physical page: [ 19.082257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.082315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.082367] page_type: f5(slab) [ 19.082410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.082464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.082508] page dumped because: kasan: bad access detected [ 19.082542] [ 19.082562] Memory state around the buggy address: [ 19.082598] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.082645] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082691] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.082731] ^ [ 19.082776] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082822] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082864] ==================================================================
[ 19.746773] ================================================================== [ 19.746826] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.746875] Write of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.746929] [ 19.746960] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.747050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.747079] Hardware name: linux,dummy-virt (DT) [ 19.747139] Call trace: [ 19.747163] show_stack+0x20/0x38 (C) [ 19.747227] dump_stack_lvl+0x8c/0xd0 [ 19.747274] print_report+0x118/0x5d0 [ 19.747321] kasan_report+0xdc/0x128 [ 19.747370] kasan_check_range+0x100/0x1a8 [ 19.747419] __kasan_check_write+0x20/0x30 [ 19.747466] copy_user_test_oob+0x434/0xec8 [ 19.747516] kunit_try_run_case+0x170/0x3f0 [ 19.747564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.747627] kthread+0x328/0x630 [ 19.748149] ret_from_fork+0x10/0x20 [ 19.748217] [ 19.748241] Allocated by task 286: [ 19.748458] kasan_save_stack+0x3c/0x68 [ 19.748547] kasan_save_track+0x20/0x40 [ 19.748608] kasan_save_alloc_info+0x40/0x58 [ 19.748689] __kasan_kmalloc+0xd4/0xd8 [ 19.748772] __kmalloc_noprof+0x198/0x4c8 [ 19.748813] kunit_kmalloc_array+0x34/0x88 [ 19.749007] copy_user_test_oob+0xac/0xec8 [ 19.749160] kunit_try_run_case+0x170/0x3f0 [ 19.749279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.749364] kthread+0x328/0x630 [ 19.749457] ret_from_fork+0x10/0x20 [ 19.749532] [ 19.749588] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.749588] which belongs to the cache kmalloc-128 of size 128 [ 19.749729] The buggy address is located 0 bytes inside of [ 19.749729] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.749807] [ 19.749828] The buggy address belongs to the physical page: [ 19.749873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.749928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.750159] page_type: f5(slab) [ 19.750273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.750366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.750577] page dumped because: kasan: bad access detected [ 19.750790] [ 19.750901] Memory state around the buggy address: [ 19.751296] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.751412] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751524] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.751567] ^ [ 19.751635] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751685] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751881] ================================================================== [ 19.734111] ================================================================== [ 19.734269] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.734340] Write of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.734595] [ 19.734638] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.734761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.734861] Hardware name: linux,dummy-virt (DT) [ 19.734905] Call trace: [ 19.734930] show_stack+0x20/0x38 (C) [ 19.734981] dump_stack_lvl+0x8c/0xd0 [ 19.735027] print_report+0x118/0x5d0 [ 19.735113] kasan_report+0xdc/0x128 [ 19.735264] kasan_check_range+0x100/0x1a8 [ 19.735326] __kasan_check_write+0x20/0x30 [ 19.735376] copy_user_test_oob+0x35c/0xec8 [ 19.735498] kunit_try_run_case+0x170/0x3f0 [ 19.735594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.735871] kthread+0x328/0x630 [ 19.736024] ret_from_fork+0x10/0x20 [ 19.736162] [ 19.736312] Allocated by task 286: [ 19.736403] kasan_save_stack+0x3c/0x68 [ 19.736729] kasan_save_track+0x20/0x40 [ 19.736815] kasan_save_alloc_info+0x40/0x58 [ 19.736939] __kasan_kmalloc+0xd4/0xd8 [ 19.737046] __kmalloc_noprof+0x198/0x4c8 [ 19.737143] kunit_kmalloc_array+0x34/0x88 [ 19.737275] copy_user_test_oob+0xac/0xec8 [ 19.737384] kunit_try_run_case+0x170/0x3f0 [ 19.737424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.737477] kthread+0x328/0x630 [ 19.737513] ret_from_fork+0x10/0x20 [ 19.737550] [ 19.737758] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.737758] which belongs to the cache kmalloc-128 of size 128 [ 19.737944] The buggy address is located 0 bytes inside of [ 19.737944] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.738107] [ 19.738188] The buggy address belongs to the physical page: [ 19.738232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.738289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.738341] page_type: f5(slab) [ 19.738381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.738447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.738492] page dumped because: kasan: bad access detected [ 19.738536] [ 19.738559] Memory state around the buggy address: [ 19.738594] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.738647] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738695] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.738737] ^ [ 19.738782] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738843] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738887] ================================================================== [ 19.739363] ================================================================== [ 19.739838] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.740108] Read of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.740306] [ 19.740442] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.740559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.740590] Hardware name: linux,dummy-virt (DT) [ 19.740622] Call trace: [ 19.740646] show_stack+0x20/0x38 (C) [ 19.740699] dump_stack_lvl+0x8c/0xd0 [ 19.740746] print_report+0x118/0x5d0 [ 19.740794] kasan_report+0xdc/0x128 [ 19.740995] kasan_check_range+0x100/0x1a8 [ 19.741108] __kasan_check_read+0x20/0x30 [ 19.741244] copy_user_test_oob+0x3c8/0xec8 [ 19.741517] kunit_try_run_case+0x170/0x3f0 [ 19.741577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.741908] kthread+0x328/0x630 [ 19.742294] ret_from_fork+0x10/0x20 [ 19.742473] [ 19.742550] Allocated by task 286: [ 19.742583] kasan_save_stack+0x3c/0x68 [ 19.742625] kasan_save_track+0x20/0x40 [ 19.742898] kasan_save_alloc_info+0x40/0x58 [ 19.743067] __kasan_kmalloc+0xd4/0xd8 [ 19.743163] __kmalloc_noprof+0x198/0x4c8 [ 19.743516] kunit_kmalloc_array+0x34/0x88 [ 19.743635] copy_user_test_oob+0xac/0xec8 [ 19.743724] kunit_try_run_case+0x170/0x3f0 [ 19.743850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.743946] kthread+0x328/0x630 [ 19.744000] ret_from_fork+0x10/0x20 [ 19.744039] [ 19.744224] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.744224] which belongs to the cache kmalloc-128 of size 128 [ 19.744291] The buggy address is located 0 bytes inside of [ 19.744291] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.744465] [ 19.744549] The buggy address belongs to the physical page: [ 19.744632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.744744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.744886] page_type: f5(slab) [ 19.745252] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.745346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.745453] page dumped because: kasan: bad access detected [ 19.745546] [ 19.745613] Memory state around the buggy address: [ 19.745690] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.745852] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.745900] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.746050] ^ [ 19.746141] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.746237] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.746280] ================================================================== [ 19.709709] ================================================================== [ 19.709811] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.709889] Write of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.710111] [ 19.710170] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.710459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.710531] Hardware name: linux,dummy-virt (DT) [ 19.710617] Call trace: [ 19.710674] show_stack+0x20/0x38 (C) [ 19.710747] dump_stack_lvl+0x8c/0xd0 [ 19.710808] print_report+0x118/0x5d0 [ 19.710874] kasan_report+0xdc/0x128 [ 19.710929] kasan_check_range+0x100/0x1a8 [ 19.710994] __kasan_check_write+0x20/0x30 [ 19.711047] copy_user_test_oob+0x234/0xec8 [ 19.711099] kunit_try_run_case+0x170/0x3f0 [ 19.711397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.713191] kthread+0x328/0x630 [ 19.713515] ret_from_fork+0x10/0x20 [ 19.713598] [ 19.713635] Allocated by task 286: [ 19.713672] kasan_save_stack+0x3c/0x68 [ 19.713716] kasan_save_track+0x20/0x40 [ 19.713755] kasan_save_alloc_info+0x40/0x58 [ 19.713974] __kasan_kmalloc+0xd4/0xd8 [ 19.714216] __kmalloc_noprof+0x198/0x4c8 [ 19.714345] kunit_kmalloc_array+0x34/0x88 [ 19.714425] copy_user_test_oob+0xac/0xec8 [ 19.714489] kunit_try_run_case+0x170/0x3f0 [ 19.714591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714668] kthread+0x328/0x630 [ 19.714712] ret_from_fork+0x10/0x20 [ 19.714811] [ 19.714894] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.714894] which belongs to the cache kmalloc-128 of size 128 [ 19.714991] The buggy address is located 0 bytes inside of [ 19.714991] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.715307] [ 19.715499] The buggy address belongs to the physical page: [ 19.715562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.715656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.715791] page_type: f5(slab) [ 19.715857] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.715962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.716081] page dumped because: kasan: bad access detected [ 19.716148] [ 19.716254] Memory state around the buggy address: [ 19.716317] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.716365] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.716414] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.716457] ^ [ 19.716752] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.717000] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.717088] ================================================================== [ 19.722196] ================================================================== [ 19.722260] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.722312] Read of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.722366] [ 19.722648] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.722815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.722851] Hardware name: linux,dummy-virt (DT) [ 19.723213] Call trace: [ 19.723277] show_stack+0x20/0x38 (C) [ 19.723347] dump_stack_lvl+0x8c/0xd0 [ 19.723486] print_report+0x118/0x5d0 [ 19.723582] kasan_report+0xdc/0x128 [ 19.723637] kasan_check_range+0x100/0x1a8 [ 19.723687] __kasan_check_read+0x20/0x30 [ 19.723748] copy_user_test_oob+0x728/0xec8 [ 19.723798] kunit_try_run_case+0x170/0x3f0 [ 19.724059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.724216] kthread+0x328/0x630 [ 19.724297] ret_from_fork+0x10/0x20 [ 19.724678] [ 19.724806] Allocated by task 286: [ 19.724893] kasan_save_stack+0x3c/0x68 [ 19.724940] kasan_save_track+0x20/0x40 [ 19.725285] kasan_save_alloc_info+0x40/0x58 [ 19.725396] __kasan_kmalloc+0xd4/0xd8 [ 19.725517] __kmalloc_noprof+0x198/0x4c8 [ 19.725598] kunit_kmalloc_array+0x34/0x88 [ 19.725644] copy_user_test_oob+0xac/0xec8 [ 19.725779] kunit_try_run_case+0x170/0x3f0 [ 19.726001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.726092] kthread+0x328/0x630 [ 19.726193] ret_from_fork+0x10/0x20 [ 19.726281] [ 19.726355] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.726355] which belongs to the cache kmalloc-128 of size 128 [ 19.726419] The buggy address is located 0 bytes inside of [ 19.726419] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.726484] [ 19.726509] The buggy address belongs to the physical page: [ 19.726542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.726884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.727012] page_type: f5(slab) [ 19.727085] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.727165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.727215] page dumped because: kasan: bad access detected [ 19.727286] [ 19.727623] Memory state around the buggy address: [ 19.727729] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.727843] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727891] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.727932] ^ [ 19.728089] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.728137] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.728353] ================================================================== [ 19.753308] ================================================================== [ 19.753393] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.753539] Read of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.753601] [ 19.753790] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.753909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.753970] Hardware name: linux,dummy-virt (DT) [ 19.754011] Call trace: [ 19.754035] show_stack+0x20/0x38 (C) [ 19.754106] dump_stack_lvl+0x8c/0xd0 [ 19.754421] print_report+0x118/0x5d0 [ 19.754493] kasan_report+0xdc/0x128 [ 19.754585] kasan_check_range+0x100/0x1a8 [ 19.754637] __kasan_check_read+0x20/0x30 [ 19.754684] copy_user_test_oob+0x4a0/0xec8 [ 19.754812] kunit_try_run_case+0x170/0x3f0 [ 19.754871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.754928] kthread+0x328/0x630 [ 19.755203] ret_from_fork+0x10/0x20 [ 19.755391] [ 19.755684] Allocated by task 286: [ 19.755768] kasan_save_stack+0x3c/0x68 [ 19.755836] kasan_save_track+0x20/0x40 [ 19.755876] kasan_save_alloc_info+0x40/0x58 [ 19.755920] __kasan_kmalloc+0xd4/0xd8 [ 19.756072] __kmalloc_noprof+0x198/0x4c8 [ 19.756249] kunit_kmalloc_array+0x34/0x88 [ 19.756374] copy_user_test_oob+0xac/0xec8 [ 19.756488] kunit_try_run_case+0x170/0x3f0 [ 19.756658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756875] kthread+0x328/0x630 [ 19.757021] ret_from_fork+0x10/0x20 [ 19.757091] [ 19.757115] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.757115] which belongs to the cache kmalloc-128 of size 128 [ 19.757205] The buggy address is located 0 bytes inside of [ 19.757205] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.757273] [ 19.757295] The buggy address belongs to the physical page: [ 19.757328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.757405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.757456] page_type: f5(slab) [ 19.757495] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.757558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.757610] page dumped because: kasan: bad access detected [ 19.757661] [ 19.757681] Memory state around the buggy address: [ 19.757746] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.757793] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.757853] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.757920] ^ [ 19.757963] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.758036] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.758092] ==================================================================
[ 16.632275] ================================================================== [ 16.632802] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.633047] Write of size 121 at addr ffff888103434a00 by task kunit_try_catch/303 [ 16.633278] [ 16.633374] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.633424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.633438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.633474] Call Trace: [ 16.633489] <TASK> [ 16.633507] dump_stack_lvl+0x73/0xb0 [ 16.633539] print_report+0xd1/0x610 [ 16.633577] ? __virt_addr_valid+0x1db/0x2d0 [ 16.633602] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.633639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.633665] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.633690] kasan_report+0x141/0x180 [ 16.633714] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.633744] kasan_check_range+0x10c/0x1c0 [ 16.633770] __kasan_check_write+0x18/0x20 [ 16.633790] copy_user_test_oob+0x3fd/0x10f0 [ 16.633818] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.633844] ? finish_task_switch.isra.0+0x153/0x700 [ 16.633879] ? __switch_to+0x47/0xf50 [ 16.633906] ? __schedule+0x10cc/0x2b60 [ 16.633941] ? __pfx_read_tsc+0x10/0x10 [ 16.633965] ? ktime_get_ts64+0x86/0x230 [ 16.633991] kunit_try_run_case+0x1a5/0x480 [ 16.634018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.634042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.634070] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.634095] ? __kthread_parkme+0x82/0x180 [ 16.634118] ? preempt_count_sub+0x50/0x80 [ 16.634143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.634178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.634205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.634242] kthread+0x337/0x6f0 [ 16.634262] ? trace_preempt_on+0x20/0xc0 [ 16.634287] ? __pfx_kthread+0x10/0x10 [ 16.634310] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.634334] ? calculate_sigpending+0x7b/0xa0 [ 16.634368] ? __pfx_kthread+0x10/0x10 [ 16.634392] ret_from_fork+0x116/0x1d0 [ 16.634411] ? __pfx_kthread+0x10/0x10 [ 16.634444] ret_from_fork_asm+0x1a/0x30 [ 16.634484] </TASK> [ 16.634495] [ 16.645841] Allocated by task 303: [ 16.645989] kasan_save_stack+0x45/0x70 [ 16.646145] kasan_save_track+0x18/0x40 [ 16.646283] kasan_save_alloc_info+0x3b/0x50 [ 16.646494] __kasan_kmalloc+0xb7/0xc0 [ 16.646823] __kmalloc_noprof+0x1c9/0x500 [ 16.647175] kunit_kmalloc_array+0x25/0x60 [ 16.647565] copy_user_test_oob+0xab/0x10f0 [ 16.647938] kunit_try_run_case+0x1a5/0x480 [ 16.648309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.648922] kthread+0x337/0x6f0 [ 16.649277] ret_from_fork+0x116/0x1d0 [ 16.649637] ret_from_fork_asm+0x1a/0x30 [ 16.650006] [ 16.650168] The buggy address belongs to the object at ffff888103434a00 [ 16.650168] which belongs to the cache kmalloc-128 of size 128 [ 16.651230] The buggy address is located 0 bytes inside of [ 16.651230] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.651982] [ 16.652060] The buggy address belongs to the physical page: [ 16.652236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.652501] flags: 0x200000000000000(node=0|zone=2) [ 16.652796] page_type: f5(slab) [ 16.652972] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.653256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.653587] page dumped because: kasan: bad access detected [ 16.653916] [ 16.653993] Memory state around the buggy address: [ 16.654168] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.654519] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654799] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.655035] ^ [ 16.655329] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.655671] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.655914] ================================================================== [ 16.674441] ================================================================== [ 16.675021] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.675352] Write of size 121 at addr ffff888103434a00 by task kunit_try_catch/303 [ 16.675701] [ 16.675817] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.675862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.675875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.675898] Call Trace: [ 16.675916] <TASK> [ 16.675933] dump_stack_lvl+0x73/0xb0 [ 16.675964] print_report+0xd1/0x610 [ 16.675988] ? __virt_addr_valid+0x1db/0x2d0 [ 16.676021] ? copy_user_test_oob+0x557/0x10f0 [ 16.676047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.676072] ? copy_user_test_oob+0x557/0x10f0 [ 16.676098] kasan_report+0x141/0x180 [ 16.676120] ? copy_user_test_oob+0x557/0x10f0 [ 16.676151] kasan_check_range+0x10c/0x1c0 [ 16.676175] __kasan_check_write+0x18/0x20 [ 16.676197] copy_user_test_oob+0x557/0x10f0 [ 16.676225] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.676249] ? finish_task_switch.isra.0+0x153/0x700 [ 16.676275] ? __switch_to+0x47/0xf50 [ 16.676307] ? __schedule+0x10cc/0x2b60 [ 16.676331] ? __pfx_read_tsc+0x10/0x10 [ 16.676354] ? ktime_get_ts64+0x86/0x230 [ 16.676379] kunit_try_run_case+0x1a5/0x480 [ 16.676406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.676443] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.676478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.676504] ? __kthread_parkme+0x82/0x180 [ 16.676527] ? preempt_count_sub+0x50/0x80 [ 16.676551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.676578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.676604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.676631] kthread+0x337/0x6f0 [ 16.676652] ? trace_preempt_on+0x20/0xc0 [ 16.676676] ? __pfx_kthread+0x10/0x10 [ 16.676698] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.676721] ? calculate_sigpending+0x7b/0xa0 [ 16.676748] ? __pfx_kthread+0x10/0x10 [ 16.676770] ret_from_fork+0x116/0x1d0 [ 16.676791] ? __pfx_kthread+0x10/0x10 [ 16.676814] ret_from_fork_asm+0x1a/0x30 [ 16.676848] </TASK> [ 16.676859] [ 16.684154] Allocated by task 303: [ 16.684289] kasan_save_stack+0x45/0x70 [ 16.684458] kasan_save_track+0x18/0x40 [ 16.684656] kasan_save_alloc_info+0x3b/0x50 [ 16.684877] __kasan_kmalloc+0xb7/0xc0 [ 16.685097] __kmalloc_noprof+0x1c9/0x500 [ 16.685355] kunit_kmalloc_array+0x25/0x60 [ 16.685653] copy_user_test_oob+0xab/0x10f0 [ 16.685835] kunit_try_run_case+0x1a5/0x480 [ 16.686008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.686237] kthread+0x337/0x6f0 [ 16.686359] ret_from_fork+0x116/0x1d0 [ 16.686503] ret_from_fork_asm+0x1a/0x30 [ 16.686651] [ 16.686748] The buggy address belongs to the object at ffff888103434a00 [ 16.686748] which belongs to the cache kmalloc-128 of size 128 [ 16.687296] The buggy address is located 0 bytes inside of [ 16.687296] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.687691] [ 16.687763] The buggy address belongs to the physical page: [ 16.687936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.688503] flags: 0x200000000000000(node=0|zone=2) [ 16.688750] page_type: f5(slab) [ 16.688919] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.689255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.689569] page dumped because: kasan: bad access detected [ 16.689742] [ 16.689814] Memory state around the buggy address: [ 16.689971] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.690234] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.690744] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.691065] ^ [ 16.691363] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.691684] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.691898] ================================================================== [ 16.692724] ================================================================== [ 16.693086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.693405] Read of size 121 at addr ffff888103434a00 by task kunit_try_catch/303 [ 16.693762] [ 16.693856] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.693904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.693916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.693940] Call Trace: [ 16.693961] <TASK> [ 16.693979] dump_stack_lvl+0x73/0xb0 [ 16.694009] print_report+0xd1/0x610 [ 16.694033] ? __virt_addr_valid+0x1db/0x2d0 [ 16.694060] ? copy_user_test_oob+0x604/0x10f0 [ 16.694085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.694110] ? copy_user_test_oob+0x604/0x10f0 [ 16.694135] kasan_report+0x141/0x180 [ 16.694158] ? copy_user_test_oob+0x604/0x10f0 [ 16.694189] kasan_check_range+0x10c/0x1c0 [ 16.694214] __kasan_check_read+0x15/0x20 [ 16.694235] copy_user_test_oob+0x604/0x10f0 [ 16.694262] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.694287] ? finish_task_switch.isra.0+0x153/0x700 [ 16.694312] ? __switch_to+0x47/0xf50 [ 16.694339] ? __schedule+0x10cc/0x2b60 [ 16.694364] ? __pfx_read_tsc+0x10/0x10 [ 16.694386] ? ktime_get_ts64+0x86/0x230 [ 16.694412] kunit_try_run_case+0x1a5/0x480 [ 16.694438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.694475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.694501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.694527] ? __kthread_parkme+0x82/0x180 [ 16.694549] ? preempt_count_sub+0x50/0x80 [ 16.694574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.694600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.694627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.694654] kthread+0x337/0x6f0 [ 16.694675] ? trace_preempt_on+0x20/0xc0 [ 16.694701] ? __pfx_kthread+0x10/0x10 [ 16.694723] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.694746] ? calculate_sigpending+0x7b/0xa0 [ 16.694772] ? __pfx_kthread+0x10/0x10 [ 16.694795] ret_from_fork+0x116/0x1d0 [ 16.694816] ? __pfx_kthread+0x10/0x10 [ 16.694838] ret_from_fork_asm+0x1a/0x30 [ 16.694871] </TASK> [ 16.694882] [ 16.701921] Allocated by task 303: [ 16.702232] kasan_save_stack+0x45/0x70 [ 16.702496] kasan_save_track+0x18/0x40 [ 16.702749] kasan_save_alloc_info+0x3b/0x50 [ 16.702963] __kasan_kmalloc+0xb7/0xc0 [ 16.703140] __kmalloc_noprof+0x1c9/0x500 [ 16.703298] kunit_kmalloc_array+0x25/0x60 [ 16.703529] copy_user_test_oob+0xab/0x10f0 [ 16.703744] kunit_try_run_case+0x1a5/0x480 [ 16.703932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.704147] kthread+0x337/0x6f0 [ 16.704270] ret_from_fork+0x116/0x1d0 [ 16.704514] ret_from_fork_asm+0x1a/0x30 [ 16.704715] [ 16.704812] The buggy address belongs to the object at ffff888103434a00 [ 16.704812] which belongs to the cache kmalloc-128 of size 128 [ 16.705273] The buggy address is located 0 bytes inside of [ 16.705273] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.705792] [ 16.705866] The buggy address belongs to the physical page: [ 16.706040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.706283] flags: 0x200000000000000(node=0|zone=2) [ 16.706480] page_type: f5(slab) [ 16.706650] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.707029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.707364] page dumped because: kasan: bad access detected [ 16.707569] [ 16.707641] Memory state around the buggy address: [ 16.707798] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.708015] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.708308] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.708781] ^ [ 16.709103] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709430] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709972] ================================================================== [ 16.656595] ================================================================== [ 16.656907] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.657264] Read of size 121 at addr ffff888103434a00 by task kunit_try_catch/303 [ 16.657553] [ 16.657653] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.657701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.657714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.657738] Call Trace: [ 16.657758] <TASK> [ 16.657778] dump_stack_lvl+0x73/0xb0 [ 16.657809] print_report+0xd1/0x610 [ 16.657833] ? __virt_addr_valid+0x1db/0x2d0 [ 16.657858] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.657884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.657910] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.657936] kasan_report+0x141/0x180 [ 16.657959] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.658040] kasan_check_range+0x10c/0x1c0 [ 16.658067] __kasan_check_read+0x15/0x20 [ 16.658088] copy_user_test_oob+0x4aa/0x10f0 [ 16.658116] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.658141] ? finish_task_switch.isra.0+0x153/0x700 [ 16.658166] ? __switch_to+0x47/0xf50 [ 16.658193] ? __schedule+0x10cc/0x2b60 [ 16.658217] ? __pfx_read_tsc+0x10/0x10 [ 16.658240] ? ktime_get_ts64+0x86/0x230 [ 16.658266] kunit_try_run_case+0x1a5/0x480 [ 16.658293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.658317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.658345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.658370] ? __kthread_parkme+0x82/0x180 [ 16.658394] ? preempt_count_sub+0x50/0x80 [ 16.658429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.658466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.658493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.658520] kthread+0x337/0x6f0 [ 16.658540] ? trace_preempt_on+0x20/0xc0 [ 16.658566] ? __pfx_kthread+0x10/0x10 [ 16.658588] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.658611] ? calculate_sigpending+0x7b/0xa0 [ 16.658637] ? __pfx_kthread+0x10/0x10 [ 16.658661] ret_from_fork+0x116/0x1d0 [ 16.658682] ? __pfx_kthread+0x10/0x10 [ 16.658707] ret_from_fork_asm+0x1a/0x30 [ 16.658741] </TASK> [ 16.658753] [ 16.666070] Allocated by task 303: [ 16.666201] kasan_save_stack+0x45/0x70 [ 16.666345] kasan_save_track+0x18/0x40 [ 16.666719] kasan_save_alloc_info+0x3b/0x50 [ 16.666941] __kasan_kmalloc+0xb7/0xc0 [ 16.667132] __kmalloc_noprof+0x1c9/0x500 [ 16.667336] kunit_kmalloc_array+0x25/0x60 [ 16.667581] copy_user_test_oob+0xab/0x10f0 [ 16.667778] kunit_try_run_case+0x1a5/0x480 [ 16.667926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.668171] kthread+0x337/0x6f0 [ 16.668346] ret_from_fork+0x116/0x1d0 [ 16.668492] ret_from_fork_asm+0x1a/0x30 [ 16.668635] [ 16.668729] The buggy address belongs to the object at ffff888103434a00 [ 16.668729] which belongs to the cache kmalloc-128 of size 128 [ 16.669266] The buggy address is located 0 bytes inside of [ 16.669266] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.669666] [ 16.669739] The buggy address belongs to the physical page: [ 16.669911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.670436] flags: 0x200000000000000(node=0|zone=2) [ 16.670681] page_type: f5(slab) [ 16.670848] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.671166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.671395] page dumped because: kasan: bad access detected [ 16.671575] [ 16.671644] Memory state around the buggy address: [ 16.671829] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.672326] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.672622] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.672833] ^ [ 16.673220] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.673721] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.673952] ==================================================================
[ 16.998512] ================================================================== [ 16.999038] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 17.000217] Write of size 121 at addr ffff8881025b8100 by task kunit_try_catch/304 [ 17.000471] [ 17.000568] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.000614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.000628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.000651] Call Trace: [ 17.000667] <TASK> [ 17.000684] dump_stack_lvl+0x73/0xb0 [ 17.000717] print_report+0xd1/0x610 [ 17.000741] ? __virt_addr_valid+0x1db/0x2d0 [ 17.000766] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.000792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.000818] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.000843] kasan_report+0x141/0x180 [ 17.000866] ? copy_user_test_oob+0x3fd/0x10f0 [ 17.000896] kasan_check_range+0x10c/0x1c0 [ 17.000921] __kasan_check_write+0x18/0x20 [ 17.000943] copy_user_test_oob+0x3fd/0x10f0 [ 17.000970] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.000996] ? finish_task_switch.isra.0+0x153/0x700 [ 17.001021] ? __switch_to+0x47/0xf50 [ 17.001047] ? __schedule+0x10cc/0x2b60 [ 17.001697] ? __pfx_read_tsc+0x10/0x10 [ 17.001725] ? ktime_get_ts64+0x86/0x230 [ 17.001752] kunit_try_run_case+0x1a5/0x480 [ 17.001782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.001808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.001834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.001860] ? __kthread_parkme+0x82/0x180 [ 17.001883] ? preempt_count_sub+0x50/0x80 [ 17.001909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.001936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.001963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.001990] kthread+0x337/0x6f0 [ 17.002011] ? trace_preempt_on+0x20/0xc0 [ 17.002037] ? __pfx_kthread+0x10/0x10 [ 17.002073] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.002097] ? calculate_sigpending+0x7b/0xa0 [ 17.002147] ? __pfx_kthread+0x10/0x10 [ 17.002170] ret_from_fork+0x116/0x1d0 [ 17.002192] ? __pfx_kthread+0x10/0x10 [ 17.002215] ret_from_fork_asm+0x1a/0x30 [ 17.002247] </TASK> [ 17.002258] [ 17.011946] Allocated by task 304: [ 17.012792] kasan_save_stack+0x45/0x70 [ 17.012996] kasan_save_track+0x18/0x40 [ 17.013184] kasan_save_alloc_info+0x3b/0x50 [ 17.013548] __kasan_kmalloc+0xb7/0xc0 [ 17.013747] __kmalloc_noprof+0x1c9/0x500 [ 17.013938] kunit_kmalloc_array+0x25/0x60 [ 17.014459] copy_user_test_oob+0xab/0x10f0 [ 17.014670] kunit_try_run_case+0x1a5/0x480 [ 17.014966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.015397] kthread+0x337/0x6f0 [ 17.015662] ret_from_fork+0x116/0x1d0 [ 17.015867] ret_from_fork_asm+0x1a/0x30 [ 17.016075] [ 17.016191] The buggy address belongs to the object at ffff8881025b8100 [ 17.016191] which belongs to the cache kmalloc-128 of size 128 [ 17.016915] The buggy address is located 0 bytes inside of [ 17.016915] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.017673] [ 17.017778] The buggy address belongs to the physical page: [ 17.018178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.018624] flags: 0x200000000000000(node=0|zone=2) [ 17.018862] page_type: f5(slab) [ 17.019171] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.019602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.020020] page dumped because: kasan: bad access detected [ 17.020353] [ 17.020451] Memory state around the buggy address: [ 17.020844] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.021362] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.021683] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.022061] ^ [ 17.022581] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.022978] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.023545] ================================================================== [ 17.024576] ================================================================== [ 17.025255] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 17.025675] Read of size 121 at addr ffff8881025b8100 by task kunit_try_catch/304 [ 17.025975] [ 17.026102] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.026148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.026162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.026285] Call Trace: [ 17.026498] <TASK> [ 17.026521] dump_stack_lvl+0x73/0xb0 [ 17.026554] print_report+0xd1/0x610 [ 17.026579] ? __virt_addr_valid+0x1db/0x2d0 [ 17.026604] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.026630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.026655] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.026680] kasan_report+0x141/0x180 [ 17.026710] ? copy_user_test_oob+0x4aa/0x10f0 [ 17.026740] kasan_check_range+0x10c/0x1c0 [ 17.026766] __kasan_check_read+0x15/0x20 [ 17.026787] copy_user_test_oob+0x4aa/0x10f0 [ 17.026814] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.026839] ? finish_task_switch.isra.0+0x153/0x700 [ 17.026864] ? __switch_to+0x47/0xf50 [ 17.026891] ? __schedule+0x10cc/0x2b60 [ 17.026915] ? __pfx_read_tsc+0x10/0x10 [ 17.026938] ? ktime_get_ts64+0x86/0x230 [ 17.026965] kunit_try_run_case+0x1a5/0x480 [ 17.026992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.027017] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.027043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.027080] ? __kthread_parkme+0x82/0x180 [ 17.027102] ? preempt_count_sub+0x50/0x80 [ 17.027129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.027156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.027183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.027211] kthread+0x337/0x6f0 [ 17.027231] ? trace_preempt_on+0x20/0xc0 [ 17.027258] ? __pfx_kthread+0x10/0x10 [ 17.027279] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.027303] ? calculate_sigpending+0x7b/0xa0 [ 17.027330] ? __pfx_kthread+0x10/0x10 [ 17.027353] ret_from_fork+0x116/0x1d0 [ 17.027374] ? __pfx_kthread+0x10/0x10 [ 17.027397] ret_from_fork_asm+0x1a/0x30 [ 17.027429] </TASK> [ 17.027440] [ 17.037434] Allocated by task 304: [ 17.037829] kasan_save_stack+0x45/0x70 [ 17.038034] kasan_save_track+0x18/0x40 [ 17.038400] kasan_save_alloc_info+0x3b/0x50 [ 17.038689] __kasan_kmalloc+0xb7/0xc0 [ 17.038964] __kmalloc_noprof+0x1c9/0x500 [ 17.039156] kunit_kmalloc_array+0x25/0x60 [ 17.039645] copy_user_test_oob+0xab/0x10f0 [ 17.039943] kunit_try_run_case+0x1a5/0x480 [ 17.040219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.040590] kthread+0x337/0x6f0 [ 17.040785] ret_from_fork+0x116/0x1d0 [ 17.041082] ret_from_fork_asm+0x1a/0x30 [ 17.041381] [ 17.041610] The buggy address belongs to the object at ffff8881025b8100 [ 17.041610] which belongs to the cache kmalloc-128 of size 128 [ 17.042089] The buggy address is located 0 bytes inside of [ 17.042089] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.042860] [ 17.043097] The buggy address belongs to the physical page: [ 17.043504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.043995] flags: 0x200000000000000(node=0|zone=2) [ 17.044330] page_type: f5(slab) [ 17.044522] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.044991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.045487] page dumped because: kasan: bad access detected [ 17.045782] [ 17.045880] Memory state around the buggy address: [ 17.046233] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.046554] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.046992] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.047469] ^ [ 17.047859] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.048374] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.048704] ================================================================== [ 17.068308] ================================================================== [ 17.068541] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 17.069112] Read of size 121 at addr ffff8881025b8100 by task kunit_try_catch/304 [ 17.069394] [ 17.069479] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.069522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.069534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.069558] Call Trace: [ 17.069572] <TASK> [ 17.069588] dump_stack_lvl+0x73/0xb0 [ 17.069618] print_report+0xd1/0x610 [ 17.069642] ? __virt_addr_valid+0x1db/0x2d0 [ 17.069666] ? copy_user_test_oob+0x604/0x10f0 [ 17.069691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.069716] ? copy_user_test_oob+0x604/0x10f0 [ 17.069743] kasan_report+0x141/0x180 [ 17.069768] ? copy_user_test_oob+0x604/0x10f0 [ 17.069797] kasan_check_range+0x10c/0x1c0 [ 17.069846] __kasan_check_read+0x15/0x20 [ 17.069867] copy_user_test_oob+0x604/0x10f0 [ 17.069894] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.069919] ? finish_task_switch.isra.0+0x153/0x700 [ 17.069961] ? __switch_to+0x47/0xf50 [ 17.069988] ? __schedule+0x10cc/0x2b60 [ 17.070027] ? __pfx_read_tsc+0x10/0x10 [ 17.070061] ? ktime_get_ts64+0x86/0x230 [ 17.070101] kunit_try_run_case+0x1a5/0x480 [ 17.070140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.070174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.070201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.070227] ? __kthread_parkme+0x82/0x180 [ 17.070250] ? preempt_count_sub+0x50/0x80 [ 17.070275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.070302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.070328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.070356] kthread+0x337/0x6f0 [ 17.070378] ? trace_preempt_on+0x20/0xc0 [ 17.070402] ? __pfx_kthread+0x10/0x10 [ 17.070424] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.070448] ? calculate_sigpending+0x7b/0xa0 [ 17.070474] ? __pfx_kthread+0x10/0x10 [ 17.070497] ret_from_fork+0x116/0x1d0 [ 17.070518] ? __pfx_kthread+0x10/0x10 [ 17.070540] ret_from_fork_asm+0x1a/0x30 [ 17.070572] </TASK> [ 17.070601] [ 17.078238] Allocated by task 304: [ 17.078368] kasan_save_stack+0x45/0x70 [ 17.078587] kasan_save_track+0x18/0x40 [ 17.078787] kasan_save_alloc_info+0x3b/0x50 [ 17.078989] __kasan_kmalloc+0xb7/0xc0 [ 17.079228] __kmalloc_noprof+0x1c9/0x500 [ 17.079424] kunit_kmalloc_array+0x25/0x60 [ 17.079617] copy_user_test_oob+0xab/0x10f0 [ 17.079862] kunit_try_run_case+0x1a5/0x480 [ 17.080124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.080400] kthread+0x337/0x6f0 [ 17.080572] ret_from_fork+0x116/0x1d0 [ 17.080761] ret_from_fork_asm+0x1a/0x30 [ 17.080957] [ 17.081062] The buggy address belongs to the object at ffff8881025b8100 [ 17.081062] which belongs to the cache kmalloc-128 of size 128 [ 17.081606] The buggy address is located 0 bytes inside of [ 17.081606] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.082211] [ 17.082308] The buggy address belongs to the physical page: [ 17.082556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.082922] flags: 0x200000000000000(node=0|zone=2) [ 17.083160] page_type: f5(slab) [ 17.083284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.083509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.083729] page dumped because: kasan: bad access detected [ 17.083898] [ 17.083967] Memory state around the buggy address: [ 17.084337] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.084688] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.085063] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.085775] ^ [ 17.086163] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086493] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086818] ================================================================== [ 17.049208] ================================================================== [ 17.049506] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 17.050011] Write of size 121 at addr ffff8881025b8100 by task kunit_try_catch/304 [ 17.050277] [ 17.050367] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.050411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.050424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.050462] Call Trace: [ 17.050478] <TASK> [ 17.050494] dump_stack_lvl+0x73/0xb0 [ 17.050525] print_report+0xd1/0x610 [ 17.050572] ? __virt_addr_valid+0x1db/0x2d0 [ 17.050598] ? copy_user_test_oob+0x557/0x10f0 [ 17.050624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.050667] ? copy_user_test_oob+0x557/0x10f0 [ 17.050694] kasan_report+0x141/0x180 [ 17.050724] ? copy_user_test_oob+0x557/0x10f0 [ 17.050781] kasan_check_range+0x10c/0x1c0 [ 17.050807] __kasan_check_write+0x18/0x20 [ 17.050828] copy_user_test_oob+0x557/0x10f0 [ 17.050856] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.050881] ? finish_task_switch.isra.0+0x153/0x700 [ 17.050905] ? __switch_to+0x47/0xf50 [ 17.050932] ? __schedule+0x10cc/0x2b60 [ 17.050956] ? __pfx_read_tsc+0x10/0x10 [ 17.050978] ? ktime_get_ts64+0x86/0x230 [ 17.051004] kunit_try_run_case+0x1a5/0x480 [ 17.051030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.051066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.051093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.051129] ? __kthread_parkme+0x82/0x180 [ 17.051152] ? preempt_count_sub+0x50/0x80 [ 17.051177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.051203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.051230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.051258] kthread+0x337/0x6f0 [ 17.051279] ? trace_preempt_on+0x20/0xc0 [ 17.051304] ? __pfx_kthread+0x10/0x10 [ 17.051326] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.051349] ? calculate_sigpending+0x7b/0xa0 [ 17.051376] ? __pfx_kthread+0x10/0x10 [ 17.051399] ret_from_fork+0x116/0x1d0 [ 17.051421] ? __pfx_kthread+0x10/0x10 [ 17.051442] ret_from_fork_asm+0x1a/0x30 [ 17.051474] </TASK> [ 17.051484] [ 17.059145] Allocated by task 304: [ 17.059276] kasan_save_stack+0x45/0x70 [ 17.059583] kasan_save_track+0x18/0x40 [ 17.059781] kasan_save_alloc_info+0x3b/0x50 [ 17.060023] __kasan_kmalloc+0xb7/0xc0 [ 17.060356] __kmalloc_noprof+0x1c9/0x500 [ 17.060524] kunit_kmalloc_array+0x25/0x60 [ 17.060681] copy_user_test_oob+0xab/0x10f0 [ 17.060912] kunit_try_run_case+0x1a5/0x480 [ 17.061168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.061389] kthread+0x337/0x6f0 [ 17.061601] ret_from_fork+0x116/0x1d0 [ 17.061850] ret_from_fork_asm+0x1a/0x30 [ 17.062092] [ 17.062190] The buggy address belongs to the object at ffff8881025b8100 [ 17.062190] which belongs to the cache kmalloc-128 of size 128 [ 17.062728] The buggy address is located 0 bytes inside of [ 17.062728] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.063260] [ 17.063335] The buggy address belongs to the physical page: [ 17.063504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.063986] flags: 0x200000000000000(node=0|zone=2) [ 17.064375] page_type: f5(slab) [ 17.064568] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.064913] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.065437] page dumped because: kasan: bad access detected [ 17.065631] [ 17.065700] Memory state around the buggy address: [ 17.065852] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.066241] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.066579] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.066937] ^ [ 17.067283] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067515] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067812] ==================================================================