Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.794562] ================================================================== [ 19.794679] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.794767] Write of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.794825] [ 19.795016] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.795154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.795184] Hardware name: linux,dummy-virt (DT) [ 19.795222] Call trace: [ 19.795249] show_stack+0x20/0x38 (C) [ 19.795637] dump_stack_lvl+0x8c/0xd0 [ 19.795864] print_report+0x118/0x5d0 [ 19.796046] kasan_report+0xdc/0x128 [ 19.796189] kasan_check_range+0x100/0x1a8 [ 19.796285] __kasan_check_write+0x20/0x30 [ 19.796399] copy_user_test_oob+0x234/0xec8 [ 19.796447] kunit_try_run_case+0x170/0x3f0 [ 19.796499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.796872] kthread+0x328/0x630 [ 19.797039] ret_from_fork+0x10/0x20 [ 19.797131] [ 19.797153] Allocated by task 285: [ 19.797189] kasan_save_stack+0x3c/0x68 [ 19.797282] kasan_save_track+0x20/0x40 [ 19.797325] kasan_save_alloc_info+0x40/0x58 [ 19.797368] __kasan_kmalloc+0xd4/0xd8 [ 19.797405] __kmalloc_noprof+0x198/0x4c8 [ 19.797638] kunit_kmalloc_array+0x34/0x88 [ 19.797692] copy_user_test_oob+0xac/0xec8 [ 19.797733] kunit_try_run_case+0x170/0x3f0 [ 19.797776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.798065] kthread+0x328/0x630 [ 19.798210] ret_from_fork+0x10/0x20 [ 19.798250] [ 19.798275] The buggy address belongs to the object at fff00000c780aa00 [ 19.798275] which belongs to the cache kmalloc-128 of size 128 [ 19.798364] The buggy address is located 0 bytes inside of [ 19.798364] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.798526] [ 19.798624] The buggy address belongs to the physical page: [ 19.798680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.798754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.798862] page_type: f5(slab) [ 19.799110] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.799168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.799217] page dumped because: kasan: bad access detected [ 19.799263] [ 19.799306] Memory state around the buggy address: [ 19.799489] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.799598] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.799643] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.799686] ^ [ 19.799766] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.799889] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.799941] ================================================================== [ 19.839411] ================================================================== [ 19.839464] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.839515] Write of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.839569] [ 19.839747] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.839838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.839867] Hardware name: linux,dummy-virt (DT) [ 19.839915] Call trace: [ 19.839938] show_stack+0x20/0x38 (C) [ 19.840393] dump_stack_lvl+0x8c/0xd0 [ 19.840790] print_report+0x118/0x5d0 [ 19.840844] kasan_report+0xdc/0x128 [ 19.841139] kasan_check_range+0x100/0x1a8 [ 19.841311] __kasan_check_write+0x20/0x30 [ 19.841390] copy_user_test_oob+0x434/0xec8 [ 19.841439] kunit_try_run_case+0x170/0x3f0 [ 19.841575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841632] kthread+0x328/0x630 [ 19.841674] ret_from_fork+0x10/0x20 [ 19.841724] [ 19.841745] Allocated by task 285: [ 19.842149] kasan_save_stack+0x3c/0x68 [ 19.842396] kasan_save_track+0x20/0x40 [ 19.842488] kasan_save_alloc_info+0x40/0x58 [ 19.842532] __kasan_kmalloc+0xd4/0xd8 [ 19.842570] __kmalloc_noprof+0x198/0x4c8 [ 19.842616] kunit_kmalloc_array+0x34/0x88 [ 19.842773] copy_user_test_oob+0xac/0xec8 [ 19.842818] kunit_try_run_case+0x170/0x3f0 [ 19.842858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.842936] kthread+0x328/0x630 [ 19.843004] ret_from_fork+0x10/0x20 [ 19.843111] [ 19.843133] The buggy address belongs to the object at fff00000c780aa00 [ 19.843133] which belongs to the cache kmalloc-128 of size 128 [ 19.843222] The buggy address is located 0 bytes inside of [ 19.843222] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.843515] [ 19.843550] The buggy address belongs to the physical page: [ 19.843589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.843694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.843801] page_type: f5(slab) [ 19.843841] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.843922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.843967] page dumped because: kasan: bad access detected [ 19.844001] [ 19.844023] Memory state around the buggy address: [ 19.844059] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.844239] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.844292] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.844629] ^ [ 19.844718] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.844929] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.844997] ================================================================== [ 19.808237] ================================================================== [ 19.808308] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.808364] Read of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.808419] [ 19.808456] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.809056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.809204] Hardware name: linux,dummy-virt (DT) [ 19.809241] Call trace: [ 19.809549] show_stack+0x20/0x38 (C) [ 19.809831] dump_stack_lvl+0x8c/0xd0 [ 19.809886] print_report+0x118/0x5d0 [ 19.809982] kasan_report+0xdc/0x128 [ 19.810569] kasan_check_range+0x100/0x1a8 [ 19.810627] __kasan_check_read+0x20/0x30 [ 19.811090] copy_user_test_oob+0x728/0xec8 [ 19.811322] kunit_try_run_case+0x170/0x3f0 [ 19.811388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.811663] kthread+0x328/0x630 [ 19.811832] ret_from_fork+0x10/0x20 [ 19.811882] [ 19.811916] Allocated by task 285: [ 19.811953] kasan_save_stack+0x3c/0x68 [ 19.812024] kasan_save_track+0x20/0x40 [ 19.812065] kasan_save_alloc_info+0x40/0x58 [ 19.812295] __kasan_kmalloc+0xd4/0xd8 [ 19.812376] __kmalloc_noprof+0x198/0x4c8 [ 19.812485] kunit_kmalloc_array+0x34/0x88 [ 19.812794] copy_user_test_oob+0xac/0xec8 [ 19.812882] kunit_try_run_case+0x170/0x3f0 [ 19.812935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.812998] kthread+0x328/0x630 [ 19.813033] ret_from_fork+0x10/0x20 [ 19.813074] [ 19.813331] The buggy address belongs to the object at fff00000c780aa00 [ 19.813331] which belongs to the cache kmalloc-128 of size 128 [ 19.813432] The buggy address is located 0 bytes inside of [ 19.813432] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.813508] [ 19.813533] The buggy address belongs to the physical page: [ 19.813566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.813823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.814006] page_type: f5(slab) [ 19.814124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.814298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.814505] page dumped because: kasan: bad access detected [ 19.814612] [ 19.814638] Memory state around the buggy address: [ 19.814690] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.814739] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.814860] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.814938] ^ [ 19.814983] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.815029] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.815071] ================================================================== [ 19.827506] ================================================================== [ 19.827576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.827638] Write of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.827693] [ 19.827729] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.827817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.827846] Hardware name: linux,dummy-virt (DT) [ 19.828154] Call trace: [ 19.828196] show_stack+0x20/0x38 (C) [ 19.828265] dump_stack_lvl+0x8c/0xd0 [ 19.828778] print_report+0x118/0x5d0 [ 19.828830] kasan_report+0xdc/0x128 [ 19.828885] kasan_check_range+0x100/0x1a8 [ 19.828947] __kasan_check_write+0x20/0x30 [ 19.828992] copy_user_test_oob+0x35c/0xec8 [ 19.829040] kunit_try_run_case+0x170/0x3f0 [ 19.829091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.829147] kthread+0x328/0x630 [ 19.829195] ret_from_fork+0x10/0x20 [ 19.829246] [ 19.829268] Allocated by task 285: [ 19.829298] kasan_save_stack+0x3c/0x68 [ 19.829345] kasan_save_track+0x20/0x40 [ 19.829384] kasan_save_alloc_info+0x40/0x58 [ 19.829427] __kasan_kmalloc+0xd4/0xd8 [ 19.829476] __kmalloc_noprof+0x198/0x4c8 [ 19.829517] kunit_kmalloc_array+0x34/0x88 [ 19.829557] copy_user_test_oob+0xac/0xec8 [ 19.829597] kunit_try_run_case+0x170/0x3f0 [ 19.829637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.830340] kthread+0x328/0x630 [ 19.830519] ret_from_fork+0x10/0x20 [ 19.830654] [ 19.830700] The buggy address belongs to the object at fff00000c780aa00 [ 19.830700] which belongs to the cache kmalloc-128 of size 128 [ 19.830994] The buggy address is located 0 bytes inside of [ 19.830994] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.831328] [ 19.831402] The buggy address belongs to the physical page: [ 19.831506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.831586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.831639] page_type: f5(slab) [ 19.831714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.831770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.831850] page dumped because: kasan: bad access detected [ 19.832307] [ 19.832345] Memory state around the buggy address: [ 19.832384] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.832548] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832638] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.832680] ^ [ 19.832724] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832769] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832810] ================================================================== [ 19.845677] ================================================================== [ 19.845984] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.846071] Read of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.846126] [ 19.846340] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.846530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.846743] Hardware name: linux,dummy-virt (DT) [ 19.846807] Call trace: [ 19.846910] show_stack+0x20/0x38 (C) [ 19.846968] dump_stack_lvl+0x8c/0xd0 [ 19.847016] print_report+0x118/0x5d0 [ 19.847070] kasan_report+0xdc/0x128 [ 19.847167] kasan_check_range+0x100/0x1a8 [ 19.847426] __kasan_check_read+0x20/0x30 [ 19.847725] copy_user_test_oob+0x4a0/0xec8 [ 19.847923] kunit_try_run_case+0x170/0x3f0 [ 19.847973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.848028] kthread+0x328/0x630 [ 19.848073] ret_from_fork+0x10/0x20 [ 19.848120] [ 19.848140] Allocated by task 285: [ 19.848305] kasan_save_stack+0x3c/0x68 [ 19.848484] kasan_save_track+0x20/0x40 [ 19.848782] kasan_save_alloc_info+0x40/0x58 [ 19.848829] __kasan_kmalloc+0xd4/0xd8 [ 19.849036] __kmalloc_noprof+0x198/0x4c8 [ 19.849385] kunit_kmalloc_array+0x34/0x88 [ 19.849425] copy_user_test_oob+0xac/0xec8 [ 19.849466] kunit_try_run_case+0x170/0x3f0 [ 19.849622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849669] kthread+0x328/0x630 [ 19.849704] ret_from_fork+0x10/0x20 [ 19.849743] [ 19.849765] The buggy address belongs to the object at fff00000c780aa00 [ 19.849765] which belongs to the cache kmalloc-128 of size 128 [ 19.849826] The buggy address is located 0 bytes inside of [ 19.849826] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.850650] [ 19.850723] The buggy address belongs to the physical page: [ 19.850909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.850973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.851099] page_type: f5(slab) [ 19.851173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.851225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.851270] page dumped because: kasan: bad access detected [ 19.851306] [ 19.851326] Memory state around the buggy address: [ 19.851362] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.851410] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851455] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.851497] ^ [ 19.851542] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851588] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851841] ================================================================== [ 19.833380] ================================================================== [ 19.833698] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.833752] Read of size 121 at addr fff00000c780aa00 by task kunit_try_catch/285 [ 19.833812] [ 19.833846] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.833951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.833981] Hardware name: linux,dummy-virt (DT) [ 19.834015] Call trace: [ 19.834278] show_stack+0x20/0x38 (C) [ 19.834586] dump_stack_lvl+0x8c/0xd0 [ 19.834918] print_report+0x118/0x5d0 [ 19.835001] kasan_report+0xdc/0x128 [ 19.835054] kasan_check_range+0x100/0x1a8 [ 19.835103] __kasan_check_read+0x20/0x30 [ 19.835150] copy_user_test_oob+0x3c8/0xec8 [ 19.835334] kunit_try_run_case+0x170/0x3f0 [ 19.835397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.835453] kthread+0x328/0x630 [ 19.835502] ret_from_fork+0x10/0x20 [ 19.835552] [ 19.835572] Allocated by task 285: [ 19.835603] kasan_save_stack+0x3c/0x68 [ 19.835645] kasan_save_track+0x20/0x40 [ 19.835686] kasan_save_alloc_info+0x40/0x58 [ 19.835728] __kasan_kmalloc+0xd4/0xd8 [ 19.835829] __kmalloc_noprof+0x198/0x4c8 [ 19.836005] kunit_kmalloc_array+0x34/0x88 [ 19.836066] copy_user_test_oob+0xac/0xec8 [ 19.836107] kunit_try_run_case+0x170/0x3f0 [ 19.836147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.836221] kthread+0x328/0x630 [ 19.836258] ret_from_fork+0x10/0x20 [ 19.836324] [ 19.836414] The buggy address belongs to the object at fff00000c780aa00 [ 19.836414] which belongs to the cache kmalloc-128 of size 128 [ 19.836476] The buggy address is located 0 bytes inside of [ 19.836476] allocated 120-byte region [fff00000c780aa00, fff00000c780aa78) [ 19.836539] [ 19.836621] The buggy address belongs to the physical page: [ 19.836790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a [ 19.836975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.837053] page_type: f5(slab) [ 19.837151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.837259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.837300] page dumped because: kasan: bad access detected [ 19.837386] [ 19.837454] Memory state around the buggy address: [ 19.837536] fff00000c780a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.837620] fff00000c780a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.837728] >fff00000c780aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.837768] ^ [ 19.837811] fff00000c780aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.837856] fff00000c780ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.838070] ==================================================================
[ 20.124880] ================================================================== [ 20.125002] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 20.125181] Read of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.125247] [ 20.125281] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.125658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.125711] Hardware name: linux,dummy-virt (DT) [ 20.125885] Call trace: [ 20.125958] show_stack+0x20/0x38 (C) [ 20.126134] dump_stack_lvl+0x8c/0xd0 [ 20.126213] print_report+0x118/0x5d0 [ 20.126722] kasan_report+0xdc/0x128 [ 20.127111] kasan_check_range+0x100/0x1a8 [ 20.127291] __kasan_check_read+0x20/0x30 [ 20.127512] copy_user_test_oob+0x728/0xec8 [ 20.127704] kunit_try_run_case+0x170/0x3f0 [ 20.128044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.128205] kthread+0x328/0x630 [ 20.128263] ret_from_fork+0x10/0x20 [ 20.128471] [ 20.128835] Allocated by task 285: [ 20.128888] kasan_save_stack+0x3c/0x68 [ 20.128983] kasan_save_track+0x20/0x40 [ 20.129116] kasan_save_alloc_info+0x40/0x58 [ 20.129335] __kasan_kmalloc+0xd4/0xd8 [ 20.129500] __kmalloc_noprof+0x198/0x4c8 [ 20.129557] kunit_kmalloc_array+0x34/0x88 [ 20.129597] copy_user_test_oob+0xac/0xec8 [ 20.129649] kunit_try_run_case+0x170/0x3f0 [ 20.129763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.130186] kthread+0x328/0x630 [ 20.130350] ret_from_fork+0x10/0x20 [ 20.130888] [ 20.131008] The buggy address belongs to the object at fff00000c5b3e200 [ 20.131008] which belongs to the cache kmalloc-128 of size 128 [ 20.131404] The buggy address is located 0 bytes inside of [ 20.131404] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.131545] [ 20.131768] The buggy address belongs to the physical page: [ 20.131831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.131897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.131952] page_type: f5(slab) [ 20.131993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.132048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.132093] page dumped because: kasan: bad access detected [ 20.132147] [ 20.132182] Memory state around the buggy address: [ 20.132227] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.132283] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.132330] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.132378] ^ [ 20.132428] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.132490] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.132545] ================================================================== [ 20.154056] ================================================================== [ 20.154114] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 20.154185] Read of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.154279] [ 20.154314] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.154875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.154911] Hardware name: linux,dummy-virt (DT) [ 20.154947] Call trace: [ 20.155251] show_stack+0x20/0x38 (C) [ 20.155424] dump_stack_lvl+0x8c/0xd0 [ 20.155483] print_report+0x118/0x5d0 [ 20.155704] kasan_report+0xdc/0x128 [ 20.155912] kasan_check_range+0x100/0x1a8 [ 20.155980] __kasan_check_read+0x20/0x30 [ 20.156167] copy_user_test_oob+0x3c8/0xec8 [ 20.156309] kunit_try_run_case+0x170/0x3f0 [ 20.156363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.156670] kthread+0x328/0x630 [ 20.156739] ret_from_fork+0x10/0x20 [ 20.156792] [ 20.156876] Allocated by task 285: [ 20.156913] kasan_save_stack+0x3c/0x68 [ 20.157027] kasan_save_track+0x20/0x40 [ 20.157069] kasan_save_alloc_info+0x40/0x58 [ 20.157167] __kasan_kmalloc+0xd4/0xd8 [ 20.157207] __kmalloc_noprof+0x198/0x4c8 [ 20.157260] kunit_kmalloc_array+0x34/0x88 [ 20.157615] copy_user_test_oob+0xac/0xec8 [ 20.157775] kunit_try_run_case+0x170/0x3f0 [ 20.157821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.157867] kthread+0x328/0x630 [ 20.157910] ret_from_fork+0x10/0x20 [ 20.157987] [ 20.158010] The buggy address belongs to the object at fff00000c5b3e200 [ 20.158010] which belongs to the cache kmalloc-128 of size 128 [ 20.158071] The buggy address is located 0 bytes inside of [ 20.158071] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.158146] [ 20.158199] The buggy address belongs to the physical page: [ 20.158246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.158310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.158360] page_type: f5(slab) [ 20.158400] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.158475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.158536] page dumped because: kasan: bad access detected [ 20.158575] [ 20.158597] Memory state around the buggy address: [ 20.159160] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.159730] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.160092] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.160197] ^ [ 20.160381] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.160590] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.160735] ================================================================== [ 20.172100] ================================================================== [ 20.172218] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 20.172300] Read of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.172440] [ 20.172478] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.172740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.172782] Hardware name: linux,dummy-virt (DT) [ 20.172815] Call trace: [ 20.172843] show_stack+0x20/0x38 (C) [ 20.173291] dump_stack_lvl+0x8c/0xd0 [ 20.173401] print_report+0x118/0x5d0 [ 20.173641] kasan_report+0xdc/0x128 [ 20.173810] kasan_check_range+0x100/0x1a8 [ 20.173870] __kasan_check_read+0x20/0x30 [ 20.174372] copy_user_test_oob+0x4a0/0xec8 [ 20.174459] kunit_try_run_case+0x170/0x3f0 [ 20.174744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.175108] kthread+0x328/0x630 [ 20.175304] ret_from_fork+0x10/0x20 [ 20.175601] [ 20.175864] Allocated by task 285: [ 20.175949] kasan_save_stack+0x3c/0x68 [ 20.176107] kasan_save_track+0x20/0x40 [ 20.176236] kasan_save_alloc_info+0x40/0x58 [ 20.176287] __kasan_kmalloc+0xd4/0xd8 [ 20.176747] __kmalloc_noprof+0x198/0x4c8 [ 20.177001] kunit_kmalloc_array+0x34/0x88 [ 20.177251] copy_user_test_oob+0xac/0xec8 [ 20.177347] kunit_try_run_case+0x170/0x3f0 [ 20.177437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177756] kthread+0x328/0x630 [ 20.177843] ret_from_fork+0x10/0x20 [ 20.178031] [ 20.178485] The buggy address belongs to the object at fff00000c5b3e200 [ 20.178485] which belongs to the cache kmalloc-128 of size 128 [ 20.178582] The buggy address is located 0 bytes inside of [ 20.178582] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.178900] [ 20.179098] The buggy address belongs to the physical page: [ 20.179166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.179700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.179833] page_type: f5(slab) [ 20.179902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.180341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.180606] page dumped because: kasan: bad access detected [ 20.180763] [ 20.180813] Memory state around the buggy address: [ 20.181573] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.181670] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.181717] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.181982] ^ [ 20.182154] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182212] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182256] ================================================================== [ 20.162327] ================================================================== [ 20.162535] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 20.162945] Write of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.163262] [ 20.163476] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.163585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.163806] Hardware name: linux,dummy-virt (DT) [ 20.163882] Call trace: [ 20.163990] show_stack+0x20/0x38 (C) [ 20.164053] dump_stack_lvl+0x8c/0xd0 [ 20.164103] print_report+0x118/0x5d0 [ 20.164160] kasan_report+0xdc/0x128 [ 20.164628] kasan_check_range+0x100/0x1a8 [ 20.164914] __kasan_check_write+0x20/0x30 [ 20.165361] copy_user_test_oob+0x434/0xec8 [ 20.165612] kunit_try_run_case+0x170/0x3f0 [ 20.165967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.166210] kthread+0x328/0x630 [ 20.166276] ret_from_fork+0x10/0x20 [ 20.166465] [ 20.166781] Allocated by task 285: [ 20.166914] kasan_save_stack+0x3c/0x68 [ 20.167285] kasan_save_track+0x20/0x40 [ 20.167486] kasan_save_alloc_info+0x40/0x58 [ 20.167714] __kasan_kmalloc+0xd4/0xd8 [ 20.167835] __kmalloc_noprof+0x198/0x4c8 [ 20.167878] kunit_kmalloc_array+0x34/0x88 [ 20.167920] copy_user_test_oob+0xac/0xec8 [ 20.167968] kunit_try_run_case+0x170/0x3f0 [ 20.168009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.168075] kthread+0x328/0x630 [ 20.168125] ret_from_fork+0x10/0x20 [ 20.168163] [ 20.168197] The buggy address belongs to the object at fff00000c5b3e200 [ 20.168197] which belongs to the cache kmalloc-128 of size 128 [ 20.168268] The buggy address is located 0 bytes inside of [ 20.168268] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.168346] [ 20.168375] The buggy address belongs to the physical page: [ 20.168439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.168494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.168554] page_type: f5(slab) [ 20.168596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.168676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.168721] page dumped because: kasan: bad access detected [ 20.168758] [ 20.168787] Memory state around the buggy address: [ 20.168822] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.168870] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.168916] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.169731] ^ [ 20.169788] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.169838] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.169924] ================================================================== [ 20.144261] ================================================================== [ 20.144357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 20.144416] Write of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.144729] [ 20.144844] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.145064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.145103] Hardware name: linux,dummy-virt (DT) [ 20.145433] Call trace: [ 20.145537] show_stack+0x20/0x38 (C) [ 20.145667] dump_stack_lvl+0x8c/0xd0 [ 20.145803] print_report+0x118/0x5d0 [ 20.145871] kasan_report+0xdc/0x128 [ 20.145957] kasan_check_range+0x100/0x1a8 [ 20.146052] __kasan_check_write+0x20/0x30 [ 20.146252] copy_user_test_oob+0x35c/0xec8 [ 20.146565] kunit_try_run_case+0x170/0x3f0 [ 20.146828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.147457] kthread+0x328/0x630 [ 20.147741] ret_from_fork+0x10/0x20 [ 20.147888] [ 20.147911] Allocated by task 285: [ 20.148107] kasan_save_stack+0x3c/0x68 [ 20.148312] kasan_save_track+0x20/0x40 [ 20.148412] kasan_save_alloc_info+0x40/0x58 [ 20.148458] __kasan_kmalloc+0xd4/0xd8 [ 20.148507] __kmalloc_noprof+0x198/0x4c8 [ 20.148548] kunit_kmalloc_array+0x34/0x88 [ 20.148589] copy_user_test_oob+0xac/0xec8 [ 20.148648] kunit_try_run_case+0x170/0x3f0 [ 20.148690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.148735] kthread+0x328/0x630 [ 20.148771] ret_from_fork+0x10/0x20 [ 20.148809] [ 20.148834] The buggy address belongs to the object at fff00000c5b3e200 [ 20.148834] which belongs to the cache kmalloc-128 of size 128 [ 20.148897] The buggy address is located 0 bytes inside of [ 20.148897] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.149548] [ 20.149639] The buggy address belongs to the physical page: [ 20.149768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.150115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.150347] page_type: f5(slab) [ 20.150510] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.150719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.150765] page dumped because: kasan: bad access detected [ 20.151348] [ 20.151446] Memory state around the buggy address: [ 20.151589] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.151671] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.152034] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.152240] ^ [ 20.152479] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.152701] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.152832] ================================================================== [ 20.107897] ================================================================== [ 20.108011] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 20.108101] Write of size 121 at addr fff00000c5b3e200 by task kunit_try_catch/285 [ 20.109185] [ 20.109286] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 20.110209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.110292] Hardware name: linux,dummy-virt (DT) [ 20.110736] Call trace: [ 20.111098] show_stack+0x20/0x38 (C) [ 20.111184] dump_stack_lvl+0x8c/0xd0 [ 20.111467] print_report+0x118/0x5d0 [ 20.111679] kasan_report+0xdc/0x128 [ 20.112011] kasan_check_range+0x100/0x1a8 [ 20.112168] __kasan_check_write+0x20/0x30 [ 20.112220] copy_user_test_oob+0x234/0xec8 [ 20.112581] kunit_try_run_case+0x170/0x3f0 [ 20.112970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.113240] kthread+0x328/0x630 [ 20.113410] ret_from_fork+0x10/0x20 [ 20.113642] [ 20.113707] Allocated by task 285: [ 20.113837] kasan_save_stack+0x3c/0x68 [ 20.113954] kasan_save_track+0x20/0x40 [ 20.114367] kasan_save_alloc_info+0x40/0x58 [ 20.114510] __kasan_kmalloc+0xd4/0xd8 [ 20.114564] __kmalloc_noprof+0x198/0x4c8 [ 20.114607] kunit_kmalloc_array+0x34/0x88 [ 20.114661] copy_user_test_oob+0xac/0xec8 [ 20.114741] kunit_try_run_case+0x170/0x3f0 [ 20.114799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.114856] kthread+0x328/0x630 [ 20.114892] ret_from_fork+0x10/0x20 [ 20.114947] [ 20.114971] The buggy address belongs to the object at fff00000c5b3e200 [ 20.114971] which belongs to the cache kmalloc-128 of size 128 [ 20.115037] The buggy address is located 0 bytes inside of [ 20.115037] allocated 120-byte region [fff00000c5b3e200, fff00000c5b3e278) [ 20.115111] [ 20.115146] The buggy address belongs to the physical page: [ 20.115191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b3e [ 20.115255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.115309] page_type: f5(slab) [ 20.115366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.115422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.115475] page dumped because: kasan: bad access detected [ 20.115517] [ 20.115547] Memory state around the buggy address: [ 20.115594] fff00000c5b3e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.115653] fff00000c5b3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.115713] >fff00000c5b3e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.115768] ^ [ 20.115811] fff00000c5b3e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.115871] fff00000c5b3e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.115914] ==================================================================
[ 16.765360] ================================================================== [ 16.765689] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.766165] Read of size 121 at addr ffff88810315a200 by task kunit_try_catch/303 [ 16.766510] [ 16.766640] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.766687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.766701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.766726] Call Trace: [ 16.766740] <TASK> [ 16.766756] dump_stack_lvl+0x73/0xb0 [ 16.766785] print_report+0xd1/0x610 [ 16.766808] ? __virt_addr_valid+0x1db/0x2d0 [ 16.766832] ? copy_user_test_oob+0x604/0x10f0 [ 16.766856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.766880] ? copy_user_test_oob+0x604/0x10f0 [ 16.766904] kasan_report+0x141/0x180 [ 16.766927] ? copy_user_test_oob+0x604/0x10f0 [ 16.766957] kasan_check_range+0x10c/0x1c0 [ 16.767004] __kasan_check_read+0x15/0x20 [ 16.767026] copy_user_test_oob+0x604/0x10f0 [ 16.767052] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.767078] ? finish_task_switch.isra.0+0x153/0x700 [ 16.767123] ? __switch_to+0x47/0xf50 [ 16.767155] ? __schedule+0x10c6/0x2b60 [ 16.767185] ? __pfx_read_tsc+0x10/0x10 [ 16.767211] ? ktime_get_ts64+0x86/0x230 [ 16.767237] kunit_try_run_case+0x1a5/0x480 [ 16.767263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.767286] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.767313] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.767339] ? __kthread_parkme+0x82/0x180 [ 16.767361] ? preempt_count_sub+0x50/0x80 [ 16.767386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.767422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.767449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.767492] kthread+0x337/0x6f0 [ 16.767514] ? trace_preempt_on+0x20/0xc0 [ 16.767538] ? __pfx_kthread+0x10/0x10 [ 16.767562] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.767599] ? calculate_sigpending+0x7b/0xa0 [ 16.767624] ? __pfx_kthread+0x10/0x10 [ 16.767647] ret_from_fork+0x116/0x1d0 [ 16.767683] ? __pfx_kthread+0x10/0x10 [ 16.767705] ret_from_fork_asm+0x1a/0x30 [ 16.767740] </TASK> [ 16.767751] [ 16.776048] Allocated by task 303: [ 16.776264] kasan_save_stack+0x45/0x70 [ 16.776501] kasan_save_track+0x18/0x40 [ 16.776746] kasan_save_alloc_info+0x3b/0x50 [ 16.776979] __kasan_kmalloc+0xb7/0xc0 [ 16.777158] __kmalloc_noprof+0x1c9/0x500 [ 16.777379] kunit_kmalloc_array+0x25/0x60 [ 16.777585] copy_user_test_oob+0xab/0x10f0 [ 16.777811] kunit_try_run_case+0x1a5/0x480 [ 16.778053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.778305] kthread+0x337/0x6f0 [ 16.778525] ret_from_fork+0x116/0x1d0 [ 16.778758] ret_from_fork_asm+0x1a/0x30 [ 16.778956] [ 16.779035] The buggy address belongs to the object at ffff88810315a200 [ 16.779035] which belongs to the cache kmalloc-128 of size 128 [ 16.779505] The buggy address is located 0 bytes inside of [ 16.779505] allocated 120-byte region [ffff88810315a200, ffff88810315a278) [ 16.779928] [ 16.780026] The buggy address belongs to the physical page: [ 16.780279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.780844] flags: 0x200000000000000(node=0|zone=2) [ 16.781018] page_type: f5(slab) [ 16.781142] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.781377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.781915] page dumped because: kasan: bad access detected [ 16.782208] [ 16.782306] Memory state around the buggy address: [ 16.782579] ffff88810315a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.782943] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.783269] >ffff88810315a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.783615] ^ [ 16.783927] ffff88810315a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.784249] ffff88810315a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.784578] ================================================================== [ 16.742561] ================================================================== [ 16.742881] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.743249] Write of size 121 at addr ffff88810315a200 by task kunit_try_catch/303 [ 16.743597] [ 16.743695] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.743759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.743773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.743796] Call Trace: [ 16.743813] <TASK> [ 16.743829] dump_stack_lvl+0x73/0xb0 [ 16.743859] print_report+0xd1/0x610 [ 16.743883] ? __virt_addr_valid+0x1db/0x2d0 [ 16.743907] ? copy_user_test_oob+0x557/0x10f0 [ 16.743931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.743955] ? copy_user_test_oob+0x557/0x10f0 [ 16.743980] kasan_report+0x141/0x180 [ 16.744003] ? copy_user_test_oob+0x557/0x10f0 [ 16.744033] kasan_check_range+0x10c/0x1c0 [ 16.744058] __kasan_check_write+0x18/0x20 [ 16.744078] copy_user_test_oob+0x557/0x10f0 [ 16.744104] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.744128] ? finish_task_switch.isra.0+0x153/0x700 [ 16.744153] ? __switch_to+0x47/0xf50 [ 16.744181] ? __schedule+0x10c6/0x2b60 [ 16.744205] ? __pfx_read_tsc+0x10/0x10 [ 16.744227] ? ktime_get_ts64+0x86/0x230 [ 16.744252] kunit_try_run_case+0x1a5/0x480 [ 16.744278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.744302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.744327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.744352] ? __kthread_parkme+0x82/0x180 [ 16.744373] ? preempt_count_sub+0x50/0x80 [ 16.744409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.744435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.744460] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.744485] kthread+0x337/0x6f0 [ 16.744506] ? trace_preempt_on+0x20/0xc0 [ 16.744530] ? __pfx_kthread+0x10/0x10 [ 16.744552] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.744575] ? calculate_sigpending+0x7b/0xa0 [ 16.744614] ? __pfx_kthread+0x10/0x10 [ 16.744638] ret_from_fork+0x116/0x1d0 [ 16.744657] ? __pfx_kthread+0x10/0x10 [ 16.744682] ret_from_fork_asm+0x1a/0x30 [ 16.744715] </TASK> [ 16.744727] [ 16.753773] Allocated by task 303: [ 16.753982] kasan_save_stack+0x45/0x70 [ 16.754451] kasan_save_track+0x18/0x40 [ 16.754720] kasan_save_alloc_info+0x3b/0x50 [ 16.755067] __kasan_kmalloc+0xb7/0xc0 [ 16.755285] __kmalloc_noprof+0x1c9/0x500 [ 16.755615] kunit_kmalloc_array+0x25/0x60 [ 16.755932] copy_user_test_oob+0xab/0x10f0 [ 16.756218] kunit_try_run_case+0x1a5/0x480 [ 16.756447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.756902] kthread+0x337/0x6f0 [ 16.757078] ret_from_fork+0x116/0x1d0 [ 16.757231] ret_from_fork_asm+0x1a/0x30 [ 16.757614] [ 16.757743] The buggy address belongs to the object at ffff88810315a200 [ 16.757743] which belongs to the cache kmalloc-128 of size 128 [ 16.758475] The buggy address is located 0 bytes inside of [ 16.758475] allocated 120-byte region [ffff88810315a200, ffff88810315a278) [ 16.759129] [ 16.759238] The buggy address belongs to the physical page: [ 16.759683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.760071] flags: 0x200000000000000(node=0|zone=2) [ 16.760432] page_type: f5(slab) [ 16.760659] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.761122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.761472] page dumped because: kasan: bad access detected [ 16.761860] [ 16.761984] Memory state around the buggy address: [ 16.762294] ffff88810315a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.762618] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.763137] >ffff88810315a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.763527] ^ [ 16.763964] ffff88810315a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764359] ffff88810315a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764836] ================================================================== [ 16.704499] ================================================================== [ 16.705061] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.705383] Write of size 121 at addr ffff88810315a200 by task kunit_try_catch/303 [ 16.705774] [ 16.705885] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.705932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.705946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.705970] Call Trace: [ 16.705984] <TASK> [ 16.706001] dump_stack_lvl+0x73/0xb0 [ 16.706032] print_report+0xd1/0x610 [ 16.706056] ? __virt_addr_valid+0x1db/0x2d0 [ 16.706080] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.706105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.706128] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.706154] kasan_report+0x141/0x180 [ 16.706177] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.706208] kasan_check_range+0x10c/0x1c0 [ 16.706233] __kasan_check_write+0x18/0x20 [ 16.706253] copy_user_test_oob+0x3fd/0x10f0 [ 16.706280] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.706304] ? finish_task_switch.isra.0+0x153/0x700 [ 16.706328] ? __switch_to+0x47/0xf50 [ 16.706356] ? __schedule+0x10c6/0x2b60 [ 16.706381] ? __pfx_read_tsc+0x10/0x10 [ 16.706415] ? ktime_get_ts64+0x86/0x230 [ 16.706442] kunit_try_run_case+0x1a5/0x480 [ 16.706468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.706518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.706543] ? __kthread_parkme+0x82/0x180 [ 16.706566] ? preempt_count_sub+0x50/0x80 [ 16.706591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.706642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.706668] kthread+0x337/0x6f0 [ 16.706689] ? trace_preempt_on+0x20/0xc0 [ 16.706713] ? __pfx_kthread+0x10/0x10 [ 16.706735] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.706758] ? calculate_sigpending+0x7b/0xa0 [ 16.706784] ? __pfx_kthread+0x10/0x10 [ 16.706808] ret_from_fork+0x116/0x1d0 [ 16.706828] ? __pfx_kthread+0x10/0x10 [ 16.706850] ret_from_fork_asm+0x1a/0x30 [ 16.706883] </TASK> [ 16.706894] [ 16.714027] Allocated by task 303: [ 16.714202] kasan_save_stack+0x45/0x70 [ 16.714376] kasan_save_track+0x18/0x40 [ 16.714549] kasan_save_alloc_info+0x3b/0x50 [ 16.714777] __kasan_kmalloc+0xb7/0xc0 [ 16.714960] __kmalloc_noprof+0x1c9/0x500 [ 16.715137] kunit_kmalloc_array+0x25/0x60 [ 16.715285] copy_user_test_oob+0xab/0x10f0 [ 16.715466] kunit_try_run_case+0x1a5/0x480 [ 16.715672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.715960] kthread+0x337/0x6f0 [ 16.716112] ret_from_fork+0x116/0x1d0 [ 16.716249] ret_from_fork_asm+0x1a/0x30 [ 16.716445] [ 16.716546] The buggy address belongs to the object at ffff88810315a200 [ 16.716546] which belongs to the cache kmalloc-128 of size 128 [ 16.717074] The buggy address is located 0 bytes inside of [ 16.717074] allocated 120-byte region [ffff88810315a200, ffff88810315a278) [ 16.717542] [ 16.717683] The buggy address belongs to the physical page: [ 16.717889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.718216] flags: 0x200000000000000(node=0|zone=2) [ 16.718460] page_type: f5(slab) [ 16.718610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.718914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.719170] page dumped because: kasan: bad access detected [ 16.719347] [ 16.719429] Memory state around the buggy address: [ 16.719588] ffff88810315a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.719809] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720029] >ffff88810315a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.720313] ^ [ 16.720958] ffff88810315a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.721277] ffff88810315a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.721607] ================================================================== [ 16.722160] ================================================================== [ 16.722524] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.722899] Read of size 121 at addr ffff88810315a200 by task kunit_try_catch/303 [ 16.723429] [ 16.723537] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.723580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.723593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.723617] Call Trace: [ 16.723633] <TASK> [ 16.723651] dump_stack_lvl+0x73/0xb0 [ 16.723679] print_report+0xd1/0x610 [ 16.723703] ? __virt_addr_valid+0x1db/0x2d0 [ 16.723728] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.723753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.723777] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.723802] kasan_report+0x141/0x180 [ 16.723825] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.723855] kasan_check_range+0x10c/0x1c0 [ 16.723880] __kasan_check_read+0x15/0x20 [ 16.723900] copy_user_test_oob+0x4aa/0x10f0 [ 16.723927] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.723951] ? finish_task_switch.isra.0+0x153/0x700 [ 16.723976] ? __switch_to+0x47/0xf50 [ 16.724004] ? __schedule+0x10c6/0x2b60 [ 16.724028] ? __pfx_read_tsc+0x10/0x10 [ 16.724050] ? ktime_get_ts64+0x86/0x230 [ 16.724076] kunit_try_run_case+0x1a5/0x480 [ 16.724102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.724125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.724150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.724176] ? __kthread_parkme+0x82/0x180 [ 16.724198] ? preempt_count_sub+0x50/0x80 [ 16.724223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.724249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.724274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.724299] kthread+0x337/0x6f0 [ 16.724320] ? trace_preempt_on+0x20/0xc0 [ 16.724345] ? __pfx_kthread+0x10/0x10 [ 16.724367] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.724390] ? calculate_sigpending+0x7b/0xa0 [ 16.724426] ? __pfx_kthread+0x10/0x10 [ 16.724450] ret_from_fork+0x116/0x1d0 [ 16.724470] ? __pfx_kthread+0x10/0x10 [ 16.724491] ret_from_fork_asm+0x1a/0x30 [ 16.724524] </TASK> [ 16.724536] [ 16.731691] Allocated by task 303: [ 16.731822] kasan_save_stack+0x45/0x70 [ 16.731966] kasan_save_track+0x18/0x40 [ 16.732106] kasan_save_alloc_info+0x3b/0x50 [ 16.732318] __kasan_kmalloc+0xb7/0xc0 [ 16.732520] __kmalloc_noprof+0x1c9/0x500 [ 16.732735] kunit_kmalloc_array+0x25/0x60 [ 16.732938] copy_user_test_oob+0xab/0x10f0 [ 16.733118] kunit_try_run_case+0x1a5/0x480 [ 16.733306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.733559] kthread+0x337/0x6f0 [ 16.733754] ret_from_fork+0x116/0x1d0 [ 16.733927] ret_from_fork_asm+0x1a/0x30 [ 16.734104] [ 16.734198] The buggy address belongs to the object at ffff88810315a200 [ 16.734198] which belongs to the cache kmalloc-128 of size 128 [ 16.734694] The buggy address is located 0 bytes inside of [ 16.734694] allocated 120-byte region [ffff88810315a200, ffff88810315a278) [ 16.735165] [ 16.735242] The buggy address belongs to the physical page: [ 16.735498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10315a [ 16.735809] flags: 0x200000000000000(node=0|zone=2) [ 16.735974] page_type: f5(slab) [ 16.736098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.736336] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.736662] page dumped because: kasan: bad access detected [ 16.736926] [ 16.737021] Memory state around the buggy address: [ 16.737245] ffff88810315a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.737583] ffff88810315a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.737899] >ffff88810315a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.738167] ^ [ 16.738384] ffff88810315a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.739294] ffff88810315a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.739529] ==================================================================
[ 16.845170] ================================================================== [ 16.845677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.846058] Write of size 121 at addr ffff8881027bcb00 by task kunit_try_catch/303 [ 16.846392] [ 16.846493] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.846536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.846550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.846572] Call Trace: [ 16.846589] <TASK> [ 16.846604] dump_stack_lvl+0x73/0xb0 [ 16.846633] print_report+0xd1/0x610 [ 16.846656] ? __virt_addr_valid+0x1db/0x2d0 [ 16.847117] ? copy_user_test_oob+0x557/0x10f0 [ 16.847233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.847257] ? copy_user_test_oob+0x557/0x10f0 [ 16.847281] kasan_report+0x141/0x180 [ 16.847305] ? copy_user_test_oob+0x557/0x10f0 [ 16.847511] kasan_check_range+0x10c/0x1c0 [ 16.847538] __kasan_check_write+0x18/0x20 [ 16.847558] copy_user_test_oob+0x557/0x10f0 [ 16.847584] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.847607] ? finish_task_switch.isra.0+0x153/0x700 [ 16.847632] ? __switch_to+0x47/0xf50 [ 16.847658] ? __schedule+0x10c6/0x2b60 [ 16.847682] ? __pfx_read_tsc+0x10/0x10 [ 16.847704] ? ktime_get_ts64+0x86/0x230 [ 16.847728] kunit_try_run_case+0x1a5/0x480 [ 16.847753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.847777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.847802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.847826] ? __kthread_parkme+0x82/0x180 [ 16.847847] ? preempt_count_sub+0x50/0x80 [ 16.847871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.847896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.847920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.847945] kthread+0x337/0x6f0 [ 16.847964] ? trace_preempt_on+0x20/0xc0 [ 16.847988] ? __pfx_kthread+0x10/0x10 [ 16.848010] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.848032] ? calculate_sigpending+0x7b/0xa0 [ 16.848057] ? __pfx_kthread+0x10/0x10 [ 16.848079] ret_from_fork+0x116/0x1d0 [ 16.848097] ? __pfx_kthread+0x10/0x10 [ 16.848118] ret_from_fork_asm+0x1a/0x30 [ 16.848162] </TASK> [ 16.848173] [ 16.858382] Allocated by task 303: [ 16.858790] kasan_save_stack+0x45/0x70 [ 16.858989] kasan_save_track+0x18/0x40 [ 16.859155] kasan_save_alloc_info+0x3b/0x50 [ 16.859580] __kasan_kmalloc+0xb7/0xc0 [ 16.859791] __kmalloc_noprof+0x1c9/0x500 [ 16.860069] kunit_kmalloc_array+0x25/0x60 [ 16.860257] copy_user_test_oob+0xab/0x10f0 [ 16.860669] kunit_try_run_case+0x1a5/0x480 [ 16.860962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.861288] kthread+0x337/0x6f0 [ 16.861462] ret_from_fork+0x116/0x1d0 [ 16.861805] ret_from_fork_asm+0x1a/0x30 [ 16.862070] [ 16.862247] The buggy address belongs to the object at ffff8881027bcb00 [ 16.862247] which belongs to the cache kmalloc-128 of size 128 [ 16.862937] The buggy address is located 0 bytes inside of [ 16.862937] allocated 120-byte region [ffff8881027bcb00, ffff8881027bcb78) [ 16.863653] [ 16.863743] The buggy address belongs to the physical page: [ 16.864160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.864544] flags: 0x200000000000000(node=0|zone=2) [ 16.864855] page_type: f5(slab) [ 16.864990] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.865587] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.866044] page dumped because: kasan: bad access detected [ 16.866259] [ 16.866477] Memory state around the buggy address: [ 16.866681] ffff8881027bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.866994] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.867306] >ffff8881027bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.867915] ^ [ 16.868385] ffff8881027bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868805] ffff8881027bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.869231] ================================================================== [ 16.799238] ================================================================== [ 16.799646] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.800026] Write of size 121 at addr ffff8881027bcb00 by task kunit_try_catch/303 [ 16.800402] [ 16.800556] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.800604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.800618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.800674] Call Trace: [ 16.800687] <TASK> [ 16.800704] dump_stack_lvl+0x73/0xb0 [ 16.800745] print_report+0xd1/0x610 [ 16.800768] ? __virt_addr_valid+0x1db/0x2d0 [ 16.800792] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.800815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.800838] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.800862] kasan_report+0x141/0x180 [ 16.800885] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.800913] kasan_check_range+0x10c/0x1c0 [ 16.800939] __kasan_check_write+0x18/0x20 [ 16.800959] copy_user_test_oob+0x3fd/0x10f0 [ 16.800985] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.801010] ? finish_task_switch.isra.0+0x153/0x700 [ 16.801035] ? __switch_to+0x47/0xf50 [ 16.801062] ? __schedule+0x10c6/0x2b60 [ 16.801085] ? __pfx_read_tsc+0x10/0x10 [ 16.801109] ? ktime_get_ts64+0x86/0x230 [ 16.801134] kunit_try_run_case+0x1a5/0x480 [ 16.801169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.801202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.801229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.801269] ? __kthread_parkme+0x82/0x180 [ 16.801290] ? preempt_count_sub+0x50/0x80 [ 16.801314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.801340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.801364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.801389] kthread+0x337/0x6f0 [ 16.801408] ? trace_preempt_on+0x20/0xc0 [ 16.801432] ? __pfx_kthread+0x10/0x10 [ 16.801454] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.801476] ? calculate_sigpending+0x7b/0xa0 [ 16.801502] ? __pfx_kthread+0x10/0x10 [ 16.801525] ret_from_fork+0x116/0x1d0 [ 16.801545] ? __pfx_kthread+0x10/0x10 [ 16.801565] ret_from_fork_asm+0x1a/0x30 [ 16.801596] </TASK> [ 16.801607] [ 16.809043] Allocated by task 303: [ 16.809233] kasan_save_stack+0x45/0x70 [ 16.809460] kasan_save_track+0x18/0x40 [ 16.809664] kasan_save_alloc_info+0x3b/0x50 [ 16.809870] __kasan_kmalloc+0xb7/0xc0 [ 16.810053] __kmalloc_noprof+0x1c9/0x500 [ 16.810246] kunit_kmalloc_array+0x25/0x60 [ 16.810482] copy_user_test_oob+0xab/0x10f0 [ 16.810681] kunit_try_run_case+0x1a5/0x480 [ 16.810901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.811124] kthread+0x337/0x6f0 [ 16.811305] ret_from_fork+0x116/0x1d0 [ 16.811472] ret_from_fork_asm+0x1a/0x30 [ 16.811697] [ 16.811791] The buggy address belongs to the object at ffff8881027bcb00 [ 16.811791] which belongs to the cache kmalloc-128 of size 128 [ 16.812264] The buggy address is located 0 bytes inside of [ 16.812264] allocated 120-byte region [ffff8881027bcb00, ffff8881027bcb78) [ 16.812706] [ 16.812789] The buggy address belongs to the physical page: [ 16.812959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.813211] flags: 0x200000000000000(node=0|zone=2) [ 16.813432] page_type: f5(slab) [ 16.813641] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.813978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.814315] page dumped because: kasan: bad access detected [ 16.814569] [ 16.814730] Memory state around the buggy address: [ 16.814954] ffff8881027bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.815283] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.816337] >ffff8881027bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.816660] ^ [ 16.816906] ffff8881027bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.817199] ffff8881027bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.818058] ================================================================== [ 16.819368] ================================================================== [ 16.819753] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.820369] Read of size 121 at addr ffff8881027bcb00 by task kunit_try_catch/303 [ 16.821011] [ 16.821270] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.821437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.821456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.821480] Call Trace: [ 16.821508] <TASK> [ 16.821525] dump_stack_lvl+0x73/0xb0 [ 16.821556] print_report+0xd1/0x610 [ 16.821586] ? __virt_addr_valid+0x1db/0x2d0 [ 16.821609] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.821633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.821658] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.821684] kasan_report+0x141/0x180 [ 16.821708] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.821737] kasan_check_range+0x10c/0x1c0 [ 16.821762] __kasan_check_read+0x15/0x20 [ 16.821782] copy_user_test_oob+0x4aa/0x10f0 [ 16.821809] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.821832] ? finish_task_switch.isra.0+0x153/0x700 [ 16.821857] ? __switch_to+0x47/0xf50 [ 16.821884] ? __schedule+0x10c6/0x2b60 [ 16.821908] ? __pfx_read_tsc+0x10/0x10 [ 16.821930] ? ktime_get_ts64+0x86/0x230 [ 16.821954] kunit_try_run_case+0x1a5/0x480 [ 16.821979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.822004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.822028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.822052] ? __kthread_parkme+0x82/0x180 [ 16.822073] ? preempt_count_sub+0x50/0x80 [ 16.822098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.822122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.822156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.822180] kthread+0x337/0x6f0 [ 16.822200] ? trace_preempt_on+0x20/0xc0 [ 16.822225] ? __pfx_kthread+0x10/0x10 [ 16.822247] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.822269] ? calculate_sigpending+0x7b/0xa0 [ 16.822293] ? __pfx_kthread+0x10/0x10 [ 16.822346] ret_from_fork+0x116/0x1d0 [ 16.822366] ? __pfx_kthread+0x10/0x10 [ 16.822387] ret_from_fork_asm+0x1a/0x30 [ 16.822419] </TASK> [ 16.822430] [ 16.834006] Allocated by task 303: [ 16.834192] kasan_save_stack+0x45/0x70 [ 16.834761] kasan_save_track+0x18/0x40 [ 16.835227] kasan_save_alloc_info+0x3b/0x50 [ 16.835493] __kasan_kmalloc+0xb7/0xc0 [ 16.835670] __kmalloc_noprof+0x1c9/0x500 [ 16.835856] kunit_kmalloc_array+0x25/0x60 [ 16.836030] copy_user_test_oob+0xab/0x10f0 [ 16.836231] kunit_try_run_case+0x1a5/0x480 [ 16.836739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.837197] kthread+0x337/0x6f0 [ 16.837523] ret_from_fork+0x116/0x1d0 [ 16.837703] ret_from_fork_asm+0x1a/0x30 [ 16.837890] [ 16.837977] The buggy address belongs to the object at ffff8881027bcb00 [ 16.837977] which belongs to the cache kmalloc-128 of size 128 [ 16.838979] The buggy address is located 0 bytes inside of [ 16.838979] allocated 120-byte region [ffff8881027bcb00, ffff8881027bcb78) [ 16.839832] [ 16.839934] The buggy address belongs to the physical page: [ 16.840166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.840755] flags: 0x200000000000000(node=0|zone=2) [ 16.840986] page_type: f5(slab) [ 16.841150] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.841393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.841836] page dumped because: kasan: bad access detected [ 16.842060] [ 16.842171] Memory state around the buggy address: [ 16.842475] ffff8881027bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.842835] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.843116] >ffff8881027bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.843515] ^ [ 16.843833] ffff8881027bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.844177] ffff8881027bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.844528] ================================================================== [ 16.870001] ================================================================== [ 16.870688] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.871127] Read of size 121 at addr ffff8881027bcb00 by task kunit_try_catch/303 [ 16.871798] [ 16.871915] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.871963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.871977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.871999] Call Trace: [ 16.872017] <TASK> [ 16.872032] dump_stack_lvl+0x73/0xb0 [ 16.872061] print_report+0xd1/0x610 [ 16.872084] ? __virt_addr_valid+0x1db/0x2d0 [ 16.872247] ? copy_user_test_oob+0x604/0x10f0 [ 16.872272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.872295] ? copy_user_test_oob+0x604/0x10f0 [ 16.872334] kasan_report+0x141/0x180 [ 16.872357] ? copy_user_test_oob+0x604/0x10f0 [ 16.872385] kasan_check_range+0x10c/0x1c0 [ 16.872409] __kasan_check_read+0x15/0x20 [ 16.872429] copy_user_test_oob+0x604/0x10f0 [ 16.872454] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.872478] ? finish_task_switch.isra.0+0x153/0x700 [ 16.872503] ? __switch_to+0x47/0xf50 [ 16.872529] ? __schedule+0x10c6/0x2b60 [ 16.872552] ? __pfx_read_tsc+0x10/0x10 [ 16.872573] ? ktime_get_ts64+0x86/0x230 [ 16.872597] kunit_try_run_case+0x1a5/0x480 [ 16.872622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.872645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.872669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.872694] ? __kthread_parkme+0x82/0x180 [ 16.872715] ? preempt_count_sub+0x50/0x80 [ 16.872738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.872763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.872787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.872811] kthread+0x337/0x6f0 [ 16.872832] ? trace_preempt_on+0x20/0xc0 [ 16.872857] ? __pfx_kthread+0x10/0x10 [ 16.872878] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.872900] ? calculate_sigpending+0x7b/0xa0 [ 16.872925] ? __pfx_kthread+0x10/0x10 [ 16.872947] ret_from_fork+0x116/0x1d0 [ 16.872965] ? __pfx_kthread+0x10/0x10 [ 16.872986] ret_from_fork_asm+0x1a/0x30 [ 16.873016] </TASK> [ 16.873027] [ 16.883405] Allocated by task 303: [ 16.883921] kasan_save_stack+0x45/0x70 [ 16.884248] kasan_save_track+0x18/0x40 [ 16.884507] kasan_save_alloc_info+0x3b/0x50 [ 16.884792] __kasan_kmalloc+0xb7/0xc0 [ 16.884961] __kmalloc_noprof+0x1c9/0x500 [ 16.885229] kunit_kmalloc_array+0x25/0x60 [ 16.885563] copy_user_test_oob+0xab/0x10f0 [ 16.885844] kunit_try_run_case+0x1a5/0x480 [ 16.886099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.886532] kthread+0x337/0x6f0 [ 16.886850] ret_from_fork+0x116/0x1d0 [ 16.887028] ret_from_fork_asm+0x1a/0x30 [ 16.887323] [ 16.887409] The buggy address belongs to the object at ffff8881027bcb00 [ 16.887409] which belongs to the cache kmalloc-128 of size 128 [ 16.887986] The buggy address is located 0 bytes inside of [ 16.887986] allocated 120-byte region [ffff8881027bcb00, ffff8881027bcb78) [ 16.888826] [ 16.888929] The buggy address belongs to the physical page: [ 16.889140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 16.889795] flags: 0x200000000000000(node=0|zone=2) [ 16.890102] page_type: f5(slab) [ 16.890425] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.890848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.891249] page dumped because: kasan: bad access detected [ 16.891665] [ 16.891840] Memory state around the buggy address: [ 16.892049] ffff8881027bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.892647] ffff8881027bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892957] >ffff8881027bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.893267] ^ [ 16.893770] ffff8881027bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.894136] ffff8881027bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.894565] ==================================================================