Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.206005] ================================================================== [ 31.206876] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 31.207711] Read of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.208597] [ 31.208960] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.209116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.209155] Hardware name: linux,dummy-virt (DT) [ 31.209224] Call trace: [ 31.209297] show_stack+0x20/0x38 (C) [ 31.209439] dump_stack_lvl+0x8c/0xd0 [ 31.209581] print_report+0x118/0x608 [ 31.209722] kasan_report+0xdc/0x128 [ 31.209854] kasan_check_range+0x100/0x1a8 [ 31.209945] __kasan_check_read+0x20/0x30 [ 31.210004] copy_user_test_oob+0x4a0/0xec0 [ 31.210066] kunit_try_run_case+0x170/0x3f0 [ 31.210123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.210203] kthread+0x318/0x620 [ 31.210260] ret_from_fork+0x10/0x20 [ 31.210322] [ 31.216178] Allocated by task 274: [ 31.216711] kasan_save_stack+0x3c/0x68 [ 31.217375] kasan_save_track+0x20/0x40 [ 31.217868] kasan_save_alloc_info+0x40/0x58 [ 31.218471] __kasan_kmalloc+0xd4/0xd8 [ 31.218966] __kmalloc_noprof+0x198/0x4c8 [ 31.219506] kunit_kmalloc_array+0x34/0x88 [ 31.220052] copy_user_test_oob+0xac/0xec0 [ 31.220606] kunit_try_run_case+0x170/0x3f0 [ 31.221163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.221856] kthread+0x318/0x620 [ 31.222395] ret_from_fork+0x10/0x20 [ 31.222933] [ 31.223235] The buggy address belongs to the object at fff00000c6414800 [ 31.223235] which belongs to the cache kmalloc-128 of size 128 [ 31.224455] The buggy address is located 0 bytes inside of [ 31.224455] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.225583] [ 31.225874] The buggy address belongs to the physical page: [ 31.226513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.227256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.228020] page_type: f5(slab) [ 31.228509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.229348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.230640] page dumped because: kasan: bad access detected [ 31.231358] [ 31.231798] Memory state around the buggy address: [ 31.232327] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.233243] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.233958] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.234638] ^ [ 31.235657] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.236535] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.237222] ================================================================== [ 31.012830] ================================================================== [ 31.014376] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 31.015534] Write of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.016487] [ 31.016997] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.017164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.017214] Hardware name: linux,dummy-virt (DT) [ 31.017298] Call trace: [ 31.017333] show_stack+0x20/0x38 (C) [ 31.017406] dump_stack_lvl+0x8c/0xd0 [ 31.017475] print_report+0x118/0x608 [ 31.017540] kasan_report+0xdc/0x128 [ 31.017601] kasan_check_range+0x100/0x1a8 [ 31.017658] __kasan_check_write+0x20/0x30 [ 31.017715] copy_user_test_oob+0x234/0xec0 [ 31.017775] kunit_try_run_case+0x170/0x3f0 [ 31.017840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.017933] kthread+0x318/0x620 [ 31.017999] ret_from_fork+0x10/0x20 [ 31.018063] [ 31.024312] Allocated by task 274: [ 31.024798] kasan_save_stack+0x3c/0x68 [ 31.025388] kasan_save_track+0x20/0x40 [ 31.025903] kasan_save_alloc_info+0x40/0x58 [ 31.026499] __kasan_kmalloc+0xd4/0xd8 [ 31.027141] __kmalloc_noprof+0x198/0x4c8 [ 31.027663] kunit_kmalloc_array+0x34/0x88 [ 31.028217] copy_user_test_oob+0xac/0xec0 [ 31.028770] kunit_try_run_case+0x170/0x3f0 [ 31.029377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.030044] kthread+0x318/0x620 [ 31.030532] ret_from_fork+0x10/0x20 [ 31.030992] [ 31.031287] The buggy address belongs to the object at fff00000c6414800 [ 31.031287] which belongs to the cache kmalloc-128 of size 128 [ 31.032578] The buggy address is located 0 bytes inside of [ 31.032578] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.033810] [ 31.034154] The buggy address belongs to the physical page: [ 31.034818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.035603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.036326] page_type: f5(slab) [ 31.036871] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.037659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.038412] page dumped because: kasan: bad access detected [ 31.039051] [ 31.039360] Memory state around the buggy address: [ 31.039953] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.040650] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.041468] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.042248] ^ [ 31.043443] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.044075] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.044908] ================================================================== [ 31.054126] ================================================================== [ 31.054878] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 31.055647] Read of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.056295] [ 31.056705] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.056951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.057038] Hardware name: linux,dummy-virt (DT) [ 31.057130] Call trace: [ 31.057198] show_stack+0x20/0x38 (C) [ 31.057336] dump_stack_lvl+0x8c/0xd0 [ 31.057496] print_report+0x118/0x608 [ 31.057615] kasan_report+0xdc/0x128 [ 31.057679] kasan_check_range+0x100/0x1a8 [ 31.057737] __kasan_check_read+0x20/0x30 [ 31.057795] copy_user_test_oob+0x728/0xec0 [ 31.057860] kunit_try_run_case+0x170/0x3f0 [ 31.057955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.058023] kthread+0x318/0x620 [ 31.058082] ret_from_fork+0x10/0x20 [ 31.058142] [ 31.064525] Allocated by task 274: [ 31.065090] kasan_save_stack+0x3c/0x68 [ 31.065703] kasan_save_track+0x20/0x40 [ 31.066301] kasan_save_alloc_info+0x40/0x58 [ 31.066952] __kasan_kmalloc+0xd4/0xd8 [ 31.067581] __kmalloc_noprof+0x198/0x4c8 [ 31.068140] kunit_kmalloc_array+0x34/0x88 [ 31.068876] copy_user_test_oob+0xac/0xec0 [ 31.069493] kunit_try_run_case+0x170/0x3f0 [ 31.070107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.070791] kthread+0x318/0x620 [ 31.071227] ret_from_fork+0x10/0x20 [ 31.071658] [ 31.072042] The buggy address belongs to the object at fff00000c6414800 [ 31.072042] which belongs to the cache kmalloc-128 of size 128 [ 31.073120] The buggy address is located 0 bytes inside of [ 31.073120] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.074609] [ 31.075154] The buggy address belongs to the physical page: [ 31.075743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.076722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.077468] page_type: f5(slab) [ 31.077821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.078761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.079549] page dumped because: kasan: bad access detected [ 31.080183] [ 31.080505] Memory state around the buggy address: [ 31.081111] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.081902] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.082676] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.083435] ^ [ 31.084176] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.084991] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.085655] ================================================================== [ 31.092873] ================================================================== [ 31.093860] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 31.095043] Write of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.096768] [ 31.097472] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.097703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.097763] Hardware name: linux,dummy-virt (DT) [ 31.097807] Call trace: [ 31.097835] show_stack+0x20/0x38 (C) [ 31.097985] dump_stack_lvl+0x8c/0xd0 [ 31.098132] print_report+0x118/0x608 [ 31.098214] kasan_report+0xdc/0x128 [ 31.098276] kasan_check_range+0x100/0x1a8 [ 31.098332] __kasan_check_write+0x20/0x30 [ 31.098389] copy_user_test_oob+0x35c/0xec0 [ 31.098450] kunit_try_run_case+0x170/0x3f0 [ 31.098507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.098572] kthread+0x318/0x620 [ 31.098627] ret_from_fork+0x10/0x20 [ 31.098687] [ 31.105310] Allocated by task 274: [ 31.105945] kasan_save_stack+0x3c/0x68 [ 31.106599] kasan_save_track+0x20/0x40 [ 31.107367] kasan_save_alloc_info+0x40/0x58 [ 31.108019] __kasan_kmalloc+0xd4/0xd8 [ 31.108725] __kmalloc_noprof+0x198/0x4c8 [ 31.109400] kunit_kmalloc_array+0x34/0x88 [ 31.109979] copy_user_test_oob+0xac/0xec0 [ 31.110760] kunit_try_run_case+0x170/0x3f0 [ 31.111456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.112253] kthread+0x318/0x620 [ 31.112932] ret_from_fork+0x10/0x20 [ 31.113490] [ 31.113912] The buggy address belongs to the object at fff00000c6414800 [ 31.113912] which belongs to the cache kmalloc-128 of size 128 [ 31.115243] The buggy address is located 0 bytes inside of [ 31.115243] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.116571] [ 31.116931] The buggy address belongs to the physical page: [ 31.117691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.118654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.119453] page_type: f5(slab) [ 31.120023] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.120915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.121734] page dumped because: kasan: bad access detected [ 31.122412] [ 31.122774] Memory state around the buggy address: [ 31.123435] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.124276] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.125099] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.125866] ^ [ 31.126575] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.127357] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.128244] ================================================================== [ 31.165492] ================================================================== [ 31.166223] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 31.167479] Write of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.168310] [ 31.168671] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.169503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.169590] Hardware name: linux,dummy-virt (DT) [ 31.169685] Call trace: [ 31.169752] show_stack+0x20/0x38 (C) [ 31.169913] dump_stack_lvl+0x8c/0xd0 [ 31.170044] print_report+0x118/0x608 [ 31.170283] kasan_report+0xdc/0x128 [ 31.170410] kasan_check_range+0x100/0x1a8 [ 31.170538] __kasan_check_write+0x20/0x30 [ 31.170663] copy_user_test_oob+0x434/0xec0 [ 31.170791] kunit_try_run_case+0x170/0x3f0 [ 31.170960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.171102] kthread+0x318/0x620 [ 31.171227] ret_from_fork+0x10/0x20 [ 31.171349] [ 31.181568] Allocated by task 274: [ 31.182369] kasan_save_stack+0x3c/0x68 [ 31.182868] kasan_save_track+0x20/0x40 [ 31.183345] kasan_save_alloc_info+0x40/0x58 [ 31.183827] __kasan_kmalloc+0xd4/0xd8 [ 31.184629] __kmalloc_noprof+0x198/0x4c8 [ 31.185176] kunit_kmalloc_array+0x34/0x88 [ 31.185727] copy_user_test_oob+0xac/0xec0 [ 31.186418] kunit_try_run_case+0x170/0x3f0 [ 31.187064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.187746] kthread+0x318/0x620 [ 31.188287] ret_from_fork+0x10/0x20 [ 31.188852] [ 31.189256] The buggy address belongs to the object at fff00000c6414800 [ 31.189256] which belongs to the cache kmalloc-128 of size 128 [ 31.190535] The buggy address is located 0 bytes inside of [ 31.190535] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.191852] [ 31.192270] The buggy address belongs to the physical page: [ 31.192981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.193922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.194677] page_type: f5(slab) [ 31.195224] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.196105] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.196907] page dumped because: kasan: bad access detected [ 31.197583] [ 31.197973] Memory state around the buggy address: [ 31.198549] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.199394] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.200111] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.200829] ^ [ 31.201633] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.202411] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.203185] ================================================================== [ 31.131432] ================================================================== [ 31.132158] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 31.133281] Read of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.134314] [ 31.134741] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.135048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.135119] Hardware name: linux,dummy-virt (DT) [ 31.135164] Call trace: [ 31.135195] show_stack+0x20/0x38 (C) [ 31.135265] dump_stack_lvl+0x8c/0xd0 [ 31.135328] print_report+0x118/0x608 [ 31.135386] kasan_report+0xdc/0x128 [ 31.135444] kasan_check_range+0x100/0x1a8 [ 31.135502] __kasan_check_read+0x20/0x30 [ 31.135558] copy_user_test_oob+0x3c8/0xec0 [ 31.135616] kunit_try_run_case+0x170/0x3f0 [ 31.135675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.135737] kthread+0x318/0x620 [ 31.135792] ret_from_fork+0x10/0x20 [ 31.135859] [ 31.142819] Allocated by task 274: [ 31.143542] kasan_save_stack+0x3c/0x68 [ 31.144351] kasan_save_track+0x20/0x40 [ 31.145008] kasan_save_alloc_info+0x40/0x58 [ 31.145566] __kasan_kmalloc+0xd4/0xd8 [ 31.146076] __kmalloc_noprof+0x198/0x4c8 [ 31.146625] kunit_kmalloc_array+0x34/0x88 [ 31.147296] copy_user_test_oob+0xac/0xec0 [ 31.147802] kunit_try_run_case+0x170/0x3f0 [ 31.148336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.148959] kthread+0x318/0x620 [ 31.149467] ret_from_fork+0x10/0x20 [ 31.149959] [ 31.150294] The buggy address belongs to the object at fff00000c6414800 [ 31.150294] which belongs to the cache kmalloc-128 of size 128 [ 31.151393] The buggy address is located 0 bytes inside of [ 31.151393] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.152566] [ 31.152951] The buggy address belongs to the physical page: [ 31.153552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.154339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.155062] page_type: f5(slab) [ 31.155530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.156326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.157041] page dumped because: kasan: bad access detected [ 31.157666] [ 31.157988] Memory state around the buggy address: [ 31.158548] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.159303] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.160071] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.160667] ^ [ 31.161795] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.162561] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.163345] ==================================================================
[ 23.847765] ================================================================== [ 23.848314] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 23.848801] Write of size 121 at addr ffff888102c74500 by task kunit_try_catch/293 [ 23.849364] [ 23.849616] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.849730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.849764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.849820] Call Trace: [ 23.849885] <TASK> [ 23.849932] dump_stack_lvl+0x73/0xb0 [ 23.850029] print_report+0xd1/0x650 [ 23.850090] ? __virt_addr_valid+0x1db/0x2d0 [ 23.850149] ? copy_user_test_oob+0x558/0x10f0 [ 23.850204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.850272] ? copy_user_test_oob+0x558/0x10f0 [ 23.850337] kasan_report+0x140/0x180 [ 23.850402] ? copy_user_test_oob+0x558/0x10f0 [ 23.850477] kasan_check_range+0x10c/0x1c0 [ 23.850543] __kasan_check_write+0x18/0x20 [ 23.850603] copy_user_test_oob+0x558/0x10f0 [ 23.850660] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.850698] ? finish_task_switch.isra.0+0x153/0x700 [ 23.850734] ? __switch_to+0x5d9/0xf60 [ 23.850771] ? __schedule+0xce8/0x2840 [ 23.850803] ? __pfx_read_tsc+0x10/0x10 [ 23.850834] ? ktime_get_ts64+0x86/0x230 [ 23.850890] kunit_try_run_case+0x1a6/0x480 [ 23.850923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.850955] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.850987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.851018] ? __kthread_parkme+0x82/0x160 [ 23.851050] ? preempt_count_sub+0x50/0x80 [ 23.851081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.851111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.851146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.851180] kthread+0x324/0x6e0 [ 23.851209] ? trace_preempt_on+0x20/0xc0 [ 23.851241] ? __pfx_kthread+0x10/0x10 [ 23.851270] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.851314] ? calculate_sigpending+0x7b/0xa0 [ 23.851348] ? __pfx_kthread+0x10/0x10 [ 23.851379] ret_from_fork+0x41/0x80 [ 23.851405] ? __pfx_kthread+0x10/0x10 [ 23.851435] ret_from_fork_asm+0x1a/0x30 [ 23.851478] </TASK> [ 23.851494] [ 23.862647] Allocated by task 293: [ 23.863081] kasan_save_stack+0x45/0x70 [ 23.863379] kasan_save_track+0x18/0x40 [ 23.863829] kasan_save_alloc_info+0x3b/0x50 [ 23.864294] __kasan_kmalloc+0xb7/0xc0 [ 23.864675] __kmalloc_noprof+0x1ca/0x500 [ 23.865094] kunit_kmalloc_array+0x25/0x60 [ 23.865482] copy_user_test_oob+0xac/0x10f0 [ 23.865782] kunit_try_run_case+0x1a6/0x480 [ 23.866064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.866538] kthread+0x324/0x6e0 [ 23.866906] ret_from_fork+0x41/0x80 [ 23.867219] ret_from_fork_asm+0x1a/0x30 [ 23.867638] [ 23.867887] The buggy address belongs to the object at ffff888102c74500 [ 23.867887] which belongs to the cache kmalloc-128 of size 128 [ 23.868903] The buggy address is located 0 bytes inside of [ 23.868903] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.869561] [ 23.869724] The buggy address belongs to the physical page: [ 23.870019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.870409] flags: 0x200000000000000(node=0|zone=2) [ 23.870688] page_type: f5(slab) [ 23.870922] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.871582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.872519] page dumped because: kasan: bad access detected [ 23.873011] [ 23.873225] Memory state around the buggy address: [ 23.873873] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.874613] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.875231] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.875782] ^ [ 23.876289] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.877068] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.877696] ================================================================== [ 23.771158] ================================================================== [ 23.772002] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 23.772499] Write of size 121 at addr ffff888102c74500 by task kunit_try_catch/293 [ 23.773085] [ 23.773287] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.773396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.773431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.773482] Call Trace: [ 23.773525] <TASK> [ 23.773570] dump_stack_lvl+0x73/0xb0 [ 23.773647] print_report+0xd1/0x650 [ 23.773707] ? __virt_addr_valid+0x1db/0x2d0 [ 23.773764] ? copy_user_test_oob+0x3fe/0x10f0 [ 23.773820] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.773899] ? copy_user_test_oob+0x3fe/0x10f0 [ 23.773963] kasan_report+0x140/0x180 [ 23.774030] ? copy_user_test_oob+0x3fe/0x10f0 [ 23.774099] kasan_check_range+0x10c/0x1c0 [ 23.774159] __kasan_check_write+0x18/0x20 [ 23.774219] copy_user_test_oob+0x3fe/0x10f0 [ 23.774281] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.774337] ? finish_task_switch.isra.0+0x153/0x700 [ 23.774399] ? __switch_to+0x5d9/0xf60 [ 23.774464] ? __schedule+0xce8/0x2840 [ 23.774521] ? __pfx_read_tsc+0x10/0x10 [ 23.774574] ? ktime_get_ts64+0x86/0x230 [ 23.774637] kunit_try_run_case+0x1a6/0x480 [ 23.774707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.774769] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.774828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.774885] ? __kthread_parkme+0x82/0x160 [ 23.774919] ? preempt_count_sub+0x50/0x80 [ 23.774953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.774984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.775022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.775056] kthread+0x324/0x6e0 [ 23.775085] ? trace_preempt_on+0x20/0xc0 [ 23.775118] ? __pfx_kthread+0x10/0x10 [ 23.775147] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.775177] ? calculate_sigpending+0x7b/0xa0 [ 23.775206] ? __pfx_kthread+0x10/0x10 [ 23.775236] ret_from_fork+0x41/0x80 [ 23.775262] ? __pfx_kthread+0x10/0x10 [ 23.775298] ret_from_fork_asm+0x1a/0x30 [ 23.775351] </TASK> [ 23.775369] [ 23.789880] Allocated by task 293: [ 23.790251] kasan_save_stack+0x45/0x70 [ 23.790613] kasan_save_track+0x18/0x40 [ 23.790977] kasan_save_alloc_info+0x3b/0x50 [ 23.791397] __kasan_kmalloc+0xb7/0xc0 [ 23.791731] __kmalloc_noprof+0x1ca/0x500 [ 23.792912] kunit_kmalloc_array+0x25/0x60 [ 23.793160] copy_user_test_oob+0xac/0x10f0 [ 23.794013] kunit_try_run_case+0x1a6/0x480 [ 23.794351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.794718] kthread+0x324/0x6e0 [ 23.795261] ret_from_fork+0x41/0x80 [ 23.795836] ret_from_fork_asm+0x1a/0x30 [ 23.796133] [ 23.796268] The buggy address belongs to the object at ffff888102c74500 [ 23.796268] which belongs to the cache kmalloc-128 of size 128 [ 23.797634] The buggy address is located 0 bytes inside of [ 23.797634] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.798599] [ 23.798782] The buggy address belongs to the physical page: [ 23.799043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.800140] flags: 0x200000000000000(node=0|zone=2) [ 23.800957] page_type: f5(slab) [ 23.801225] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.802023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.803047] page dumped because: kasan: bad access detected [ 23.803414] [ 23.803622] Memory state around the buggy address: [ 23.804154] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.804946] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.805396] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.806033] ^ [ 23.806640] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.807115] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.807812] ================================================================== [ 23.878817] ================================================================== [ 23.879349] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 23.880060] Read of size 121 at addr ffff888102c74500 by task kunit_try_catch/293 [ 23.880422] [ 23.880596] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.880705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.880740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.880798] Call Trace: [ 23.881170] <TASK> [ 23.881237] dump_stack_lvl+0x73/0xb0 [ 23.881333] print_report+0xd1/0x650 [ 23.881399] ? __virt_addr_valid+0x1db/0x2d0 [ 23.881463] ? copy_user_test_oob+0x605/0x10f0 [ 23.881525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.881582] ? copy_user_test_oob+0x605/0x10f0 [ 23.881645] kasan_report+0x140/0x180 [ 23.881709] ? copy_user_test_oob+0x605/0x10f0 [ 23.881786] kasan_check_range+0x10c/0x1c0 [ 23.881869] __kasan_check_read+0x15/0x20 [ 23.881934] copy_user_test_oob+0x605/0x10f0 [ 23.882004] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.882068] ? finish_task_switch.isra.0+0x153/0x700 [ 23.882134] ? __switch_to+0x5d9/0xf60 [ 23.882207] ? __schedule+0xce8/0x2840 [ 23.882267] ? __pfx_read_tsc+0x10/0x10 [ 23.882329] ? ktime_get_ts64+0x86/0x230 [ 23.882398] kunit_try_run_case+0x1a6/0x480 [ 23.882460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.882519] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.882573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.882638] ? __kthread_parkme+0x82/0x160 [ 23.882691] ? preempt_count_sub+0x50/0x80 [ 23.882742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.882794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.882878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.882939] kthread+0x324/0x6e0 [ 23.882991] ? trace_preempt_on+0x20/0xc0 [ 23.883053] ? __pfx_kthread+0x10/0x10 [ 23.883112] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.883176] ? calculate_sigpending+0x7b/0xa0 [ 23.883237] ? __pfx_kthread+0x10/0x10 [ 23.883298] ret_from_fork+0x41/0x80 [ 23.883354] ? __pfx_kthread+0x10/0x10 [ 23.883417] ret_from_fork_asm+0x1a/0x30 [ 23.883504] </TASK> [ 23.883536] [ 23.896248] Allocated by task 293: [ 23.896682] kasan_save_stack+0x45/0x70 [ 23.897161] kasan_save_track+0x18/0x40 [ 23.897759] kasan_save_alloc_info+0x3b/0x50 [ 23.898145] __kasan_kmalloc+0xb7/0xc0 [ 23.898672] __kmalloc_noprof+0x1ca/0x500 [ 23.898984] kunit_kmalloc_array+0x25/0x60 [ 23.899359] copy_user_test_oob+0xac/0x10f0 [ 23.899622] kunit_try_run_case+0x1a6/0x480 [ 23.899925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.900483] kthread+0x324/0x6e0 [ 23.900818] ret_from_fork+0x41/0x80 [ 23.901210] ret_from_fork_asm+0x1a/0x30 [ 23.901510] [ 23.901663] The buggy address belongs to the object at ffff888102c74500 [ 23.901663] which belongs to the cache kmalloc-128 of size 128 [ 23.902191] The buggy address is located 0 bytes inside of [ 23.902191] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.903205] [ 23.903491] The buggy address belongs to the physical page: [ 23.903966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.904790] flags: 0x200000000000000(node=0|zone=2) [ 23.905198] page_type: f5(slab) [ 23.905653] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.906060] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.906411] page dumped because: kasan: bad access detected [ 23.906686] [ 23.906828] Memory state around the buggy address: [ 23.907234] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.907972] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.908626] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.909239] ^ [ 23.909722] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910271] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910720] ================================================================== [ 23.809115] ================================================================== [ 23.810017] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 23.810338] Read of size 121 at addr ffff888102c74500 by task kunit_try_catch/293 [ 23.810615] [ 23.810757] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.810873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.810910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.810965] Call Trace: [ 23.811071] <TASK> [ 23.811152] dump_stack_lvl+0x73/0xb0 [ 23.811299] print_report+0xd1/0x650 [ 23.811358] ? __virt_addr_valid+0x1db/0x2d0 [ 23.811412] ? copy_user_test_oob+0x4ab/0x10f0 [ 23.811469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.811537] ? copy_user_test_oob+0x4ab/0x10f0 [ 23.811590] kasan_report+0x140/0x180 [ 23.811647] ? copy_user_test_oob+0x4ab/0x10f0 [ 23.811736] kasan_check_range+0x10c/0x1c0 [ 23.811802] __kasan_check_read+0x15/0x20 [ 23.811880] copy_user_test_oob+0x4ab/0x10f0 [ 23.811950] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.812012] ? finish_task_switch.isra.0+0x153/0x700 [ 23.812078] ? __switch_to+0x5d9/0xf60 [ 23.812146] ? __schedule+0xce8/0x2840 [ 23.812207] ? __pfx_read_tsc+0x10/0x10 [ 23.812266] ? ktime_get_ts64+0x86/0x230 [ 23.812335] kunit_try_run_case+0x1a6/0x480 [ 23.812402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.812460] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.812526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.812592] ? __kthread_parkme+0x82/0x160 [ 23.812645] ? preempt_count_sub+0x50/0x80 [ 23.812702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.812759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.812826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.813012] kthread+0x324/0x6e0 [ 23.813075] ? trace_preempt_on+0x20/0xc0 [ 23.813127] ? __pfx_kthread+0x10/0x10 [ 23.813169] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.813214] ? calculate_sigpending+0x7b/0xa0 [ 23.813257] ? __pfx_kthread+0x10/0x10 [ 23.813301] ret_from_fork+0x41/0x80 [ 23.813347] ? __pfx_kthread+0x10/0x10 [ 23.813397] ret_from_fork_asm+0x1a/0x30 [ 23.813480] </TASK> [ 23.813512] [ 23.826716] Allocated by task 293: [ 23.827252] kasan_save_stack+0x45/0x70 [ 23.827559] kasan_save_track+0x18/0x40 [ 23.827823] kasan_save_alloc_info+0x3b/0x50 [ 23.828344] __kasan_kmalloc+0xb7/0xc0 [ 23.828793] __kmalloc_noprof+0x1ca/0x500 [ 23.829282] kunit_kmalloc_array+0x25/0x60 [ 23.829737] copy_user_test_oob+0xac/0x10f0 [ 23.830235] kunit_try_run_case+0x1a6/0x480 [ 23.830596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.831135] kthread+0x324/0x6e0 [ 23.831349] ret_from_fork+0x41/0x80 [ 23.831779] ret_from_fork_asm+0x1a/0x30 [ 23.832266] [ 23.833704] The buggy address belongs to the object at ffff888102c74500 [ 23.833704] which belongs to the cache kmalloc-128 of size 128 [ 23.835588] The buggy address is located 0 bytes inside of [ 23.835588] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.836587] [ 23.836795] The buggy address belongs to the physical page: [ 23.837404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.838324] flags: 0x200000000000000(node=0|zone=2) [ 23.838668] page_type: f5(slab) [ 23.838916] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.840105] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.840842] page dumped because: kasan: bad access detected [ 23.841287] [ 23.841444] Memory state around the buggy address: [ 23.842000] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.842512] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.842963] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.843396] ^ [ 23.844057] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844588] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845283] ==================================================================