Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 62.520854] ================================================================== [ 62.533221] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 62.540251] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 62.547799] [ 62.549285] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.549339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.549359] Hardware name: WinLink E850-96 board (DT) [ 62.549381] Call trace: [ 62.549397] show_stack+0x20/0x38 (C) [ 62.549433] dump_stack_lvl+0x8c/0xd0 [ 62.549470] print_report+0x118/0x608 [ 62.549500] kasan_report+0xdc/0x128 [ 62.549529] kasan_check_range+0x100/0x1a8 [ 62.549565] __kasan_check_write+0x20/0x30 [ 62.549598] copy_user_test_oob+0x234/0xec8 [ 62.549626] kunit_try_run_case+0x170/0x3f0 [ 62.549662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.549702] kthread+0x328/0x630 [ 62.549735] ret_from_fork+0x10/0x20 [ 62.549770] [ 62.615508] Allocated by task 332: [ 62.618896] kasan_save_stack+0x3c/0x68 [ 62.622712] kasan_save_track+0x20/0x40 [ 62.626531] kasan_save_alloc_info+0x40/0x58 [ 62.630784] __kasan_kmalloc+0xd4/0xd8 [ 62.634518] __kmalloc_noprof+0x198/0x4c8 [ 62.638511] kunit_kmalloc_array+0x34/0x88 [ 62.642589] copy_user_test_oob+0xac/0xec8 [ 62.646669] kunit_try_run_case+0x170/0x3f0 [ 62.650836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.656304] kthread+0x328/0x630 [ 62.659516] ret_from_fork+0x10/0x20 [ 62.663075] [ 62.664553] The buggy address belongs to the object at ffff000801c16100 [ 62.664553] which belongs to the cache kmalloc-128 of size 128 [ 62.677053] The buggy address is located 0 bytes inside of [ 62.677053] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 62.689464] [ 62.690943] The buggy address belongs to the physical page: [ 62.696500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 62.704485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.712121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.719066] page_type: f5(slab) [ 62.722203] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.729923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.737647] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.745459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.753272] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 62.761084] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.768889] page dumped because: kasan: bad access detected [ 62.774446] [ 62.775921] Memory state around the buggy address: [ 62.780702] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.787903] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.795109] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.802309] ^ [ 62.809431] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.816637] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.823838] ================================================================== [ 63.746113] ================================================================== [ 63.752993] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 63.760021] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.767573] [ 63.769058] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.769109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.769128] Hardware name: WinLink E850-96 board (DT) [ 63.769149] Call trace: [ 63.769162] show_stack+0x20/0x38 (C) [ 63.769195] dump_stack_lvl+0x8c/0xd0 [ 63.769229] print_report+0x118/0x608 [ 63.769259] kasan_report+0xdc/0x128 [ 63.769288] kasan_check_range+0x100/0x1a8 [ 63.769321] __kasan_check_write+0x20/0x30 [ 63.769355] copy_user_test_oob+0x434/0xec8 [ 63.769383] kunit_try_run_case+0x170/0x3f0 [ 63.769417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.769455] kthread+0x328/0x630 [ 63.769489] ret_from_fork+0x10/0x20 [ 63.769523] [ 63.835281] Allocated by task 332: [ 63.838667] kasan_save_stack+0x3c/0x68 [ 63.842485] kasan_save_track+0x20/0x40 [ 63.846304] kasan_save_alloc_info+0x40/0x58 [ 63.850557] __kasan_kmalloc+0xd4/0xd8 [ 63.854290] __kmalloc_noprof+0x198/0x4c8 [ 63.858283] kunit_kmalloc_array+0x34/0x88 [ 63.862363] copy_user_test_oob+0xac/0xec8 [ 63.866443] kunit_try_run_case+0x170/0x3f0 [ 63.870609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.876078] kthread+0x328/0x630 [ 63.879290] ret_from_fork+0x10/0x20 [ 63.882849] [ 63.884326] The buggy address belongs to the object at ffff000801c16100 [ 63.884326] which belongs to the cache kmalloc-128 of size 128 [ 63.896826] The buggy address is located 0 bytes inside of [ 63.896826] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.909237] [ 63.910714] The buggy address belongs to the physical page: [ 63.916272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.924257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.931895] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.938839] page_type: f5(slab) [ 63.941974] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.949695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.957421] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.965233] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.973045] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.980857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.988663] page dumped because: kasan: bad access detected [ 63.994218] [ 63.995694] Memory state around the buggy address: [ 64.000473] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.007677] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.014881] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.022082] ^ [ 64.029204] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.036410] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.043610] ================================================================== [ 62.831312] ================================================================== [ 62.838254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 62.845278] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 62.852742] [ 62.854229] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.854282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.854299] Hardware name: WinLink E850-96 board (DT) [ 62.854321] Call trace: [ 62.854334] show_stack+0x20/0x38 (C) [ 62.854371] dump_stack_lvl+0x8c/0xd0 [ 62.854408] print_report+0x118/0x608 [ 62.854439] kasan_report+0xdc/0x128 [ 62.854467] kasan_check_range+0x100/0x1a8 [ 62.854500] __kasan_check_read+0x20/0x30 [ 62.854533] copy_user_test_oob+0x728/0xec8 [ 62.854562] kunit_try_run_case+0x170/0x3f0 [ 62.854599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.854639] kthread+0x328/0x630 [ 62.854674] ret_from_fork+0x10/0x20 [ 62.854708] [ 62.920363] Allocated by task 332: [ 62.923751] kasan_save_stack+0x3c/0x68 [ 62.927568] kasan_save_track+0x20/0x40 [ 62.931387] kasan_save_alloc_info+0x40/0x58 [ 62.935641] __kasan_kmalloc+0xd4/0xd8 [ 62.939375] __kmalloc_noprof+0x198/0x4c8 [ 62.943366] kunit_kmalloc_array+0x34/0x88 [ 62.947446] copy_user_test_oob+0xac/0xec8 [ 62.951526] kunit_try_run_case+0x170/0x3f0 [ 62.955692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.961161] kthread+0x328/0x630 [ 62.964373] ret_from_fork+0x10/0x20 [ 62.967932] [ 62.969409] The buggy address belongs to the object at ffff000801c16100 [ 62.969409] which belongs to the cache kmalloc-128 of size 128 [ 62.981909] The buggy address is located 0 bytes inside of [ 62.981909] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 62.994320] [ 62.995799] The buggy address belongs to the physical page: [ 63.001355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.009341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.016979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.023923] page_type: f5(slab) [ 63.027057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.034777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.042504] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.050316] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.058128] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.065940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.073746] page dumped because: kasan: bad access detected [ 63.079301] [ 63.080777] Memory state around the buggy address: [ 63.085558] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.092760] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.099965] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.107166] ^ [ 63.114287] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.121493] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.128693] ================================================================== [ 63.441045] ================================================================== [ 63.448140] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 63.455164] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.462629] [ 63.464115] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.464172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.464189] Hardware name: WinLink E850-96 board (DT) [ 63.464211] Call trace: [ 63.464225] show_stack+0x20/0x38 (C) [ 63.464259] dump_stack_lvl+0x8c/0xd0 [ 63.464297] print_report+0x118/0x608 [ 63.464328] kasan_report+0xdc/0x128 [ 63.464358] kasan_check_range+0x100/0x1a8 [ 63.464390] __kasan_check_read+0x20/0x30 [ 63.464422] copy_user_test_oob+0x3c8/0xec8 [ 63.464450] kunit_try_run_case+0x170/0x3f0 [ 63.464487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.464525] kthread+0x328/0x630 [ 63.464558] ret_from_fork+0x10/0x20 [ 63.464593] [ 63.530250] Allocated by task 332: [ 63.533637] kasan_save_stack+0x3c/0x68 [ 63.537456] kasan_save_track+0x20/0x40 [ 63.541274] kasan_save_alloc_info+0x40/0x58 [ 63.545527] __kasan_kmalloc+0xd4/0xd8 [ 63.549260] __kmalloc_noprof+0x198/0x4c8 [ 63.553254] kunit_kmalloc_array+0x34/0x88 [ 63.557333] copy_user_test_oob+0xac/0xec8 [ 63.561413] kunit_try_run_case+0x170/0x3f0 [ 63.565579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.571048] kthread+0x328/0x630 [ 63.574260] ret_from_fork+0x10/0x20 [ 63.577819] [ 63.579296] The buggy address belongs to the object at ffff000801c16100 [ 63.579296] which belongs to the cache kmalloc-128 of size 128 [ 63.591796] The buggy address is located 0 bytes inside of [ 63.591796] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.604207] [ 63.605684] The buggy address belongs to the physical page: [ 63.611241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.619227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.626866] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.633809] page_type: f5(slab) [ 63.636941] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.644664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.652391] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.660202] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.668015] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.675827] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.683633] page dumped because: kasan: bad access detected [ 63.689188] [ 63.690664] Memory state around the buggy address: [ 63.695444] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.702647] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.709851] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.717052] ^ [ 63.724174] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.731380] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.738579] ================================================================== [ 64.051033] ================================================================== [ 64.058023] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 64.065051] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 64.072516] [ 64.073998] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 64.074048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.074065] Hardware name: WinLink E850-96 board (DT) [ 64.074085] Call trace: [ 64.074096] show_stack+0x20/0x38 (C) [ 64.074126] dump_stack_lvl+0x8c/0xd0 [ 64.074158] print_report+0x118/0x608 [ 64.074189] kasan_report+0xdc/0x128 [ 64.074217] kasan_check_range+0x100/0x1a8 [ 64.074250] __kasan_check_read+0x20/0x30 [ 64.074284] copy_user_test_oob+0x4a0/0xec8 [ 64.074311] kunit_try_run_case+0x170/0x3f0 [ 64.074346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.074385] kthread+0x328/0x630 [ 64.074417] ret_from_fork+0x10/0x20 [ 64.074451] [ 64.140136] Allocated by task 332: [ 64.143524] kasan_save_stack+0x3c/0x68 [ 64.147341] kasan_save_track+0x20/0x40 [ 64.151161] kasan_save_alloc_info+0x40/0x58 [ 64.155414] __kasan_kmalloc+0xd4/0xd8 [ 64.159146] __kmalloc_noprof+0x198/0x4c8 [ 64.163140] kunit_kmalloc_array+0x34/0x88 [ 64.167219] copy_user_test_oob+0xac/0xec8 [ 64.171299] kunit_try_run_case+0x170/0x3f0 [ 64.175465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.180934] kthread+0x328/0x630 [ 64.184146] ret_from_fork+0x10/0x20 [ 64.187705] [ 64.189182] The buggy address belongs to the object at ffff000801c16100 [ 64.189182] which belongs to the cache kmalloc-128 of size 128 [ 64.201683] The buggy address is located 0 bytes inside of [ 64.201683] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 64.214093] [ 64.215571] The buggy address belongs to the physical page: [ 64.221129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 64.229113] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.236752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.243696] page_type: f5(slab) [ 64.246830] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.254551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.262278] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.270089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.277902] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 64.285714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.293519] page dumped because: kasan: bad access detected [ 64.299075] [ 64.300551] Memory state around the buggy address: [ 64.305330] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.312533] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.319738] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.326939] ^ [ 64.334061] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.341267] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.348467] ================================================================== [ 63.136241] ================================================================== [ 63.143108] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 63.150134] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.157686] [ 63.159171] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.159226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.159243] Hardware name: WinLink E850-96 board (DT) [ 63.159265] Call trace: [ 63.159279] show_stack+0x20/0x38 (C) [ 63.159314] dump_stack_lvl+0x8c/0xd0 [ 63.159350] print_report+0x118/0x608 [ 63.159380] kasan_report+0xdc/0x128 [ 63.159409] kasan_check_range+0x100/0x1a8 [ 63.159442] __kasan_check_write+0x20/0x30 [ 63.159475] copy_user_test_oob+0x35c/0xec8 [ 63.159504] kunit_try_run_case+0x170/0x3f0 [ 63.159540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.159577] kthread+0x328/0x630 [ 63.159609] ret_from_fork+0x10/0x20 [ 63.159645] [ 63.225393] Allocated by task 332: [ 63.228780] kasan_save_stack+0x3c/0x68 [ 63.232598] kasan_save_track+0x20/0x40 [ 63.236417] kasan_save_alloc_info+0x40/0x58 [ 63.240671] __kasan_kmalloc+0xd4/0xd8 [ 63.244403] __kmalloc_noprof+0x198/0x4c8 [ 63.248396] kunit_kmalloc_array+0x34/0x88 [ 63.252477] copy_user_test_oob+0xac/0xec8 [ 63.256556] kunit_try_run_case+0x170/0x3f0 [ 63.260723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.266191] kthread+0x328/0x630 [ 63.269403] ret_from_fork+0x10/0x20 [ 63.272962] [ 63.274439] The buggy address belongs to the object at ffff000801c16100 [ 63.274439] which belongs to the cache kmalloc-128 of size 128 [ 63.286938] The buggy address is located 0 bytes inside of [ 63.286938] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.299350] [ 63.300829] The buggy address belongs to the physical page: [ 63.306385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.314371] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.322008] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.328952] page_type: f5(slab) [ 63.332087] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.339808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.347534] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.355345] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.363158] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.370970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.378776] page dumped because: kasan: bad access detected [ 63.384331] [ 63.385807] Memory state around the buggy address: [ 63.390587] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.397790] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.404995] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.412196] ^ [ 63.419317] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.426523] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.433724] ==================================================================
[ 21.408731] ================================================================== [ 21.408821] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.408882] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.409201] [ 21.409382] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.409487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.409665] Hardware name: linux,dummy-virt (DT) [ 21.409950] Call trace: [ 21.409989] show_stack+0x20/0x38 (C) [ 21.410066] dump_stack_lvl+0x8c/0xd0 [ 21.410377] print_report+0x118/0x608 [ 21.410501] kasan_report+0xdc/0x128 [ 21.410659] kasan_check_range+0x100/0x1a8 [ 21.410906] __kasan_check_read+0x20/0x30 [ 21.411083] copy_user_test_oob+0x728/0xec8 [ 21.411251] kunit_try_run_case+0x170/0x3f0 [ 21.411542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.411724] kthread+0x328/0x630 [ 21.412034] ret_from_fork+0x10/0x20 [ 21.412282] [ 21.412505] Allocated by task 288: [ 21.412653] kasan_save_stack+0x3c/0x68 [ 21.412829] kasan_save_track+0x20/0x40 [ 21.413083] kasan_save_alloc_info+0x40/0x58 [ 21.413318] __kasan_kmalloc+0xd4/0xd8 [ 21.413442] __kmalloc_noprof+0x198/0x4c8 [ 21.413483] kunit_kmalloc_array+0x34/0x88 [ 21.413803] copy_user_test_oob+0xac/0xec8 [ 21.414001] kunit_try_run_case+0x170/0x3f0 [ 21.414167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.414230] kthread+0x328/0x630 [ 21.414277] ret_from_fork+0x10/0x20 [ 21.414641] [ 21.414865] The buggy address belongs to the object at fff00000c3f9e800 [ 21.414865] which belongs to the cache kmalloc-128 of size 128 [ 21.415143] The buggy address is located 0 bytes inside of [ 21.415143] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.415286] [ 21.415310] The buggy address belongs to the physical page: [ 21.415520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.415666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.415864] page_type: f5(slab) [ 21.415912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.416153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.416300] page dumped because: kasan: bad access detected [ 21.416397] [ 21.416429] Memory state around the buggy address: [ 21.416467] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.416699] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.416902] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.417067] ^ [ 21.417216] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.417308] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.417491] ================================================================== [ 21.392854] ================================================================== [ 21.393278] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.393488] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.393691] [ 21.393831] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.394156] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.394310] Hardware name: linux,dummy-virt (DT) [ 21.394435] Call trace: [ 21.394627] show_stack+0x20/0x38 (C) [ 21.394836] dump_stack_lvl+0x8c/0xd0 [ 21.395105] print_report+0x118/0x608 [ 21.395365] kasan_report+0xdc/0x128 [ 21.395531] kasan_check_range+0x100/0x1a8 [ 21.395665] __kasan_check_write+0x20/0x30 [ 21.395825] copy_user_test_oob+0x234/0xec8 [ 21.396060] kunit_try_run_case+0x170/0x3f0 [ 21.396251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.396414] kthread+0x328/0x630 [ 21.396552] ret_from_fork+0x10/0x20 [ 21.396806] [ 21.396906] Allocated by task 288: [ 21.397071] kasan_save_stack+0x3c/0x68 [ 21.397157] kasan_save_track+0x20/0x40 [ 21.397390] kasan_save_alloc_info+0x40/0x58 [ 21.397517] __kasan_kmalloc+0xd4/0xd8 [ 21.397795] __kmalloc_noprof+0x198/0x4c8 [ 21.398015] kunit_kmalloc_array+0x34/0x88 [ 21.398068] copy_user_test_oob+0xac/0xec8 [ 21.398107] kunit_try_run_case+0x170/0x3f0 [ 21.398150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.398686] kthread+0x328/0x630 [ 21.398894] ret_from_fork+0x10/0x20 [ 21.399130] [ 21.399213] The buggy address belongs to the object at fff00000c3f9e800 [ 21.399213] which belongs to the cache kmalloc-128 of size 128 [ 21.399308] The buggy address is located 0 bytes inside of [ 21.399308] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.399498] [ 21.399602] The buggy address belongs to the physical page: [ 21.399759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.399977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.400125] page_type: f5(slab) [ 21.400323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.400535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.400734] page dumped because: kasan: bad access detected [ 21.400806] [ 21.400827] Memory state around the buggy address: [ 21.401085] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.401147] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.401451] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.401551] ^ [ 21.401730] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.401942] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.402052] ================================================================== [ 21.442321] ================================================================== [ 21.442390] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.442473] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.442527] [ 21.442779] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.442882] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.442915] Hardware name: linux,dummy-virt (DT) [ 21.442947] Call trace: [ 21.443105] show_stack+0x20/0x38 (C) [ 21.443172] dump_stack_lvl+0x8c/0xd0 [ 21.443227] print_report+0x118/0x608 [ 21.443321] kasan_report+0xdc/0x128 [ 21.443496] kasan_check_range+0x100/0x1a8 [ 21.443683] __kasan_check_read+0x20/0x30 [ 21.443835] copy_user_test_oob+0x4a0/0xec8 [ 21.443888] kunit_try_run_case+0x170/0x3f0 [ 21.443940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.444015] kthread+0x328/0x630 [ 21.444223] ret_from_fork+0x10/0x20 [ 21.444376] [ 21.444559] Allocated by task 288: [ 21.444840] kasan_save_stack+0x3c/0x68 [ 21.444963] kasan_save_track+0x20/0x40 [ 21.445050] kasan_save_alloc_info+0x40/0x58 [ 21.445095] __kasan_kmalloc+0xd4/0xd8 [ 21.445213] __kmalloc_noprof+0x198/0x4c8 [ 21.445297] kunit_kmalloc_array+0x34/0x88 [ 21.445371] copy_user_test_oob+0xac/0xec8 [ 21.445416] kunit_try_run_case+0x170/0x3f0 [ 21.445458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.445518] kthread+0x328/0x630 [ 21.445556] ret_from_fork+0x10/0x20 [ 21.445595] [ 21.445617] The buggy address belongs to the object at fff00000c3f9e800 [ 21.445617] which belongs to the cache kmalloc-128 of size 128 [ 21.445934] The buggy address is located 0 bytes inside of [ 21.445934] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.446114] [ 21.446289] The buggy address belongs to the physical page: [ 21.446386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.446464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.446522] page_type: f5(slab) [ 21.446736] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.446909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.447095] page dumped because: kasan: bad access detected [ 21.447182] [ 21.447466] Memory state around the buggy address: [ 21.447575] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.447723] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.447827] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.447907] ^ [ 21.447994] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.448039] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.448326] ================================================================== [ 21.430294] ================================================================== [ 21.430363] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.430416] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.430469] [ 21.430500] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.430587] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.430620] Hardware name: linux,dummy-virt (DT) [ 21.430652] Call trace: [ 21.430677] show_stack+0x20/0x38 (C) [ 21.430726] dump_stack_lvl+0x8c/0xd0 [ 21.430776] print_report+0x118/0x608 [ 21.430825] kasan_report+0xdc/0x128 [ 21.430873] kasan_check_range+0x100/0x1a8 [ 21.430923] __kasan_check_read+0x20/0x30 [ 21.430973] copy_user_test_oob+0x3c8/0xec8 [ 21.431028] kunit_try_run_case+0x170/0x3f0 [ 21.431078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.431136] kthread+0x328/0x630 [ 21.431184] ret_from_fork+0x10/0x20 [ 21.431235] [ 21.431256] Allocated by task 288: [ 21.431287] kasan_save_stack+0x3c/0x68 [ 21.431328] kasan_save_track+0x20/0x40 [ 21.433690] kasan_save_alloc_info+0x40/0x58 [ 21.433776] __kasan_kmalloc+0xd4/0xd8 [ 21.433817] __kmalloc_noprof+0x198/0x4c8 [ 21.433856] kunit_kmalloc_array+0x34/0x88 [ 21.433899] copy_user_test_oob+0xac/0xec8 [ 21.433938] kunit_try_run_case+0x170/0x3f0 [ 21.433981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.434030] kthread+0x328/0x630 [ 21.434069] ret_from_fork+0x10/0x20 [ 21.434109] [ 21.434134] The buggy address belongs to the object at fff00000c3f9e800 [ 21.434134] which belongs to the cache kmalloc-128 of size 128 [ 21.434192] The buggy address is located 0 bytes inside of [ 21.434192] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.434257] [ 21.434281] The buggy address belongs to the physical page: [ 21.434314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.434378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.434628] page_type: f5(slab) [ 21.434916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.435131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.435308] page dumped because: kasan: bad access detected [ 21.435406] [ 21.435438] Memory state around the buggy address: [ 21.435477] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.435524] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435571] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.435613] ^ [ 21.435779] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435834] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435976] ================================================================== [ 21.436843] ================================================================== [ 21.436893] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.436946] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.436998] [ 21.437030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.437135] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.437178] Hardware name: linux,dummy-virt (DT) [ 21.437212] Call trace: [ 21.437236] show_stack+0x20/0x38 (C) [ 21.437285] dump_stack_lvl+0x8c/0xd0 [ 21.437359] print_report+0x118/0x608 [ 21.437408] kasan_report+0xdc/0x128 [ 21.437457] kasan_check_range+0x100/0x1a8 [ 21.437508] __kasan_check_write+0x20/0x30 [ 21.437574] copy_user_test_oob+0x434/0xec8 [ 21.437625] kunit_try_run_case+0x170/0x3f0 [ 21.437676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.437734] kthread+0x328/0x630 [ 21.437783] ret_from_fork+0x10/0x20 [ 21.437833] [ 21.437855] Allocated by task 288: [ 21.437884] kasan_save_stack+0x3c/0x68 [ 21.437935] kasan_save_track+0x20/0x40 [ 21.437975] kasan_save_alloc_info+0x40/0x58 [ 21.438026] __kasan_kmalloc+0xd4/0xd8 [ 21.438065] __kmalloc_noprof+0x198/0x4c8 [ 21.438105] kunit_kmalloc_array+0x34/0x88 [ 21.438146] copy_user_test_oob+0xac/0xec8 [ 21.438187] kunit_try_run_case+0x170/0x3f0 [ 21.438229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.438289] kthread+0x328/0x630 [ 21.438327] ret_from_fork+0x10/0x20 [ 21.439158] [ 21.439267] The buggy address belongs to the object at fff00000c3f9e800 [ 21.439267] which belongs to the cache kmalloc-128 of size 128 [ 21.439398] The buggy address is located 0 bytes inside of [ 21.439398] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.439567] [ 21.439706] The buggy address belongs to the physical page: [ 21.439794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.439934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.440034] page_type: f5(slab) [ 21.440138] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.440205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.440255] page dumped because: kasan: bad access detected [ 21.440290] [ 21.440310] Memory state around the buggy address: [ 21.440355] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.440402] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440448] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.440688] ^ [ 21.440879] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440956] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440995] ================================================================== [ 21.425040] ================================================================== [ 21.425152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.425236] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.425294] [ 21.425536] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.425829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.425864] Hardware name: linux,dummy-virt (DT) [ 21.425900] Call trace: [ 21.426213] show_stack+0x20/0x38 (C) [ 21.426370] dump_stack_lvl+0x8c/0xd0 [ 21.427404] print_report+0x118/0x608 [ 21.427468] kasan_report+0xdc/0x128 [ 21.427518] kasan_check_range+0x100/0x1a8 [ 21.427567] __kasan_check_write+0x20/0x30 [ 21.427620] copy_user_test_oob+0x35c/0xec8 [ 21.427670] kunit_try_run_case+0x170/0x3f0 [ 21.427720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.427778] kthread+0x328/0x630 [ 21.427828] ret_from_fork+0x10/0x20 [ 21.427880] [ 21.427900] Allocated by task 288: [ 21.427933] kasan_save_stack+0x3c/0x68 [ 21.427976] kasan_save_track+0x20/0x40 [ 21.428015] kasan_save_alloc_info+0x40/0x58 [ 21.428058] __kasan_kmalloc+0xd4/0xd8 [ 21.428096] __kmalloc_noprof+0x198/0x4c8 [ 21.428137] kunit_kmalloc_array+0x34/0x88 [ 21.428178] copy_user_test_oob+0xac/0xec8 [ 21.428218] kunit_try_run_case+0x170/0x3f0 [ 21.428264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.428315] kthread+0x328/0x630 [ 21.428363] ret_from_fork+0x10/0x20 [ 21.428403] [ 21.428426] The buggy address belongs to the object at fff00000c3f9e800 [ 21.428426] which belongs to the cache kmalloc-128 of size 128 [ 21.428487] The buggy address is located 0 bytes inside of [ 21.428487] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.428551] [ 21.428575] The buggy address belongs to the physical page: [ 21.428610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.428665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.428717] page_type: f5(slab) [ 21.428760] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.428813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.428856] page dumped because: kasan: bad access detected [ 21.428891] [ 21.428915] Memory state around the buggy address: [ 21.428953] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.429000] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429045] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.429087] ^ [ 21.429131] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429176] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429217] ==================================================================
[ 22.173930] ================================================================== [ 22.174637] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 22.175270] Read of size 121 at addr ffff888101e0b000 by task kunit_try_catch/306 [ 22.175692] [ 22.175918] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 22.176062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.176088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.176151] Call Trace: [ 22.176211] <TASK> [ 22.176253] dump_stack_lvl+0x73/0xb0 [ 22.176325] print_report+0xd1/0x650 [ 22.176402] ? __virt_addr_valid+0x1db/0x2d0 [ 22.176471] ? copy_user_test_oob+0x604/0x10f0 [ 22.176513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.176564] ? copy_user_test_oob+0x604/0x10f0 [ 22.176610] kasan_report+0x141/0x180 [ 22.176664] ? copy_user_test_oob+0x604/0x10f0 [ 22.176723] kasan_check_range+0x10c/0x1c0 [ 22.176790] __kasan_check_read+0x15/0x20 [ 22.176829] copy_user_test_oob+0x604/0x10f0 [ 22.176890] ? __pfx_copy_user_test_oob+0x10/0x10 [ 22.176925] ? finish_task_switch.isra.0+0x153/0x700 [ 22.176968] ? __switch_to+0x5d9/0xf60 [ 22.177000] ? dequeue_task_fair+0x166/0x4e0 [ 22.177039] ? __schedule+0x10cc/0x2b30 [ 22.177077] ? __pfx_read_tsc+0x10/0x10 [ 22.177142] ? ktime_get_ts64+0x86/0x230 [ 22.177211] kunit_try_run_case+0x1a5/0x480 [ 22.177263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.177308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.177362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.177438] ? __kthread_parkme+0x82/0x180 [ 22.177500] ? preempt_count_sub+0x50/0x80 [ 22.177552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.177595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.177647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.177696] kthread+0x337/0x6f0 [ 22.177742] ? trace_preempt_on+0x20/0xc0 [ 22.177817] ? __pfx_kthread+0x10/0x10 [ 22.177862] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.177902] ? calculate_sigpending+0x7b/0xa0 [ 22.177939] ? __pfx_kthread+0x10/0x10 [ 22.177971] ret_from_fork+0x41/0x80 [ 22.178005] ? __pfx_kthread+0x10/0x10 [ 22.178038] ret_from_fork_asm+0x1a/0x30 [ 22.178090] </TASK> [ 22.178162] [ 22.189482] Allocated by task 306: [ 22.189856] kasan_save_stack+0x45/0x70 [ 22.190279] kasan_save_track+0x18/0x40 [ 22.190555] kasan_save_alloc_info+0x3b/0x50 [ 22.190820] __kasan_kmalloc+0xb7/0xc0 [ 22.191183] __kmalloc_noprof+0x1c9/0x500 [ 22.191562] kunit_kmalloc_array+0x25/0x60 [ 22.191825] copy_user_test_oob+0xab/0x10f0 [ 22.192645] kunit_try_run_case+0x1a5/0x480 [ 22.194373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.194695] kthread+0x337/0x6f0 [ 22.194906] ret_from_fork+0x41/0x80 [ 22.195115] ret_from_fork_asm+0x1a/0x30 [ 22.195952] [ 22.196285] The buggy address belongs to the object at ffff888101e0b000 [ 22.196285] which belongs to the cache kmalloc-128 of size 128 [ 22.197396] The buggy address is located 0 bytes inside of [ 22.197396] allocated 120-byte region [ffff888101e0b000, ffff888101e0b078) [ 22.198363] [ 22.198530] The buggy address belongs to the physical page: [ 22.198824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e0b [ 22.199509] flags: 0x200000000000000(node=0|zone=2) [ 22.199784] page_type: f5(slab) [ 22.200001] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.200688] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.201391] page dumped because: kasan: bad access detected [ 22.201878] [ 22.202155] Memory state around the buggy address: [ 22.202578] ffff888101e0af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.203052] ffff888101e0af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.203728] >ffff888101e0b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.204849] ^ [ 22.205481] ffff888101e0b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.205959] ffff888101e0b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.206568] ================================================================== [ 22.071779] ================================================================== [ 22.072315] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 22.072940] Write of size 121 at addr ffff888101e0b000 by task kunit_try_catch/306 [ 22.073785] [ 22.074052] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 22.074211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.074264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.074314] Call Trace: [ 22.074362] <TASK> [ 22.074409] dump_stack_lvl+0x73/0xb0 [ 22.074498] print_report+0xd1/0x650 [ 22.074557] ? __virt_addr_valid+0x1db/0x2d0 [ 22.074607] ? copy_user_test_oob+0x3fd/0x10f0 [ 22.074648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.074681] ? copy_user_test_oob+0x3fd/0x10f0 [ 22.074705] kasan_report+0x141/0x180 [ 22.074732] ? copy_user_test_oob+0x3fd/0x10f0 [ 22.074786] kasan_check_range+0x10c/0x1c0 [ 22.074813] __kasan_check_write+0x18/0x20 [ 22.074836] copy_user_test_oob+0x3fd/0x10f0 [ 22.074863] ? __pfx_copy_user_test_oob+0x10/0x10 [ 22.074887] ? finish_task_switch.isra.0+0x153/0x700 [ 22.074917] ? __switch_to+0x5d9/0xf60 [ 22.074940] ? dequeue_task_fair+0x166/0x4e0 [ 22.074969] ? __schedule+0x10cc/0x2b30 [ 22.074995] ? __pfx_read_tsc+0x10/0x10 [ 22.075019] ? ktime_get_ts64+0x86/0x230 [ 22.075048] kunit_try_run_case+0x1a5/0x480 [ 22.075078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.075119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.075158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.075184] ? __kthread_parkme+0x82/0x180 [ 22.075209] ? preempt_count_sub+0x50/0x80 [ 22.075238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.075264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.075290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.075316] kthread+0x337/0x6f0 [ 22.075336] ? trace_preempt_on+0x20/0xc0 [ 22.075365] ? __pfx_kthread+0x10/0x10 [ 22.075386] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.075411] ? calculate_sigpending+0x7b/0xa0 [ 22.075449] ? __pfx_kthread+0x10/0x10 [ 22.075483] ret_from_fork+0x41/0x80 [ 22.075523] ? __pfx_kthread+0x10/0x10 [ 22.075555] ret_from_fork_asm+0x1a/0x30 [ 22.075615] </TASK> [ 22.075656] [ 22.093009] Allocated by task 306: [ 22.093512] kasan_save_stack+0x45/0x70 [ 22.093975] kasan_save_track+0x18/0x40 [ 22.094460] kasan_save_alloc_info+0x3b/0x50 [ 22.094926] __kasan_kmalloc+0xb7/0xc0 [ 22.095338] __kmalloc_noprof+0x1c9/0x500 [ 22.095847] kunit_kmalloc_array+0x25/0x60 [ 22.096341] copy_user_test_oob+0xab/0x10f0 [ 22.096724] kunit_try_run_case+0x1a5/0x480 [ 22.096970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.097532] kthread+0x337/0x6f0 [ 22.097907] ret_from_fork+0x41/0x80 [ 22.098324] ret_from_fork_asm+0x1a/0x30 [ 22.098683] [ 22.098858] The buggy address belongs to the object at ffff888101e0b000 [ 22.098858] which belongs to the cache kmalloc-128 of size 128 [ 22.099427] The buggy address is located 0 bytes inside of [ 22.099427] allocated 120-byte region [ffff888101e0b000, ffff888101e0b078) [ 22.100463] [ 22.100630] The buggy address belongs to the physical page: [ 22.100902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e0b [ 22.101645] flags: 0x200000000000000(node=0|zone=2) [ 22.102170] page_type: f5(slab) [ 22.102548] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.103054] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.103571] page dumped because: kasan: bad access detected [ 22.104036] [ 22.104294] Memory state around the buggy address: [ 22.104673] ffff888101e0af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105165] ffff888101e0af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105810] >ffff888101e0b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.106329] ^ [ 22.106775] ffff888101e0b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.107291] ffff888101e0b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.107830] ================================================================== [ 22.109383] ================================================================== [ 22.109986] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 22.110662] Read of size 121 at addr ffff888101e0b000 by task kunit_try_catch/306 [ 22.110953] [ 22.111269] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 22.111400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.111449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.111501] Call Trace: [ 22.111548] <TASK> [ 22.111595] dump_stack_lvl+0x73/0xb0 [ 22.111711] print_report+0xd1/0x650 [ 22.111778] ? __virt_addr_valid+0x1db/0x2d0 [ 22.111823] ? copy_user_test_oob+0x4aa/0x10f0 [ 22.111849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.111876] ? copy_user_test_oob+0x4aa/0x10f0 [ 22.111900] kasan_report+0x141/0x180 [ 22.111927] ? copy_user_test_oob+0x4aa/0x10f0 [ 22.111974] kasan_check_range+0x10c/0x1c0 [ 22.112015] __kasan_check_read+0x15/0x20 [ 22.112060] copy_user_test_oob+0x4aa/0x10f0 [ 22.112153] ? __pfx_copy_user_test_oob+0x10/0x10 [ 22.112218] ? finish_task_switch.isra.0+0x153/0x700 [ 22.112272] ? __switch_to+0x5d9/0xf60 [ 22.112313] ? dequeue_task_fair+0x166/0x4e0 [ 22.112376] ? __schedule+0x10cc/0x2b30 [ 22.112442] ? __pfx_read_tsc+0x10/0x10 [ 22.112492] ? ktime_get_ts64+0x86/0x230 [ 22.112558] kunit_try_run_case+0x1a5/0x480 [ 22.112600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.112627] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.112656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.112682] ? __kthread_parkme+0x82/0x180 [ 22.112708] ? preempt_count_sub+0x50/0x80 [ 22.112735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.112787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.112815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.112842] kthread+0x337/0x6f0 [ 22.112863] ? trace_preempt_on+0x20/0xc0 [ 22.112891] ? __pfx_kthread+0x10/0x10 [ 22.112912] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.112936] ? calculate_sigpending+0x7b/0xa0 [ 22.112962] ? __pfx_kthread+0x10/0x10 [ 22.112984] ret_from_fork+0x41/0x80 [ 22.113009] ? __pfx_kthread+0x10/0x10 [ 22.113030] ret_from_fork_asm+0x1a/0x30 [ 22.113067] </TASK> [ 22.113084] [ 22.128056] Allocated by task 306: [ 22.128306] kasan_save_stack+0x45/0x70 [ 22.128533] kasan_save_track+0x18/0x40 [ 22.128708] kasan_save_alloc_info+0x3b/0x50 [ 22.128903] __kasan_kmalloc+0xb7/0xc0 [ 22.129106] __kmalloc_noprof+0x1c9/0x500 [ 22.129326] kunit_kmalloc_array+0x25/0x60 [ 22.130229] copy_user_test_oob+0xab/0x10f0 [ 22.130683] kunit_try_run_case+0x1a5/0x480 [ 22.131406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.131999] kthread+0x337/0x6f0 [ 22.132366] ret_from_fork+0x41/0x80 [ 22.132614] ret_from_fork_asm+0x1a/0x30 [ 22.132848] [ 22.132998] The buggy address belongs to the object at ffff888101e0b000 [ 22.132998] which belongs to the cache kmalloc-128 of size 128 [ 22.134346] The buggy address is located 0 bytes inside of [ 22.134346] allocated 120-byte region [ffff888101e0b000, ffff888101e0b078) [ 22.134899] [ 22.135119] The buggy address belongs to the physical page: [ 22.135608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e0b [ 22.136016] flags: 0x200000000000000(node=0|zone=2) [ 22.136282] page_type: f5(slab) [ 22.136585] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.137453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.138087] page dumped because: kasan: bad access detected [ 22.138339] [ 22.138440] Memory state around the buggy address: [ 22.138638] ffff888101e0af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.139059] ffff888101e0af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.140227] >ffff888101e0b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.140526] ^ [ 22.140797] ffff888101e0b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.140976] ffff888101e0b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.141204] ================================================================== [ 22.142148] ================================================================== [ 22.142493] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 22.143201] Write of size 121 at addr ffff888101e0b000 by task kunit_try_catch/306 [ 22.143570] [ 22.143780] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 22.143895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.143926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.143972] Call Trace: [ 22.144018] <TASK> [ 22.144065] dump_stack_lvl+0x73/0xb0 [ 22.144179] print_report+0xd1/0x650 [ 22.144234] ? __virt_addr_valid+0x1db/0x2d0 [ 22.144294] ? copy_user_test_oob+0x557/0x10f0 [ 22.144345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.144395] ? copy_user_test_oob+0x557/0x10f0 [ 22.144437] kasan_report+0x141/0x180 [ 22.144480] ? copy_user_test_oob+0x557/0x10f0 [ 22.144530] kasan_check_range+0x10c/0x1c0 [ 22.144579] __kasan_check_write+0x18/0x20 [ 22.144622] copy_user_test_oob+0x557/0x10f0 [ 22.144667] ? __pfx_copy_user_test_oob+0x10/0x10 [ 22.144709] ? finish_task_switch.isra.0+0x153/0x700 [ 22.144770] ? __switch_to+0x5d9/0xf60 [ 22.144819] ? dequeue_task_fair+0x166/0x4e0 [ 22.144872] ? __schedule+0x10cc/0x2b30 [ 22.144922] ? __pfx_read_tsc+0x10/0x10 [ 22.144970] ? ktime_get_ts64+0x86/0x230 [ 22.145029] kunit_try_run_case+0x1a5/0x480 [ 22.145090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.145172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.145229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.145284] ? __kthread_parkme+0x82/0x180 [ 22.145336] ? preempt_count_sub+0x50/0x80 [ 22.145385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.145429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.145475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.145525] kthread+0x337/0x6f0 [ 22.145568] ? trace_preempt_on+0x20/0xc0 [ 22.145625] ? __pfx_kthread+0x10/0x10 [ 22.145672] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.145724] ? calculate_sigpending+0x7b/0xa0 [ 22.145791] ? __pfx_kthread+0x10/0x10 [ 22.145832] ret_from_fork+0x41/0x80 [ 22.145882] ? __pfx_kthread+0x10/0x10 [ 22.145927] ret_from_fork_asm+0x1a/0x30 [ 22.146000] </TASK> [ 22.146023] [ 22.157609] Allocated by task 306: [ 22.158068] kasan_save_stack+0x45/0x70 [ 22.159441] kasan_save_track+0x18/0x40 [ 22.159724] kasan_save_alloc_info+0x3b/0x50 [ 22.159970] __kasan_kmalloc+0xb7/0xc0 [ 22.160641] __kmalloc_noprof+0x1c9/0x500 [ 22.160877] kunit_kmalloc_array+0x25/0x60 [ 22.161075] copy_user_test_oob+0xab/0x10f0 [ 22.161771] kunit_try_run_case+0x1a5/0x480 [ 22.162313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.162636] kthread+0x337/0x6f0 [ 22.162831] ret_from_fork+0x41/0x80 [ 22.163166] ret_from_fork_asm+0x1a/0x30 [ 22.163462] [ 22.163671] The buggy address belongs to the object at ffff888101e0b000 [ 22.163671] which belongs to the cache kmalloc-128 of size 128 [ 22.164845] The buggy address is located 0 bytes inside of [ 22.164845] allocated 120-byte region [ffff888101e0b000, ffff888101e0b078) [ 22.165682] [ 22.165918] The buggy address belongs to the physical page: [ 22.166304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e0b [ 22.166731] flags: 0x200000000000000(node=0|zone=2) [ 22.167216] page_type: f5(slab) [ 22.167432] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.168048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.168528] page dumped because: kasan: bad access detected [ 22.168821] [ 22.169022] Memory state around the buggy address: [ 22.169472] ffff888101e0af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.169951] ffff888101e0af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.170455] >ffff888101e0b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.171000] ^ [ 22.171418] ffff888101e0b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.172014] ffff888101e0b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.172527] ==================================================================