Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.188712] ================================================================== [ 27.188851] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 27.188985] Write of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.189115] [ 27.189204] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.189423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.190214] Hardware name: linux,dummy-virt (DT) [ 27.190353] Call trace: [ 27.190522] show_stack+0x20/0x38 (C) [ 27.190751] dump_stack_lvl+0x8c/0xd0 [ 27.191020] print_report+0x118/0x608 [ 27.191162] kasan_report+0xdc/0x128 [ 27.191269] kasan_check_range+0x100/0x1a8 [ 27.191630] __kasan_check_write+0x20/0x30 [ 27.191860] copy_user_test_oob+0x434/0xec8 [ 27.191978] kunit_try_run_case+0x170/0x3f0 [ 27.192132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.192541] kthread+0x328/0x630 [ 27.192681] ret_from_fork+0x10/0x20 [ 27.192899] [ 27.192963] Allocated by task 289: [ 27.193138] kasan_save_stack+0x3c/0x68 [ 27.193375] kasan_save_track+0x20/0x40 [ 27.193490] kasan_save_alloc_info+0x40/0x58 [ 27.193587] __kasan_kmalloc+0xd4/0xd8 [ 27.194081] __kmalloc_noprof+0x198/0x4c8 [ 27.194442] kunit_kmalloc_array+0x34/0x88 [ 27.194638] copy_user_test_oob+0xac/0xec8 [ 27.194824] kunit_try_run_case+0x170/0x3f0 [ 27.194993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.195256] kthread+0x328/0x630 [ 27.195349] ret_from_fork+0x10/0x20 [ 27.195447] [ 27.195501] The buggy address belongs to the object at fff00000c7732300 [ 27.195501] which belongs to the cache kmalloc-128 of size 128 [ 27.195651] The buggy address is located 0 bytes inside of [ 27.195651] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.196206] [ 27.196548] The buggy address belongs to the physical page: [ 27.196710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.197052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.197216] page_type: f5(slab) [ 27.197318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.197451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.197566] page dumped because: kasan: bad access detected [ 27.197654] [ 27.197704] Memory state around the buggy address: [ 27.198327] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.199059] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.199658] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.199863] ^ [ 27.199968] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.200529] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.200591] ================================================================== [ 27.170423] ================================================================== [ 27.170808] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 27.171382] Read of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.171614] [ 27.171714] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.172676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.172945] Hardware name: linux,dummy-virt (DT) [ 27.173515] Call trace: [ 27.173598] show_stack+0x20/0x38 (C) [ 27.174002] dump_stack_lvl+0x8c/0xd0 [ 27.174348] print_report+0x118/0x608 [ 27.174697] kasan_report+0xdc/0x128 [ 27.174984] kasan_check_range+0x100/0x1a8 [ 27.175109] __kasan_check_read+0x20/0x30 [ 27.175240] copy_user_test_oob+0x3c8/0xec8 [ 27.175472] kunit_try_run_case+0x170/0x3f0 [ 27.176205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.176840] kthread+0x328/0x630 [ 27.177008] ret_from_fork+0x10/0x20 [ 27.177314] [ 27.177435] Allocated by task 289: [ 27.177876] kasan_save_stack+0x3c/0x68 [ 27.178217] kasan_save_track+0x20/0x40 [ 27.178555] kasan_save_alloc_info+0x40/0x58 [ 27.178708] __kasan_kmalloc+0xd4/0xd8 [ 27.178809] __kmalloc_noprof+0x198/0x4c8 [ 27.179196] kunit_kmalloc_array+0x34/0x88 [ 27.179413] copy_user_test_oob+0xac/0xec8 [ 27.180021] kunit_try_run_case+0x170/0x3f0 [ 27.180145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.180275] kthread+0x328/0x630 [ 27.180377] ret_from_fork+0x10/0x20 [ 27.180790] [ 27.181493] The buggy address belongs to the object at fff00000c7732300 [ 27.181493] which belongs to the cache kmalloc-128 of size 128 [ 27.181752] The buggy address is located 0 bytes inside of [ 27.181752] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.182343] [ 27.182446] The buggy address belongs to the physical page: [ 27.182535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.182769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.182976] page_type: f5(slab) [ 27.183090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.183197] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.183566] page dumped because: kasan: bad access detected [ 27.183858] [ 27.183978] Memory state around the buggy address: [ 27.184094] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.184312] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.184660] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.184800] ^ [ 27.185094] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.185276] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.185624] ================================================================== [ 27.109672] ================================================================== [ 27.110115] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 27.110842] Read of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.111083] [ 27.111184] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.111388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.112028] Hardware name: linux,dummy-virt (DT) [ 27.112157] Call trace: [ 27.112459] show_stack+0x20/0x38 (C) [ 27.112608] dump_stack_lvl+0x8c/0xd0 [ 27.112739] print_report+0x118/0x608 [ 27.112860] kasan_report+0xdc/0x128 [ 27.114355] kasan_check_range+0x100/0x1a8 [ 27.114814] __kasan_check_read+0x20/0x30 [ 27.115153] copy_user_test_oob+0x728/0xec8 [ 27.115359] kunit_try_run_case+0x170/0x3f0 [ 27.115822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.116044] kthread+0x328/0x630 [ 27.116414] ret_from_fork+0x10/0x20 [ 27.116553] [ 27.117103] Allocated by task 289: [ 27.117376] kasan_save_stack+0x3c/0x68 [ 27.117551] kasan_save_track+0x20/0x40 [ 27.118184] kasan_save_alloc_info+0x40/0x58 [ 27.118344] __kasan_kmalloc+0xd4/0xd8 [ 27.118474] __kmalloc_noprof+0x198/0x4c8 [ 27.118559] kunit_kmalloc_array+0x34/0x88 [ 27.118656] copy_user_test_oob+0xac/0xec8 [ 27.118751] kunit_try_run_case+0x170/0x3f0 [ 27.118866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.118995] kthread+0x328/0x630 [ 27.119092] ret_from_fork+0x10/0x20 [ 27.119921] [ 27.120003] The buggy address belongs to the object at fff00000c7732300 [ 27.120003] which belongs to the cache kmalloc-128 of size 128 [ 27.120655] The buggy address is located 0 bytes inside of [ 27.120655] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.120842] [ 27.120911] The buggy address belongs to the physical page: [ 27.121197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.121752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.121910] page_type: f5(slab) [ 27.122593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.122850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.123027] page dumped because: kasan: bad access detected [ 27.123114] [ 27.123378] Memory state around the buggy address: [ 27.123558] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.124057] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.124565] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.124982] ^ [ 27.125126] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.125240] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.125347] ================================================================== [ 27.150721] ================================================================== [ 27.151268] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 27.151611] Write of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.151950] [ 27.152061] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.152592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.152798] Hardware name: linux,dummy-virt (DT) [ 27.152884] Call trace: [ 27.152951] show_stack+0x20/0x38 (C) [ 27.153685] dump_stack_lvl+0x8c/0xd0 [ 27.153852] print_report+0x118/0x608 [ 27.153963] kasan_report+0xdc/0x128 [ 27.154086] kasan_check_range+0x100/0x1a8 [ 27.154665] __kasan_check_write+0x20/0x30 [ 27.155579] copy_user_test_oob+0x35c/0xec8 [ 27.155769] kunit_try_run_case+0x170/0x3f0 [ 27.156001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.156254] kthread+0x328/0x630 [ 27.156388] ret_from_fork+0x10/0x20 [ 27.156848] [ 27.156914] Allocated by task 289: [ 27.157251] kasan_save_stack+0x3c/0x68 [ 27.157386] kasan_save_track+0x20/0x40 [ 27.157491] kasan_save_alloc_info+0x40/0x58 [ 27.157855] __kasan_kmalloc+0xd4/0xd8 [ 27.158149] __kmalloc_noprof+0x198/0x4c8 [ 27.158510] kunit_kmalloc_array+0x34/0x88 [ 27.158610] copy_user_test_oob+0xac/0xec8 [ 27.158691] kunit_try_run_case+0x170/0x3f0 [ 27.158784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.159665] kthread+0x328/0x630 [ 27.159790] ret_from_fork+0x10/0x20 [ 27.159888] [ 27.159941] The buggy address belongs to the object at fff00000c7732300 [ 27.159941] which belongs to the cache kmalloc-128 of size 128 [ 27.160835] The buggy address is located 0 bytes inside of [ 27.160835] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.161097] [ 27.161164] The buggy address belongs to the physical page: [ 27.161298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.161535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.161719] page_type: f5(slab) [ 27.161846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.161990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.162397] page dumped because: kasan: bad access detected [ 27.162774] [ 27.163144] Memory state around the buggy address: [ 27.163253] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.163632] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.163782] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.164396] ^ [ 27.164888] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.165065] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.165179] ================================================================== [ 27.204067] ================================================================== [ 27.204323] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 27.204831] Read of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.205094] [ 27.205285] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.206042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.206150] Hardware name: linux,dummy-virt (DT) [ 27.206237] Call trace: [ 27.206317] show_stack+0x20/0x38 (C) [ 27.206876] dump_stack_lvl+0x8c/0xd0 [ 27.207170] print_report+0x118/0x608 [ 27.207424] kasan_report+0xdc/0x128 [ 27.207761] kasan_check_range+0x100/0x1a8 [ 27.207901] __kasan_check_read+0x20/0x30 [ 27.208117] copy_user_test_oob+0x4a0/0xec8 [ 27.208357] kunit_try_run_case+0x170/0x3f0 [ 27.208668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.209147] kthread+0x328/0x630 [ 27.209287] ret_from_fork+0x10/0x20 [ 27.209617] [ 27.209744] Allocated by task 289: [ 27.209928] kasan_save_stack+0x3c/0x68 [ 27.210131] kasan_save_track+0x20/0x40 [ 27.210229] kasan_save_alloc_info+0x40/0x58 [ 27.210783] __kasan_kmalloc+0xd4/0xd8 [ 27.210964] __kmalloc_noprof+0x198/0x4c8 [ 27.211331] kunit_kmalloc_array+0x34/0x88 [ 27.211594] copy_user_test_oob+0xac/0xec8 [ 27.211833] kunit_try_run_case+0x170/0x3f0 [ 27.211950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.212061] kthread+0x328/0x630 [ 27.212142] ret_from_fork+0x10/0x20 [ 27.212228] [ 27.212279] The buggy address belongs to the object at fff00000c7732300 [ 27.212279] which belongs to the cache kmalloc-128 of size 128 [ 27.212450] The buggy address is located 0 bytes inside of [ 27.212450] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.212629] [ 27.212687] The buggy address belongs to the physical page: [ 27.212779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.212923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.213063] page_type: f5(slab) [ 27.213172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.213437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.213592] page dumped because: kasan: bad access detected [ 27.214032] [ 27.214095] Memory state around the buggy address: [ 27.214194] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.214828] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.215463] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.215594] ^ [ 27.215800] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.216115] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.216328] ================================================================== [ 27.078205] ================================================================== [ 27.078555] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 27.078820] Write of size 121 at addr fff00000c7732300 by task kunit_try_catch/289 [ 27.078954] [ 27.079057] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 27.079268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.079355] Hardware name: linux,dummy-virt (DT) [ 27.079445] Call trace: [ 27.079532] show_stack+0x20/0x38 (C) [ 27.079710] dump_stack_lvl+0x8c/0xd0 [ 27.079914] print_report+0x118/0x608 [ 27.080091] kasan_report+0xdc/0x128 [ 27.080210] kasan_check_range+0x100/0x1a8 [ 27.081332] __kasan_check_write+0x20/0x30 [ 27.081973] copy_user_test_oob+0x234/0xec8 [ 27.082228] kunit_try_run_case+0x170/0x3f0 [ 27.082468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.083102] kthread+0x328/0x630 [ 27.083313] ret_from_fork+0x10/0x20 [ 27.083859] [ 27.084266] Allocated by task 289: [ 27.084358] kasan_save_stack+0x3c/0x68 [ 27.084492] kasan_save_track+0x20/0x40 [ 27.085035] kasan_save_alloc_info+0x40/0x58 [ 27.085162] __kasan_kmalloc+0xd4/0xd8 [ 27.085669] __kmalloc_noprof+0x198/0x4c8 [ 27.085877] kunit_kmalloc_array+0x34/0x88 [ 27.086002] copy_user_test_oob+0xac/0xec8 [ 27.086097] kunit_try_run_case+0x170/0x3f0 [ 27.086597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.086731] kthread+0x328/0x630 [ 27.086827] ret_from_fork+0x10/0x20 [ 27.086961] [ 27.087022] The buggy address belongs to the object at fff00000c7732300 [ 27.087022] which belongs to the cache kmalloc-128 of size 128 [ 27.087703] The buggy address is located 0 bytes inside of [ 27.087703] allocated 120-byte region [fff00000c7732300, fff00000c7732378) [ 27.087989] [ 27.088292] The buggy address belongs to the physical page: [ 27.088530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 27.089351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.090071] page_type: f5(slab) [ 27.090217] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.090365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.090626] page dumped because: kasan: bad access detected [ 27.090722] [ 27.090784] Memory state around the buggy address: [ 27.091275] fff00000c7732200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.091495] fff00000c7732280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.091840] >fff00000c7732300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.092219] ^ [ 27.092870] fff00000c7732380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.093470] fff00000c7732400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.093577] ==================================================================
[ 18.438627] ================================================================== [ 18.439285] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 18.439729] Write of size 121 at addr ffff8881039f5200 by task kunit_try_catch/305 [ 18.440189] [ 18.440305] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.440353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.440366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.440388] Call Trace: [ 18.440403] <TASK> [ 18.440418] dump_stack_lvl+0x73/0xb0 [ 18.440445] print_report+0xd1/0x650 [ 18.440469] ? __virt_addr_valid+0x1db/0x2d0 [ 18.440491] ? copy_user_test_oob+0x557/0x10f0 [ 18.440510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.440532] ? copy_user_test_oob+0x557/0x10f0 [ 18.440552] kasan_report+0x141/0x180 [ 18.440585] ? copy_user_test_oob+0x557/0x10f0 [ 18.440611] kasan_check_range+0x10c/0x1c0 [ 18.440631] __kasan_check_write+0x18/0x20 [ 18.440652] copy_user_test_oob+0x557/0x10f0 [ 18.440674] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.440693] ? finish_task_switch.isra.0+0x153/0x700 [ 18.440716] ? __switch_to+0x5d9/0xf60 [ 18.440736] ? dequeue_task_fair+0x166/0x4e0 [ 18.440759] ? __schedule+0x10cc/0x2b30 [ 18.440781] ? __pfx_read_tsc+0x10/0x10 [ 18.440800] ? ktime_get_ts64+0x86/0x230 [ 18.440824] kunit_try_run_case+0x1a5/0x480 [ 18.440848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.440870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.440893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.440915] ? __kthread_parkme+0x82/0x180 [ 18.440937] ? preempt_count_sub+0x50/0x80 [ 18.440961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.440985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.441007] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.441030] kthread+0x337/0x6f0 [ 18.441049] ? trace_preempt_on+0x20/0xc0 [ 18.441072] ? __pfx_kthread+0x10/0x10 [ 18.441092] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.441115] ? calculate_sigpending+0x7b/0xa0 [ 18.441138] ? __pfx_kthread+0x10/0x10 [ 18.441158] ret_from_fork+0x41/0x80 [ 18.441180] ? __pfx_kthread+0x10/0x10 [ 18.441199] ret_from_fork_asm+0x1a/0x30 [ 18.441229] </TASK> [ 18.441241] [ 18.447278] Allocated by task 305: [ 18.447373] kasan_save_stack+0x45/0x70 [ 18.447471] kasan_save_track+0x18/0x40 [ 18.447571] kasan_save_alloc_info+0x3b/0x50 [ 18.447837] __kasan_kmalloc+0xb7/0xc0 [ 18.448086] __kmalloc_noprof+0x1c9/0x500 [ 18.448407] kunit_kmalloc_array+0x25/0x60 [ 18.448670] copy_user_test_oob+0xab/0x10f0 [ 18.448906] kunit_try_run_case+0x1a5/0x480 [ 18.449126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.449457] kthread+0x337/0x6f0 [ 18.449553] ret_from_fork+0x41/0x80 [ 18.449650] ret_from_fork_asm+0x1a/0x30 [ 18.449887] [ 18.449986] The buggy address belongs to the object at ffff8881039f5200 [ 18.449986] which belongs to the cache kmalloc-128 of size 128 [ 18.450316] The buggy address is located 0 bytes inside of [ 18.450316] allocated 120-byte region [ffff8881039f5200, ffff8881039f5278) [ 18.450593] [ 18.450651] The buggy address belongs to the physical page: [ 18.451025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f5 [ 18.451290] flags: 0x200000000000000(node=0|zone=2) [ 18.451446] page_type: f5(slab) [ 18.451636] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.451888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.452084] page dumped because: kasan: bad access detected [ 18.452233] [ 18.452303] Memory state around the buggy address: [ 18.452431] ffff8881039f5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.452630] ffff8881039f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.453887] >ffff8881039f5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.454185] ^ [ 18.454457] ffff8881039f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454628] ffff8881039f5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454760] ================================================================== [ 18.424885] ================================================================== [ 18.425261] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 18.425483] Read of size 121 at addr ffff8881039f5200 by task kunit_try_catch/305 [ 18.425802] [ 18.425918] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.425965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.425980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.426001] Call Trace: [ 18.426018] <TASK> [ 18.426033] dump_stack_lvl+0x73/0xb0 [ 18.426061] print_report+0xd1/0x650 [ 18.426085] ? __virt_addr_valid+0x1db/0x2d0 [ 18.426108] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.426129] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.426151] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.426172] kasan_report+0x141/0x180 [ 18.426193] ? copy_user_test_oob+0x4aa/0x10f0 [ 18.426219] kasan_check_range+0x10c/0x1c0 [ 18.426240] __kasan_check_read+0x15/0x20 [ 18.426261] copy_user_test_oob+0x4aa/0x10f0 [ 18.426283] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.426302] ? finish_task_switch.isra.0+0x153/0x700 [ 18.426325] ? __switch_to+0x5d9/0xf60 [ 18.426346] ? dequeue_task_fair+0x166/0x4e0 [ 18.426369] ? __schedule+0x10cc/0x2b30 [ 18.426391] ? __pfx_read_tsc+0x10/0x10 [ 18.426411] ? ktime_get_ts64+0x86/0x230 [ 18.426436] kunit_try_run_case+0x1a5/0x480 [ 18.426460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.426505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.426527] ? __kthread_parkme+0x82/0x180 [ 18.426548] ? preempt_count_sub+0x50/0x80 [ 18.426583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.426631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.426654] kthread+0x337/0x6f0 [ 18.426695] ? trace_preempt_on+0x20/0xc0 [ 18.426721] ? __pfx_kthread+0x10/0x10 [ 18.426742] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.426763] ? calculate_sigpending+0x7b/0xa0 [ 18.426784] ? __pfx_kthread+0x10/0x10 [ 18.426803] ret_from_fork+0x41/0x80 [ 18.426826] ? __pfx_kthread+0x10/0x10 [ 18.426845] ret_from_fork_asm+0x1a/0x30 [ 18.426875] </TASK> [ 18.426888] [ 18.432003] Allocated by task 305: [ 18.432247] kasan_save_stack+0x45/0x70 [ 18.432455] kasan_save_track+0x18/0x40 [ 18.432680] kasan_save_alloc_info+0x3b/0x50 [ 18.432895] __kasan_kmalloc+0xb7/0xc0 [ 18.433188] __kmalloc_noprof+0x1c9/0x500 [ 18.433395] kunit_kmalloc_array+0x25/0x60 [ 18.433492] copy_user_test_oob+0xab/0x10f0 [ 18.433750] kunit_try_run_case+0x1a5/0x480 [ 18.433914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.434024] kthread+0x337/0x6f0 [ 18.434103] ret_from_fork+0x41/0x80 [ 18.434214] ret_from_fork_asm+0x1a/0x30 [ 18.434456] [ 18.434586] The buggy address belongs to the object at ffff8881039f5200 [ 18.434586] which belongs to the cache kmalloc-128 of size 128 [ 18.435086] The buggy address is located 0 bytes inside of [ 18.435086] allocated 120-byte region [ffff8881039f5200, ffff8881039f5278) [ 18.435479] [ 18.435593] The buggy address belongs to the physical page: [ 18.435880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f5 [ 18.436115] flags: 0x200000000000000(node=0|zone=2) [ 18.436387] page_type: f5(slab) [ 18.436480] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.436791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.437081] page dumped because: kasan: bad access detected [ 18.437244] [ 18.437355] Memory state around the buggy address: [ 18.437463] ffff8881039f5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.437607] ffff8881039f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437738] >ffff8881039f5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.437864] ^ [ 18.437992] ffff8881039f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.438125] ffff8881039f5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.438248] ================================================================== [ 18.455285] ================================================================== [ 18.455448] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 18.456046] Read of size 121 at addr ffff8881039f5200 by task kunit_try_catch/305 [ 18.457007] [ 18.457195] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.457344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.457447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.457474] Call Trace: [ 18.457493] <TASK> [ 18.457690] dump_stack_lvl+0x73/0xb0 [ 18.457737] print_report+0xd1/0x650 [ 18.457764] ? __virt_addr_valid+0x1db/0x2d0 [ 18.457787] ? copy_user_test_oob+0x604/0x10f0 [ 18.457809] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.457832] ? copy_user_test_oob+0x604/0x10f0 [ 18.457853] kasan_report+0x141/0x180 [ 18.457878] ? copy_user_test_oob+0x604/0x10f0 [ 18.457903] kasan_check_range+0x10c/0x1c0 [ 18.457924] __kasan_check_read+0x15/0x20 [ 18.457946] copy_user_test_oob+0x604/0x10f0 [ 18.457970] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.457990] ? finish_task_switch.isra.0+0x153/0x700 [ 18.458014] ? __switch_to+0x5d9/0xf60 [ 18.458035] ? dequeue_task_fair+0x166/0x4e0 [ 18.458059] ? __schedule+0x10cc/0x2b30 [ 18.458082] ? __pfx_read_tsc+0x10/0x10 [ 18.458102] ? ktime_get_ts64+0x86/0x230 [ 18.458128] kunit_try_run_case+0x1a5/0x480 [ 18.458154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.458177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.458201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.458225] ? __kthread_parkme+0x82/0x180 [ 18.458248] ? preempt_count_sub+0x50/0x80 [ 18.458273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.458297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.458322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.458346] kthread+0x337/0x6f0 [ 18.458365] ? trace_preempt_on+0x20/0xc0 [ 18.458388] ? __pfx_kthread+0x10/0x10 [ 18.458408] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.458430] ? calculate_sigpending+0x7b/0xa0 [ 18.458452] ? __pfx_kthread+0x10/0x10 [ 18.458471] ret_from_fork+0x41/0x80 [ 18.458492] ? __pfx_kthread+0x10/0x10 [ 18.458512] ret_from_fork_asm+0x1a/0x30 [ 18.458543] </TASK> [ 18.459236] [ 18.468266] Allocated by task 305: [ 18.468467] kasan_save_stack+0x45/0x70 [ 18.468761] kasan_save_track+0x18/0x40 [ 18.469175] kasan_save_alloc_info+0x3b/0x50 [ 18.469335] __kasan_kmalloc+0xb7/0xc0 [ 18.469469] __kmalloc_noprof+0x1c9/0x500 [ 18.469668] kunit_kmalloc_array+0x25/0x60 [ 18.470060] copy_user_test_oob+0xab/0x10f0 [ 18.470219] kunit_try_run_case+0x1a5/0x480 [ 18.470475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.470937] kthread+0x337/0x6f0 [ 18.471149] ret_from_fork+0x41/0x80 [ 18.471309] ret_from_fork_asm+0x1a/0x30 [ 18.471540] [ 18.471672] The buggy address belongs to the object at ffff8881039f5200 [ 18.471672] which belongs to the cache kmalloc-128 of size 128 [ 18.472410] The buggy address is located 0 bytes inside of [ 18.472410] allocated 120-byte region [ffff8881039f5200, ffff8881039f5278) [ 18.473277] [ 18.473373] The buggy address belongs to the physical page: [ 18.473556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f5 [ 18.473991] flags: 0x200000000000000(node=0|zone=2) [ 18.474175] page_type: f5(slab) [ 18.474434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.474709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.475023] page dumped because: kasan: bad access detected [ 18.475249] [ 18.475385] Memory state around the buggy address: [ 18.475670] ffff8881039f5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.476017] ffff8881039f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.476268] >ffff8881039f5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.476545] ^ [ 18.477032] ffff8881039f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.477615] ffff8881039f5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.477998] ================================================================== [ 18.409945] ================================================================== [ 18.410259] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 18.410471] Write of size 121 at addr ffff8881039f5200 by task kunit_try_catch/305 [ 18.410802] [ 18.410934] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.410987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.411002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.411024] Call Trace: [ 18.411041] <TASK> [ 18.411061] dump_stack_lvl+0x73/0xb0 [ 18.411090] print_report+0xd1/0x650 [ 18.411115] ? __virt_addr_valid+0x1db/0x2d0 [ 18.411146] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.411169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.411193] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.411214] kasan_report+0x141/0x180 [ 18.411238] ? copy_user_test_oob+0x3fd/0x10f0 [ 18.411262] kasan_check_range+0x10c/0x1c0 [ 18.411285] __kasan_check_write+0x18/0x20 [ 18.411305] copy_user_test_oob+0x3fd/0x10f0 [ 18.411327] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.411347] ? finish_task_switch.isra.0+0x153/0x700 [ 18.411371] ? __switch_to+0x5d9/0xf60 [ 18.411394] ? dequeue_task_fair+0x166/0x4e0 [ 18.411420] ? __schedule+0x10cc/0x2b30 [ 18.411443] ? __pfx_read_tsc+0x10/0x10 [ 18.411465] ? ktime_get_ts64+0x86/0x230 [ 18.411491] kunit_try_run_case+0x1a5/0x480 [ 18.411517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.411540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.411577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.411603] ? __kthread_parkme+0x82/0x180 [ 18.411626] ? preempt_count_sub+0x50/0x80 [ 18.411652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.411676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.411700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.411723] kthread+0x337/0x6f0 [ 18.411743] ? trace_preempt_on+0x20/0xc0 [ 18.411767] ? __pfx_kthread+0x10/0x10 [ 18.411787] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.411809] ? calculate_sigpending+0x7b/0xa0 [ 18.411831] ? __pfx_kthread+0x10/0x10 [ 18.411852] ret_from_fork+0x41/0x80 [ 18.411873] ? __pfx_kthread+0x10/0x10 [ 18.411893] ret_from_fork_asm+0x1a/0x30 [ 18.411924] </TASK> [ 18.411937] [ 18.417888] Allocated by task 305: [ 18.417974] kasan_save_stack+0x45/0x70 [ 18.418071] kasan_save_track+0x18/0x40 [ 18.418159] kasan_save_alloc_info+0x3b/0x50 [ 18.418250] __kasan_kmalloc+0xb7/0xc0 [ 18.418333] __kmalloc_noprof+0x1c9/0x500 [ 18.418420] kunit_kmalloc_array+0x25/0x60 [ 18.418576] copy_user_test_oob+0xab/0x10f0 [ 18.418808] kunit_try_run_case+0x1a5/0x480 [ 18.419084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.419438] kthread+0x337/0x6f0 [ 18.419643] ret_from_fork+0x41/0x80 [ 18.419773] ret_from_fork_asm+0x1a/0x30 [ 18.419872] [ 18.419929] The buggy address belongs to the object at ffff8881039f5200 [ 18.419929] which belongs to the cache kmalloc-128 of size 128 [ 18.420139] The buggy address is located 0 bytes inside of [ 18.420139] allocated 120-byte region [ffff8881039f5200, ffff8881039f5278) [ 18.420940] [ 18.421072] The buggy address belongs to the physical page: [ 18.421275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f5 [ 18.421421] flags: 0x200000000000000(node=0|zone=2) [ 18.421528] page_type: f5(slab) [ 18.421713] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.421996] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.422365] page dumped because: kasan: bad access detected [ 18.422670] [ 18.422753] Memory state around the buggy address: [ 18.422898] ffff8881039f5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.423030] ffff8881039f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.423171] >ffff8881039f5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.423312] ^ [ 18.423442] ffff8881039f5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.423754] ffff8881039f5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.424104] ==================================================================