Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 64.933426] ================================================================== [ 64.940371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 64.947399] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 64.954864] [ 64.956350] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.956407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.956425] Hardware name: WinLink E850-96 board (DT) [ 64.956447] Call trace: [ 64.956461] show_stack+0x20/0x38 (C) [ 64.956497] dump_stack_lvl+0x8c/0xd0 [ 64.956538] print_report+0x118/0x608 [ 64.956573] kasan_report+0xdc/0x128 [ 64.956603] kasan_check_range+0x100/0x1a8 [ 64.956638] __kasan_check_read+0x20/0x30 [ 64.956673] copy_user_test_oob+0x728/0xec8 [ 64.956704] kunit_try_run_case+0x170/0x3f0 [ 64.956741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.956782] kthread+0x328/0x630 [ 64.956817] ret_from_fork+0x10/0x20 [ 64.956854] [ 65.022485] Allocated by task 334: [ 65.025872] kasan_save_stack+0x3c/0x68 [ 65.029689] kasan_save_track+0x20/0x40 [ 65.033509] kasan_save_alloc_info+0x40/0x58 [ 65.037763] __kasan_kmalloc+0xd4/0xd8 [ 65.041495] __kmalloc_noprof+0x198/0x4c8 [ 65.045488] kunit_kmalloc_array+0x34/0x88 [ 65.049567] copy_user_test_oob+0xac/0xec8 [ 65.053649] kunit_try_run_case+0x170/0x3f0 [ 65.057814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.063283] kthread+0x328/0x630 [ 65.066494] ret_from_fork+0x10/0x20 [ 65.070053] [ 65.071529] The buggy address belongs to the object at ffff000800dad600 [ 65.071529] which belongs to the cache kmalloc-128 of size 128 [ 65.084032] The buggy address is located 0 bytes inside of [ 65.084032] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.096442] [ 65.097922] The buggy address belongs to the physical page: [ 65.103477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.111462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.119100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.126045] page_type: f5(slab) [ 65.129178] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.136900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.144626] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.152437] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.160250] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.168062] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.175867] page dumped because: kasan: bad access detected [ 65.181423] [ 65.182899] Memory state around the buggy address: [ 65.187681] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.194882] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.202087] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.209288] ^ [ 65.216409] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.223614] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.230815] ================================================================== [ 64.623030] ================================================================== [ 64.635341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.642369] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 64.649922] [ 64.651409] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 64.651465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.651483] Hardware name: WinLink E850-96 board (DT) [ 64.651505] Call trace: [ 64.651519] show_stack+0x20/0x38 (C) [ 64.651558] dump_stack_lvl+0x8c/0xd0 [ 64.651599] print_report+0x118/0x608 [ 64.651631] kasan_report+0xdc/0x128 [ 64.651665] kasan_check_range+0x100/0x1a8 [ 64.651699] __kasan_check_write+0x20/0x30 [ 64.651733] copy_user_test_oob+0x234/0xec8 [ 64.651766] kunit_try_run_case+0x170/0x3f0 [ 64.651805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.651844] kthread+0x328/0x630 [ 64.651884] ret_from_fork+0x10/0x20 [ 64.651920] [ 64.717628] Allocated by task 334: [ 64.721018] kasan_save_stack+0x3c/0x68 [ 64.724833] kasan_save_track+0x20/0x40 [ 64.728652] kasan_save_alloc_info+0x40/0x58 [ 64.732906] __kasan_kmalloc+0xd4/0xd8 [ 64.736639] __kmalloc_noprof+0x198/0x4c8 [ 64.740632] kunit_kmalloc_array+0x34/0x88 [ 64.744711] copy_user_test_oob+0xac/0xec8 [ 64.748791] kunit_try_run_case+0x170/0x3f0 [ 64.752957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.758426] kthread+0x328/0x630 [ 64.761638] ret_from_fork+0x10/0x20 [ 64.765197] [ 64.766674] The buggy address belongs to the object at ffff000800dad600 [ 64.766674] which belongs to the cache kmalloc-128 of size 128 [ 64.779174] The buggy address is located 0 bytes inside of [ 64.779174] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 64.791585] [ 64.793066] The buggy address belongs to the physical page: [ 64.798621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 64.806606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.814244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.821187] page_type: f5(slab) [ 64.824327] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.832043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.839771] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.847581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.855394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 64.863206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.871011] page dumped because: kasan: bad access detected [ 64.876568] [ 64.878042] Memory state around the buggy address: [ 64.882823] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.890027] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.897232] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.904431] ^ [ 64.911553] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.918757] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.925960] ================================================================== [ 65.543170] ================================================================== [ 65.550259] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.557286] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.564751] [ 65.566236] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.566290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.566307] Hardware name: WinLink E850-96 board (DT) [ 65.566329] Call trace: [ 65.566344] show_stack+0x20/0x38 (C) [ 65.566379] dump_stack_lvl+0x8c/0xd0 [ 65.566415] print_report+0x118/0x608 [ 65.566449] kasan_report+0xdc/0x128 [ 65.566480] kasan_check_range+0x100/0x1a8 [ 65.566514] __kasan_check_read+0x20/0x30 [ 65.566550] copy_user_test_oob+0x3c8/0xec8 [ 65.566581] kunit_try_run_case+0x170/0x3f0 [ 65.566618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.566658] kthread+0x328/0x630 [ 65.566690] ret_from_fork+0x10/0x20 [ 65.566726] [ 65.632372] Allocated by task 334: [ 65.635760] kasan_save_stack+0x3c/0x68 [ 65.639576] kasan_save_track+0x20/0x40 [ 65.643396] kasan_save_alloc_info+0x40/0x58 [ 65.647649] __kasan_kmalloc+0xd4/0xd8 [ 65.651383] __kmalloc_noprof+0x198/0x4c8 [ 65.655375] kunit_kmalloc_array+0x34/0x88 [ 65.659455] copy_user_test_oob+0xac/0xec8 [ 65.663534] kunit_try_run_case+0x170/0x3f0 [ 65.667701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.673170] kthread+0x328/0x630 [ 65.676381] ret_from_fork+0x10/0x20 [ 65.679940] [ 65.681416] The buggy address belongs to the object at ffff000800dad600 [ 65.681416] which belongs to the cache kmalloc-128 of size 128 [ 65.693919] The buggy address is located 0 bytes inside of [ 65.693919] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.706329] [ 65.707807] The buggy address belongs to the physical page: [ 65.713366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.721347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.728986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.735932] page_type: f5(slab) [ 65.739065] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.746786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.754513] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.762324] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.770137] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.777949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.785755] page dumped because: kasan: bad access detected [ 65.791310] [ 65.792785] Memory state around the buggy address: [ 65.797565] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.804769] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.811973] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.819174] ^ [ 65.826296] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.833501] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.840703] ================================================================== [ 65.238365] ================================================================== [ 65.245231] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.252256] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.259808] [ 65.261293] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.261350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.261368] Hardware name: WinLink E850-96 board (DT) [ 65.261389] Call trace: [ 65.261404] show_stack+0x20/0x38 (C) [ 65.261443] dump_stack_lvl+0x8c/0xd0 [ 65.261481] print_report+0x118/0x608 [ 65.261513] kasan_report+0xdc/0x128 [ 65.261546] kasan_check_range+0x100/0x1a8 [ 65.261581] __kasan_check_write+0x20/0x30 [ 65.261614] copy_user_test_oob+0x35c/0xec8 [ 65.261644] kunit_try_run_case+0x170/0x3f0 [ 65.261682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.261723] kthread+0x328/0x630 [ 65.261756] ret_from_fork+0x10/0x20 [ 65.261792] [ 65.327514] Allocated by task 334: [ 65.330904] kasan_save_stack+0x3c/0x68 [ 65.334720] kasan_save_track+0x20/0x40 [ 65.338539] kasan_save_alloc_info+0x40/0x58 [ 65.342792] __kasan_kmalloc+0xd4/0xd8 [ 65.346526] __kmalloc_noprof+0x198/0x4c8 [ 65.350518] kunit_kmalloc_array+0x34/0x88 [ 65.354598] copy_user_test_oob+0xac/0xec8 [ 65.358677] kunit_try_run_case+0x170/0x3f0 [ 65.362844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.368313] kthread+0x328/0x630 [ 65.371525] ret_from_fork+0x10/0x20 [ 65.375084] [ 65.376559] The buggy address belongs to the object at ffff000800dad600 [ 65.376559] which belongs to the cache kmalloc-128 of size 128 [ 65.389062] The buggy address is located 0 bytes inside of [ 65.389062] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 65.401472] [ 65.402951] The buggy address belongs to the physical page: [ 65.408508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 65.416489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.424131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.431074] page_type: f5(slab) [ 65.434211] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.441930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.449656] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.457467] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.465280] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 65.473092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.480898] page dumped because: kasan: bad access detected [ 65.486453] [ 65.487929] Memory state around the buggy address: [ 65.492710] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.499912] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.507116] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.514318] ^ [ 65.521440] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.528644] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.535845] ================================================================== [ 66.153052] ================================================================== [ 66.160144] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.167172] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 66.174638] [ 66.176122] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 66.176177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.176197] Hardware name: WinLink E850-96 board (DT) [ 66.176219] Call trace: [ 66.176232] show_stack+0x20/0x38 (C) [ 66.176267] dump_stack_lvl+0x8c/0xd0 [ 66.176305] print_report+0x118/0x608 [ 66.176336] kasan_report+0xdc/0x128 [ 66.176367] kasan_check_range+0x100/0x1a8 [ 66.176400] __kasan_check_read+0x20/0x30 [ 66.176433] copy_user_test_oob+0x4a0/0xec8 [ 66.176463] kunit_try_run_case+0x170/0x3f0 [ 66.176501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.176539] kthread+0x328/0x630 [ 66.176573] ret_from_fork+0x10/0x20 [ 66.176606] [ 66.242258] Allocated by task 334: [ 66.245645] kasan_save_stack+0x3c/0x68 [ 66.249463] kasan_save_track+0x20/0x40 [ 66.253282] kasan_save_alloc_info+0x40/0x58 [ 66.257536] __kasan_kmalloc+0xd4/0xd8 [ 66.261268] __kmalloc_noprof+0x198/0x4c8 [ 66.265261] kunit_kmalloc_array+0x34/0x88 [ 66.269341] copy_user_test_oob+0xac/0xec8 [ 66.273420] kunit_try_run_case+0x170/0x3f0 [ 66.277587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.283056] kthread+0x328/0x630 [ 66.286267] ret_from_fork+0x10/0x20 [ 66.289827] [ 66.291302] The buggy address belongs to the object at ffff000800dad600 [ 66.291302] which belongs to the cache kmalloc-128 of size 128 [ 66.303803] The buggy address is located 0 bytes inside of [ 66.303803] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.316215] [ 66.317693] The buggy address belongs to the physical page: [ 66.323249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.331233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.338873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.345817] page_type: f5(slab) [ 66.348949] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.356673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.364400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.372210] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.380024] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.387835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.395641] page dumped because: kasan: bad access detected [ 66.401196] [ 66.402672] Memory state around the buggy address: [ 66.407452] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.414655] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.421860] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.429061] ^ [ 66.436182] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.443389] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.450589] ================================================================== [ 65.848118] ================================================================== [ 65.855114] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 65.862142] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334 [ 65.869694] [ 65.871179] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 65.871235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.871254] Hardware name: WinLink E850-96 board (DT) [ 65.871276] Call trace: [ 65.871290] show_stack+0x20/0x38 (C) [ 65.871327] dump_stack_lvl+0x8c/0xd0 [ 65.871366] print_report+0x118/0x608 [ 65.871399] kasan_report+0xdc/0x128 [ 65.871431] kasan_check_range+0x100/0x1a8 [ 65.871463] __kasan_check_write+0x20/0x30 [ 65.871497] copy_user_test_oob+0x434/0xec8 [ 65.871527] kunit_try_run_case+0x170/0x3f0 [ 65.871566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.871604] kthread+0x328/0x630 [ 65.871640] ret_from_fork+0x10/0x20 [ 65.871674] [ 65.937401] Allocated by task 334: [ 65.940788] kasan_save_stack+0x3c/0x68 [ 65.944606] kasan_save_track+0x20/0x40 [ 65.948425] kasan_save_alloc_info+0x40/0x58 [ 65.952679] __kasan_kmalloc+0xd4/0xd8 [ 65.956413] __kmalloc_noprof+0x198/0x4c8 [ 65.960405] kunit_kmalloc_array+0x34/0x88 [ 65.964485] copy_user_test_oob+0xac/0xec8 [ 65.968564] kunit_try_run_case+0x170/0x3f0 [ 65.972731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.978199] kthread+0x328/0x630 [ 65.981411] ret_from_fork+0x10/0x20 [ 65.984970] [ 65.986446] The buggy address belongs to the object at ffff000800dad600 [ 65.986446] which belongs to the cache kmalloc-128 of size 128 [ 65.998948] The buggy address is located 0 bytes inside of [ 65.998948] allocated 120-byte region [ffff000800dad600, ffff000800dad678) [ 66.011359] [ 66.012836] The buggy address belongs to the physical page: [ 66.018395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 66.026379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.034017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.040959] page_type: f5(slab) [ 66.044095] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.051816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.059543] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.067354] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.075167] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 66.082979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.090785] page dumped because: kasan: bad access detected [ 66.096340] [ 66.097816] Memory state around the buggy address: [ 66.102597] ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.109799] ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.117003] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.124204] ^ [ 66.131327] ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.138531] ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.145732] ==================================================================
[ 21.062909] ================================================================== [ 21.062989] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.063113] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.063230] [ 21.063319] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.063448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.063871] Hardware name: linux,dummy-virt (DT) [ 21.064244] Call trace: [ 21.064332] show_stack+0x20/0x38 (C) [ 21.064393] dump_stack_lvl+0x8c/0xd0 [ 21.064560] print_report+0x118/0x608 [ 21.064825] kasan_report+0xdc/0x128 [ 21.064905] kasan_check_range+0x100/0x1a8 [ 21.065426] __kasan_check_write+0x20/0x30 [ 21.065584] copy_user_test_oob+0x35c/0xec8 [ 21.065718] kunit_try_run_case+0x170/0x3f0 [ 21.065877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.066347] kthread+0x328/0x630 [ 21.066440] ret_from_fork+0x10/0x20 [ 21.066554] [ 21.066585] Allocated by task 287: [ 21.066624] kasan_save_stack+0x3c/0x68 [ 21.066713] kasan_save_track+0x20/0x40 [ 21.066754] kasan_save_alloc_info+0x40/0x58 [ 21.066806] __kasan_kmalloc+0xd4/0xd8 [ 21.066873] __kmalloc_noprof+0x198/0x4c8 [ 21.066912] kunit_kmalloc_array+0x34/0x88 [ 21.066954] copy_user_test_oob+0xac/0xec8 [ 21.066998] kunit_try_run_case+0x170/0x3f0 [ 21.067040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.067095] kthread+0x328/0x630 [ 21.067143] ret_from_fork+0x10/0x20 [ 21.067199] [ 21.067221] The buggy address belongs to the object at fff00000c791de00 [ 21.067221] which belongs to the cache kmalloc-128 of size 128 [ 21.067299] The buggy address is located 0 bytes inside of [ 21.067299] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.067372] [ 21.067405] The buggy address belongs to the physical page: [ 21.067452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.067507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.067564] page_type: f5(slab) [ 21.067610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.067664] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.067714] page dumped because: kasan: bad access detected [ 21.067777] [ 21.067806] Memory state around the buggy address: [ 21.067850] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.068114] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.068176] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.068221] ^ [ 21.068265] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069417] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069879] ================================================================== [ 21.082621] ================================================================== [ 21.082702] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.082779] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.082835] [ 21.082881] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.082968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.082998] Hardware name: linux,dummy-virt (DT) [ 21.083031] Call trace: [ 21.083055] show_stack+0x20/0x38 (C) [ 21.083105] dump_stack_lvl+0x8c/0xd0 [ 21.083161] print_report+0x118/0x608 [ 21.083231] kasan_report+0xdc/0x128 [ 21.083277] kasan_check_range+0x100/0x1a8 [ 21.083326] __kasan_check_write+0x20/0x30 [ 21.083375] copy_user_test_oob+0x434/0xec8 [ 21.083423] kunit_try_run_case+0x170/0x3f0 [ 21.083474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.083529] kthread+0x328/0x630 [ 21.083575] ret_from_fork+0x10/0x20 [ 21.083631] [ 21.083652] Allocated by task 287: [ 21.083685] kasan_save_stack+0x3c/0x68 [ 21.083738] kasan_save_track+0x20/0x40 [ 21.083778] kasan_save_alloc_info+0x40/0x58 [ 21.083817] __kasan_kmalloc+0xd4/0xd8 [ 21.083865] __kmalloc_noprof+0x198/0x4c8 [ 21.083963] kunit_kmalloc_array+0x34/0x88 [ 21.084326] copy_user_test_oob+0xac/0xec8 [ 21.084817] kunit_try_run_case+0x170/0x3f0 [ 21.085272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.085334] kthread+0x328/0x630 [ 21.085373] ret_from_fork+0x10/0x20 [ 21.085740] [ 21.086300] The buggy address belongs to the object at fff00000c791de00 [ 21.086300] which belongs to the cache kmalloc-128 of size 128 [ 21.086500] The buggy address is located 0 bytes inside of [ 21.086500] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.086671] [ 21.086695] The buggy address belongs to the physical page: [ 21.087047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.087498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.087653] page_type: f5(slab) [ 21.087921] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.088071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.088122] page dumped because: kasan: bad access detected [ 21.088159] [ 21.088181] Memory state around the buggy address: [ 21.088673] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.089178] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089248] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.089294] ^ [ 21.089916] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090371] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090576] ================================================================== [ 21.031606] ================================================================== [ 21.031710] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.032384] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.032464] [ 21.032749] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.032874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033007] Hardware name: linux,dummy-virt (DT) [ 21.033076] Call trace: [ 21.033111] show_stack+0x20/0x38 (C) [ 21.033191] dump_stack_lvl+0x8c/0xd0 [ 21.033288] print_report+0x118/0x608 [ 21.033354] kasan_report+0xdc/0x128 [ 21.033634] kasan_check_range+0x100/0x1a8 [ 21.033726] __kasan_check_write+0x20/0x30 [ 21.033802] copy_user_test_oob+0x234/0xec8 [ 21.034063] kunit_try_run_case+0x170/0x3f0 [ 21.034289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.034581] kthread+0x328/0x630 [ 21.034690] ret_from_fork+0x10/0x20 [ 21.035011] [ 21.035378] Allocated by task 287: [ 21.035684] kasan_save_stack+0x3c/0x68 [ 21.036147] kasan_save_track+0x20/0x40 [ 21.036244] kasan_save_alloc_info+0x40/0x58 [ 21.036434] __kasan_kmalloc+0xd4/0xd8 [ 21.036677] __kmalloc_noprof+0x198/0x4c8 [ 21.036780] kunit_kmalloc_array+0x34/0x88 [ 21.036980] copy_user_test_oob+0xac/0xec8 [ 21.037164] kunit_try_run_case+0x170/0x3f0 [ 21.037409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.037644] kthread+0x328/0x630 [ 21.037732] ret_from_fork+0x10/0x20 [ 21.038127] [ 21.038166] The buggy address belongs to the object at fff00000c791de00 [ 21.038166] which belongs to the cache kmalloc-128 of size 128 [ 21.038329] The buggy address is located 0 bytes inside of [ 21.038329] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.038397] [ 21.038424] The buggy address belongs to the physical page: [ 21.038459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.038524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.038580] page_type: f5(slab) [ 21.038636] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.038691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.038753] page dumped because: kasan: bad access detected [ 21.038790] [ 21.038818] Memory state around the buggy address: [ 21.038868] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.038916] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.038976] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.039019] ^ [ 21.039077] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039124] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039174] ================================================================== [ 21.045972] ================================================================== [ 21.046033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.046088] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.046621] [ 21.046871] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.046974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.047260] Hardware name: linux,dummy-virt (DT) [ 21.047504] Call trace: [ 21.047531] show_stack+0x20/0x38 (C) [ 21.047645] dump_stack_lvl+0x8c/0xd0 [ 21.047759] print_report+0x118/0x608 [ 21.048031] kasan_report+0xdc/0x128 [ 21.048276] kasan_check_range+0x100/0x1a8 [ 21.048549] __kasan_check_read+0x20/0x30 [ 21.048642] copy_user_test_oob+0x728/0xec8 [ 21.048826] kunit_try_run_case+0x170/0x3f0 [ 21.049317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049643] kthread+0x328/0x630 [ 21.049706] ret_from_fork+0x10/0x20 [ 21.050179] [ 21.050483] Allocated by task 287: [ 21.050673] kasan_save_stack+0x3c/0x68 [ 21.051045] kasan_save_track+0x20/0x40 [ 21.051177] kasan_save_alloc_info+0x40/0x58 [ 21.051428] __kasan_kmalloc+0xd4/0xd8 [ 21.051626] __kmalloc_noprof+0x198/0x4c8 [ 21.051689] kunit_kmalloc_array+0x34/0x88 [ 21.051922] copy_user_test_oob+0xac/0xec8 [ 21.051976] kunit_try_run_case+0x170/0x3f0 [ 21.052271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.052430] kthread+0x328/0x630 [ 21.052491] ret_from_fork+0x10/0x20 [ 21.052553] [ 21.052576] The buggy address belongs to the object at fff00000c791de00 [ 21.052576] which belongs to the cache kmalloc-128 of size 128 [ 21.052647] The buggy address is located 0 bytes inside of [ 21.052647] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.052713] [ 21.052744] The buggy address belongs to the physical page: [ 21.052778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.052833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.052906] page_type: f5(slab) [ 21.052952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.053008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.053077] page dumped because: kasan: bad access detected [ 21.053114] [ 21.053135] Memory state around the buggy address: [ 21.053178] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.053228] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053285] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.053329] ^ [ 21.053390] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053442] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053503] ================================================================== [ 21.072249] ================================================================== [ 21.072309] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.072362] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.072416] [ 21.072692] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.072956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.072988] Hardware name: linux,dummy-virt (DT) [ 21.073544] Call trace: [ 21.073586] show_stack+0x20/0x38 (C) [ 21.073766] dump_stack_lvl+0x8c/0xd0 [ 21.073931] print_report+0x118/0x608 [ 21.073984] kasan_report+0xdc/0x128 [ 21.074047] kasan_check_range+0x100/0x1a8 [ 21.074097] __kasan_check_read+0x20/0x30 [ 21.074184] copy_user_test_oob+0x3c8/0xec8 [ 21.074525] kunit_try_run_case+0x170/0x3f0 [ 21.074793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.074869] kthread+0x328/0x630 [ 21.074918] ret_from_fork+0x10/0x20 [ 21.075090] [ 21.075152] Allocated by task 287: [ 21.075189] kasan_save_stack+0x3c/0x68 [ 21.075234] kasan_save_track+0x20/0x40 [ 21.075591] kasan_save_alloc_info+0x40/0x58 [ 21.075809] __kasan_kmalloc+0xd4/0xd8 [ 21.075912] __kmalloc_noprof+0x198/0x4c8 [ 21.076003] kunit_kmalloc_array+0x34/0x88 [ 21.076139] copy_user_test_oob+0xac/0xec8 [ 21.076198] kunit_try_run_case+0x170/0x3f0 [ 21.076243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076452] kthread+0x328/0x630 [ 21.077045] ret_from_fork+0x10/0x20 [ 21.077168] [ 21.077226] The buggy address belongs to the object at fff00000c791de00 [ 21.077226] which belongs to the cache kmalloc-128 of size 128 [ 21.077290] The buggy address is located 0 bytes inside of [ 21.077290] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.077657] [ 21.077703] The buggy address belongs to the physical page: [ 21.077761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.078307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078451] page_type: f5(slab) [ 21.078565] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.078620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.078961] page dumped because: kasan: bad access detected [ 21.079243] [ 21.079327] Memory state around the buggy address: [ 21.079367] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.080340] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.080399] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.080443] ^ [ 21.080488] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081007] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081186] ================================================================== [ 21.094515] ================================================================== [ 21.095060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.095131] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.095534] [ 21.095700] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.095796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.096090] Hardware name: linux,dummy-virt (DT) [ 21.096175] Call trace: [ 21.096608] show_stack+0x20/0x38 (C) [ 21.096784] dump_stack_lvl+0x8c/0xd0 [ 21.096994] print_report+0x118/0x608 [ 21.097104] kasan_report+0xdc/0x128 [ 21.097154] kasan_check_range+0x100/0x1a8 [ 21.097202] __kasan_check_read+0x20/0x30 [ 21.097255] copy_user_test_oob+0x4a0/0xec8 [ 21.097981] kunit_try_run_case+0x170/0x3f0 [ 21.098100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.098371] kthread+0x328/0x630 [ 21.098459] ret_from_fork+0x10/0x20 [ 21.098598] [ 21.098620] Allocated by task 287: [ 21.098876] kasan_save_stack+0x3c/0x68 [ 21.099023] kasan_save_track+0x20/0x40 [ 21.099401] kasan_save_alloc_info+0x40/0x58 [ 21.099536] __kasan_kmalloc+0xd4/0xd8 [ 21.099581] __kmalloc_noprof+0x198/0x4c8 [ 21.099672] kunit_kmalloc_array+0x34/0x88 [ 21.099715] copy_user_test_oob+0xac/0xec8 [ 21.099777] kunit_try_run_case+0x170/0x3f0 [ 21.099820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.099880] kthread+0x328/0x630 [ 21.100159] ret_from_fork+0x10/0x20 [ 21.100614] [ 21.100646] The buggy address belongs to the object at fff00000c791de00 [ 21.100646] which belongs to the cache kmalloc-128 of size 128 [ 21.100710] The buggy address is located 0 bytes inside of [ 21.100710] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.100776] [ 21.101384] The buggy address belongs to the physical page: [ 21.101682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.101962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.102359] page_type: f5(slab) [ 21.102404] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.102648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.103396] page dumped because: kasan: bad access detected [ 21.103603] [ 21.103912] Memory state around the buggy address: [ 21.103967] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.104018] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104066] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.104111] ^ [ 21.104486] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104743] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104795] ==================================================================
[ 14.855259] ================================================================== [ 14.855514] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 14.855966] Read of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304 [ 14.856324] [ 14.856457] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.856607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.856622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.856645] Call Trace: [ 14.856676] <TASK> [ 14.856696] dump_stack_lvl+0x73/0xb0 [ 14.856723] print_report+0xd1/0x650 [ 14.856747] ? __virt_addr_valid+0x1db/0x2d0 [ 14.856770] ? copy_user_test_oob+0x4aa/0x10f0 [ 14.856790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.856815] ? copy_user_test_oob+0x4aa/0x10f0 [ 14.856836] kasan_report+0x141/0x180 [ 14.856859] ? copy_user_test_oob+0x4aa/0x10f0 [ 14.856885] kasan_check_range+0x10c/0x1c0 [ 14.856906] __kasan_check_read+0x15/0x20 [ 14.856935] copy_user_test_oob+0x4aa/0x10f0 [ 14.856959] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.856979] ? finish_task_switch.isra.0+0x153/0x700 [ 14.857006] ? __switch_to+0x5d9/0xf60 [ 14.857028] ? dequeue_task_fair+0x166/0x4e0 [ 14.857054] ? __schedule+0x10cc/0x2b60 [ 14.857077] ? __pfx_read_tsc+0x10/0x10 [ 14.857099] ? ktime_get_ts64+0x86/0x230 [ 14.857125] kunit_try_run_case+0x1a5/0x480 [ 14.857152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857176] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.857202] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.857226] ? __kthread_parkme+0x82/0x180 [ 14.857249] ? preempt_count_sub+0x50/0x80 [ 14.857275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.857324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.857348] kthread+0x337/0x6f0 [ 14.857365] ? trace_preempt_on+0x20/0xc0 [ 14.857390] ? __pfx_kthread+0x10/0x10 [ 14.857409] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.857431] ? calculate_sigpending+0x7b/0xa0 [ 14.857455] ? __pfx_kthread+0x10/0x10 [ 14.857473] ret_from_fork+0x41/0x80 [ 14.857495] ? __pfx_kthread+0x10/0x10 [ 14.857514] ret_from_fork_asm+0x1a/0x30 [ 14.857596] </TASK> [ 14.857609] [ 14.866093] Allocated by task 304: [ 14.866298] kasan_save_stack+0x45/0x70 [ 14.866619] kasan_save_track+0x18/0x40 [ 14.866838] kasan_save_alloc_info+0x3b/0x50 [ 14.867096] __kasan_kmalloc+0xb7/0xc0 [ 14.867352] __kmalloc_noprof+0x1c9/0x500 [ 14.867603] kunit_kmalloc_array+0x25/0x60 [ 14.867754] copy_user_test_oob+0xab/0x10f0 [ 14.867929] kunit_try_run_case+0x1a5/0x480 [ 14.868179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.868513] kthread+0x337/0x6f0 [ 14.868754] ret_from_fork+0x41/0x80 [ 14.868959] ret_from_fork_asm+0x1a/0x30 [ 14.869210] [ 14.869322] The buggy address belongs to the object at ffff888102f60f00 [ 14.869322] which belongs to the cache kmalloc-128 of size 128 [ 14.869791] The buggy address is located 0 bytes inside of [ 14.869791] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.870493] [ 14.870623] The buggy address belongs to the physical page: [ 14.870908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.871274] flags: 0x200000000000000(node=0|zone=2) [ 14.871644] page_type: f5(slab) [ 14.871870] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.872164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.872498] page dumped because: kasan: bad access detected [ 14.872748] [ 14.872827] Memory state around the buggy address: [ 14.873051] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.873358] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873661] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.874026] ^ [ 14.874256] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.874545] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.875019] ================================================================== [ 14.896987] ================================================================== [ 14.897426] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 14.897825] Read of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304 [ 14.898135] [ 14.898253] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.898302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.898315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.898338] Call Trace: [ 14.898359] <TASK> [ 14.898380] dump_stack_lvl+0x73/0xb0 [ 14.898405] print_report+0xd1/0x650 [ 14.898430] ? __virt_addr_valid+0x1db/0x2d0 [ 14.898454] ? copy_user_test_oob+0x604/0x10f0 [ 14.898477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.898501] ? copy_user_test_oob+0x604/0x10f0 [ 14.898522] kasan_report+0x141/0x180 [ 14.898545] ? copy_user_test_oob+0x604/0x10f0 [ 14.898649] kasan_check_range+0x10c/0x1c0 [ 14.898671] __kasan_check_read+0x15/0x20 [ 14.898703] copy_user_test_oob+0x604/0x10f0 [ 14.898727] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.898747] ? finish_task_switch.isra.0+0x153/0x700 [ 14.898775] ? __switch_to+0x5d9/0xf60 [ 14.898802] ? dequeue_task_fair+0x166/0x4e0 [ 14.898831] ? __schedule+0x10cc/0x2b60 [ 14.898858] ? __pfx_read_tsc+0x10/0x10 [ 14.898880] ? ktime_get_ts64+0x86/0x230 [ 14.898906] kunit_try_run_case+0x1a5/0x480 [ 14.898943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.898966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.898992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.899017] ? __kthread_parkme+0x82/0x180 [ 14.899042] ? preempt_count_sub+0x50/0x80 [ 14.899068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.899093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.899118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.899142] kthread+0x337/0x6f0 [ 14.899159] ? trace_preempt_on+0x20/0xc0 [ 14.899184] ? __pfx_kthread+0x10/0x10 [ 14.899202] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.899224] ? calculate_sigpending+0x7b/0xa0 [ 14.899248] ? __pfx_kthread+0x10/0x10 [ 14.899267] ret_from_fork+0x41/0x80 [ 14.899289] ? __pfx_kthread+0x10/0x10 [ 14.899308] ret_from_fork_asm+0x1a/0x30 [ 14.899339] </TASK> [ 14.899351] [ 14.908283] Allocated by task 304: [ 14.908535] kasan_save_stack+0x45/0x70 [ 14.908812] kasan_save_track+0x18/0x40 [ 14.908994] kasan_save_alloc_info+0x3b/0x50 [ 14.909144] __kasan_kmalloc+0xb7/0xc0 [ 14.909451] __kmalloc_noprof+0x1c9/0x500 [ 14.909676] kunit_kmalloc_array+0x25/0x60 [ 14.909940] copy_user_test_oob+0xab/0x10f0 [ 14.910112] kunit_try_run_case+0x1a5/0x480 [ 14.910323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.910719] kthread+0x337/0x6f0 [ 14.910875] ret_from_fork+0x41/0x80 [ 14.911132] ret_from_fork_asm+0x1a/0x30 [ 14.911373] [ 14.911477] The buggy address belongs to the object at ffff888102f60f00 [ 14.911477] which belongs to the cache kmalloc-128 of size 128 [ 14.912129] The buggy address is located 0 bytes inside of [ 14.912129] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.912715] [ 14.912818] The buggy address belongs to the physical page: [ 14.913064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.913390] flags: 0x200000000000000(node=0|zone=2) [ 14.913676] page_type: f5(slab) [ 14.913805] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.914155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.914639] page dumped because: kasan: bad access detected [ 14.914835] [ 14.914936] Memory state around the buggy address: [ 14.915289] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.915582] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915911] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.916295] ^ [ 14.916617] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.916865] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.917204] ================================================================== [ 14.834892] ================================================================== [ 14.835286] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 14.835734] Write of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304 [ 14.836153] [ 14.836256] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.836308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.836323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.836413] Call Trace: [ 14.836466] <TASK> [ 14.836488] dump_stack_lvl+0x73/0xb0 [ 14.836515] print_report+0xd1/0x650 [ 14.836540] ? __virt_addr_valid+0x1db/0x2d0 [ 14.836586] ? copy_user_test_oob+0x3fd/0x10f0 [ 14.836607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.836631] ? copy_user_test_oob+0x3fd/0x10f0 [ 14.836652] kasan_report+0x141/0x180 [ 14.836676] ? copy_user_test_oob+0x3fd/0x10f0 [ 14.836702] kasan_check_range+0x10c/0x1c0 [ 14.836723] __kasan_check_write+0x18/0x20 [ 14.836743] copy_user_test_oob+0x3fd/0x10f0 [ 14.836766] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.836787] ? finish_task_switch.isra.0+0x153/0x700 [ 14.836814] ? __switch_to+0x5d9/0xf60 [ 14.836838] ? dequeue_task_fair+0x166/0x4e0 [ 14.836864] ? __schedule+0x10cc/0x2b60 [ 14.836888] ? __pfx_read_tsc+0x10/0x10 [ 14.836910] ? ktime_get_ts64+0x86/0x230 [ 14.836946] kunit_try_run_case+0x1a5/0x480 [ 14.836973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.837022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.837047] ? __kthread_parkme+0x82/0x180 [ 14.837070] ? preempt_count_sub+0x50/0x80 [ 14.837095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.837119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.837144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.837167] kthread+0x337/0x6f0 [ 14.837185] ? trace_preempt_on+0x20/0xc0 [ 14.837210] ? __pfx_kthread+0x10/0x10 [ 14.837229] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.837252] ? calculate_sigpending+0x7b/0xa0 [ 14.837274] ? __pfx_kthread+0x10/0x10 [ 14.837293] ret_from_fork+0x41/0x80 [ 14.837315] ? __pfx_kthread+0x10/0x10 [ 14.837333] ret_from_fork_asm+0x1a/0x30 [ 14.837364] </TASK> [ 14.837376] [ 14.845749] Allocated by task 304: [ 14.845895] kasan_save_stack+0x45/0x70 [ 14.846107] kasan_save_track+0x18/0x40 [ 14.846442] kasan_save_alloc_info+0x3b/0x50 [ 14.846763] __kasan_kmalloc+0xb7/0xc0 [ 14.846965] __kmalloc_noprof+0x1c9/0x500 [ 14.847135] kunit_kmalloc_array+0x25/0x60 [ 14.847340] copy_user_test_oob+0xab/0x10f0 [ 14.847481] kunit_try_run_case+0x1a5/0x480 [ 14.847825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848126] kthread+0x337/0x6f0 [ 14.848278] ret_from_fork+0x41/0x80 [ 14.848409] ret_from_fork_asm+0x1a/0x30 [ 14.848725] [ 14.848859] The buggy address belongs to the object at ffff888102f60f00 [ 14.848859] which belongs to the cache kmalloc-128 of size 128 [ 14.849435] The buggy address is located 0 bytes inside of [ 14.849435] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.850036] [ 14.850157] The buggy address belongs to the physical page: [ 14.850403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.850823] flags: 0x200000000000000(node=0|zone=2) [ 14.851077] page_type: f5(slab) [ 14.851228] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.851526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.851863] page dumped because: kasan: bad access detected [ 14.852097] [ 14.852190] Memory state around the buggy address: [ 14.852512] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.852860] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.853107] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.853523] ^ [ 14.853846] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854208] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.854521] ================================================================== [ 14.875709] ================================================================== [ 14.876240] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 14.876639] Write of size 121 at addr ffff888102f60f00 by task kunit_try_catch/304 [ 14.876978] [ 14.877165] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.877216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.877229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.877252] Call Trace: [ 14.877274] <TASK> [ 14.877295] dump_stack_lvl+0x73/0xb0 [ 14.877385] print_report+0xd1/0x650 [ 14.877422] ? __virt_addr_valid+0x1db/0x2d0 [ 14.877446] ? copy_user_test_oob+0x557/0x10f0 [ 14.877467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.877492] ? copy_user_test_oob+0x557/0x10f0 [ 14.877513] kasan_report+0x141/0x180 [ 14.877536] ? copy_user_test_oob+0x557/0x10f0 [ 14.877583] kasan_check_range+0x10c/0x1c0 [ 14.877605] __kasan_check_write+0x18/0x20 [ 14.877626] copy_user_test_oob+0x557/0x10f0 [ 14.877648] ? __pfx_copy_user_test_oob+0x10/0x10 [ 14.877669] ? finish_task_switch.isra.0+0x153/0x700 [ 14.877696] ? __switch_to+0x5d9/0xf60 [ 14.877719] ? dequeue_task_fair+0x166/0x4e0 [ 14.877744] ? __schedule+0x10cc/0x2b60 [ 14.877769] ? __pfx_read_tsc+0x10/0x10 [ 14.877790] ? ktime_get_ts64+0x86/0x230 [ 14.877817] kunit_try_run_case+0x1a5/0x480 [ 14.877844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.877867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.877892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.877926] ? __kthread_parkme+0x82/0x180 [ 14.877949] ? preempt_count_sub+0x50/0x80 [ 14.877975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.877999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.878048] kthread+0x337/0x6f0 [ 14.878066] ? trace_preempt_on+0x20/0xc0 [ 14.878090] ? __pfx_kthread+0x10/0x10 [ 14.878108] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.878131] ? calculate_sigpending+0x7b/0xa0 [ 14.878153] ? __pfx_kthread+0x10/0x10 [ 14.878172] ret_from_fork+0x41/0x80 [ 14.878196] ? __pfx_kthread+0x10/0x10 [ 14.878215] ret_from_fork_asm+0x1a/0x30 [ 14.878247] </TASK> [ 14.878259] [ 14.887325] Allocated by task 304: [ 14.887515] kasan_save_stack+0x45/0x70 [ 14.887691] kasan_save_track+0x18/0x40 [ 14.887891] kasan_save_alloc_info+0x3b/0x50 [ 14.888110] __kasan_kmalloc+0xb7/0xc0 [ 14.888302] __kmalloc_noprof+0x1c9/0x500 [ 14.888496] kunit_kmalloc_array+0x25/0x60 [ 14.888751] copy_user_test_oob+0xab/0x10f0 [ 14.888900] kunit_try_run_case+0x1a5/0x480 [ 14.889119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.889485] kthread+0x337/0x6f0 [ 14.889742] ret_from_fork+0x41/0x80 [ 14.889962] ret_from_fork_asm+0x1a/0x30 [ 14.890156] [ 14.890256] The buggy address belongs to the object at ffff888102f60f00 [ 14.890256] which belongs to the cache kmalloc-128 of size 128 [ 14.890795] The buggy address is located 0 bytes inside of [ 14.890795] allocated 120-byte region [ffff888102f60f00, ffff888102f60f78) [ 14.891411] [ 14.891512] The buggy address belongs to the physical page: [ 14.891840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60 [ 14.892222] flags: 0x200000000000000(node=0|zone=2) [ 14.892494] page_type: f5(slab) [ 14.892747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.893121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.893461] page dumped because: kasan: bad access detected [ 14.893727] [ 14.893913] Memory state around the buggy address: [ 14.894181] ffff888102f60e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.894462] ffff888102f60e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.894889] >ffff888102f60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 14.895236] ^ [ 14.895532] ffff888102f60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.895875] ffff888102f61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.896234] ==================================================================