Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.758262] ================================================================== [ 29.758594] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 29.758831] Write of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.759224] [ 29.759402] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.759640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.759713] Hardware name: linux,dummy-virt (DT) [ 29.759813] Call trace: [ 29.759877] show_stack+0x20/0x38 (C) [ 29.760004] dump_stack_lvl+0x8c/0xd0 [ 29.760151] print_report+0x118/0x608 [ 29.760280] kasan_report+0xdc/0x128 [ 29.760633] kasan_check_range+0x100/0x1a8 [ 29.760818] __kasan_check_write+0x20/0x30 [ 29.760968] copy_user_test_oob+0x35c/0xec8 [ 29.761131] kunit_try_run_case+0x170/0x3f0 [ 29.761477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.761716] kthread+0x328/0x630 [ 29.761926] ret_from_fork+0x10/0x20 [ 29.762058] [ 29.762358] Allocated by task 287: [ 29.762555] kasan_save_stack+0x3c/0x68 [ 29.763279] kasan_save_track+0x20/0x40 [ 29.763533] kasan_save_alloc_info+0x40/0x58 [ 29.763651] __kasan_kmalloc+0xd4/0xd8 [ 29.763742] __kmalloc_noprof+0x198/0x4c8 [ 29.763836] kunit_kmalloc_array+0x34/0x88 [ 29.764053] copy_user_test_oob+0xac/0xec8 [ 29.764819] kunit_try_run_case+0x170/0x3f0 [ 29.765623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.766057] kthread+0x328/0x630 [ 29.766162] ret_from_fork+0x10/0x20 [ 29.766720] [ 29.766788] The buggy address belongs to the object at fff00000c7065800 [ 29.766788] which belongs to the cache kmalloc-128 of size 128 [ 29.767426] The buggy address is located 0 bytes inside of [ 29.767426] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.767585] [ 29.767642] The buggy address belongs to the physical page: [ 29.767725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.767850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.769266] page_type: f5(slab) [ 29.769500] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.769634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.770605] page dumped because: kasan: bad access detected [ 29.770881] [ 29.770989] Memory state around the buggy address: [ 29.771358] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.771491] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.771608] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.772599] ^ [ 29.772798] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.772994] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773098] ================================================================== [ 29.776064] ================================================================== [ 29.776199] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 29.776524] Read of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.776677] [ 29.776766] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.776965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.777030] Hardware name: linux,dummy-virt (DT) [ 29.777117] Call trace: [ 29.777302] show_stack+0x20/0x38 (C) [ 29.777444] dump_stack_lvl+0x8c/0xd0 [ 29.777594] print_report+0x118/0x608 [ 29.777765] kasan_report+0xdc/0x128 [ 29.777954] kasan_check_range+0x100/0x1a8 [ 29.778123] __kasan_check_read+0x20/0x30 [ 29.778266] copy_user_test_oob+0x3c8/0xec8 [ 29.778413] kunit_try_run_case+0x170/0x3f0 [ 29.778657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.778802] kthread+0x328/0x630 [ 29.778957] ret_from_fork+0x10/0x20 [ 29.779326] [ 29.779457] Allocated by task 287: [ 29.779539] kasan_save_stack+0x3c/0x68 [ 29.779647] kasan_save_track+0x20/0x40 [ 29.779785] kasan_save_alloc_info+0x40/0x58 [ 29.779989] __kasan_kmalloc+0xd4/0xd8 [ 29.780165] __kmalloc_noprof+0x198/0x4c8 [ 29.780431] kunit_kmalloc_array+0x34/0x88 [ 29.780550] copy_user_test_oob+0xac/0xec8 [ 29.780666] kunit_try_run_case+0x170/0x3f0 [ 29.780801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.780962] kthread+0x328/0x630 [ 29.781078] ret_from_fork+0x10/0x20 [ 29.781198] [ 29.781260] The buggy address belongs to the object at fff00000c7065800 [ 29.781260] which belongs to the cache kmalloc-128 of size 128 [ 29.781495] The buggy address is located 0 bytes inside of [ 29.781495] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.781670] [ 29.781821] The buggy address belongs to the physical page: [ 29.781929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.782067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.782189] page_type: f5(slab) [ 29.782338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.782591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.782707] page dumped because: kasan: bad access detected [ 29.782800] [ 29.782883] Memory state around the buggy address: [ 29.783006] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.783119] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783232] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.783334] ^ [ 29.783504] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783700] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783941] ================================================================== [ 29.799209] ================================================================== [ 29.799315] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 29.799438] Read of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.799564] [ 29.799644] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.800365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.802419] Hardware name: linux,dummy-virt (DT) [ 29.802508] Call trace: [ 29.802740] show_stack+0x20/0x38 (C) [ 29.803331] dump_stack_lvl+0x8c/0xd0 [ 29.803631] print_report+0x118/0x608 [ 29.803771] kasan_report+0xdc/0x128 [ 29.804514] kasan_check_range+0x100/0x1a8 [ 29.804722] __kasan_check_read+0x20/0x30 [ 29.804976] copy_user_test_oob+0x4a0/0xec8 [ 29.805611] kunit_try_run_case+0x170/0x3f0 [ 29.805807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.806367] kthread+0x328/0x630 [ 29.806593] ret_from_fork+0x10/0x20 [ 29.806982] [ 29.807078] Allocated by task 287: [ 29.807258] kasan_save_stack+0x3c/0x68 [ 29.807447] kasan_save_track+0x20/0x40 [ 29.807582] kasan_save_alloc_info+0x40/0x58 [ 29.807722] __kasan_kmalloc+0xd4/0xd8 [ 29.807821] __kmalloc_noprof+0x198/0x4c8 [ 29.807918] kunit_kmalloc_array+0x34/0x88 [ 29.808122] copy_user_test_oob+0xac/0xec8 [ 29.808340] kunit_try_run_case+0x170/0x3f0 [ 29.808782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.808982] kthread+0x328/0x630 [ 29.809093] ret_from_fork+0x10/0x20 [ 29.809215] [ 29.809298] The buggy address belongs to the object at fff00000c7065800 [ 29.809298] which belongs to the cache kmalloc-128 of size 128 [ 29.809590] The buggy address is located 0 bytes inside of [ 29.809590] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.809762] [ 29.809885] The buggy address belongs to the physical page: [ 29.809970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.810119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.810261] page_type: f5(slab) [ 29.810437] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.810688] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.811029] page dumped because: kasan: bad access detected [ 29.811465] [ 29.811530] Memory state around the buggy address: [ 29.811961] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.812083] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.812225] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.812338] ^ [ 29.812462] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.812581] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.812854] ================================================================== [ 29.645113] ================================================================== [ 29.645491] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 29.646167] Write of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.646460] [ 29.646568] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.647462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.647734] Hardware name: linux,dummy-virt (DT) [ 29.648304] Call trace: [ 29.648537] show_stack+0x20/0x38 (C) [ 29.648788] dump_stack_lvl+0x8c/0xd0 [ 29.649350] print_report+0x118/0x608 [ 29.649497] kasan_report+0xdc/0x128 [ 29.649677] kasan_check_range+0x100/0x1a8 [ 29.650289] __kasan_check_write+0x20/0x30 [ 29.650504] copy_user_test_oob+0x234/0xec8 [ 29.650729] kunit_try_run_case+0x170/0x3f0 [ 29.651307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.651532] kthread+0x328/0x630 [ 29.651748] ret_from_fork+0x10/0x20 [ 29.652017] [ 29.652476] Allocated by task 287: [ 29.652575] kasan_save_stack+0x3c/0x68 [ 29.652733] kasan_save_track+0x20/0x40 [ 29.652979] kasan_save_alloc_info+0x40/0x58 [ 29.653254] __kasan_kmalloc+0xd4/0xd8 [ 29.653814] __kmalloc_noprof+0x198/0x4c8 [ 29.653988] kunit_kmalloc_array+0x34/0x88 [ 29.654110] copy_user_test_oob+0xac/0xec8 [ 29.654304] kunit_try_run_case+0x170/0x3f0 [ 29.654796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.655344] kthread+0x328/0x630 [ 29.655729] ret_from_fork+0x10/0x20 [ 29.656682] [ 29.656743] The buggy address belongs to the object at fff00000c7065800 [ 29.656743] which belongs to the cache kmalloc-128 of size 128 [ 29.657590] The buggy address is located 0 bytes inside of [ 29.657590] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.657762] [ 29.657825] The buggy address belongs to the physical page: [ 29.657911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.658607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.659072] page_type: f5(slab) [ 29.659634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.660147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.660715] page dumped because: kasan: bad access detected [ 29.660810] [ 29.660862] Memory state around the buggy address: [ 29.660961] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.661357] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.661510] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.661673] ^ [ 29.661805] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.661990] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.662141] ================================================================== [ 29.712198] ================================================================== [ 29.712364] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 29.712517] Read of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.712641] [ 29.712727] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.712928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.716789] Hardware name: linux,dummy-virt (DT) [ 29.717120] Call trace: [ 29.717497] show_stack+0x20/0x38 (C) [ 29.717695] dump_stack_lvl+0x8c/0xd0 [ 29.718466] print_report+0x118/0x608 [ 29.720125] kasan_report+0xdc/0x128 [ 29.720830] kasan_check_range+0x100/0x1a8 [ 29.721417] __kasan_check_read+0x20/0x30 [ 29.721794] copy_user_test_oob+0x728/0xec8 [ 29.722298] kunit_try_run_case+0x170/0x3f0 [ 29.723852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.724927] kthread+0x328/0x630 [ 29.725453] ret_from_fork+0x10/0x20 [ 29.725596] [ 29.726455] Allocated by task 287: [ 29.726612] kasan_save_stack+0x3c/0x68 [ 29.726950] kasan_save_track+0x20/0x40 [ 29.727197] kasan_save_alloc_info+0x40/0x58 [ 29.727846] __kasan_kmalloc+0xd4/0xd8 [ 29.728012] __kmalloc_noprof+0x198/0x4c8 [ 29.728943] kunit_kmalloc_array+0x34/0x88 [ 29.729184] copy_user_test_oob+0xac/0xec8 [ 29.729286] kunit_try_run_case+0x170/0x3f0 [ 29.730041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.731011] kthread+0x328/0x630 [ 29.731164] ret_from_fork+0x10/0x20 [ 29.731263] [ 29.731319] The buggy address belongs to the object at fff00000c7065800 [ 29.731319] which belongs to the cache kmalloc-128 of size 128 [ 29.731484] The buggy address is located 0 bytes inside of [ 29.731484] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.731637] [ 29.733141] The buggy address belongs to the physical page: [ 29.733482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.733955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.734301] page_type: f5(slab) [ 29.734583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.734718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.735287] page dumped because: kasan: bad access detected [ 29.735419] [ 29.735475] Memory state around the buggy address: [ 29.736035] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.736196] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736357] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.736480] ^ [ 29.736589] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736701] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736810] ================================================================== [ 29.784486] ================================================================== [ 29.784593] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 29.784701] Write of size 121 at addr fff00000c7065800 by task kunit_try_catch/287 [ 29.784828] [ 29.784906] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.785151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.785333] Hardware name: linux,dummy-virt (DT) [ 29.785580] Call trace: [ 29.785640] show_stack+0x20/0x38 (C) [ 29.785756] dump_stack_lvl+0x8c/0xd0 [ 29.785880] print_report+0x118/0x608 [ 29.785990] kasan_report+0xdc/0x128 [ 29.786112] kasan_check_range+0x100/0x1a8 [ 29.786469] __kasan_check_write+0x20/0x30 [ 29.786667] copy_user_test_oob+0x434/0xec8 [ 29.786817] kunit_try_run_case+0x170/0x3f0 [ 29.786984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.787177] kthread+0x328/0x630 [ 29.787313] ret_from_fork+0x10/0x20 [ 29.787482] [ 29.787685] Allocated by task 287: [ 29.787763] kasan_save_stack+0x3c/0x68 [ 29.788470] kasan_save_track+0x20/0x40 [ 29.788625] kasan_save_alloc_info+0x40/0x58 [ 29.788766] __kasan_kmalloc+0xd4/0xd8 [ 29.789163] __kmalloc_noprof+0x198/0x4c8 [ 29.789706] kunit_kmalloc_array+0x34/0x88 [ 29.790180] copy_user_test_oob+0xac/0xec8 [ 29.790283] kunit_try_run_case+0x170/0x3f0 [ 29.790672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.790734] kthread+0x328/0x630 [ 29.790812] ret_from_fork+0x10/0x20 [ 29.791284] [ 29.791350] The buggy address belongs to the object at fff00000c7065800 [ 29.791350] which belongs to the cache kmalloc-128 of size 128 [ 29.791885] The buggy address is located 0 bytes inside of [ 29.791885] allocated 120-byte region [fff00000c7065800, fff00000c7065878) [ 29.792050] [ 29.792102] The buggy address belongs to the physical page: [ 29.792177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107065 [ 29.792300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.792768] page_type: f5(slab) [ 29.793229] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.793917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.794493] page dumped because: kasan: bad access detected [ 29.795174] [ 29.795323] Memory state around the buggy address: [ 29.795431] fff00000c7065700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.795680] fff00000c7065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.795804] >fff00000c7065800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.796630] ^ [ 29.796905] fff00000c7065880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.797018] fff00000c7065900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.797303] ==================================================================
[ 24.278097] ================================================================== [ 24.278732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 24.279390] Write of size 121 at addr ffff88810a090200 by task kunit_try_catch/306 [ 24.280073] [ 24.280417] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 24.280540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.280579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.280667] Call Trace: [ 24.280740] <TASK> [ 24.280788] dump_stack_lvl+0x73/0xb0 [ 24.280867] print_report+0xd1/0x650 [ 24.280964] ? __virt_addr_valid+0x1db/0x2d0 [ 24.281075] ? copy_user_test_oob+0x557/0x10f0 [ 24.281150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.281308] ? copy_user_test_oob+0x557/0x10f0 [ 24.281386] kasan_report+0x141/0x180 [ 24.281461] ? copy_user_test_oob+0x557/0x10f0 [ 24.281546] kasan_check_range+0x10c/0x1c0 [ 24.281637] __kasan_check_write+0x18/0x20 [ 24.281715] copy_user_test_oob+0x557/0x10f0 [ 24.281829] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.281937] ? finish_task_switch.isra.0+0x153/0x700 [ 24.282020] ? __switch_to+0x5d9/0xf60 [ 24.282087] ? dequeue_task_fair+0x156/0x4e0 [ 24.282189] ? __schedule+0x10cc/0x2b60 [ 24.282307] ? __pfx_read_tsc+0x10/0x10 [ 24.282340] ? ktime_get_ts64+0x86/0x230 [ 24.282378] kunit_try_run_case+0x1a5/0x480 [ 24.282416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.282452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.282489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.282523] ? __kthread_parkme+0x82/0x180 [ 24.282556] ? preempt_count_sub+0x50/0x80 [ 24.282593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.282660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.282698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.282735] kthread+0x337/0x6f0 [ 24.282759] ? trace_preempt_on+0x20/0xc0 [ 24.282794] ? __pfx_kthread+0x10/0x10 [ 24.282821] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.282854] ? calculate_sigpending+0x7b/0xa0 [ 24.282885] ? __pfx_kthread+0x10/0x10 [ 24.282911] ret_from_fork+0x41/0x80 [ 24.282942] ? __pfx_kthread+0x10/0x10 [ 24.282970] ret_from_fork_asm+0x1a/0x30 [ 24.283013] </TASK> [ 24.283028] [ 24.301963] Allocated by task 306: [ 24.302372] kasan_save_stack+0x45/0x70 [ 24.302905] kasan_save_track+0x18/0x40 [ 24.303352] kasan_save_alloc_info+0x3b/0x50 [ 24.303899] __kasan_kmalloc+0xb7/0xc0 [ 24.304507] __kmalloc_noprof+0x1c9/0x500 [ 24.304926] kunit_kmalloc_array+0x25/0x60 [ 24.305377] copy_user_test_oob+0xab/0x10f0 [ 24.305837] kunit_try_run_case+0x1a5/0x480 [ 24.306406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.306822] kthread+0x337/0x6f0 [ 24.307287] ret_from_fork+0x41/0x80 [ 24.307697] ret_from_fork_asm+0x1a/0x30 [ 24.308133] [ 24.308411] The buggy address belongs to the object at ffff88810a090200 [ 24.308411] which belongs to the cache kmalloc-128 of size 128 [ 24.309398] The buggy address is located 0 bytes inside of [ 24.309398] allocated 120-byte region [ffff88810a090200, ffff88810a090278) [ 24.310452] [ 24.310735] The buggy address belongs to the physical page: [ 24.311280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a090 [ 24.311997] flags: 0x200000000000000(node=0|zone=2) [ 24.312514] page_type: f5(slab) [ 24.312930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.313570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.314361] page dumped because: kasan: bad access detected [ 24.314784] [ 24.315042] Memory state around the buggy address: [ 24.315513] ffff88810a090100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.316114] ffff88810a090180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316722] >ffff88810a090200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.317277] ^ [ 24.317962] ffff88810a090280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.318588] ffff88810a090300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.319275] ================================================================== [ 24.235880] ================================================================== [ 24.236783] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 24.237530] Read of size 121 at addr ffff88810a090200 by task kunit_try_catch/306 [ 24.238266] [ 24.238542] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 24.238681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.238721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.238777] Call Trace: [ 24.238828] <TASK> [ 24.238872] dump_stack_lvl+0x73/0xb0 [ 24.238988] print_report+0xd1/0x650 [ 24.239071] ? __virt_addr_valid+0x1db/0x2d0 [ 24.239146] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.239257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.239381] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.239459] kasan_report+0x141/0x180 [ 24.239576] ? copy_user_test_oob+0x4aa/0x10f0 [ 24.239685] kasan_check_range+0x10c/0x1c0 [ 24.239762] __kasan_check_read+0x15/0x20 [ 24.239833] copy_user_test_oob+0x4aa/0x10f0 [ 24.239913] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.240024] ? finish_task_switch.isra.0+0x153/0x700 [ 24.240129] ? __switch_to+0x5d9/0xf60 [ 24.240240] ? dequeue_task_fair+0x156/0x4e0 [ 24.240327] ? __schedule+0x10cc/0x2b60 [ 24.240407] ? __pfx_read_tsc+0x10/0x10 [ 24.240479] ? ktime_get_ts64+0x86/0x230 [ 24.240597] kunit_try_run_case+0x1a5/0x480 [ 24.240704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.240780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.240901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.240984] ? __kthread_parkme+0x82/0x180 [ 24.241058] ? preempt_count_sub+0x50/0x80 [ 24.241137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.241193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.241271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.241313] kthread+0x337/0x6f0 [ 24.241340] ? trace_preempt_on+0x20/0xc0 [ 24.241377] ? __pfx_kthread+0x10/0x10 [ 24.241405] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.241438] ? calculate_sigpending+0x7b/0xa0 [ 24.241470] ? __pfx_kthread+0x10/0x10 [ 24.241498] ret_from_fork+0x41/0x80 [ 24.241529] ? __pfx_kthread+0x10/0x10 [ 24.241555] ret_from_fork_asm+0x1a/0x30 [ 24.241617] </TASK> [ 24.241640] [ 24.258685] Allocated by task 306: [ 24.258966] kasan_save_stack+0x45/0x70 [ 24.259338] kasan_save_track+0x18/0x40 [ 24.259854] kasan_save_alloc_info+0x3b/0x50 [ 24.260344] __kasan_kmalloc+0xb7/0xc0 [ 24.260774] __kmalloc_noprof+0x1c9/0x500 [ 24.261394] kunit_kmalloc_array+0x25/0x60 [ 24.261888] copy_user_test_oob+0xab/0x10f0 [ 24.262443] kunit_try_run_case+0x1a5/0x480 [ 24.262968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.263655] kthread+0x337/0x6f0 [ 24.264056] ret_from_fork+0x41/0x80 [ 24.264591] ret_from_fork_asm+0x1a/0x30 [ 24.265026] [ 24.265402] The buggy address belongs to the object at ffff88810a090200 [ 24.265402] which belongs to the cache kmalloc-128 of size 128 [ 24.266475] The buggy address is located 0 bytes inside of [ 24.266475] allocated 120-byte region [ffff88810a090200, ffff88810a090278) [ 24.267442] [ 24.267645] The buggy address belongs to the physical page: [ 24.268007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a090 [ 24.268834] flags: 0x200000000000000(node=0|zone=2) [ 24.269365] page_type: f5(slab) [ 24.269903] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.270634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.271402] page dumped because: kasan: bad access detected [ 24.271873] [ 24.272052] Memory state around the buggy address: [ 24.272472] ffff88810a090100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.273168] ffff88810a090180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.273923] >ffff88810a090200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.274625] ^ [ 24.275424] ffff88810a090280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.276048] ffff88810a090300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.276729] ================================================================== [ 24.196855] ================================================================== [ 24.197415] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 24.198112] Write of size 121 at addr ffff88810a090200 by task kunit_try_catch/306 [ 24.198996] [ 24.199447] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 24.199598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.199659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.199739] Call Trace: [ 24.199808] <TASK> [ 24.199858] dump_stack_lvl+0x73/0xb0 [ 24.199931] print_report+0xd1/0x650 [ 24.199971] ? __virt_addr_valid+0x1db/0x2d0 [ 24.200007] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.200039] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.200076] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.200107] kasan_report+0x141/0x180 [ 24.200141] ? copy_user_test_oob+0x3fd/0x10f0 [ 24.200177] kasan_check_range+0x10c/0x1c0 [ 24.200210] __kasan_check_write+0x18/0x20 [ 24.200273] copy_user_test_oob+0x3fd/0x10f0 [ 24.200309] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.200339] ? finish_task_switch.isra.0+0x153/0x700 [ 24.200376] ? __switch_to+0x5d9/0xf60 [ 24.200404] ? dequeue_task_fair+0x156/0x4e0 [ 24.200439] ? __schedule+0x10cc/0x2b60 [ 24.200472] ? __pfx_read_tsc+0x10/0x10 [ 24.200503] ? ktime_get_ts64+0x86/0x230 [ 24.200539] kunit_try_run_case+0x1a5/0x480 [ 24.200578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.200639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.200679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.200716] ? __kthread_parkme+0x82/0x180 [ 24.200756] ? preempt_count_sub+0x50/0x80 [ 24.200809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.200848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.200883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.200920] kthread+0x337/0x6f0 [ 24.200943] ? trace_preempt_on+0x20/0xc0 [ 24.200980] ? __pfx_kthread+0x10/0x10 [ 24.201007] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.201039] ? calculate_sigpending+0x7b/0xa0 [ 24.201103] ? __pfx_kthread+0x10/0x10 [ 24.201134] ret_from_fork+0x41/0x80 [ 24.201184] ? __pfx_kthread+0x10/0x10 [ 24.201218] ret_from_fork_asm+0x1a/0x30 [ 24.201291] </TASK> [ 24.201309] [ 24.218439] Allocated by task 306: [ 24.218855] kasan_save_stack+0x45/0x70 [ 24.219341] kasan_save_track+0x18/0x40 [ 24.219815] kasan_save_alloc_info+0x3b/0x50 [ 24.220286] __kasan_kmalloc+0xb7/0xc0 [ 24.220722] __kmalloc_noprof+0x1c9/0x500 [ 24.221167] kunit_kmalloc_array+0x25/0x60 [ 24.221693] copy_user_test_oob+0xab/0x10f0 [ 24.222084] kunit_try_run_case+0x1a5/0x480 [ 24.222559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.223096] kthread+0x337/0x6f0 [ 24.223484] ret_from_fork+0x41/0x80 [ 24.223810] ret_from_fork_asm+0x1a/0x30 [ 24.224160] [ 24.224397] The buggy address belongs to the object at ffff88810a090200 [ 24.224397] which belongs to the cache kmalloc-128 of size 128 [ 24.225380] The buggy address is located 0 bytes inside of [ 24.225380] allocated 120-byte region [ffff88810a090200, ffff88810a090278) [ 24.226122] [ 24.226365] The buggy address belongs to the physical page: [ 24.226820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a090 [ 24.227592] flags: 0x200000000000000(node=0|zone=2) [ 24.228089] page_type: f5(slab) [ 24.228513] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.229146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.229708] page dumped because: kasan: bad access detected [ 24.230321] [ 24.230528] Memory state around the buggy address: [ 24.231025] ffff88810a090100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.231749] ffff88810a090180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.232438] >ffff88810a090200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.233099] ^ [ 24.233597] ffff88810a090280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.234072] ffff88810a090300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.234668] ================================================================== [ 24.320515] ================================================================== [ 24.321922] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 24.323014] Read of size 121 at addr ffff88810a090200 by task kunit_try_catch/306 [ 24.323710] [ 24.324026] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 24.324153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.324194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.324300] Call Trace: [ 24.324371] <TASK> [ 24.324450] dump_stack_lvl+0x73/0xb0 [ 24.324531] print_report+0xd1/0x650 [ 24.324623] ? __virt_addr_valid+0x1db/0x2d0 [ 24.324702] ? copy_user_test_oob+0x604/0x10f0 [ 24.324776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.324879] ? copy_user_test_oob+0x604/0x10f0 [ 24.324982] kasan_report+0x141/0x180 [ 24.325062] ? copy_user_test_oob+0x604/0x10f0 [ 24.325154] kasan_check_range+0x10c/0x1c0 [ 24.325276] __kasan_check_read+0x15/0x20 [ 24.325354] copy_user_test_oob+0x604/0x10f0 [ 24.325457] ? __pfx_copy_user_test_oob+0x10/0x10 [ 24.325558] ? finish_task_switch.isra.0+0x153/0x700 [ 24.325651] ? __switch_to+0x5d9/0xf60 [ 24.325722] ? dequeue_task_fair+0x156/0x4e0 [ 24.325812] ? __schedule+0x10cc/0x2b60 [ 24.325853] ? __pfx_read_tsc+0x10/0x10 [ 24.325886] ? ktime_get_ts64+0x86/0x230 [ 24.325927] kunit_try_run_case+0x1a5/0x480 [ 24.325968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.326003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.326039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.326076] ? __kthread_parkme+0x82/0x180 [ 24.326108] ? preempt_count_sub+0x50/0x80 [ 24.326144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.326181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.326265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.326308] kthread+0x337/0x6f0 [ 24.326335] ? trace_preempt_on+0x20/0xc0 [ 24.326370] ? __pfx_kthread+0x10/0x10 [ 24.326396] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.326429] ? calculate_sigpending+0x7b/0xa0 [ 24.326462] ? __pfx_kthread+0x10/0x10 [ 24.326489] ret_from_fork+0x41/0x80 [ 24.326523] ? __pfx_kthread+0x10/0x10 [ 24.326550] ret_from_fork_asm+0x1a/0x30 [ 24.326595] </TASK> [ 24.326635] [ 24.345076] Allocated by task 306: [ 24.345587] kasan_save_stack+0x45/0x70 [ 24.346094] kasan_save_track+0x18/0x40 [ 24.346641] kasan_save_alloc_info+0x3b/0x50 [ 24.347174] __kasan_kmalloc+0xb7/0xc0 [ 24.347656] __kmalloc_noprof+0x1c9/0x500 [ 24.348172] kunit_kmalloc_array+0x25/0x60 [ 24.348731] copy_user_test_oob+0xab/0x10f0 [ 24.349277] kunit_try_run_case+0x1a5/0x480 [ 24.349834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.350469] kthread+0x337/0x6f0 [ 24.350848] ret_from_fork+0x41/0x80 [ 24.351391] ret_from_fork_asm+0x1a/0x30 [ 24.351855] [ 24.352139] The buggy address belongs to the object at ffff88810a090200 [ 24.352139] which belongs to the cache kmalloc-128 of size 128 [ 24.353333] The buggy address is located 0 bytes inside of [ 24.353333] allocated 120-byte region [ffff88810a090200, ffff88810a090278) [ 24.354469] [ 24.354748] The buggy address belongs to the physical page: [ 24.355282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a090 [ 24.356095] flags: 0x200000000000000(node=0|zone=2) [ 24.356671] page_type: f5(slab) [ 24.357156] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.357941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.358691] page dumped because: kasan: bad access detected [ 24.359143] [ 24.359435] Memory state around the buggy address: [ 24.359978] ffff88810a090100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.360744] ffff88810a090180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.361493] >ffff88810a090200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.362492] ^ [ 24.363020] ffff88810a090280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.363589] ffff88810a090300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.364174] ==================================================================