Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.948247] ================================================================== [ 19.948771] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.949160] Read of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.949782] [ 19.949830] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.950713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.950756] Hardware name: linux,dummy-virt (DT) [ 19.951240] Call trace: [ 19.951308] show_stack+0x20/0x38 (C) [ 19.951680] dump_stack_lvl+0x8c/0xd0 [ 19.952278] print_report+0x118/0x608 [ 19.953018] kasan_report+0xdc/0x128 [ 19.953543] kasan_check_range+0x100/0x1a8 [ 19.954098] __kasan_check_read+0x20/0x30 [ 19.954161] copy_user_test_oob+0x3c8/0xec8 [ 19.954799] kunit_try_run_case+0x170/0x3f0 [ 19.955150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.955475] kthread+0x328/0x630 [ 19.956004] ret_from_fork+0x10/0x20 [ 19.956615] [ 19.956643] Allocated by task 285: [ 19.957200] kasan_save_stack+0x3c/0x68 [ 19.957962] kasan_save_track+0x20/0x40 [ 19.958026] kasan_save_alloc_info+0x40/0x58 [ 19.958072] __kasan_kmalloc+0xd4/0xd8 [ 19.958125] __kmalloc_noprof+0x198/0x4c8 [ 19.959057] kunit_kmalloc_array+0x34/0x88 [ 19.959117] copy_user_test_oob+0xac/0xec8 [ 19.959159] kunit_try_run_case+0x170/0x3f0 [ 19.959202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.959249] kthread+0x328/0x630 [ 19.960133] ret_from_fork+0x10/0x20 [ 19.960836] [ 19.961243] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.961243] which belongs to the cache kmalloc-128 of size 128 [ 19.961346] The buggy address is located 0 bytes inside of [ 19.961346] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.961459] [ 19.961516] The buggy address belongs to the physical page: [ 19.961580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.961933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.962179] page_type: f5(slab) [ 19.962636] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.962853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.962925] page dumped because: kasan: bad access detected [ 19.962960] [ 19.963143] Memory state around the buggy address: [ 19.963359] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.963449] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.963559] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.963905] ^ [ 19.964065] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.964252] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.964344] ================================================================== [ 19.918503] ================================================================== [ 19.918598] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.918657] Read of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.918711] [ 19.918746] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.918878] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.918913] Hardware name: linux,dummy-virt (DT) [ 19.918974] Call trace: [ 19.919045] show_stack+0x20/0x38 (C) [ 19.919159] dump_stack_lvl+0x8c/0xd0 [ 19.919240] print_report+0x118/0x608 [ 19.919307] kasan_report+0xdc/0x128 [ 19.919363] kasan_check_range+0x100/0x1a8 [ 19.919414] __kasan_check_read+0x20/0x30 [ 19.919461] copy_user_test_oob+0x728/0xec8 [ 19.919648] kunit_try_run_case+0x170/0x3f0 [ 19.919723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.919853] kthread+0x328/0x630 [ 19.919919] ret_from_fork+0x10/0x20 [ 19.919972] [ 19.920060] Allocated by task 285: [ 19.920115] kasan_save_stack+0x3c/0x68 [ 19.920160] kasan_save_track+0x20/0x40 [ 19.920452] kasan_save_alloc_info+0x40/0x58 [ 19.920574] __kasan_kmalloc+0xd4/0xd8 [ 19.920618] __kmalloc_noprof+0x198/0x4c8 [ 19.920683] kunit_kmalloc_array+0x34/0x88 [ 19.920783] copy_user_test_oob+0xac/0xec8 [ 19.920829] kunit_try_run_case+0x170/0x3f0 [ 19.920878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.920969] kthread+0x328/0x630 [ 19.921037] ret_from_fork+0x10/0x20 [ 19.921094] [ 19.921155] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.921155] which belongs to the cache kmalloc-128 of size 128 [ 19.921236] The buggy address is located 0 bytes inside of [ 19.921236] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.921328] [ 19.921356] The buggy address belongs to the physical page: [ 19.921390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.921445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.921607] page_type: f5(slab) [ 19.921677] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.921915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.922025] page dumped because: kasan: bad access detected [ 19.922121] [ 19.922209] Memory state around the buggy address: [ 19.922279] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.922388] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.922521] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.922629] ^ [ 19.922774] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.922821] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.922885] ================================================================== [ 19.928989] ================================================================== [ 19.929362] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.929439] Write of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.929496] [ 19.929533] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.929624] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.929657] Hardware name: linux,dummy-virt (DT) [ 19.929691] Call trace: [ 19.929715] show_stack+0x20/0x38 (C) [ 19.929767] dump_stack_lvl+0x8c/0xd0 [ 19.929819] print_report+0x118/0x608 [ 19.929869] kasan_report+0xdc/0x128 [ 19.930022] kasan_check_range+0x100/0x1a8 [ 19.930209] __kasan_check_write+0x20/0x30 [ 19.930256] copy_user_test_oob+0x35c/0xec8 [ 19.930307] kunit_try_run_case+0x170/0x3f0 [ 19.930358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.931043] kthread+0x328/0x630 [ 19.932258] ret_from_fork+0x10/0x20 [ 19.932313] [ 19.933284] Allocated by task 285: [ 19.933618] kasan_save_stack+0x3c/0x68 [ 19.934249] kasan_save_track+0x20/0x40 [ 19.934305] kasan_save_alloc_info+0x40/0x58 [ 19.934872] __kasan_kmalloc+0xd4/0xd8 [ 19.935326] __kmalloc_noprof+0x198/0x4c8 [ 19.935496] kunit_kmalloc_array+0x34/0x88 [ 19.935757] copy_user_test_oob+0xac/0xec8 [ 19.935805] kunit_try_run_case+0x170/0x3f0 [ 19.936985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.937203] kthread+0x328/0x630 [ 19.937264] ret_from_fork+0x10/0x20 [ 19.937304] [ 19.937927] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.937927] which belongs to the cache kmalloc-128 of size 128 [ 19.938205] The buggy address is located 0 bytes inside of [ 19.938205] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.939118] [ 19.939476] The buggy address belongs to the physical page: [ 19.939576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.939639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.939699] page_type: f5(slab) [ 19.939744] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.939799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.939843] page dumped because: kasan: bad access detected [ 19.939879] [ 19.940906] Memory state around the buggy address: [ 19.941946] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.942036] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.942096] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.942404] ^ [ 19.942911] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.943679] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.943868] ================================================================== [ 19.975613] ================================================================== [ 19.975723] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.975818] Read of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.976052] [ 19.976214] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.976320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.976441] Hardware name: linux,dummy-virt (DT) [ 19.976517] Call trace: [ 19.976544] show_stack+0x20/0x38 (C) [ 19.976883] dump_stack_lvl+0x8c/0xd0 [ 19.977278] print_report+0x118/0x608 [ 19.977356] kasan_report+0xdc/0x128 [ 19.977447] kasan_check_range+0x100/0x1a8 [ 19.977542] __kasan_check_read+0x20/0x30 [ 19.977725] copy_user_test_oob+0x4a0/0xec8 [ 19.977965] kunit_try_run_case+0x170/0x3f0 [ 19.978138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.978247] kthread+0x328/0x630 [ 19.978294] ret_from_fork+0x10/0x20 [ 19.978409] [ 19.978433] Allocated by task 285: [ 19.978473] kasan_save_stack+0x3c/0x68 [ 19.978519] kasan_save_track+0x20/0x40 [ 19.978691] kasan_save_alloc_info+0x40/0x58 [ 19.978744] __kasan_kmalloc+0xd4/0xd8 [ 19.978791] __kmalloc_noprof+0x198/0x4c8 [ 19.978832] kunit_kmalloc_array+0x34/0x88 [ 19.979077] copy_user_test_oob+0xac/0xec8 [ 19.979174] kunit_try_run_case+0x170/0x3f0 [ 19.979335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.979477] kthread+0x328/0x630 [ 19.979830] ret_from_fork+0x10/0x20 [ 19.979898] [ 19.979973] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.979973] which belongs to the cache kmalloc-128 of size 128 [ 19.980114] The buggy address is located 0 bytes inside of [ 19.980114] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.980480] [ 19.980536] The buggy address belongs to the physical page: [ 19.980645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.980884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.980960] page_type: f5(slab) [ 19.981308] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.981577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.981713] page dumped because: kasan: bad access detected [ 19.981813] [ 19.981926] Memory state around the buggy address: [ 19.982035] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.982105] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.982151] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.982325] ^ [ 19.982377] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.982615] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.982684] ================================================================== [ 19.965808] ================================================================== [ 19.966133] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.966206] Write of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.966434] [ 19.966520] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.966698] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.966732] Hardware name: linux,dummy-virt (DT) [ 19.967019] Call trace: [ 19.967274] show_stack+0x20/0x38 (C) [ 19.967372] dump_stack_lvl+0x8c/0xd0 [ 19.967429] print_report+0x118/0x608 [ 19.967760] kasan_report+0xdc/0x128 [ 19.967871] kasan_check_range+0x100/0x1a8 [ 19.968203] __kasan_check_write+0x20/0x30 [ 19.968343] copy_user_test_oob+0x434/0xec8 [ 19.968456] kunit_try_run_case+0x170/0x3f0 [ 19.968841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.969029] kthread+0x328/0x630 [ 19.969099] ret_from_fork+0x10/0x20 [ 19.969447] [ 19.969558] Allocated by task 285: [ 19.969614] kasan_save_stack+0x3c/0x68 [ 19.969677] kasan_save_track+0x20/0x40 [ 19.969995] kasan_save_alloc_info+0x40/0x58 [ 19.970071] __kasan_kmalloc+0xd4/0xd8 [ 19.970223] __kmalloc_noprof+0x198/0x4c8 [ 19.970427] kunit_kmalloc_array+0x34/0x88 [ 19.970634] copy_user_test_oob+0xac/0xec8 [ 19.970747] kunit_try_run_case+0x170/0x3f0 [ 19.970854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.970913] kthread+0x328/0x630 [ 19.971112] ret_from_fork+0x10/0x20 [ 19.971369] [ 19.971429] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.971429] which belongs to the cache kmalloc-128 of size 128 [ 19.971802] The buggy address is located 0 bytes inside of [ 19.971802] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.971997] [ 19.972074] The buggy address belongs to the physical page: [ 19.972425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.972594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.972668] page_type: f5(slab) [ 19.972719] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.973033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.973143] page dumped because: kasan: bad access detected [ 19.973217] [ 19.973457] Memory state around the buggy address: [ 19.973545] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.973777] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.973861] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.974022] ^ [ 19.974148] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974250] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974470] ================================================================== [ 19.907335] ================================================================== [ 19.907762] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.907869] Write of size 121 at addr fff00000c6c2cc00 by task kunit_try_catch/285 [ 19.907988] [ 19.908081] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.908197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.908228] Hardware name: linux,dummy-virt (DT) [ 19.908404] Call trace: [ 19.908444] show_stack+0x20/0x38 (C) [ 19.908502] dump_stack_lvl+0x8c/0xd0 [ 19.908556] print_report+0x118/0x608 [ 19.908606] kasan_report+0xdc/0x128 [ 19.908751] kasan_check_range+0x100/0x1a8 [ 19.908842] __kasan_check_write+0x20/0x30 [ 19.908895] copy_user_test_oob+0x234/0xec8 [ 19.909016] kunit_try_run_case+0x170/0x3f0 [ 19.909080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.909148] kthread+0x328/0x630 [ 19.909194] ret_from_fork+0x10/0x20 [ 19.909266] [ 19.909289] Allocated by task 285: [ 19.909321] kasan_save_stack+0x3c/0x68 [ 19.909368] kasan_save_track+0x20/0x40 [ 19.909566] kasan_save_alloc_info+0x40/0x58 [ 19.909644] __kasan_kmalloc+0xd4/0xd8 [ 19.909720] __kmalloc_noprof+0x198/0x4c8 [ 19.909801] kunit_kmalloc_array+0x34/0x88 [ 19.909864] copy_user_test_oob+0xac/0xec8 [ 19.909903] kunit_try_run_case+0x170/0x3f0 [ 19.909944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.909991] kthread+0x328/0x630 [ 19.910164] ret_from_fork+0x10/0x20 [ 19.910207] [ 19.910275] The buggy address belongs to the object at fff00000c6c2cc00 [ 19.910275] which belongs to the cache kmalloc-128 of size 128 [ 19.910431] The buggy address is located 0 bytes inside of [ 19.910431] allocated 120-byte region [fff00000c6c2cc00, fff00000c6c2cc78) [ 19.910556] [ 19.910633] The buggy address belongs to the physical page: [ 19.910678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c2c [ 19.910754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.911100] page_type: f5(slab) [ 19.911187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.911422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.911529] page dumped because: kasan: bad access detected [ 19.911661] [ 19.911760] Memory state around the buggy address: [ 19.911858] fff00000c6c2cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.911973] fff00000c6c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.912109] >fff00000c6c2cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.912193] ^ [ 19.912274] fff00000c6c2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.912626] fff00000c6c2cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.912749] ==================================================================
[ 16.691608] ================================================================== [ 16.691991] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.692287] Write of size 121 at addr ffff8881029c7e00 by task kunit_try_catch/302 [ 16.692610] [ 16.692728] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.692777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.692790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.692815] Call Trace: [ 16.692828] <TASK> [ 16.692846] dump_stack_lvl+0x73/0xb0 [ 16.692875] print_report+0xd1/0x650 [ 16.692899] ? __virt_addr_valid+0x1db/0x2d0 [ 16.692924] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.692959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.692985] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.693009] kasan_report+0x141/0x180 [ 16.693033] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.693063] kasan_check_range+0x10c/0x1c0 [ 16.693087] __kasan_check_write+0x18/0x20 [ 16.693107] copy_user_test_oob+0x3fd/0x10f0 [ 16.693134] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.693158] ? finish_task_switch.isra.0+0x153/0x700 [ 16.693184] ? __switch_to+0x47/0xf50 [ 16.693211] ? __schedule+0x10cc/0x2b60 [ 16.693234] ? __pfx_read_tsc+0x10/0x10 [ 16.693256] ? ktime_get_ts64+0x86/0x230 [ 16.693282] kunit_try_run_case+0x1a5/0x480 [ 16.693308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.693332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.693357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.693382] ? __kthread_parkme+0x82/0x180 [ 16.693404] ? preempt_count_sub+0x50/0x80 [ 16.693429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.693455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.693480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.693507] kthread+0x337/0x6f0 [ 16.693526] ? trace_preempt_on+0x20/0xc0 [ 16.693551] ? __pfx_kthread+0x10/0x10 [ 16.693573] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.693606] ? calculate_sigpending+0x7b/0xa0 [ 16.693633] ? __pfx_kthread+0x10/0x10 [ 16.693655] ret_from_fork+0x116/0x1d0 [ 16.693675] ? __pfx_kthread+0x10/0x10 [ 16.693696] ret_from_fork_asm+0x1a/0x30 [ 16.693728] </TASK> [ 16.693739] [ 16.700791] Allocated by task 302: [ 16.701113] kasan_save_stack+0x45/0x70 [ 16.701316] kasan_save_track+0x18/0x40 [ 16.701486] kasan_save_alloc_info+0x3b/0x50 [ 16.701646] __kasan_kmalloc+0xb7/0xc0 [ 16.701782] __kmalloc_noprof+0x1c9/0x500 [ 16.701924] kunit_kmalloc_array+0x25/0x60 [ 16.702207] copy_user_test_oob+0xab/0x10f0 [ 16.702419] kunit_try_run_case+0x1a5/0x480 [ 16.702644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.702942] kthread+0x337/0x6f0 [ 16.703115] ret_from_fork+0x116/0x1d0 [ 16.703307] ret_from_fork_asm+0x1a/0x30 [ 16.703678] [ 16.703757] The buggy address belongs to the object at ffff8881029c7e00 [ 16.703757] which belongs to the cache kmalloc-128 of size 128 [ 16.704243] The buggy address is located 0 bytes inside of [ 16.704243] allocated 120-byte region [ffff8881029c7e00, ffff8881029c7e78) [ 16.704691] [ 16.704802] The buggy address belongs to the physical page: [ 16.705061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c7 [ 16.705370] flags: 0x200000000000000(node=0|zone=2) [ 16.705535] page_type: f5(slab) [ 16.705691] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.706034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.706447] page dumped because: kasan: bad access detected [ 16.706631] [ 16.706700] Memory state around the buggy address: [ 16.707093] ffff8881029c7d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.707403] ffff8881029c7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.707970] >ffff8881029c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.708243] ^ [ 16.708460] ffff8881029c7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.708740] ffff8881029c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709886] ================================================================== [ 16.710683] ================================================================== [ 16.711675] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.712372] Read of size 121 at addr ffff8881029c7e00 by task kunit_try_catch/302 [ 16.713160] [ 16.713328] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.713387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.713402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.713424] Call Trace: [ 16.713442] <TASK> [ 16.713459] dump_stack_lvl+0x73/0xb0 [ 16.713489] print_report+0xd1/0x650 [ 16.713512] ? __virt_addr_valid+0x1db/0x2d0 [ 16.713537] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.713561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.713585] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.713618] kasan_report+0x141/0x180 [ 16.713641] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.713670] kasan_check_range+0x10c/0x1c0 [ 16.713694] __kasan_check_read+0x15/0x20 [ 16.713714] copy_user_test_oob+0x4aa/0x10f0 [ 16.713740] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.713817] ? finish_task_switch.isra.0+0x153/0x700 [ 16.713844] ? __switch_to+0x47/0xf50 [ 16.713871] ? __schedule+0x10cc/0x2b60 [ 16.713905] ? __pfx_read_tsc+0x10/0x10 [ 16.713927] ? ktime_get_ts64+0x86/0x230 [ 16.713951] kunit_try_run_case+0x1a5/0x480 [ 16.713977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.714001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.714026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.714051] ? __kthread_parkme+0x82/0x180 [ 16.714073] ? preempt_count_sub+0x50/0x80 [ 16.714097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.714122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.714148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.714174] kthread+0x337/0x6f0 [ 16.714195] ? trace_preempt_on+0x20/0xc0 [ 16.714219] ? __pfx_kthread+0x10/0x10 [ 16.714241] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.714263] ? calculate_sigpending+0x7b/0xa0 [ 16.714289] ? __pfx_kthread+0x10/0x10 [ 16.714312] ret_from_fork+0x116/0x1d0 [ 16.714330] ? __pfx_kthread+0x10/0x10 [ 16.714351] ret_from_fork_asm+0x1a/0x30 [ 16.714382] </TASK> [ 16.714393] [ 16.726543] Allocated by task 302: [ 16.726747] kasan_save_stack+0x45/0x70 [ 16.726965] kasan_save_track+0x18/0x40 [ 16.727106] kasan_save_alloc_info+0x3b/0x50 [ 16.727276] __kasan_kmalloc+0xb7/0xc0 [ 16.727464] __kmalloc_noprof+0x1c9/0x500 [ 16.727674] kunit_kmalloc_array+0x25/0x60 [ 16.727910] copy_user_test_oob+0xab/0x10f0 [ 16.728071] kunit_try_run_case+0x1a5/0x480 [ 16.728219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.728478] kthread+0x337/0x6f0 [ 16.728663] ret_from_fork+0x116/0x1d0 [ 16.728849] ret_from_fork_asm+0x1a/0x30 [ 16.729007] [ 16.729089] The buggy address belongs to the object at ffff8881029c7e00 [ 16.729089] which belongs to the cache kmalloc-128 of size 128 [ 16.729553] The buggy address is located 0 bytes inside of [ 16.729553] allocated 120-byte region [ffff8881029c7e00, ffff8881029c7e78) [ 16.729983] [ 16.730081] The buggy address belongs to the physical page: [ 16.730328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c7 [ 16.730570] flags: 0x200000000000000(node=0|zone=2) [ 16.730745] page_type: f5(slab) [ 16.730928] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.731279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.731640] page dumped because: kasan: bad access detected [ 16.731985] [ 16.732058] Memory state around the buggy address: [ 16.732249] ffff8881029c7d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.732467] ffff8881029c7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.732798] >ffff8881029c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.733151] ^ [ 16.733403] ffff8881029c7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.733634] ffff8881029c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.734072] ================================================================== [ 16.753006] ================================================================== [ 16.753752] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.754041] Read of size 121 at addr ffff8881029c7e00 by task kunit_try_catch/302 [ 16.754273] [ 16.754362] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.754407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.754420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.754442] Call Trace: [ 16.754459] <TASK> [ 16.754476] dump_stack_lvl+0x73/0xb0 [ 16.754505] print_report+0xd1/0x650 [ 16.754528] ? __virt_addr_valid+0x1db/0x2d0 [ 16.754552] ? copy_user_test_oob+0x604/0x10f0 [ 16.754576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.754611] ? copy_user_test_oob+0x604/0x10f0 [ 16.754636] kasan_report+0x141/0x180 [ 16.754658] ? copy_user_test_oob+0x604/0x10f0 [ 16.754687] kasan_check_range+0x10c/0x1c0 [ 16.754713] __kasan_check_read+0x15/0x20 [ 16.754733] copy_user_test_oob+0x604/0x10f0 [ 16.754759] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.754783] ? finish_task_switch.isra.0+0x153/0x700 [ 16.754819] ? __switch_to+0x47/0xf50 [ 16.754852] ? __schedule+0x10cc/0x2b60 [ 16.754875] ? __pfx_read_tsc+0x10/0x10 [ 16.754898] ? ktime_get_ts64+0x86/0x230 [ 16.754923] kunit_try_run_case+0x1a5/0x480 [ 16.754950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.754974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.755000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.755025] ? __kthread_parkme+0x82/0x180 [ 16.755047] ? preempt_count_sub+0x50/0x80 [ 16.755071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.755123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.755149] kthread+0x337/0x6f0 [ 16.755169] ? trace_preempt_on+0x20/0xc0 [ 16.755194] ? __pfx_kthread+0x10/0x10 [ 16.755216] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.755240] ? calculate_sigpending+0x7b/0xa0 [ 16.755265] ? __pfx_kthread+0x10/0x10 [ 16.755287] ret_from_fork+0x116/0x1d0 [ 16.755306] ? __pfx_kthread+0x10/0x10 [ 16.755327] ret_from_fork_asm+0x1a/0x30 [ 16.755358] </TASK> [ 16.755369] [ 16.762600] Allocated by task 302: [ 16.762754] kasan_save_stack+0x45/0x70 [ 16.762976] kasan_save_track+0x18/0x40 [ 16.763140] kasan_save_alloc_info+0x3b/0x50 [ 16.763339] __kasan_kmalloc+0xb7/0xc0 [ 16.763507] __kmalloc_noprof+0x1c9/0x500 [ 16.763711] kunit_kmalloc_array+0x25/0x60 [ 16.763923] copy_user_test_oob+0xab/0x10f0 [ 16.764114] kunit_try_run_case+0x1a5/0x480 [ 16.764273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.764474] kthread+0x337/0x6f0 [ 16.764654] ret_from_fork+0x116/0x1d0 [ 16.764842] ret_from_fork_asm+0x1a/0x30 [ 16.765052] [ 16.765123] The buggy address belongs to the object at ffff8881029c7e00 [ 16.765123] which belongs to the cache kmalloc-128 of size 128 [ 16.765642] The buggy address is located 0 bytes inside of [ 16.765642] allocated 120-byte region [ffff8881029c7e00, ffff8881029c7e78) [ 16.766147] [ 16.766234] The buggy address belongs to the physical page: [ 16.766471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c7 [ 16.766807] flags: 0x200000000000000(node=0|zone=2) [ 16.767021] page_type: f5(slab) [ 16.767185] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.767478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.767765] page dumped because: kasan: bad access detected [ 16.768007] [ 16.768076] Memory state around the buggy address: [ 16.768232] ffff8881029c7d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.768450] ffff8881029c7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.768676] >ffff8881029c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.768979] ^ [ 16.769455] ffff8881029c7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.769740] ffff8881029c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.769959] ================================================================== [ 16.734854] ================================================================== [ 16.735133] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.735452] Write of size 121 at addr ffff8881029c7e00 by task kunit_try_catch/302 [ 16.735866] [ 16.735967] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.736013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.736025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.736048] Call Trace: [ 16.736065] <TASK> [ 16.736082] dump_stack_lvl+0x73/0xb0 [ 16.736112] print_report+0xd1/0x650 [ 16.736136] ? __virt_addr_valid+0x1db/0x2d0 [ 16.736160] ? copy_user_test_oob+0x557/0x10f0 [ 16.736184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.736209] ? copy_user_test_oob+0x557/0x10f0 [ 16.736234] kasan_report+0x141/0x180 [ 16.736256] ? copy_user_test_oob+0x557/0x10f0 [ 16.736285] kasan_check_range+0x10c/0x1c0 [ 16.736309] __kasan_check_write+0x18/0x20 [ 16.736329] copy_user_test_oob+0x557/0x10f0 [ 16.736355] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.736379] ? finish_task_switch.isra.0+0x153/0x700 [ 16.736404] ? __switch_to+0x47/0xf50 [ 16.736430] ? __schedule+0x10cc/0x2b60 [ 16.736453] ? __pfx_read_tsc+0x10/0x10 [ 16.736475] ? ktime_get_ts64+0x86/0x230 [ 16.736501] kunit_try_run_case+0x1a5/0x480 [ 16.736526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.736550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.736575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.736612] ? __kthread_parkme+0x82/0x180 [ 16.736634] ? preempt_count_sub+0x50/0x80 [ 16.736658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.736684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.736710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.736736] kthread+0x337/0x6f0 [ 16.736755] ? trace_preempt_on+0x20/0xc0 [ 16.736788] ? __pfx_kthread+0x10/0x10 [ 16.736809] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.736832] ? calculate_sigpending+0x7b/0xa0 [ 16.736858] ? __pfx_kthread+0x10/0x10 [ 16.736880] ret_from_fork+0x116/0x1d0 [ 16.736898] ? __pfx_kthread+0x10/0x10 [ 16.736919] ret_from_fork_asm+0x1a/0x30 [ 16.736954] </TASK> [ 16.736965] [ 16.743862] Allocated by task 302: [ 16.744043] kasan_save_stack+0x45/0x70 [ 16.744241] kasan_save_track+0x18/0x40 [ 16.744431] kasan_save_alloc_info+0x3b/0x50 [ 16.744648] __kasan_kmalloc+0xb7/0xc0 [ 16.744791] __kmalloc_noprof+0x1c9/0x500 [ 16.744997] kunit_kmalloc_array+0x25/0x60 [ 16.745184] copy_user_test_oob+0xab/0x10f0 [ 16.745331] kunit_try_run_case+0x1a5/0x480 [ 16.745478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.745737] kthread+0x337/0x6f0 [ 16.746071] ret_from_fork+0x116/0x1d0 [ 16.746262] ret_from_fork_asm+0x1a/0x30 [ 16.746460] [ 16.746560] The buggy address belongs to the object at ffff8881029c7e00 [ 16.746560] which belongs to the cache kmalloc-128 of size 128 [ 16.747069] The buggy address is located 0 bytes inside of [ 16.747069] allocated 120-byte region [ffff8881029c7e00, ffff8881029c7e78) [ 16.747528] [ 16.747635] The buggy address belongs to the physical page: [ 16.747866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c7 [ 16.748192] flags: 0x200000000000000(node=0|zone=2) [ 16.748405] page_type: f5(slab) [ 16.748575] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.748924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.749229] page dumped because: kasan: bad access detected [ 16.749457] [ 16.749533] Memory state around the buggy address: [ 16.749750] ffff8881029c7d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.750035] ffff8881029c7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.750327] >ffff8881029c7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.750542] ^ [ 16.750858] ffff8881029c7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751330] ffff8881029c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751552] ==================================================================