Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.556161] ================================================================== [ 19.556236] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.556288] Read of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.556341] [ 19.556379] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.556777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.556887] Hardware name: linux,dummy-virt (DT) [ 19.556935] Call trace: [ 19.556974] show_stack+0x20/0x38 (C) [ 19.557034] dump_stack_lvl+0x8c/0xd0 [ 19.557141] print_report+0x118/0x5d0 [ 19.557217] kasan_report+0xdc/0x128 [ 19.557270] kasan_check_range+0x100/0x1a8 [ 19.557344] __kasan_check_read+0x20/0x30 [ 19.557500] copy_user_test_oob+0x3c8/0xec8 [ 19.557585] kunit_try_run_case+0x170/0x3f0 [ 19.557670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557755] kthread+0x328/0x630 [ 19.557804] ret_from_fork+0x10/0x20 [ 19.557855] [ 19.557881] Allocated by task 285: [ 19.557911] kasan_save_stack+0x3c/0x68 [ 19.557952] kasan_save_track+0x20/0x40 [ 19.557993] kasan_save_alloc_info+0x40/0x58 [ 19.558034] __kasan_kmalloc+0xd4/0xd8 [ 19.558074] __kmalloc_noprof+0x198/0x4c8 [ 19.558115] kunit_kmalloc_array+0x34/0x88 [ 19.558154] copy_user_test_oob+0xac/0xec8 [ 19.558200] kunit_try_run_case+0x170/0x3f0 [ 19.558239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.558287] kthread+0x328/0x630 [ 19.558330] ret_from_fork+0x10/0x20 [ 19.558377] [ 19.558397] The buggy address belongs to the object at fff00000c7939000 [ 19.558397] which belongs to the cache kmalloc-128 of size 128 [ 19.558464] The buggy address is located 0 bytes inside of [ 19.558464] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.558530] [ 19.558550] The buggy address belongs to the physical page: [ 19.558584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.558637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558687] page_type: f5(slab) [ 19.559292] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.559386] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.559537] page dumped because: kasan: bad access detected [ 19.559595] [ 19.559651] Memory state around the buggy address: [ 19.559697] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.559752] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.559798] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.560010] ^ [ 19.560089] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560248] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560337] ================================================================== [ 19.541217] ================================================================== [ 19.541278] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.541467] Read of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.541558] [ 19.541607] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.541744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.541781] Hardware name: linux,dummy-virt (DT) [ 19.541815] Call trace: [ 19.541837] show_stack+0x20/0x38 (C) [ 19.541887] dump_stack_lvl+0x8c/0xd0 [ 19.541961] print_report+0x118/0x5d0 [ 19.542009] kasan_report+0xdc/0x128 [ 19.542055] kasan_check_range+0x100/0x1a8 [ 19.542105] __kasan_check_read+0x20/0x30 [ 19.542220] copy_user_test_oob+0x728/0xec8 [ 19.542268] kunit_try_run_case+0x170/0x3f0 [ 19.542325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.542380] kthread+0x328/0x630 [ 19.542458] ret_from_fork+0x10/0x20 [ 19.542510] [ 19.542530] Allocated by task 285: [ 19.542583] kasan_save_stack+0x3c/0x68 [ 19.542785] kasan_save_track+0x20/0x40 [ 19.542829] kasan_save_alloc_info+0x40/0x58 [ 19.542939] __kasan_kmalloc+0xd4/0xd8 [ 19.543032] __kmalloc_noprof+0x198/0x4c8 [ 19.543073] kunit_kmalloc_array+0x34/0x88 [ 19.543114] copy_user_test_oob+0xac/0xec8 [ 19.543201] kunit_try_run_case+0x170/0x3f0 [ 19.543590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.543675] kthread+0x328/0x630 [ 19.543774] ret_from_fork+0x10/0x20 [ 19.543979] [ 19.544157] The buggy address belongs to the object at fff00000c7939000 [ 19.544157] which belongs to the cache kmalloc-128 of size 128 [ 19.544267] The buggy address is located 0 bytes inside of [ 19.544267] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.544464] [ 19.544542] The buggy address belongs to the physical page: [ 19.544620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.544760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.544811] page_type: f5(slab) [ 19.544850] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.544903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.544953] page dumped because: kasan: bad access detected [ 19.544986] [ 19.545007] Memory state around the buggy address: [ 19.545043] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.545090] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.545138] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.545182] ^ [ 19.545396] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545443] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545514] ================================================================== [ 19.565786] ================================================================== [ 19.565840] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.565889] Read of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.566062] [ 19.566093] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.566206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.566234] Hardware name: linux,dummy-virt (DT) [ 19.566292] Call trace: [ 19.566317] show_stack+0x20/0x38 (C) [ 19.566450] dump_stack_lvl+0x8c/0xd0 [ 19.566535] print_report+0x118/0x5d0 [ 19.566616] kasan_report+0xdc/0x128 [ 19.567265] kasan_check_range+0x100/0x1a8 [ 19.567328] __kasan_check_read+0x20/0x30 [ 19.567373] copy_user_test_oob+0x4a0/0xec8 [ 19.567422] kunit_try_run_case+0x170/0x3f0 [ 19.567469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567524] kthread+0x328/0x630 [ 19.567565] ret_from_fork+0x10/0x20 [ 19.567614] [ 19.567634] Allocated by task 285: [ 19.567663] kasan_save_stack+0x3c/0x68 [ 19.567706] kasan_save_track+0x20/0x40 [ 19.567756] kasan_save_alloc_info+0x40/0x58 [ 19.567800] __kasan_kmalloc+0xd4/0xd8 [ 19.567839] __kmalloc_noprof+0x198/0x4c8 [ 19.567879] kunit_kmalloc_array+0x34/0x88 [ 19.567919] copy_user_test_oob+0xac/0xec8 [ 19.567958] kunit_try_run_case+0x170/0x3f0 [ 19.567998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.568042] kthread+0x328/0x630 [ 19.568077] ret_from_fork+0x10/0x20 [ 19.568116] [ 19.568136] The buggy address belongs to the object at fff00000c7939000 [ 19.568136] which belongs to the cache kmalloc-128 of size 128 [ 19.568196] The buggy address is located 0 bytes inside of [ 19.568196] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.568262] [ 19.568282] The buggy address belongs to the physical page: [ 19.568316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.568369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.568419] page_type: f5(slab) [ 19.568456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.568509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.568554] page dumped because: kasan: bad access detected [ 19.568587] [ 19.568608] Memory state around the buggy address: [ 19.568641] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.568687] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.568740] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.568781] ^ [ 19.568824] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.568869] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.568911] ================================================================== [ 19.560910] ================================================================== [ 19.561042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.561094] Write of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.561147] [ 19.561182] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.561267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.561469] Hardware name: linux,dummy-virt (DT) [ 19.561508] Call trace: [ 19.561531] show_stack+0x20/0x38 (C) [ 19.561597] dump_stack_lvl+0x8c/0xd0 [ 19.561674] print_report+0x118/0x5d0 [ 19.561753] kasan_report+0xdc/0x128 [ 19.561820] kasan_check_range+0x100/0x1a8 [ 19.561918] __kasan_check_write+0x20/0x30 [ 19.561985] copy_user_test_oob+0x434/0xec8 [ 19.562035] kunit_try_run_case+0x170/0x3f0 [ 19.562099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.562285] kthread+0x328/0x630 [ 19.562330] ret_from_fork+0x10/0x20 [ 19.562448] [ 19.562468] Allocated by task 285: [ 19.562558] kasan_save_stack+0x3c/0x68 [ 19.562602] kasan_save_track+0x20/0x40 [ 19.562659] kasan_save_alloc_info+0x40/0x58 [ 19.562704] __kasan_kmalloc+0xd4/0xd8 [ 19.562751] __kmalloc_noprof+0x198/0x4c8 [ 19.562951] kunit_kmalloc_array+0x34/0x88 [ 19.563039] copy_user_test_oob+0xac/0xec8 [ 19.563149] kunit_try_run_case+0x170/0x3f0 [ 19.563208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.563254] kthread+0x328/0x630 [ 19.563301] ret_from_fork+0x10/0x20 [ 19.563379] [ 19.563446] The buggy address belongs to the object at fff00000c7939000 [ 19.563446] which belongs to the cache kmalloc-128 of size 128 [ 19.563616] The buggy address is located 0 bytes inside of [ 19.563616] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.563915] [ 19.563957] The buggy address belongs to the physical page: [ 19.563992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.564046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.564097] page_type: f5(slab) [ 19.564360] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.564416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.564525] page dumped because: kasan: bad access detected [ 19.564592] [ 19.564642] Memory state around the buggy address: [ 19.564676] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.564740] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.564820] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.564874] ^ [ 19.565018] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.565095] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.565172] ================================================================== [ 19.532974] ================================================================== [ 19.533143] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.533234] Write of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.533339] [ 19.533393] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.533482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.533512] Hardware name: linux,dummy-virt (DT) [ 19.533547] Call trace: [ 19.533575] show_stack+0x20/0x38 (C) [ 19.533760] dump_stack_lvl+0x8c/0xd0 [ 19.533817] print_report+0x118/0x5d0 [ 19.533865] kasan_report+0xdc/0x128 [ 19.533911] kasan_check_range+0x100/0x1a8 [ 19.533959] __kasan_check_write+0x20/0x30 [ 19.534006] copy_user_test_oob+0x234/0xec8 [ 19.534053] kunit_try_run_case+0x170/0x3f0 [ 19.534103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534157] kthread+0x328/0x630 [ 19.534201] ret_from_fork+0x10/0x20 [ 19.534250] [ 19.534270] Allocated by task 285: [ 19.534302] kasan_save_stack+0x3c/0x68 [ 19.534347] kasan_save_track+0x20/0x40 [ 19.534387] kasan_save_alloc_info+0x40/0x58 [ 19.534428] __kasan_kmalloc+0xd4/0xd8 [ 19.534467] __kmalloc_noprof+0x198/0x4c8 [ 19.534506] kunit_kmalloc_array+0x34/0x88 [ 19.534546] copy_user_test_oob+0xac/0xec8 [ 19.534584] kunit_try_run_case+0x170/0x3f0 [ 19.534626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534671] kthread+0x328/0x630 [ 19.534705] ret_from_fork+0x10/0x20 [ 19.534787] [ 19.534835] The buggy address belongs to the object at fff00000c7939000 [ 19.534835] which belongs to the cache kmalloc-128 of size 128 [ 19.534897] The buggy address is located 0 bytes inside of [ 19.534897] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.534977] [ 19.535005] The buggy address belongs to the physical page: [ 19.535040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.535113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535204] page_type: f5(slab) [ 19.535247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.535335] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.535470] page dumped because: kasan: bad access detected [ 19.535559] [ 19.535806] Memory state around the buggy address: [ 19.536031] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.536107] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.536199] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.536353] ^ [ 19.536456] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536529] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536654] ================================================================== [ 19.549976] ================================================================== [ 19.550099] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.550184] Write of size 121 at addr fff00000c7939000 by task kunit_try_catch/285 [ 19.550265] [ 19.550457] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.550546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.550575] Hardware name: linux,dummy-virt (DT) [ 19.550609] Call trace: [ 19.550633] show_stack+0x20/0x38 (C) [ 19.550728] dump_stack_lvl+0x8c/0xd0 [ 19.550806] print_report+0x118/0x5d0 [ 19.550898] kasan_report+0xdc/0x128 [ 19.550956] kasan_check_range+0x100/0x1a8 [ 19.551042] __kasan_check_write+0x20/0x30 [ 19.551112] copy_user_test_oob+0x35c/0xec8 [ 19.551235] kunit_try_run_case+0x170/0x3f0 [ 19.551417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551616] kthread+0x328/0x630 [ 19.551673] ret_from_fork+0x10/0x20 [ 19.551937] [ 19.552017] Allocated by task 285: [ 19.552108] kasan_save_stack+0x3c/0x68 [ 19.552256] kasan_save_track+0x20/0x40 [ 19.552307] kasan_save_alloc_info+0x40/0x58 [ 19.552349] __kasan_kmalloc+0xd4/0xd8 [ 19.552542] __kmalloc_noprof+0x198/0x4c8 [ 19.552589] kunit_kmalloc_array+0x34/0x88 [ 19.552628] copy_user_test_oob+0xac/0xec8 [ 19.552669] kunit_try_run_case+0x170/0x3f0 [ 19.552717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.552763] kthread+0x328/0x630 [ 19.552798] ret_from_fork+0x10/0x20 [ 19.552839] [ 19.552860] The buggy address belongs to the object at fff00000c7939000 [ 19.552860] which belongs to the cache kmalloc-128 of size 128 [ 19.552992] The buggy address is located 0 bytes inside of [ 19.552992] allocated 120-byte region [fff00000c7939000, fff00000c7939078) [ 19.553097] [ 19.553118] The buggy address belongs to the physical page: [ 19.553161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107939 [ 19.553245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.553305] page_type: f5(slab) [ 19.553343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.553449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.553730] page dumped because: kasan: bad access detected [ 19.553838] [ 19.553917] Memory state around the buggy address: [ 19.554007] fff00000c7938f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.554121] fff00000c7938f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.554197] >fff00000c7939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.554314] ^ [ 19.554467] fff00000c7939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554573] fff00000c7939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554672] ==================================================================
[ 16.723130] ================================================================== [ 16.723885] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 16.725245] Read of size 121 at addr ffff88810307db00 by task kunit_try_catch/302 [ 16.726467] [ 16.726852] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.726902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.726916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.727096] Call Trace: [ 16.727116] <TASK> [ 16.727132] dump_stack_lvl+0x73/0xb0 [ 16.727166] print_report+0xd1/0x610 [ 16.727205] ? __virt_addr_valid+0x1db/0x2d0 [ 16.727229] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.727255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.727281] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.727307] kasan_report+0x141/0x180 [ 16.727330] ? copy_user_test_oob+0x4aa/0x10f0 [ 16.727360] kasan_check_range+0x10c/0x1c0 [ 16.727386] __kasan_check_read+0x15/0x20 [ 16.727407] copy_user_test_oob+0x4aa/0x10f0 [ 16.727511] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.727541] ? finish_task_switch.isra.0+0x153/0x700 [ 16.727566] ? __switch_to+0x47/0xf50 [ 16.727593] ? __schedule+0x10cc/0x2b60 [ 16.727617] ? __pfx_read_tsc+0x10/0x10 [ 16.727640] ? ktime_get_ts64+0x86/0x230 [ 16.727664] kunit_try_run_case+0x1a5/0x480 [ 16.727691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.727716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.727742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.727779] ? __kthread_parkme+0x82/0x180 [ 16.727801] ? preempt_count_sub+0x50/0x80 [ 16.727826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.727853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.727880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.727907] kthread+0x337/0x6f0 [ 16.727928] ? trace_preempt_on+0x20/0xc0 [ 16.727953] ? __pfx_kthread+0x10/0x10 [ 16.727976] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.727999] ? calculate_sigpending+0x7b/0xa0 [ 16.728025] ? __pfx_kthread+0x10/0x10 [ 16.728048] ret_from_fork+0x116/0x1d0 [ 16.728069] ? __pfx_kthread+0x10/0x10 [ 16.728090] ret_from_fork_asm+0x1a/0x30 [ 16.728122] </TASK> [ 16.728133] [ 16.739340] Allocated by task 302: [ 16.739855] kasan_save_stack+0x45/0x70 [ 16.740434] kasan_save_track+0x18/0x40 [ 16.740892] kasan_save_alloc_info+0x3b/0x50 [ 16.741406] __kasan_kmalloc+0xb7/0xc0 [ 16.741781] __kmalloc_noprof+0x1c9/0x500 [ 16.741945] kunit_kmalloc_array+0x25/0x60 [ 16.742098] copy_user_test_oob+0xab/0x10f0 [ 16.742251] kunit_try_run_case+0x1a5/0x480 [ 16.742400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.743274] kthread+0x337/0x6f0 [ 16.743809] ret_from_fork+0x116/0x1d0 [ 16.744320] ret_from_fork_asm+0x1a/0x30 [ 16.744890] [ 16.745223] The buggy address belongs to the object at ffff88810307db00 [ 16.745223] which belongs to the cache kmalloc-128 of size 128 [ 16.747004] The buggy address is located 0 bytes inside of [ 16.747004] allocated 120-byte region [ffff88810307db00, ffff88810307db78) [ 16.748168] [ 16.748376] The buggy address belongs to the physical page: [ 16.748916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10307d [ 16.749646] flags: 0x200000000000000(node=0|zone=2) [ 16.750121] page_type: f5(slab) [ 16.750440] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.751121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.751360] page dumped because: kasan: bad access detected [ 16.751836] [ 16.752023] Memory state around the buggy address: [ 16.752490] ffff88810307da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.753041] ffff88810307da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.753263] >ffff88810307db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.753487] ^ [ 16.753703] ffff88810307db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.753936] ffff88810307dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.754255] ================================================================== [ 16.755594] ================================================================== [ 16.755908] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 16.756596] Write of size 121 at addr ffff88810307db00 by task kunit_try_catch/302 [ 16.756921] [ 16.757027] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.757072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.757086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.757107] Call Trace: [ 16.757124] <TASK> [ 16.757140] dump_stack_lvl+0x73/0xb0 [ 16.757172] print_report+0xd1/0x610 [ 16.757196] ? __virt_addr_valid+0x1db/0x2d0 [ 16.757220] ? copy_user_test_oob+0x557/0x10f0 [ 16.757245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.757272] ? copy_user_test_oob+0x557/0x10f0 [ 16.757297] kasan_report+0x141/0x180 [ 16.757321] ? copy_user_test_oob+0x557/0x10f0 [ 16.757350] kasan_check_range+0x10c/0x1c0 [ 16.757376] __kasan_check_write+0x18/0x20 [ 16.757398] copy_user_test_oob+0x557/0x10f0 [ 16.757425] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.757464] ? finish_task_switch.isra.0+0x153/0x700 [ 16.757489] ? __switch_to+0x47/0xf50 [ 16.757516] ? __schedule+0x10cc/0x2b60 [ 16.757540] ? __pfx_read_tsc+0x10/0x10 [ 16.757563] ? ktime_get_ts64+0x86/0x230 [ 16.757589] kunit_try_run_case+0x1a5/0x480 [ 16.757615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.757640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.757666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.757692] ? __kthread_parkme+0x82/0x180 [ 16.757715] ? preempt_count_sub+0x50/0x80 [ 16.757740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.757785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.757811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.757839] kthread+0x337/0x6f0 [ 16.757860] ? trace_preempt_on+0x20/0xc0 [ 16.757886] ? __pfx_kthread+0x10/0x10 [ 16.757908] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.757932] ? calculate_sigpending+0x7b/0xa0 [ 16.757958] ? __pfx_kthread+0x10/0x10 [ 16.757981] ret_from_fork+0x116/0x1d0 [ 16.758001] ? __pfx_kthread+0x10/0x10 [ 16.758023] ret_from_fork_asm+0x1a/0x30 [ 16.758055] </TASK> [ 16.758066] [ 16.768251] Allocated by task 302: [ 16.768673] kasan_save_stack+0x45/0x70 [ 16.769008] kasan_save_track+0x18/0x40 [ 16.769376] kasan_save_alloc_info+0x3b/0x50 [ 16.769752] __kasan_kmalloc+0xb7/0xc0 [ 16.769971] __kmalloc_noprof+0x1c9/0x500 [ 16.770163] kunit_kmalloc_array+0x25/0x60 [ 16.770353] copy_user_test_oob+0xab/0x10f0 [ 16.770823] kunit_try_run_case+0x1a5/0x480 [ 16.771216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.771696] kthread+0x337/0x6f0 [ 16.771957] ret_from_fork+0x116/0x1d0 [ 16.772266] ret_from_fork_asm+0x1a/0x30 [ 16.772658] [ 16.772878] The buggy address belongs to the object at ffff88810307db00 [ 16.772878] which belongs to the cache kmalloc-128 of size 128 [ 16.773402] The buggy address is located 0 bytes inside of [ 16.773402] allocated 120-byte region [ffff88810307db00, ffff88810307db78) [ 16.774320] [ 16.774443] The buggy address belongs to the physical page: [ 16.774683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10307d [ 16.775024] flags: 0x200000000000000(node=0|zone=2) [ 16.775248] page_type: f5(slab) [ 16.775408] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.776053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.776734] page dumped because: kasan: bad access detected [ 16.777055] [ 16.777273] Memory state around the buggy address: [ 16.777936] ffff88810307da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.778570] ffff88810307da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.779158] >ffff88810307db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.779386] ^ [ 16.779787] ffff88810307db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.780394] ffff88810307dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.781213] ================================================================== [ 16.702883] ================================================================== [ 16.703328] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 16.703636] Write of size 121 at addr ffff88810307db00 by task kunit_try_catch/302 [ 16.703970] [ 16.704080] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.704125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.704138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.704160] Call Trace: [ 16.704172] <TASK> [ 16.704189] dump_stack_lvl+0x73/0xb0 [ 16.704218] print_report+0xd1/0x610 [ 16.704243] ? __virt_addr_valid+0x1db/0x2d0 [ 16.704267] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.704293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.704318] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.704344] kasan_report+0x141/0x180 [ 16.704368] ? copy_user_test_oob+0x3fd/0x10f0 [ 16.704398] kasan_check_range+0x10c/0x1c0 [ 16.704423] __kasan_check_write+0x18/0x20 [ 16.704445] copy_user_test_oob+0x3fd/0x10f0 [ 16.704472] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.704505] ? finish_task_switch.isra.0+0x153/0x700 [ 16.704530] ? __switch_to+0x47/0xf50 [ 16.704557] ? __schedule+0x10cc/0x2b60 [ 16.704581] ? __pfx_read_tsc+0x10/0x10 [ 16.704603] ? ktime_get_ts64+0x86/0x230 [ 16.704629] kunit_try_run_case+0x1a5/0x480 [ 16.704656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.704707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.704733] ? __kthread_parkme+0x82/0x180 [ 16.704755] ? preempt_count_sub+0x50/0x80 [ 16.704804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.704857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.704885] kthread+0x337/0x6f0 [ 16.704905] ? trace_preempt_on+0x20/0xc0 [ 16.704932] ? __pfx_kthread+0x10/0x10 [ 16.704954] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.704978] ? calculate_sigpending+0x7b/0xa0 [ 16.705004] ? __pfx_kthread+0x10/0x10 [ 16.705027] ret_from_fork+0x116/0x1d0 [ 16.705048] ? __pfx_kthread+0x10/0x10 [ 16.705070] ret_from_fork_asm+0x1a/0x30 [ 16.705101] </TASK> [ 16.705112] [ 16.712087] Allocated by task 302: [ 16.712270] kasan_save_stack+0x45/0x70 [ 16.712470] kasan_save_track+0x18/0x40 [ 16.712662] kasan_save_alloc_info+0x3b/0x50 [ 16.712897] __kasan_kmalloc+0xb7/0xc0 [ 16.713039] __kmalloc_noprof+0x1c9/0x500 [ 16.713183] kunit_kmalloc_array+0x25/0x60 [ 16.713956] copy_user_test_oob+0xab/0x10f0 [ 16.714158] kunit_try_run_case+0x1a5/0x480 [ 16.714310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.714601] kthread+0x337/0x6f0 [ 16.714758] ret_from_fork+0x116/0x1d0 [ 16.714924] ret_from_fork_asm+0x1a/0x30 [ 16.715067] [ 16.715168] The buggy address belongs to the object at ffff88810307db00 [ 16.715168] which belongs to the cache kmalloc-128 of size 128 [ 16.715630] The buggy address is located 0 bytes inside of [ 16.715630] allocated 120-byte region [ffff88810307db00, ffff88810307db78) [ 16.716160] [ 16.716261] The buggy address belongs to the physical page: [ 16.716489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10307d [ 16.716771] flags: 0x200000000000000(node=0|zone=2) [ 16.717045] page_type: f5(slab) [ 16.717214] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.717531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.717867] page dumped because: kasan: bad access detected [ 16.718042] [ 16.718117] Memory state around the buggy address: [ 16.718337] ffff88810307da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.719636] ffff88810307da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719891] >ffff88810307db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.720111] ^ [ 16.720329] ffff88810307db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720556] ffff88810307dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720782] ================================================================== [ 16.782229] ================================================================== [ 16.782903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 16.783535] Read of size 121 at addr ffff88810307db00 by task kunit_try_catch/302 [ 16.783778] [ 16.783867] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.783911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.783924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.783946] Call Trace: [ 16.783963] <TASK> [ 16.783979] dump_stack_lvl+0x73/0xb0 [ 16.784009] print_report+0xd1/0x610 [ 16.784034] ? __virt_addr_valid+0x1db/0x2d0 [ 16.784059] ? copy_user_test_oob+0x604/0x10f0 [ 16.784084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.784110] ? copy_user_test_oob+0x604/0x10f0 [ 16.784135] kasan_report+0x141/0x180 [ 16.784159] ? copy_user_test_oob+0x604/0x10f0 [ 16.784189] kasan_check_range+0x10c/0x1c0 [ 16.784215] __kasan_check_read+0x15/0x20 [ 16.784236] copy_user_test_oob+0x604/0x10f0 [ 16.784262] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.784287] ? finish_task_switch.isra.0+0x153/0x700 [ 16.784312] ? __switch_to+0x47/0xf50 [ 16.784339] ? __schedule+0x10cc/0x2b60 [ 16.784363] ? __pfx_read_tsc+0x10/0x10 [ 16.784386] ? ktime_get_ts64+0x86/0x230 [ 16.784411] kunit_try_run_case+0x1a5/0x480 [ 16.784437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.784475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.784501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.784527] ? __kthread_parkme+0x82/0x180 [ 16.784549] ? preempt_count_sub+0x50/0x80 [ 16.784574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.784600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.784635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.784663] kthread+0x337/0x6f0 [ 16.784684] ? trace_preempt_on+0x20/0xc0 [ 16.784709] ? __pfx_kthread+0x10/0x10 [ 16.784731] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.784754] ? calculate_sigpending+0x7b/0xa0 [ 16.784791] ? __pfx_kthread+0x10/0x10 [ 16.784815] ret_from_fork+0x116/0x1d0 [ 16.784834] ? __pfx_kthread+0x10/0x10 [ 16.784855] ret_from_fork_asm+0x1a/0x30 [ 16.784887] </TASK> [ 16.784898] [ 16.797078] Allocated by task 302: [ 16.797393] kasan_save_stack+0x45/0x70 [ 16.797838] kasan_save_track+0x18/0x40 [ 16.798203] kasan_save_alloc_info+0x3b/0x50 [ 16.798542] __kasan_kmalloc+0xb7/0xc0 [ 16.798744] __kmalloc_noprof+0x1c9/0x500 [ 16.798900] kunit_kmalloc_array+0x25/0x60 [ 16.799046] copy_user_test_oob+0xab/0x10f0 [ 16.799201] kunit_try_run_case+0x1a5/0x480 [ 16.799349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.799681] kthread+0x337/0x6f0 [ 16.799987] ret_from_fork+0x116/0x1d0 [ 16.800322] ret_from_fork_asm+0x1a/0x30 [ 16.800715] [ 16.800886] The buggy address belongs to the object at ffff88810307db00 [ 16.800886] which belongs to the cache kmalloc-128 of size 128 [ 16.801990] The buggy address is located 0 bytes inside of [ 16.801990] allocated 120-byte region [ffff88810307db00, ffff88810307db78) [ 16.803074] [ 16.803248] The buggy address belongs to the physical page: [ 16.803784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10307d [ 16.804089] flags: 0x200000000000000(node=0|zone=2) [ 16.804253] page_type: f5(slab) [ 16.804373] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.804958] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.805654] page dumped because: kasan: bad access detected [ 16.806129] [ 16.806283] Memory state around the buggy address: [ 16.806718] ffff88810307da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.807325] ffff88810307da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.807986] >ffff88810307db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.808345] ^ [ 16.808741] ffff88810307db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.809356] ffff88810307dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.809916] ==================================================================