================================================================== BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2624 [inline] BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x209a/0x4160 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705 Write of size 5120 at addr ffffc90007323c40 by task vivid-000-vid-c/13267 CPU: 2 UID: 0 PID: 13267 Comm: vivid-000-vid-c Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1a0 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:186 [inline] kasan_check_range+0x10f/0x1e0 mm/kasan/generic.c:200 __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106 tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2624 [inline] tpg_fill_plane_buffer+0x209a/0x4160 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705 vivid_fillbuff+0x95d/0x3ed0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 vivid_thread_vid_cap_tick+0x81b/0x1470 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629 vivid_thread_vid_cap+0x454/0xd70 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767 kthread+0x3b3/0x730 kernel/kthread.c:463 ret_from_fork+0x754/0xaf0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 The buggy address belongs to a vmalloc virtual mapping The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888055ba2000 pfn:0x55ba2 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 ffffea000156e890 0000000000000000 raw: ffff888055ba2000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x29c2(GFP_NOWAIT|__GFP_HIGHMEM|__GFP_IO|__GFP_FS|__GFP_ZERO), pid 13266, tgid 13263 (syz.6.2101), ts 227643209132, free_ts 226356928333 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1e1/0x250 mm/page_alloc.c:1884 prep_new_page mm/page_alloc.c:1892 [inline] get_page_from_freelist+0xe3d/0x2e10 mm/page_alloc.c:3945 __alloc_frozen_pages_noprof+0x26c/0x2410 mm/page_alloc.c:5240 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2486 alloc_frozen_pages_noprof mm/mempolicy.c:2557 [inline] alloc_pages_noprof+0x131/0x390 mm/mempolicy.c:2577 vm_area_alloc_pages mm/vmalloc.c:3649 [inline] __vmalloc_area_node mm/vmalloc.c:3863 [inline] __vmalloc_node_range_noprof+0xe5c/0x1530 mm/vmalloc.c:4051 vmalloc_user_noprof+0x9e/0xe0 mm/vmalloc.c:4205 vb2_vmalloc_alloc+0x135/0x410 drivers/media/common/videobuf2/videobuf2-vmalloc.c:47 __vb2_buf_mem_alloc drivers/media/common/videobuf2/videobuf2-core.c:242 [inline] __vb2_queue_alloc+0x8cc/0x1150 drivers/media/common/videobuf2/videobuf2-core.c:523 vb2_core_reqbufs+0x899/0xf30 drivers/media/common/videobuf2/videobuf2-core.c:964 __vb2_init_fileio+0x32d/0xff0 drivers/media/common/videobuf2/videobuf2-core.c:2895 vb2_core_poll+0x611/0x740 drivers/media/common/videobuf2/videobuf2-core.c:2729 vb2_poll+0x4b/0xe0 drivers/media/common/videobuf2/videobuf2-v4l2.c:979 vb2_fop_poll+0x10e/0x350 drivers/media/common/videobuf2/videobuf2-v4l2.c:1245 v4l2_poll+0x15f/0x220 drivers/media/v4l2-core/v4l2-dev.c:350 vfs_poll include/linux/poll.h:82 [inline] do_pollfd fs/select.c:866 [inline] do_poll fs/select.c:909 [inline] do_sys_poll+0x6e5/0xeb0 fs/select.c:1005 page last free pid 13200 tgid 13199 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1433 [inline] __free_frozen_pages+0x822/0x1130 mm/page_alloc.c:2973 stack_depot_save_flags+0x412/0x9c0 lib/stackdepot.c:727 kasan_save_stack+0x3f/0x50 mm/kasan/common.c:58 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x2ad/0x780 mm/slub.c:5270 reqsk_alloc_noprof net/ipv4/inet_connection_sock.c:871 [inline] inet_reqsk_alloc+0x97/0x730 net/ipv4/inet_connection_sock.c:901 tcp_conn_request+0x31d/0x34b0 net/ipv4/tcp_input.c:7449 tcp_v6_conn_request+0x1eb/0x4f0 net/ipv6/tcp_ipv6.c:1294 tcp_rcv_state_process+0x558/0x6580 net/ipv4/tcp_input.c:6968 tcp_v6_do_rcv+0x7ff/0x1dd0 net/ipv6/tcp_ipv6.c:1630 tcp_v6_rcv+0x3eff/0x48c0 net/ipv6/tcp_ipv6.c:1867 ip6_protocol_deliver_rcu+0x188/0x1500 net/ipv6/ip6_input.c:438 ip6_input_finish+0x1e4/0x4a0 net/ipv6/ip6_input.c:489 NF_HOOK include/linux/netfilter.h:318 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] ip6_input+0x105/0x2f0 net/ipv6/ip6_input.c:500 dst_input include/net/dst.h:474 [inline] ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline] NF_HOOK include/linux/netfilter.h:318 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0x261/0x610 net/ipv6/ip6_input.c:311 Memory state around the buggy address: ffffc90007324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc90007324f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc90007325000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc90007325080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90007325100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ==================================================================