Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 38.414318] ================================================================== [ 38.415162] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 38.415863] Write of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.417020] [ 38.417459] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.418705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.419375] Hardware name: linux,dummy-virt (DT) [ 38.420011] Call trace: [ 38.420584] show_stack+0x20/0x38 (C) [ 38.421313] dump_stack_lvl+0x8c/0xd0 [ 38.421927] print_report+0x118/0x5e0 [ 38.422558] kasan_report+0xc8/0x118 [ 38.423255] kasan_check_range+0x100/0x1a8 [ 38.423958] __kasan_check_write+0x20/0x30 [ 38.424561] copy_user_test_oob+0x434/0xec0 [ 38.425310] kunit_try_run_case+0x14c/0x3d0 [ 38.426100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.426935] kthread+0x24c/0x2d0 [ 38.427586] ret_from_fork+0x10/0x20 [ 38.428304] [ 38.428654] Allocated by task 274: [ 38.429175] kasan_save_stack+0x3c/0x68 [ 38.429817] kasan_save_track+0x20/0x40 [ 38.430500] kasan_save_alloc_info+0x40/0x58 [ 38.431095] __kasan_kmalloc+0xd4/0xd8 [ 38.431801] __kmalloc_noprof+0x188/0x4c8 [ 38.432441] kunit_kmalloc_array+0x34/0x88 [ 38.434043] copy_user_test_oob+0xac/0xec0 [ 38.434646] kunit_try_run_case+0x14c/0x3d0 [ 38.435664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.436961] kthread+0x24c/0x2d0 [ 38.437461] ret_from_fork+0x10/0x20 [ 38.437972] [ 38.438344] The buggy address belongs to the object at fff00000c596cb00 [ 38.438344] which belongs to the cache kmalloc-128 of size 128 [ 38.439969] The buggy address is located 0 bytes inside of [ 38.439969] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.441990] [ 38.442363] The buggy address belongs to the physical page: [ 38.443253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.444320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.445258] page_type: f5(slab) [ 38.445829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.446589] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.447681] page dumped because: kasan: bad access detected [ 38.448719] [ 38.449434] Memory state around the buggy address: [ 38.450312] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.451099] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.451843] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.452920] ^ [ 38.453981] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.455170] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.455870] ================================================================== [ 38.457458] ================================================================== [ 38.458077] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 38.459061] Read of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.460021] [ 38.460812] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.463433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.463946] Hardware name: linux,dummy-virt (DT) [ 38.464820] Call trace: [ 38.465444] show_stack+0x20/0x38 (C) [ 38.466371] dump_stack_lvl+0x8c/0xd0 [ 38.467154] print_report+0x118/0x5e0 [ 38.467576] kasan_report+0xc8/0x118 [ 38.468303] kasan_check_range+0x100/0x1a8 [ 38.469007] __kasan_check_read+0x20/0x30 [ 38.470441] copy_user_test_oob+0x4a0/0xec0 [ 38.471102] kunit_try_run_case+0x14c/0x3d0 [ 38.471773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.472803] kthread+0x24c/0x2d0 [ 38.473460] ret_from_fork+0x10/0x20 [ 38.474153] [ 38.474524] Allocated by task 274: [ 38.475052] kasan_save_stack+0x3c/0x68 [ 38.475659] kasan_save_track+0x20/0x40 [ 38.476317] kasan_save_alloc_info+0x40/0x58 [ 38.477786] __kasan_kmalloc+0xd4/0xd8 [ 38.478369] __kmalloc_noprof+0x188/0x4c8 [ 38.479030] kunit_kmalloc_array+0x34/0x88 [ 38.479665] copy_user_test_oob+0xac/0xec0 [ 38.481033] kunit_try_run_case+0x14c/0x3d0 [ 38.481577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.482330] kthread+0x24c/0x2d0 [ 38.482855] ret_from_fork+0x10/0x20 [ 38.483388] [ 38.483758] The buggy address belongs to the object at fff00000c596cb00 [ 38.483758] which belongs to the cache kmalloc-128 of size 128 [ 38.486024] The buggy address is located 0 bytes inside of [ 38.486024] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.487113] [ 38.487485] The buggy address belongs to the physical page: [ 38.488080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.489221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.490432] page_type: f5(slab) [ 38.490975] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.491853] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.493030] page dumped because: kasan: bad access detected [ 38.493636] [ 38.494028] Memory state around the buggy address: [ 38.494585] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.497000] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.497926] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.498705] ^ [ 38.499510] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.500344] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.501656] ================================================================== [ 38.271711] ================================================================== [ 38.272540] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 38.273434] Read of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.274247] [ 38.274534] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.275398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.275998] Hardware name: linux,dummy-virt (DT) [ 38.277205] Call trace: [ 38.277981] show_stack+0x20/0x38 (C) [ 38.278645] dump_stack_lvl+0x8c/0xd0 [ 38.279238] print_report+0x118/0x5e0 [ 38.279741] kasan_report+0xc8/0x118 [ 38.281486] kasan_check_range+0x100/0x1a8 [ 38.282002] __kasan_check_read+0x20/0x30 [ 38.282762] copy_user_test_oob+0x728/0xec0 [ 38.283551] kunit_try_run_case+0x14c/0x3d0 [ 38.284286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.285334] kthread+0x24c/0x2d0 [ 38.286421] ret_from_fork+0x10/0x20 [ 38.287025] [ 38.287287] Allocated by task 274: [ 38.287709] kasan_save_stack+0x3c/0x68 [ 38.288623] kasan_save_track+0x20/0x40 [ 38.289662] kasan_save_alloc_info+0x40/0x58 [ 38.290837] __kasan_kmalloc+0xd4/0xd8 [ 38.291482] __kmalloc_noprof+0x188/0x4c8 [ 38.292193] kunit_kmalloc_array+0x34/0x88 [ 38.293669] copy_user_test_oob+0xac/0xec0 [ 38.294339] kunit_try_run_case+0x14c/0x3d0 [ 38.295035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.295803] kthread+0x24c/0x2d0 [ 38.296614] ret_from_fork+0x10/0x20 [ 38.297448] [ 38.298060] The buggy address belongs to the object at fff00000c596cb00 [ 38.298060] which belongs to the cache kmalloc-128 of size 128 [ 38.299646] The buggy address is located 0 bytes inside of [ 38.299646] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.301596] [ 38.301887] The buggy address belongs to the physical page: [ 38.302539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.304137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.305217] page_type: f5(slab) [ 38.306021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.306873] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.307683] page dumped because: kasan: bad access detected [ 38.308359] [ 38.309323] Memory state around the buggy address: [ 38.310087] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.311101] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.312116] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.313341] ^ [ 38.314362] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.315392] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.316406] ================================================================== [ 38.371456] ================================================================== [ 38.372086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 38.373157] Read of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.374787] [ 38.375230] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.376226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.377552] Hardware name: linux,dummy-virt (DT) [ 38.378560] Call trace: [ 38.379124] show_stack+0x20/0x38 (C) [ 38.379846] dump_stack_lvl+0x8c/0xd0 [ 38.380602] print_report+0x118/0x5e0 [ 38.381333] kasan_report+0xc8/0x118 [ 38.381995] kasan_check_range+0x100/0x1a8 [ 38.382760] __kasan_check_read+0x20/0x30 [ 38.383454] copy_user_test_oob+0x3c8/0xec0 [ 38.384214] kunit_try_run_case+0x14c/0x3d0 [ 38.385022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.385838] kthread+0x24c/0x2d0 [ 38.386399] ret_from_fork+0x10/0x20 [ 38.387162] [ 38.387514] Allocated by task 274: [ 38.387984] kasan_save_stack+0x3c/0x68 [ 38.389018] kasan_save_track+0x20/0x40 [ 38.390076] kasan_save_alloc_info+0x40/0x58 [ 38.390693] __kasan_kmalloc+0xd4/0xd8 [ 38.391428] __kmalloc_noprof+0x188/0x4c8 [ 38.392116] kunit_kmalloc_array+0x34/0x88 [ 38.392742] copy_user_test_oob+0xac/0xec0 [ 38.393507] kunit_try_run_case+0x14c/0x3d0 [ 38.394031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.394586] kthread+0x24c/0x2d0 [ 38.395040] ret_from_fork+0x10/0x20 [ 38.395813] [ 38.396296] The buggy address belongs to the object at fff00000c596cb00 [ 38.396296] which belongs to the cache kmalloc-128 of size 128 [ 38.398287] The buggy address is located 0 bytes inside of [ 38.398287] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.399599] [ 38.400022] The buggy address belongs to the physical page: [ 38.401032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.402657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.403420] page_type: f5(slab) [ 38.403979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.405023] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.405996] page dumped because: kasan: bad access detected [ 38.406695] [ 38.407117] Memory state around the buggy address: [ 38.407794] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.408636] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.409491] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.410332] ^ [ 38.411147] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.411943] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.412827] ================================================================== [ 38.220033] ================================================================== [ 38.221299] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 38.221991] Write of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.222688] [ 38.223105] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.224473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.225056] Hardware name: linux,dummy-virt (DT) [ 38.225943] Call trace: [ 38.226598] show_stack+0x20/0x38 (C) [ 38.227517] dump_stack_lvl+0x8c/0xd0 [ 38.228286] print_report+0x118/0x5e0 [ 38.229529] kasan_report+0xc8/0x118 [ 38.230113] kasan_check_range+0x100/0x1a8 [ 38.230841] __kasan_check_write+0x20/0x30 [ 38.231486] copy_user_test_oob+0x234/0xec0 [ 38.232204] kunit_try_run_case+0x14c/0x3d0 [ 38.233003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.233754] kthread+0x24c/0x2d0 [ 38.234377] ret_from_fork+0x10/0x20 [ 38.234963] [ 38.235285] Allocated by task 274: [ 38.236035] kasan_save_stack+0x3c/0x68 [ 38.237466] kasan_save_track+0x20/0x40 [ 38.238145] kasan_save_alloc_info+0x40/0x58 [ 38.238816] __kasan_kmalloc+0xd4/0xd8 [ 38.239427] __kmalloc_noprof+0x188/0x4c8 [ 38.240016] kunit_kmalloc_array+0x34/0x88 [ 38.241108] copy_user_test_oob+0xac/0xec0 [ 38.241598] kunit_try_run_case+0x14c/0x3d0 [ 38.242343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.243148] kthread+0x24c/0x2d0 [ 38.243765] ret_from_fork+0x10/0x20 [ 38.244454] [ 38.244845] The buggy address belongs to the object at fff00000c596cb00 [ 38.244845] which belongs to the cache kmalloc-128 of size 128 [ 38.246503] The buggy address is located 0 bytes inside of [ 38.246503] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.248748] [ 38.249208] The buggy address belongs to the physical page: [ 38.250073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.251201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.252042] page_type: f5(slab) [ 38.253420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.254427] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.255280] page dumped because: kasan: bad access detected [ 38.256022] [ 38.256411] Memory state around the buggy address: [ 38.257550] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.258428] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.259316] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.260170] ^ [ 38.261696] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.262953] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.263703] ================================================================== [ 38.326264] ================================================================== [ 38.327034] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 38.328063] Write of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.330155] [ 38.330638] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.331979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.332597] Hardware name: linux,dummy-virt (DT) [ 38.333498] Call trace: [ 38.333847] show_stack+0x20/0x38 (C) [ 38.334395] dump_stack_lvl+0x8c/0xd0 [ 38.335062] print_report+0x118/0x5e0 [ 38.335589] kasan_report+0xc8/0x118 [ 38.336227] kasan_check_range+0x100/0x1a8 [ 38.337946] __kasan_check_write+0x20/0x30 [ 38.338560] copy_user_test_oob+0x35c/0xec0 [ 38.339220] kunit_try_run_case+0x14c/0x3d0 [ 38.339922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.341058] kthread+0x24c/0x2d0 [ 38.341521] ret_from_fork+0x10/0x20 [ 38.342029] [ 38.342364] Allocated by task 274: [ 38.342809] kasan_save_stack+0x3c/0x68 [ 38.343991] kasan_save_track+0x20/0x40 [ 38.344884] kasan_save_alloc_info+0x40/0x58 [ 38.346320] __kasan_kmalloc+0xd4/0xd8 [ 38.346932] __kmalloc_noprof+0x188/0x4c8 [ 38.347606] kunit_kmalloc_array+0x34/0x88 [ 38.348213] copy_user_test_oob+0xac/0xec0 [ 38.348858] kunit_try_run_case+0x14c/0x3d0 [ 38.349931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.350658] kthread+0x24c/0x2d0 [ 38.351277] ret_from_fork+0x10/0x20 [ 38.351893] [ 38.353415] The buggy address belongs to the object at fff00000c596cb00 [ 38.353415] which belongs to the cache kmalloc-128 of size 128 [ 38.354535] The buggy address is located 0 bytes inside of [ 38.354535] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.355835] [ 38.356260] The buggy address belongs to the physical page: [ 38.356991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.357821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.358715] page_type: f5(slab) [ 38.359182] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.361180] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.361844] page dumped because: kasan: bad access detected [ 38.362610] [ 38.363485] Memory state around the buggy address: [ 38.364043] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.365290] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.366313] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.367116] ^ [ 38.367837] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.368959] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.370266] ==================================================================
[ 38.380597] ================================================================== [ 38.381344] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 38.382201] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.383097] [ 38.383507] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.384485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.385137] Hardware name: linux,dummy-virt (DT) [ 38.385823] Call trace: [ 38.386300] show_stack+0x20/0x38 (C) [ 38.386969] dump_stack_lvl+0x8c/0xd0 [ 38.387596] print_report+0x118/0x5e0 [ 38.388227] kasan_report+0xc8/0x118 [ 38.388896] kasan_check_range+0x100/0x1a8 [ 38.389632] __kasan_check_read+0x20/0x30 [ 38.390300] copy_user_test_oob+0x728/0xec0 [ 38.390855] kunit_try_run_case+0x14c/0x3d0 [ 38.391582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.392311] kthread+0x24c/0x2d0 [ 38.392952] ret_from_fork+0x10/0x20 [ 38.393622] [ 38.393992] Allocated by task 274: [ 38.394512] kasan_save_stack+0x3c/0x68 [ 38.395050] kasan_save_track+0x20/0x40 [ 38.395710] kasan_save_alloc_info+0x40/0x58 [ 38.396391] __kasan_kmalloc+0xd4/0xd8 [ 38.397004] __kmalloc_noprof+0x188/0x4c8 [ 38.397585] kunit_kmalloc_array+0x34/0x88 [ 38.398163] copy_user_test_oob+0xac/0xec0 [ 38.398830] kunit_try_run_case+0x14c/0x3d0 [ 38.399436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.400223] kthread+0x24c/0x2d0 [ 38.400793] ret_from_fork+0x10/0x20 [ 38.401396] [ 38.401790] The buggy address belongs to the object at fff00000c5f1be00 [ 38.401790] which belongs to the cache kmalloc-128 of size 128 [ 38.403001] The buggy address is located 0 bytes inside of [ 38.403001] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.404192] [ 38.404621] The buggy address belongs to the physical page: [ 38.405362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.406139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.407043] page_type: f5(slab) [ 38.407655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.408449] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.409459] page dumped because: kasan: bad access detected [ 38.410237] [ 38.410577] Memory state around the buggy address: [ 38.411268] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.412042] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.413006] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.413802] ^ [ 38.414730] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.415556] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.416413] ================================================================== [ 38.329216] ================================================================== [ 38.330824] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 38.331634] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.332545] [ 38.332969] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.334019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.334701] Hardware name: linux,dummy-virt (DT) [ 38.335361] Call trace: [ 38.335852] show_stack+0x20/0x38 (C) [ 38.336547] dump_stack_lvl+0x8c/0xd0 [ 38.337227] print_report+0x118/0x5e0 [ 38.338374] kasan_report+0xc8/0x118 [ 38.339443] kasan_check_range+0x100/0x1a8 [ 38.340164] __kasan_check_write+0x20/0x30 [ 38.340884] copy_user_test_oob+0x234/0xec0 [ 38.341543] kunit_try_run_case+0x14c/0x3d0 [ 38.342191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.342956] kthread+0x24c/0x2d0 [ 38.343855] ret_from_fork+0x10/0x20 [ 38.344488] [ 38.344846] Allocated by task 274: [ 38.345326] kasan_save_stack+0x3c/0x68 [ 38.345947] kasan_save_track+0x20/0x40 [ 38.346602] kasan_save_alloc_info+0x40/0x58 [ 38.348055] __kasan_kmalloc+0xd4/0xd8 [ 38.348787] __kmalloc_noprof+0x188/0x4c8 [ 38.349479] kunit_kmalloc_array+0x34/0x88 [ 38.350205] copy_user_test_oob+0xac/0xec0 [ 38.351193] kunit_try_run_case+0x14c/0x3d0 [ 38.351870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.352619] kthread+0x24c/0x2d0 [ 38.353100] ret_from_fork+0x10/0x20 [ 38.354228] [ 38.354569] The buggy address belongs to the object at fff00000c5f1be00 [ 38.354569] which belongs to the cache kmalloc-128 of size 128 [ 38.355769] The buggy address is located 0 bytes inside of [ 38.355769] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.357082] [ 38.357460] The buggy address belongs to the physical page: [ 38.358279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.359440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.360794] page_type: f5(slab) [ 38.361178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.362396] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.363571] page dumped because: kasan: bad access detected [ 38.364345] [ 38.364825] Memory state around the buggy address: [ 38.365736] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.366764] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.367696] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.368586] ^ [ 38.369460] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.370379] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.371217] ================================================================== [ 38.425923] ================================================================== [ 38.426740] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 38.427621] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.428275] [ 38.428687] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.429864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.430411] Hardware name: linux,dummy-virt (DT) [ 38.431143] Call trace: [ 38.431622] show_stack+0x20/0x38 (C) [ 38.432282] dump_stack_lvl+0x8c/0xd0 [ 38.432944] print_report+0x118/0x5e0 [ 38.433510] kasan_report+0xc8/0x118 [ 38.434183] kasan_check_range+0x100/0x1a8 [ 38.434795] __kasan_check_write+0x20/0x30 [ 38.435490] copy_user_test_oob+0x35c/0xec0 [ 38.436206] kunit_try_run_case+0x14c/0x3d0 [ 38.436947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.437734] kthread+0x24c/0x2d0 [ 38.438278] ret_from_fork+0x10/0x20 [ 38.438938] [ 38.439335] Allocated by task 274: [ 38.439818] kasan_save_stack+0x3c/0x68 [ 38.440451] kasan_save_track+0x20/0x40 [ 38.441020] kasan_save_alloc_info+0x40/0x58 [ 38.441711] __kasan_kmalloc+0xd4/0xd8 [ 38.442248] __kmalloc_noprof+0x188/0x4c8 [ 38.442901] kunit_kmalloc_array+0x34/0x88 [ 38.443583] copy_user_test_oob+0xac/0xec0 [ 38.444231] kunit_try_run_case+0x14c/0x3d0 [ 38.444880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.445517] kthread+0x24c/0x2d0 [ 38.446109] ret_from_fork+0x10/0x20 [ 38.446732] [ 38.447116] The buggy address belongs to the object at fff00000c5f1be00 [ 38.447116] which belongs to the cache kmalloc-128 of size 128 [ 38.448327] The buggy address is located 0 bytes inside of [ 38.448327] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.449803] [ 38.450168] The buggy address belongs to the physical page: [ 38.450944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.451821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.452677] page_type: f5(slab) [ 38.453221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.453997] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.454976] page dumped because: kasan: bad access detected [ 38.455635] [ 38.455941] Memory state around the buggy address: [ 38.456675] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.457616] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.458511] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.459388] ^ [ 38.460339] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.461173] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.462078] ================================================================== [ 38.542184] ================================================================== [ 38.542969] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 38.543704] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.544565] [ 38.544949] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.546332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.546984] Hardware name: linux,dummy-virt (DT) [ 38.547510] Call trace: [ 38.548005] show_stack+0x20/0x38 (C) [ 38.548677] dump_stack_lvl+0x8c/0xd0 [ 38.549247] print_report+0x118/0x5e0 [ 38.549936] kasan_report+0xc8/0x118 [ 38.550831] kasan_check_range+0x100/0x1a8 [ 38.551514] __kasan_check_read+0x20/0x30 [ 38.552116] copy_user_test_oob+0x4a0/0xec0 [ 38.552833] kunit_try_run_case+0x14c/0x3d0 [ 38.553458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.554178] kthread+0x24c/0x2d0 [ 38.554765] ret_from_fork+0x10/0x20 [ 38.555408] [ 38.555814] Allocated by task 274: [ 38.556334] kasan_save_stack+0x3c/0x68 [ 38.556842] kasan_save_track+0x20/0x40 [ 38.557474] kasan_save_alloc_info+0x40/0x58 [ 38.558144] __kasan_kmalloc+0xd4/0xd8 [ 38.558669] __kmalloc_noprof+0x188/0x4c8 [ 38.559352] kunit_kmalloc_array+0x34/0x88 [ 38.560027] copy_user_test_oob+0xac/0xec0 [ 38.560636] kunit_try_run_case+0x14c/0x3d0 [ 38.561237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.561992] kthread+0x24c/0x2d0 [ 38.562591] ret_from_fork+0x10/0x20 [ 38.563090] [ 38.563473] The buggy address belongs to the object at fff00000c5f1be00 [ 38.563473] which belongs to the cache kmalloc-128 of size 128 [ 38.564756] The buggy address is located 0 bytes inside of [ 38.564756] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.565812] [ 38.566195] The buggy address belongs to the physical page: [ 38.566977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.567993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.568756] page_type: f5(slab) [ 38.569368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.570244] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.571142] page dumped because: kasan: bad access detected [ 38.571933] [ 38.572319] Memory state around the buggy address: [ 38.572944] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.573910] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.574835] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.575602] ^ [ 38.576444] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.577335] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.578203] ================================================================== [ 38.464087] ================================================================== [ 38.464758] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 38.465750] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.466629] [ 38.467042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.468413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.469004] Hardware name: linux,dummy-virt (DT) [ 38.469758] Call trace: [ 38.470231] show_stack+0x20/0x38 (C) [ 38.470844] dump_stack_lvl+0x8c/0xd0 [ 38.471501] print_report+0x118/0x5e0 [ 38.472124] kasan_report+0xc8/0x118 [ 38.472742] kasan_check_range+0x100/0x1a8 [ 38.473335] __kasan_check_read+0x20/0x30 [ 38.473912] copy_user_test_oob+0x3c8/0xec0 [ 38.474617] kunit_try_run_case+0x14c/0x3d0 [ 38.475324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.476150] kthread+0x24c/0x2d0 [ 38.476778] ret_from_fork+0x10/0x20 [ 38.477428] [ 38.477784] Allocated by task 274: [ 38.478277] kasan_save_stack+0x3c/0x68 [ 38.478931] kasan_save_track+0x20/0x40 [ 38.479493] kasan_save_alloc_info+0x40/0x58 [ 38.480193] __kasan_kmalloc+0xd4/0xd8 [ 38.480750] __kmalloc_noprof+0x188/0x4c8 [ 38.481278] kunit_kmalloc_array+0x34/0x88 [ 38.481955] copy_user_test_oob+0xac/0xec0 [ 38.482638] kunit_try_run_case+0x14c/0x3d0 [ 38.483300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.484074] kthread+0x24c/0x2d0 [ 38.484616] ret_from_fork+0x10/0x20 [ 38.485099] [ 38.485413] The buggy address belongs to the object at fff00000c5f1be00 [ 38.485413] which belongs to the cache kmalloc-128 of size 128 [ 38.486896] The buggy address is located 0 bytes inside of [ 38.486896] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.488310] [ 38.489274] The buggy address belongs to the physical page: [ 38.490012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.490911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.491805] page_type: f5(slab) [ 38.492429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.493303] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.494278] page dumped because: kasan: bad access detected [ 38.495019] [ 38.495396] Memory state around the buggy address: [ 38.495934] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.496722] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.497493] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.498297] ^ [ 38.499272] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.500138] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.500861] ================================================================== [ 38.502763] ================================================================== [ 38.503520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 38.504287] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.505218] [ 38.505653] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.506863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.507490] Hardware name: linux,dummy-virt (DT) [ 38.508191] Call trace: [ 38.508609] show_stack+0x20/0x38 (C) [ 38.509289] dump_stack_lvl+0x8c/0xd0 [ 38.509912] print_report+0x118/0x5e0 [ 38.510501] kasan_report+0xc8/0x118 [ 38.511161] kasan_check_range+0x100/0x1a8 [ 38.511745] __kasan_check_write+0x20/0x30 [ 38.512453] copy_user_test_oob+0x434/0xec0 [ 38.513038] kunit_try_run_case+0x14c/0x3d0 [ 38.513770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.514412] kthread+0x24c/0x2d0 [ 38.515037] ret_from_fork+0x10/0x20 [ 38.515716] [ 38.516104] Allocated by task 274: [ 38.516687] kasan_save_stack+0x3c/0x68 [ 38.517241] kasan_save_track+0x20/0x40 [ 38.517886] kasan_save_alloc_info+0x40/0x58 [ 38.518553] __kasan_kmalloc+0xd4/0xd8 [ 38.519185] __kmalloc_noprof+0x188/0x4c8 [ 38.520138] kunit_kmalloc_array+0x34/0x88 [ 38.520936] copy_user_test_oob+0xac/0xec0 [ 38.521589] kunit_try_run_case+0x14c/0x3d0 [ 38.522219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.522932] kthread+0x24c/0x2d0 [ 38.523516] ret_from_fork+0x10/0x20 [ 38.524130] [ 38.524520] The buggy address belongs to the object at fff00000c5f1be00 [ 38.524520] which belongs to the cache kmalloc-128 of size 128 [ 38.525698] The buggy address is located 0 bytes inside of [ 38.525698] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.526956] [ 38.527336] The buggy address belongs to the physical page: [ 38.528105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.528980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.529857] page_type: f5(slab) [ 38.530352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.531261] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.532091] page dumped because: kasan: bad access detected [ 38.532877] [ 38.533191] Memory state around the buggy address: [ 38.533860] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.534764] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.535559] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.536382] ^ [ 38.537171] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.538001] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.538923] ==================================================================
[ 32.788316] ================================================================== [ 32.788828] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 32.788828] Read of size 121 at addr ffff8881028f6c00 by task kunit_try_catch/294 [ 32.788828] [ 32.788828] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.788828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.788828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.788828] Call Trace: [ 32.788828] <TASK> [ 32.788828] dump_stack_lvl+0x73/0xb0 [ 32.788828] print_report+0xd1/0x640 [ 32.788828] ? __virt_addr_valid+0x1db/0x2d0 [ 32.788828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.788828] kasan_report+0x102/0x140 [ 32.788828] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.788828] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.788828] kasan_check_range+0x10c/0x1c0 [ 32.788828] __kasan_check_read+0x15/0x20 [ 32.788828] copy_user_test_oob+0x4ab/0x10f0 [ 32.788828] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.788828] ? __switch_to+0x5d9/0xf60 [ 32.788828] ? __schedule+0xc3e/0x2790 [ 32.788828] ? ktime_get_ts64+0x84/0x230 [ 32.788828] kunit_try_run_case+0x1b3/0x490 [ 32.788828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.788828] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.788828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.788828] ? __kthread_parkme+0x82/0x160 [ 32.788828] ? preempt_count_sub+0x50/0x80 [ 32.788828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.788828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.788828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.788828] kthread+0x257/0x310 [ 32.788828] ? __pfx_kthread+0x10/0x10 [ 32.788828] ret_from_fork+0x41/0x80 [ 32.788828] ? __pfx_kthread+0x10/0x10 [ 32.788828] ret_from_fork_asm+0x1a/0x30 [ 32.788828] </TASK> [ 32.788828] [ 32.788828] Allocated by task 294: [ 32.788828] kasan_save_stack+0x3d/0x60 [ 32.788828] kasan_save_track+0x18/0x40 [ 32.788828] kasan_save_alloc_info+0x3b/0x50 [ 32.788828] __kasan_kmalloc+0xb7/0xc0 [ 32.788828] __kmalloc_noprof+0x1c4/0x500 [ 32.788828] kunit_kmalloc_array+0x25/0x60 [ 32.788828] copy_user_test_oob+0xac/0x10f0 [ 32.788828] kunit_try_run_case+0x1b3/0x490 [ 32.788828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.788828] kthread+0x257/0x310 [ 32.788828] ret_from_fork+0x41/0x80 [ 32.788828] ret_from_fork_asm+0x1a/0x30 [ 32.788828] [ 32.788828] The buggy address belongs to the object at ffff8881028f6c00 [ 32.788828] which belongs to the cache kmalloc-128 of size 128 [ 32.788828] The buggy address is located 0 bytes inside of [ 32.788828] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.788828] [ 32.788828] The buggy address belongs to the physical page: [ 32.788828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.788828] flags: 0x200000000000000(node=0|zone=2) [ 32.788828] page_type: f5(slab) [ 32.788828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.788828] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.788828] page dumped because: kasan: bad access detected [ 32.788828] [ 32.788828] Memory state around the buggy address: [ 32.788828] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.788828] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788828] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.788828] ^ [ 32.788828] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788828] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788828] ================================================================== [ 32.865825] ================================================================== [ 32.866214] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 32.866214] Read of size 121 at addr ffff8881028f6c00 by task kunit_try_catch/294 [ 32.866214] [ 32.866214] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.866403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.866403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.866403] Call Trace: [ 32.866403] <TASK> [ 32.866403] dump_stack_lvl+0x73/0xb0 [ 32.866403] print_report+0xd1/0x640 [ 32.866403] ? __virt_addr_valid+0x1db/0x2d0 [ 32.866403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.866403] kasan_report+0x102/0x140 [ 32.866403] ? copy_user_test_oob+0x605/0x10f0 [ 32.866403] ? copy_user_test_oob+0x605/0x10f0 [ 32.866403] kasan_check_range+0x10c/0x1c0 [ 32.866403] __kasan_check_read+0x15/0x20 [ 32.866403] copy_user_test_oob+0x605/0x10f0 [ 32.866403] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.866403] ? __switch_to+0x5d9/0xf60 [ 32.866403] ? __schedule+0xc3e/0x2790 [ 32.866403] ? ktime_get_ts64+0x84/0x230 [ 32.866403] kunit_try_run_case+0x1b3/0x490 [ 32.866403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.866403] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.866403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.866403] ? __kthread_parkme+0x82/0x160 [ 32.866403] ? preempt_count_sub+0x50/0x80 [ 32.866403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.866403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.866403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.866403] kthread+0x257/0x310 [ 32.866403] ? __pfx_kthread+0x10/0x10 [ 32.866403] ret_from_fork+0x41/0x80 [ 32.866403] ? __pfx_kthread+0x10/0x10 [ 32.866403] ret_from_fork_asm+0x1a/0x30 [ 32.866403] </TASK> [ 32.866403] [ 32.866403] Allocated by task 294: [ 32.866403] kasan_save_stack+0x3d/0x60 [ 32.866403] kasan_save_track+0x18/0x40 [ 32.866403] kasan_save_alloc_info+0x3b/0x50 [ 32.866403] __kasan_kmalloc+0xb7/0xc0 [ 32.866403] __kmalloc_noprof+0x1c4/0x500 [ 32.866403] kunit_kmalloc_array+0x25/0x60 [ 32.866403] copy_user_test_oob+0xac/0x10f0 [ 32.866403] kunit_try_run_case+0x1b3/0x490 [ 32.866403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.866403] kthread+0x257/0x310 [ 32.866403] ret_from_fork+0x41/0x80 [ 32.866403] ret_from_fork_asm+0x1a/0x30 [ 32.866403] [ 32.866403] The buggy address belongs to the object at ffff8881028f6c00 [ 32.866403] which belongs to the cache kmalloc-128 of size 128 [ 32.866403] The buggy address is located 0 bytes inside of [ 32.866403] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.866403] [ 32.866403] The buggy address belongs to the physical page: [ 32.866403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.866403] flags: 0x200000000000000(node=0|zone=2) [ 32.866403] page_type: f5(slab) [ 32.866403] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.866403] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.866403] page dumped because: kasan: bad access detected [ 32.866403] [ 32.866403] Memory state around the buggy address: [ 32.866403] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.866403] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866403] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.866403] ^ [ 32.866403] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866403] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866403] ================================================================== [ 32.829039] ================================================================== [ 32.829517] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 32.829517] Write of size 121 at addr ffff8881028f6c00 by task kunit_try_catch/294 [ 32.829517] [ 32.829517] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.830793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.830793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.830793] Call Trace: [ 32.830793] <TASK> [ 32.830793] dump_stack_lvl+0x73/0xb0 [ 32.830793] print_report+0xd1/0x640 [ 32.830793] ? __virt_addr_valid+0x1db/0x2d0 [ 32.830793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.830793] kasan_report+0x102/0x140 [ 32.830793] ? copy_user_test_oob+0x558/0x10f0 [ 32.830793] ? copy_user_test_oob+0x558/0x10f0 [ 32.830793] kasan_check_range+0x10c/0x1c0 [ 32.830793] __kasan_check_write+0x18/0x20 [ 32.830793] copy_user_test_oob+0x558/0x10f0 [ 32.830793] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.830793] ? __switch_to+0x5d9/0xf60 [ 32.830793] ? __schedule+0xc3e/0x2790 [ 32.830793] ? ktime_get_ts64+0x84/0x230 [ 32.830793] kunit_try_run_case+0x1b3/0x490 [ 32.830793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.830793] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.830793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.830793] ? __kthread_parkme+0x82/0x160 [ 32.830793] ? preempt_count_sub+0x50/0x80 [ 32.830793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.830793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.830793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.830793] kthread+0x257/0x310 [ 32.830793] ? __pfx_kthread+0x10/0x10 [ 32.830793] ret_from_fork+0x41/0x80 [ 32.830793] ? __pfx_kthread+0x10/0x10 [ 32.830793] ret_from_fork_asm+0x1a/0x30 [ 32.830793] </TASK> [ 32.830793] [ 32.830793] Allocated by task 294: [ 32.830793] kasan_save_stack+0x3d/0x60 [ 32.830793] kasan_save_track+0x18/0x40 [ 32.830793] kasan_save_alloc_info+0x3b/0x50 [ 32.830793] __kasan_kmalloc+0xb7/0xc0 [ 32.830793] __kmalloc_noprof+0x1c4/0x500 [ 32.830793] kunit_kmalloc_array+0x25/0x60 [ 32.830793] copy_user_test_oob+0xac/0x10f0 [ 32.830793] kunit_try_run_case+0x1b3/0x490 [ 32.830793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.830793] kthread+0x257/0x310 [ 32.830793] ret_from_fork+0x41/0x80 [ 32.830793] ret_from_fork_asm+0x1a/0x30 [ 32.830793] [ 32.830793] The buggy address belongs to the object at ffff8881028f6c00 [ 32.830793] which belongs to the cache kmalloc-128 of size 128 [ 32.830793] The buggy address is located 0 bytes inside of [ 32.830793] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.830793] [ 32.830793] The buggy address belongs to the physical page: [ 32.830793] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.830793] flags: 0x200000000000000(node=0|zone=2) [ 32.830793] page_type: f5(slab) [ 32.830793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.830793] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.830793] page dumped because: kasan: bad access detected [ 32.830793] [ 32.830793] Memory state around the buggy address: [ 32.830793] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.830793] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.830793] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.830793] ^ [ 32.830793] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.830793] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.830793] ================================================================== [ 32.749823] ================================================================== [ 32.750130] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 32.750130] Write of size 121 at addr ffff8881028f6c00 by task kunit_try_catch/294 [ 32.750130] [ 32.750130] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.750130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.750130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.750130] Call Trace: [ 32.750130] <TASK> [ 32.750130] dump_stack_lvl+0x73/0xb0 [ 32.750130] print_report+0xd1/0x640 [ 32.750130] ? __virt_addr_valid+0x1db/0x2d0 [ 32.750130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.750130] kasan_report+0x102/0x140 [ 32.750130] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.750130] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.750130] kasan_check_range+0x10c/0x1c0 [ 32.750130] __kasan_check_write+0x18/0x20 [ 32.750130] copy_user_test_oob+0x3fe/0x10f0 [ 32.750130] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.750130] ? __switch_to+0x5d9/0xf60 [ 32.750130] ? __schedule+0xc3e/0x2790 [ 32.750130] ? ktime_get_ts64+0x84/0x230 [ 32.750130] kunit_try_run_case+0x1b3/0x490 [ 32.750130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.750130] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.750130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.750130] ? __kthread_parkme+0x82/0x160 [ 32.750130] ? preempt_count_sub+0x50/0x80 [ 32.750130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.750130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.750130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.750130] kthread+0x257/0x310 [ 32.750130] ? __pfx_kthread+0x10/0x10 [ 32.750130] ret_from_fork+0x41/0x80 [ 32.750130] ? __pfx_kthread+0x10/0x10 [ 32.750130] ret_from_fork_asm+0x1a/0x30 [ 32.750130] </TASK> [ 32.750130] [ 32.750130] Allocated by task 294: [ 32.750130] kasan_save_stack+0x3d/0x60 [ 32.750130] kasan_save_track+0x18/0x40 [ 32.750130] kasan_save_alloc_info+0x3b/0x50 [ 32.750130] __kasan_kmalloc+0xb7/0xc0 [ 32.750130] __kmalloc_noprof+0x1c4/0x500 [ 32.750130] kunit_kmalloc_array+0x25/0x60 [ 32.750130] copy_user_test_oob+0xac/0x10f0 [ 32.750130] kunit_try_run_case+0x1b3/0x490 [ 32.750130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.750130] kthread+0x257/0x310 [ 32.750130] ret_from_fork+0x41/0x80 [ 32.750130] ret_from_fork_asm+0x1a/0x30 [ 32.750130] [ 32.750130] The buggy address belongs to the object at ffff8881028f6c00 [ 32.750130] which belongs to the cache kmalloc-128 of size 128 [ 32.750130] The buggy address is located 0 bytes inside of [ 32.750130] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.750130] [ 32.750130] The buggy address belongs to the physical page: [ 32.750130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.750130] flags: 0x200000000000000(node=0|zone=2) [ 32.750130] page_type: f5(slab) [ 32.750130] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.750130] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.750130] page dumped because: kasan: bad access detected [ 32.750130] [ 32.750130] Memory state around the buggy address: [ 32.750130] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.750130] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750130] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.750130] ^ [ 32.750130] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750130] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750130] ==================================================================
[ 27.517691] ================================================================== [ 27.518632] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 27.519043] Read of size 121 at addr ffff8881028cc000 by task kunit_try_catch/292 [ 27.519442] [ 27.519724] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.520899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.521317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.522369] Call Trace: [ 27.522614] <TASK> [ 27.522821] dump_stack_lvl+0x73/0xb0 [ 27.523105] print_report+0xd1/0x640 [ 27.523410] ? __virt_addr_valid+0x1db/0x2d0 [ 27.523978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.524579] kasan_report+0x102/0x140 [ 27.525182] ? copy_user_test_oob+0x4ab/0x10f0 [ 27.525792] ? copy_user_test_oob+0x4ab/0x10f0 [ 27.526330] kasan_check_range+0x10c/0x1c0 [ 27.526895] __kasan_check_read+0x15/0x20 [ 27.527351] copy_user_test_oob+0x4ab/0x10f0 [ 27.527990] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.528383] ? finish_task_switch.isra.0+0x153/0x700 [ 27.528950] ? __switch_to+0x5d9/0xf60 [ 27.529426] ? __schedule+0xc3e/0x2790 [ 27.529944] ? __pfx_read_tsc+0x10/0x10 [ 27.530300] ? ktime_get_ts64+0x84/0x230 [ 27.530894] kunit_try_run_case+0x1b3/0x490 [ 27.531221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.531616] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.532139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.532682] ? __kthread_parkme+0x82/0x160 [ 27.533153] ? preempt_count_sub+0x50/0x80 [ 27.533461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.534011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.534658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.535098] kthread+0x257/0x310 [ 27.535588] ? __pfx_kthread+0x10/0x10 [ 27.536003] ret_from_fork+0x41/0x80 [ 27.536288] ? __pfx_kthread+0x10/0x10 [ 27.536618] ret_from_fork_asm+0x1a/0x30 [ 27.537190] </TASK> [ 27.537642] [ 27.537898] Allocated by task 292: [ 27.538321] kasan_save_stack+0x3d/0x60 [ 27.538793] kasan_save_track+0x18/0x40 [ 27.539076] kasan_save_alloc_info+0x3b/0x50 [ 27.539376] __kasan_kmalloc+0xb7/0xc0 [ 27.539814] __kmalloc_noprof+0x1c4/0x500 [ 27.540287] kunit_kmalloc_array+0x25/0x60 [ 27.540883] copy_user_test_oob+0xac/0x10f0 [ 27.541351] kunit_try_run_case+0x1b3/0x490 [ 27.541940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.542372] kthread+0x257/0x310 [ 27.544504] ret_from_fork+0x41/0x80 [ 27.544943] ret_from_fork_asm+0x1a/0x30 [ 27.545405] [ 27.545666] The buggy address belongs to the object at ffff8881028cc000 [ 27.545666] which belongs to the cache kmalloc-128 of size 128 [ 27.546428] The buggy address is located 0 bytes inside of [ 27.546428] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.549247] [ 27.549881] The buggy address belongs to the physical page: [ 27.550926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.552220] flags: 0x200000000000000(node=0|zone=2) [ 27.552836] page_type: f5(slab) [ 27.553091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.553516] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.553924] page dumped because: kasan: bad access detected [ 27.554214] [ 27.554306] Memory state around the buggy address: [ 27.554469] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.555355] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.556228] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.557099] ^ [ 27.557961] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.558887] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.559319] ================================================================== [ 27.604533] ================================================================== [ 27.605226] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 27.605842] Read of size 121 at addr ffff8881028cc000 by task kunit_try_catch/292 [ 27.606438] [ 27.606781] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.607479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.607991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.608720] Call Trace: [ 27.609194] <TASK> [ 27.609504] dump_stack_lvl+0x73/0xb0 [ 27.610060] print_report+0xd1/0x640 [ 27.610358] ? __virt_addr_valid+0x1db/0x2d0 [ 27.610752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.611388] kasan_report+0x102/0x140 [ 27.611898] ? copy_user_test_oob+0x605/0x10f0 [ 27.612387] ? copy_user_test_oob+0x605/0x10f0 [ 27.613076] kasan_check_range+0x10c/0x1c0 [ 27.613637] __kasan_check_read+0x15/0x20 [ 27.614077] copy_user_test_oob+0x605/0x10f0 [ 27.614711] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.615166] ? finish_task_switch.isra.0+0x153/0x700 [ 27.615760] ? __switch_to+0x5d9/0xf60 [ 27.616245] ? __schedule+0xc3e/0x2790 [ 27.616713] ? __pfx_read_tsc+0x10/0x10 [ 27.617035] ? ktime_get_ts64+0x84/0x230 [ 27.617616] kunit_try_run_case+0x1b3/0x490 [ 27.618217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.618753] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.619119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.619804] ? __kthread_parkme+0x82/0x160 [ 27.620367] ? preempt_count_sub+0x50/0x80 [ 27.620899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.621432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.621872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.622542] kthread+0x257/0x310 [ 27.622992] ? __pfx_kthread+0x10/0x10 [ 27.623427] ret_from_fork+0x41/0x80 [ 27.623961] ? __pfx_kthread+0x10/0x10 [ 27.624338] ret_from_fork_asm+0x1a/0x30 [ 27.624950] </TASK> [ 27.625276] [ 27.625448] Allocated by task 292: [ 27.625756] kasan_save_stack+0x3d/0x60 [ 27.626055] kasan_save_track+0x18/0x40 [ 27.626360] kasan_save_alloc_info+0x3b/0x50 [ 27.626951] __kasan_kmalloc+0xb7/0xc0 [ 27.627321] __kmalloc_noprof+0x1c4/0x500 [ 27.627682] kunit_kmalloc_array+0x25/0x60 [ 27.627980] copy_user_test_oob+0xac/0x10f0 [ 27.628272] kunit_try_run_case+0x1b3/0x490 [ 27.628880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.629420] kthread+0x257/0x310 [ 27.629925] ret_from_fork+0x41/0x80 [ 27.630351] ret_from_fork_asm+0x1a/0x30 [ 27.630925] [ 27.631192] The buggy address belongs to the object at ffff8881028cc000 [ 27.631192] which belongs to the cache kmalloc-128 of size 128 [ 27.632292] The buggy address is located 0 bytes inside of [ 27.632292] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.633390] [ 27.633751] The buggy address belongs to the physical page: [ 27.634236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.634981] flags: 0x200000000000000(node=0|zone=2) [ 27.635406] page_type: f5(slab) [ 27.635904] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.636548] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.637193] page dumped because: kasan: bad access detected [ 27.637824] [ 27.638030] Memory state around the buggy address: [ 27.638473] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.639165] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.639613] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.639990] ^ [ 27.640748] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.641405] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.642247] ================================================================== [ 27.560777] ================================================================== [ 27.561321] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 27.562078] Write of size 121 at addr ffff8881028cc000 by task kunit_try_catch/292 [ 27.562924] [ 27.563137] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.564080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.564693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.565329] Call Trace: [ 27.565817] <TASK> [ 27.566200] dump_stack_lvl+0x73/0xb0 [ 27.566701] print_report+0xd1/0x640 [ 27.567265] ? __virt_addr_valid+0x1db/0x2d0 [ 27.567774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.568392] kasan_report+0x102/0x140 [ 27.568907] ? copy_user_test_oob+0x558/0x10f0 [ 27.569252] ? copy_user_test_oob+0x558/0x10f0 [ 27.570065] kasan_check_range+0x10c/0x1c0 [ 27.570561] __kasan_check_write+0x18/0x20 [ 27.572727] copy_user_test_oob+0x558/0x10f0 [ 27.573413] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.573889] ? finish_task_switch.isra.0+0x153/0x700 [ 27.574609] ? __switch_to+0x5d9/0xf60 [ 27.574927] ? __schedule+0xc3e/0x2790 [ 27.575217] ? __pfx_read_tsc+0x10/0x10 [ 27.575586] ? ktime_get_ts64+0x84/0x230 [ 27.576095] kunit_try_run_case+0x1b3/0x490 [ 27.576525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.577096] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.577631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.578158] ? __kthread_parkme+0x82/0x160 [ 27.578736] ? preempt_count_sub+0x50/0x80 [ 27.579277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.579745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.580458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.581108] kthread+0x257/0x310 [ 27.581902] ? __pfx_kthread+0x10/0x10 [ 27.582205] ret_from_fork+0x41/0x80 [ 27.583163] ? __pfx_kthread+0x10/0x10 [ 27.583844] ret_from_fork_asm+0x1a/0x30 [ 27.584199] </TASK> [ 27.584469] [ 27.584634] Allocated by task 292: [ 27.584866] kasan_save_stack+0x3d/0x60 [ 27.585302] kasan_save_track+0x18/0x40 [ 27.585793] kasan_save_alloc_info+0x3b/0x50 [ 27.586203] __kasan_kmalloc+0xb7/0xc0 [ 27.586510] __kmalloc_noprof+0x1c4/0x500 [ 27.586948] kunit_kmalloc_array+0x25/0x60 [ 27.587377] copy_user_test_oob+0xac/0x10f0 [ 27.588258] kunit_try_run_case+0x1b3/0x490 [ 27.588582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.589131] kthread+0x257/0x310 [ 27.589454] ret_from_fork+0x41/0x80 [ 27.589924] ret_from_fork_asm+0x1a/0x30 [ 27.590470] [ 27.591723] The buggy address belongs to the object at ffff8881028cc000 [ 27.591723] which belongs to the cache kmalloc-128 of size 128 [ 27.592682] The buggy address is located 0 bytes inside of [ 27.592682] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.593472] [ 27.594453] The buggy address belongs to the physical page: [ 27.594940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.595302] flags: 0x200000000000000(node=0|zone=2) [ 27.595516] page_type: f5(slab) [ 27.595757] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.596447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.597216] page dumped because: kasan: bad access detected [ 27.597830] [ 27.598148] Memory state around the buggy address: [ 27.598631] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.599190] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.599963] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.600462] ^ [ 27.601407] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.602570] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.603214] ================================================================== [ 27.478940] ================================================================== [ 27.479551] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 27.480025] Write of size 121 at addr ffff8881028cc000 by task kunit_try_catch/292 [ 27.480754] [ 27.481018] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.481714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.482195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.482786] Call Trace: [ 27.483141] <TASK> [ 27.483432] dump_stack_lvl+0x73/0xb0 [ 27.483983] print_report+0xd1/0x640 [ 27.484501] ? __virt_addr_valid+0x1db/0x2d0 [ 27.484870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.485442] kasan_report+0x102/0x140 [ 27.485947] ? copy_user_test_oob+0x3fe/0x10f0 [ 27.486283] ? copy_user_test_oob+0x3fe/0x10f0 [ 27.486843] kasan_check_range+0x10c/0x1c0 [ 27.487353] __kasan_check_write+0x18/0x20 [ 27.487759] copy_user_test_oob+0x3fe/0x10f0 [ 27.488165] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.488661] ? finish_task_switch.isra.0+0x153/0x700 [ 27.489066] ? __switch_to+0x5d9/0xf60 [ 27.489545] ? __schedule+0xc3e/0x2790 [ 27.490014] ? __pfx_read_tsc+0x10/0x10 [ 27.490433] ? ktime_get_ts64+0x84/0x230 [ 27.491025] kunit_try_run_case+0x1b3/0x490 [ 27.491442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.491905] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.492407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.492884] ? __kthread_parkme+0x82/0x160 [ 27.493189] ? preempt_count_sub+0x50/0x80 [ 27.493518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.494071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.494701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.495310] kthread+0x257/0x310 [ 27.495762] ? __pfx_kthread+0x10/0x10 [ 27.496215] ret_from_fork+0x41/0x80 [ 27.496614] ? __pfx_kthread+0x10/0x10 [ 27.497087] ret_from_fork_asm+0x1a/0x30 [ 27.497558] </TASK> [ 27.497863] [ 27.498071] Allocated by task 292: [ 27.498444] kasan_save_stack+0x3d/0x60 [ 27.499041] kasan_save_track+0x18/0x40 [ 27.499372] kasan_save_alloc_info+0x3b/0x50 [ 27.499907] __kasan_kmalloc+0xb7/0xc0 [ 27.500326] __kmalloc_noprof+0x1c4/0x500 [ 27.500683] kunit_kmalloc_array+0x25/0x60 [ 27.501150] copy_user_test_oob+0xac/0x10f0 [ 27.501605] kunit_try_run_case+0x1b3/0x490 [ 27.501935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.502569] kthread+0x257/0x310 [ 27.502961] ret_from_fork+0x41/0x80 [ 27.503415] ret_from_fork_asm+0x1a/0x30 [ 27.503964] [ 27.504261] The buggy address belongs to the object at ffff8881028cc000 [ 27.504261] which belongs to the cache kmalloc-128 of size 128 [ 27.505114] The buggy address is located 0 bytes inside of [ 27.505114] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.506166] [ 27.506474] The buggy address belongs to the physical page: [ 27.507211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.507809] flags: 0x200000000000000(node=0|zone=2) [ 27.508122] page_type: f5(slab) [ 27.508543] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.509395] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.511646] page dumped because: kasan: bad access detected [ 27.511961] [ 27.512116] Memory state around the buggy address: [ 27.512397] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.513320] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.514152] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.514884] ^ [ 27.515595] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.516091] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.516464] ==================================================================