Hay
Date
Nov. 27, 2024, 3:37 a.m.

Environment
qemu-arm64
qemu-x86_64

[   54.767282] ==================================================================
[   54.768734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   54.769635] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.771375] 
[   54.771715] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.773043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.774117] Hardware name: linux,dummy-virt (DT)
[   54.774732] Call trace:
[   54.775144]  show_stack+0x20/0x38 (C)
[   54.775729]  dump_stack_lvl+0x8c/0xd0
[   54.776317]  print_report+0x118/0x5e0
[   54.776897]  kasan_report+0xc8/0x118
[   54.777791]  kasan_check_range+0x100/0x1a8
[   54.778407]  __kasan_check_write+0x20/0x30
[   54.779015]  copy_user_test_oob+0x234/0xec0
[   54.779617]  kunit_try_run_case+0x14c/0x3d0
[   54.780285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.780922]  kthread+0x24c/0x2d0
[   54.781900]  ret_from_fork+0x10/0x20
[   54.782509] 
[   54.782827] Allocated by task 274:
[   54.783432]  kasan_save_stack+0x3c/0x68
[   54.784075]  kasan_save_track+0x20/0x40
[   54.784693]  kasan_save_alloc_info+0x40/0x58
[   54.785575]  __kasan_kmalloc+0xd4/0xd8
[   54.786155]  __kmalloc_noprof+0x188/0x4c8
[   54.786755]  kunit_kmalloc_array+0x34/0x88
[   54.787306]  copy_user_test_oob+0xac/0xec0
[   54.787854]  kunit_try_run_case+0x14c/0x3d0
[   54.788494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.789192]  kthread+0x24c/0x2d0
[   54.789825]  ret_from_fork+0x10/0x20
[   54.790322] 
[   54.790710] The buggy address belongs to the object at fff00000c61a5600
[   54.790710]  which belongs to the cache kmalloc-128 of size 128
[   54.792834] The buggy address is located 0 bytes inside of
[   54.792834]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.794473] 
[   54.794779] The buggy address belongs to the physical page:
[   54.795528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.796491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.797568] page_type: f5(slab)
[   54.798222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.799159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.800057] page dumped because: kasan: bad access detected
[   54.800713] 
[   54.801021] Memory state around the buggy address:
[   54.802048]  fff00000c61a5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   54.802941]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.804081] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.804901]                                                                 ^
[   54.806479]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.807585]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.808544] ==================================================================
[   54.864802] ==================================================================
[   54.865897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   54.867251] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.868482] 
[   54.868803] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.870126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.870702] Hardware name: linux,dummy-virt (DT)
[   54.871190] Call trace:
[   54.871582]  show_stack+0x20/0x38 (C)
[   54.872156]  dump_stack_lvl+0x8c/0xd0
[   54.872822]  print_report+0x118/0x5e0
[   54.873421]  kasan_report+0xc8/0x118
[   54.873971]  kasan_check_range+0x100/0x1a8
[   54.874619]  __kasan_check_write+0x20/0x30
[   54.875227]  copy_user_test_oob+0x35c/0xec0
[   54.875784]  kunit_try_run_case+0x14c/0x3d0
[   54.876490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.877265]  kthread+0x24c/0x2d0
[   54.877733]  ret_from_fork+0x10/0x20
[   54.878390] 
[   54.878763] Allocated by task 274:
[   54.879228]  kasan_save_stack+0x3c/0x68
[   54.879859]  kasan_save_track+0x20/0x40
[   54.880376]  kasan_save_alloc_info+0x40/0x58
[   54.881049]  __kasan_kmalloc+0xd4/0xd8
[   54.881698]  __kmalloc_noprof+0x188/0x4c8
[   54.882234]  kunit_kmalloc_array+0x34/0x88
[   54.882846]  copy_user_test_oob+0xac/0xec0
[   54.883404]  kunit_try_run_case+0x14c/0x3d0
[   54.884023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.884627]  kthread+0x24c/0x2d0
[   54.885208]  ret_from_fork+0x10/0x20
[   54.885761] 
[   54.886068] The buggy address belongs to the object at fff00000c61a5600
[   54.886068]  which belongs to the cache kmalloc-128 of size 128
[   54.887426] The buggy address is located 0 bytes inside of
[   54.887426]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.888767] 
[   54.889084] The buggy address belongs to the physical page:
[   54.889973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.890874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.891732] page_type: f5(slab)
[   54.892317] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.893177] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.894060] page dumped because: kasan: bad access detected
[   54.894742] 
[   54.895132] Memory state around the buggy address:
[   54.895750]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.896732]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.897675] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.898558]                                                                 ^
[   54.899406]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.900171]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.900972] ==================================================================
[   54.816603] ==================================================================
[   54.817609] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   54.819244] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.820212] 
[   54.820595] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.821903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.822606] Hardware name: linux,dummy-virt (DT)
[   54.823254] Call trace:
[   54.823662]  show_stack+0x20/0x38 (C)
[   54.824165]  dump_stack_lvl+0x8c/0xd0
[   54.824853]  print_report+0x118/0x5e0
[   54.825893]  kasan_report+0xc8/0x118
[   54.826511]  kasan_check_range+0x100/0x1a8
[   54.827115]  __kasan_check_read+0x20/0x30
[   54.827622]  copy_user_test_oob+0x728/0xec0
[   54.828128]  kunit_try_run_case+0x14c/0x3d0
[   54.828707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.829488]  kthread+0x24c/0x2d0
[   54.830132]  ret_from_fork+0x10/0x20
[   54.830694] 
[   54.831003] Allocated by task 274:
[   54.831834]  kasan_save_stack+0x3c/0x68
[   54.832469]  kasan_save_track+0x20/0x40
[   54.833316]  kasan_save_alloc_info+0x40/0x58
[   54.833929]  __kasan_kmalloc+0xd4/0xd8
[   54.834462]  __kmalloc_noprof+0x188/0x4c8
[   54.835087]  kunit_kmalloc_array+0x34/0x88
[   54.835715]  copy_user_test_oob+0xac/0xec0
[   54.836393]  kunit_try_run_case+0x14c/0x3d0
[   54.836993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.838383]  kthread+0x24c/0x2d0
[   54.839087]  ret_from_fork+0x10/0x20
[   54.839599] 
[   54.839916] The buggy address belongs to the object at fff00000c61a5600
[   54.839916]  which belongs to the cache kmalloc-128 of size 128
[   54.841801] The buggy address is located 0 bytes inside of
[   54.841801]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.843366] 
[   54.843860] The buggy address belongs to the physical page:
[   54.844515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.844974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.846283] page_type: f5(slab)
[   54.846759] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.847676] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.848651] page dumped because: kasan: bad access detected
[   54.849450] 
[   54.849873] Memory state around the buggy address:
[   54.850521]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.851417]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.852367] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.853391]                                                                 ^
[   54.854235]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.855050]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.855616] ==================================================================
[   54.902681] ==================================================================
[   54.903520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   54.904167] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.905384] 
[   54.906051] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.907233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.907761] Hardware name: linux,dummy-virt (DT)
[   54.908368] Call trace:
[   54.908732]  show_stack+0x20/0x38 (C)
[   54.909370]  dump_stack_lvl+0x8c/0xd0
[   54.909943]  print_report+0x118/0x5e0
[   54.910526]  kasan_report+0xc8/0x118
[   54.911076]  kasan_check_range+0x100/0x1a8
[   54.911673]  __kasan_check_read+0x20/0x30
[   54.912322]  copy_user_test_oob+0x3c8/0xec0
[   54.912931]  kunit_try_run_case+0x14c/0x3d0
[   54.913630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.914415]  kthread+0x24c/0x2d0
[   54.914952]  ret_from_fork+0x10/0x20
[   54.915540] 
[   54.915806] Allocated by task 274:
[   54.916286]  kasan_save_stack+0x3c/0x68
[   54.916920]  kasan_save_track+0x20/0x40
[   54.917479]  kasan_save_alloc_info+0x40/0x58
[   54.918158]  __kasan_kmalloc+0xd4/0xd8
[   54.918742]  __kmalloc_noprof+0x188/0x4c8
[   54.919347]  kunit_kmalloc_array+0x34/0x88
[   54.919871]  copy_user_test_oob+0xac/0xec0
[   54.920523]  kunit_try_run_case+0x14c/0x3d0
[   54.921109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.921787]  kthread+0x24c/0x2d0
[   54.922269]  ret_from_fork+0x10/0x20
[   54.922893] 
[   54.923188] The buggy address belongs to the object at fff00000c61a5600
[   54.923188]  which belongs to the cache kmalloc-128 of size 128
[   54.924547] The buggy address is located 0 bytes inside of
[   54.924547]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.925892] 
[   54.926187] The buggy address belongs to the physical page:
[   54.926961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.927815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.928626] page_type: f5(slab)
[   54.929071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.930104] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.930991] page dumped because: kasan: bad access detected
[   54.931732] 
[   54.932053] Memory state around the buggy address:
[   54.932605]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.933516]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.934470] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.935230]                                                                 ^
[   54.936094]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.936947]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.937827] ==================================================================
[   54.939643] ==================================================================
[   54.940421] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   54.941221] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.942886] 
[   54.943326] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.944447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.945098] Hardware name: linux,dummy-virt (DT)
[   54.945751] Call trace:
[   54.946125]  show_stack+0x20/0x38 (C)
[   54.946641]  dump_stack_lvl+0x8c/0xd0
[   54.947279]  print_report+0x118/0x5e0
[   54.947869]  kasan_report+0xc8/0x118
[   54.948433]  kasan_check_range+0x100/0x1a8
[   54.949065]  __kasan_check_write+0x20/0x30
[   54.949769]  copy_user_test_oob+0x434/0xec0
[   54.950420]  kunit_try_run_case+0x14c/0x3d0
[   54.951125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.951835]  kthread+0x24c/0x2d0
[   54.952366]  ret_from_fork+0x10/0x20
[   54.952981] 
[   54.953342] Allocated by task 274:
[   54.953845]  kasan_save_stack+0x3c/0x68
[   54.954394]  kasan_save_track+0x20/0x40
[   54.954925]  kasan_save_alloc_info+0x40/0x58
[   54.955639]  __kasan_kmalloc+0xd4/0xd8
[   54.956215]  __kmalloc_noprof+0x188/0x4c8
[   54.956705]  kunit_kmalloc_array+0x34/0x88
[   54.957394]  copy_user_test_oob+0xac/0xec0
[   54.957997]  kunit_try_run_case+0x14c/0x3d0
[   54.958726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.959363]  kthread+0x24c/0x2d0
[   54.959906]  ret_from_fork+0x10/0x20
[   54.960418] 
[   54.960840] The buggy address belongs to the object at fff00000c61a5600
[   54.960840]  which belongs to the cache kmalloc-128 of size 128
[   54.962209] The buggy address is located 0 bytes inside of
[   54.962209]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.963580] 
[   54.963851] The buggy address belongs to the physical page:
[   54.964593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.965520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.966382] page_type: f5(slab)
[   54.966890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.967761] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.968783] page dumped because: kasan: bad access detected
[   54.969574] 
[   54.969888] Memory state around the buggy address:
[   54.970530]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.971346]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.972270] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.973076]                                                                 ^
[   54.973894]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.974847]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.975802] ==================================================================
[   54.978785] ==================================================================
[   54.979554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   54.980340] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.981087] 
[   54.981572] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.982792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.983368] Hardware name: linux,dummy-virt (DT)
[   54.983908] Call trace:
[   54.984411]  show_stack+0x20/0x38 (C)
[   54.985068]  dump_stack_lvl+0x8c/0xd0
[   54.985739]  print_report+0x118/0x5e0
[   54.986276]  kasan_report+0xc8/0x118
[   54.987004]  kasan_check_range+0x100/0x1a8
[   54.987622]  __kasan_check_read+0x20/0x30
[   54.988322]  copy_user_test_oob+0x4a0/0xec0
[   54.989018]  kunit_try_run_case+0x14c/0x3d0
[   54.989672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.990396]  kthread+0x24c/0x2d0
[   54.991017]  ret_from_fork+0x10/0x20
[   54.991654] 
[   54.991941] Allocated by task 274:
[   54.992500]  kasan_save_stack+0x3c/0x68
[   54.993131]  kasan_save_track+0x20/0x40
[   54.993686]  kasan_save_alloc_info+0x40/0x58
[   54.994269]  __kasan_kmalloc+0xd4/0xd8
[   54.994852]  __kmalloc_noprof+0x188/0x4c8
[   54.995350]  kunit_kmalloc_array+0x34/0x88
[   54.996005]  copy_user_test_oob+0xac/0xec0
[   54.996693]  kunit_try_run_case+0x14c/0x3d0
[   54.997283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.998027]  kthread+0x24c/0x2d0
[   54.998516]  ret_from_fork+0x10/0x20
[   54.999047] 
[   54.999417] The buggy address belongs to the object at fff00000c61a5600
[   54.999417]  which belongs to the cache kmalloc-128 of size 128
[   55.000844] The buggy address is located 0 bytes inside of
[   55.000844]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   55.002212] 
[   55.002618] The buggy address belongs to the physical page:
[   55.003279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   55.004259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.005054] page_type: f5(slab)
[   55.005591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   55.006444] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   55.007477] page dumped because: kasan: bad access detected
[   55.008168] 
[   55.008510] Memory state around the buggy address:
[   55.009120]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.009989]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.010891] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.011752]                                                                 ^
[   55.012621]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.013491]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.014341] ==================================================================

[   32.875087] ==================================================================
[   32.875719] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   32.876394] Read of size 121 at addr ffff888102a58900 by task kunit_try_catch/293
[   32.876976] 
[   32.877289] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.877937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.878432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.879152] Call Trace:
[   32.879493]  <TASK>
[   32.879804]  dump_stack_lvl+0x73/0xb0
[   32.880302]  print_report+0xd1/0x640
[   32.880663]  ? __virt_addr_valid+0x1db/0x2d0
[   32.881142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.881784]  kasan_report+0x102/0x140
[   32.882237]  ? copy_user_test_oob+0x4ab/0x10f0
[   32.882764]  ? copy_user_test_oob+0x4ab/0x10f0
[   32.883371]  kasan_check_range+0x10c/0x1c0
[   32.883700]  __kasan_check_read+0x15/0x20
[   32.884294]  copy_user_test_oob+0x4ab/0x10f0
[   32.884720]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.885312]  ? finish_task_switch.isra.0+0x153/0x700
[   32.885734]  ? __switch_to+0x5d9/0xf60
[   32.886140]  ? __schedule+0xc3e/0x2790
[   32.886569]  ? __pfx_read_tsc+0x10/0x10
[   32.886945]  ? ktime_get_ts64+0x84/0x230
[   32.887340]  kunit_try_run_case+0x1b3/0x490
[   32.887780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.888295]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.888709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.889360]  ? __kthread_parkme+0x82/0x160
[   32.889847]  ? preempt_count_sub+0x50/0x80
[   32.890388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.890810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.891911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.893083]  kthread+0x257/0x310
[   32.893904]  ? __pfx_kthread+0x10/0x10
[   32.894521]  ret_from_fork+0x41/0x80
[   32.894923]  ? __pfx_kthread+0x10/0x10
[   32.895206]  ret_from_fork_asm+0x1a/0x30
[   32.896163]  </TASK>
[   32.896394] 
[   32.896554] Allocated by task 293:
[   32.896902]  kasan_save_stack+0x3d/0x60
[   32.897826]  kasan_save_track+0x18/0x40
[   32.898374]  kasan_save_alloc_info+0x3b/0x50
[   32.898893]  __kasan_kmalloc+0xb7/0xc0
[   32.899326]  __kmalloc_noprof+0x1c4/0x500
[   32.899901]  kunit_kmalloc_array+0x25/0x60
[   32.900391]  copy_user_test_oob+0xac/0x10f0
[   32.900820]  kunit_try_run_case+0x1b3/0x490
[   32.902034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.902505]  kthread+0x257/0x310
[   32.902929]  ret_from_fork+0x41/0x80
[   32.903298]  ret_from_fork_asm+0x1a/0x30
[   32.903752] 
[   32.903945] The buggy address belongs to the object at ffff888102a58900
[   32.903945]  which belongs to the cache kmalloc-128 of size 128
[   32.904858] The buggy address is located 0 bytes inside of
[   32.904858]  allocated 120-byte region [ffff888102a58900, ffff888102a58978)
[   32.906197] 
[   32.906390] The buggy address belongs to the physical page:
[   32.907043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58
[   32.907775] flags: 0x200000000000000(node=0|zone=2)
[   32.908622] page_type: f5(slab)
[   32.909440] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.910165] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.910893] page dumped because: kasan: bad access detected
[   32.911242] 
[   32.911495] Memory state around the buggy address:
[   32.912098]  ffff888102a58800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.912678]  ffff888102a58880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.913823] >ffff888102a58900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.914569]                                                                 ^
[   32.915579]  ffff888102a58980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.916419]  ffff888102a58a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.917879] ==================================================================
[   32.919201] ==================================================================
[   32.919737] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   32.921231] Write of size 121 at addr ffff888102a58900 by task kunit_try_catch/293
[   32.921919] 
[   32.922703] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.924244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.924697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.926012] Call Trace:
[   32.926320]  <TASK>
[   32.926737]  dump_stack_lvl+0x73/0xb0
[   32.927438]  print_report+0xd1/0x640
[   32.928014]  ? __virt_addr_valid+0x1db/0x2d0
[   32.928613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.929119]  kasan_report+0x102/0x140
[   32.929964]  ? copy_user_test_oob+0x558/0x10f0
[   32.930446]  ? copy_user_test_oob+0x558/0x10f0
[   32.931163]  kasan_check_range+0x10c/0x1c0
[   32.931876]  __kasan_check_write+0x18/0x20
[   32.932605]  copy_user_test_oob+0x558/0x10f0
[   32.933319]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.933896]  ? finish_task_switch.isra.0+0x153/0x700
[   32.934468]  ? __switch_to+0x5d9/0xf60
[   32.934853]  ? __schedule+0xc3e/0x2790
[   32.935239]  ? __pfx_read_tsc+0x10/0x10
[   32.936137]  ? ktime_get_ts64+0x84/0x230
[   32.936764]  kunit_try_run_case+0x1b3/0x490
[   32.937409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.938084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.938541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.939004]  ? __kthread_parkme+0x82/0x160
[   32.939792]  ? preempt_count_sub+0x50/0x80
[   32.940430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.940853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.941886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.942670]  kthread+0x257/0x310
[   32.943291]  ? __pfx_kthread+0x10/0x10
[   32.943662]  ret_from_fork+0x41/0x80
[   32.944045]  ? __pfx_kthread+0x10/0x10
[   32.944439]  ret_from_fork_asm+0x1a/0x30
[   32.944836]  </TASK>
[   32.945665] 
[   32.945848] Allocated by task 293:
[   32.946117]  kasan_save_stack+0x3d/0x60
[   32.946883]  kasan_save_track+0x18/0x40
[   32.947475]  kasan_save_alloc_info+0x3b/0x50
[   32.948133]  __kasan_kmalloc+0xb7/0xc0
[   32.948680]  __kmalloc_noprof+0x1c4/0x500
[   32.949259]  kunit_kmalloc_array+0x25/0x60
[   32.949676]  copy_user_test_oob+0xac/0x10f0
[   32.950104]  kunit_try_run_case+0x1b3/0x490
[   32.950896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.951561]  kthread+0x257/0x310
[   32.951963]  ret_from_fork+0x41/0x80
[   32.952540]  ret_from_fork_asm+0x1a/0x30
[   32.953022] 
[   32.953333] The buggy address belongs to the object at ffff888102a58900
[   32.953333]  which belongs to the cache kmalloc-128 of size 128
[   32.954458] The buggy address is located 0 bytes inside of
[   32.954458]  allocated 120-byte region [ffff888102a58900, ffff888102a58978)
[   32.954901] 
[   32.955066] The buggy address belongs to the physical page:
[   32.955486] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58
[   32.956383] flags: 0x200000000000000(node=0|zone=2)
[   32.957271] page_type: f5(slab)
[   32.957878] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.958949] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.960082] page dumped because: kasan: bad access detected
[   32.960307] 
[   32.960403] Memory state around the buggy address:
[   32.960601]  ffff888102a58800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.960871]  ffff888102a58880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.961629] >ffff888102a58900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.963483]                                                                 ^
[   32.964114]  ffff888102a58980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.964816]  ffff888102a58a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.966119] ==================================================================
[   32.832200] ==================================================================
[   32.832840] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   32.833587] Write of size 121 at addr ffff888102a58900 by task kunit_try_catch/293
[   32.834270] 
[   32.834563] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.835444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.836016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.836788] Call Trace:
[   32.837124]  <TASK>
[   32.837389]  dump_stack_lvl+0x73/0xb0
[   32.837900]  print_report+0xd1/0x640
[   32.838510]  ? __virt_addr_valid+0x1db/0x2d0
[   32.838973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.839597]  kasan_report+0x102/0x140
[   32.840151]  ? copy_user_test_oob+0x3fe/0x10f0
[   32.840615]  ? copy_user_test_oob+0x3fe/0x10f0
[   32.841327]  kasan_check_range+0x10c/0x1c0
[   32.841705]  __kasan_check_write+0x18/0x20
[   32.842215]  copy_user_test_oob+0x3fe/0x10f0
[   32.842890]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.843316]  ? finish_task_switch.isra.0+0x153/0x700
[   32.843928]  ? __switch_to+0x5d9/0xf60
[   32.844286]  ? __schedule+0xc3e/0x2790
[   32.844850]  ? __pfx_read_tsc+0x10/0x10
[   32.845419]  ? ktime_get_ts64+0x84/0x230
[   32.845790]  kunit_try_run_case+0x1b3/0x490
[   32.846635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.847061]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.847793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.848463]  ? __kthread_parkme+0x82/0x160
[   32.848942]  ? preempt_count_sub+0x50/0x80
[   32.849408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.850063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.850776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.851587]  kthread+0x257/0x310
[   32.852089]  ? __pfx_kthread+0x10/0x10
[   32.852514]  ret_from_fork+0x41/0x80
[   32.852911]  ? __pfx_kthread+0x10/0x10
[   32.853651]  ret_from_fork_asm+0x1a/0x30
[   32.854206]  </TASK>
[   32.854509] 
[   32.854786] Allocated by task 293:
[   32.855089]  kasan_save_stack+0x3d/0x60
[   32.855638]  kasan_save_track+0x18/0x40
[   32.856756]  kasan_save_alloc_info+0x3b/0x50
[   32.857641]  __kasan_kmalloc+0xb7/0xc0
[   32.857835]  __kmalloc_noprof+0x1c4/0x500
[   32.858110]  kunit_kmalloc_array+0x25/0x60
[   32.858926]  copy_user_test_oob+0xac/0x10f0
[   32.859463]  kunit_try_run_case+0x1b3/0x490
[   32.860311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.860793]  kthread+0x257/0x310
[   32.861304]  ret_from_fork+0x41/0x80
[   32.861637]  ret_from_fork_asm+0x1a/0x30
[   32.862003] 
[   32.862280] The buggy address belongs to the object at ffff888102a58900
[   32.862280]  which belongs to the cache kmalloc-128 of size 128
[   32.863303] The buggy address is located 0 bytes inside of
[   32.863303]  allocated 120-byte region [ffff888102a58900, ffff888102a58978)
[   32.864412] 
[   32.864578] The buggy address belongs to the physical page:
[   32.865136] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58
[   32.865727] flags: 0x200000000000000(node=0|zone=2)
[   32.866258] page_type: f5(slab)
[   32.866515] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.867352] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.867866] page dumped because: kasan: bad access detected
[   32.868523] 
[   32.868731] Memory state around the buggy address:
[   32.869211]  ffff888102a58800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.869811]  ffff888102a58880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.870401] >ffff888102a58900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.871193]                                                                 ^
[   32.871666]  ffff888102a58980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.872482]  ffff888102a58a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.872952] ==================================================================
[   32.967216] ==================================================================
[   32.967790] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   32.968760] Read of size 121 at addr ffff888102a58900 by task kunit_try_catch/293
[   32.969466] 
[   32.970222] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.971636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.972375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.973840] Call Trace:
[   32.974173]  <TASK>
[   32.974303]  dump_stack_lvl+0x73/0xb0
[   32.974505]  print_report+0xd1/0x640
[   32.974691]  ? __virt_addr_valid+0x1db/0x2d0
[   32.974893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.975243]  kasan_report+0x102/0x140
[   32.975529]  ? copy_user_test_oob+0x605/0x10f0
[   32.976829]  ? copy_user_test_oob+0x605/0x10f0
[   32.977544]  kasan_check_range+0x10c/0x1c0
[   32.978001]  __kasan_check_read+0x15/0x20
[   32.978638]  copy_user_test_oob+0x605/0x10f0
[   32.978857]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.979647]  ? finish_task_switch.isra.0+0x153/0x700
[   32.980505]  ? __switch_to+0x5d9/0xf60
[   32.981249]  ? __schedule+0xc3e/0x2790
[   32.981884]  ? __pfx_read_tsc+0x10/0x10
[   32.982875]  ? ktime_get_ts64+0x84/0x230
[   32.983404]  kunit_try_run_case+0x1b3/0x490
[   32.983854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.984811]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.985637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.986386]  ? __kthread_parkme+0x82/0x160
[   32.986826]  ? preempt_count_sub+0x50/0x80
[   32.987442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.987948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.988411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.989161]  kthread+0x257/0x310
[   32.989587]  ? __pfx_kthread+0x10/0x10
[   32.990003]  ret_from_fork+0x41/0x80
[   32.990514]  ? __pfx_kthread+0x10/0x10
[   32.991095]  ret_from_fork_asm+0x1a/0x30
[   32.991555]  </TASK>
[   32.991918] 
[   32.992500] Allocated by task 293:
[   32.992876]  kasan_save_stack+0x3d/0x60
[   32.993898]  kasan_save_track+0x18/0x40
[   32.994900]  kasan_save_alloc_info+0x3b/0x50
[   32.995546]  __kasan_kmalloc+0xb7/0xc0
[   32.995942]  __kmalloc_noprof+0x1c4/0x500
[   32.996381]  kunit_kmalloc_array+0x25/0x60
[   32.996803]  copy_user_test_oob+0xac/0x10f0
[   32.997764]  kunit_try_run_case+0x1b3/0x490
[   32.998516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.999799]  kthread+0x257/0x310
[   33.000518]  ret_from_fork+0x41/0x80
[   33.001228]  ret_from_fork_asm+0x1a/0x30
[   33.001443] 
[   33.001543] The buggy address belongs to the object at ffff888102a58900
[   33.001543]  which belongs to the cache kmalloc-128 of size 128
[   33.002003] The buggy address is located 0 bytes inside of
[   33.002003]  allocated 120-byte region [ffff888102a58900, ffff888102a58978)
[   33.002936] 
[   33.003261] The buggy address belongs to the physical page:
[   33.004229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58
[   33.005089] flags: 0x200000000000000(node=0|zone=2)
[   33.005638] page_type: f5(slab)
[   33.006027] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   33.006893] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.007774] page dumped because: kasan: bad access detected
[   33.008657] 
[   33.009017] Memory state around the buggy address:
[   33.009541]  ffff888102a58800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.010417]  ffff888102a58880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.011185] >ffff888102a58900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   33.012132]                                                                 ^
[   33.012826]  ffff888102a58980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.013605]  ffff888102a58a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.014448] ==================================================================