Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 39.437521] ================================================================== [ 39.438233] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 39.439309] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.440750] [ 39.441087] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.443880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.444691] Hardware name: linux,dummy-virt (DT) [ 39.445485] Call trace: [ 39.445917] show_stack+0x20/0x38 (C) [ 39.446505] dump_stack_lvl+0x8c/0xd0 [ 39.447039] print_report+0x118/0x5e0 [ 39.447559] kasan_report+0xc8/0x118 [ 39.448147] kasan_check_range+0x100/0x1a8 [ 39.448764] __kasan_check_read+0x20/0x30 [ 39.449469] copy_user_test_oob+0x3c8/0xec0 [ 39.450016] kunit_try_run_case+0x14c/0x3d0 [ 39.450742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.451593] kthread+0x24c/0x2d0 [ 39.452189] ret_from_fork+0x10/0x20 [ 39.452851] [ 39.453262] Allocated by task 273: [ 39.453739] kasan_save_stack+0x3c/0x68 [ 39.454329] kasan_save_track+0x20/0x40 [ 39.454766] kasan_save_alloc_info+0x40/0x58 [ 39.455229] __kasan_kmalloc+0xd4/0xd8 [ 39.455675] __kmalloc_noprof+0x188/0x4c8 [ 39.456100] kunit_kmalloc_array+0x34/0x88 [ 39.456753] copy_user_test_oob+0xac/0xec0 [ 39.457586] kunit_try_run_case+0x14c/0x3d0 [ 39.458074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.458745] kthread+0x24c/0x2d0 [ 39.459370] ret_from_fork+0x10/0x20 [ 39.459918] [ 39.460213] The buggy address belongs to the object at fff00000c6766e00 [ 39.460213] which belongs to the cache kmalloc-128 of size 128 [ 39.461870] The buggy address is located 0 bytes inside of [ 39.461870] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.463487] [ 39.463813] The buggy address belongs to the physical page: [ 39.464538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.465229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.466192] page_type: f5(slab) [ 39.466682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.467735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.468874] page dumped because: kasan: bad access detected [ 39.469572] [ 39.469966] Memory state around the buggy address: [ 39.470651] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.471706] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.472701] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.473520] ^ [ 39.474401] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.475282] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.476232] ================================================================== [ 39.479349] ================================================================== [ 39.480226] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 39.480971] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.481896] [ 39.482408] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.483657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.484192] Hardware name: linux,dummy-virt (DT) [ 39.484818] Call trace: [ 39.485306] show_stack+0x20/0x38 (C) [ 39.485983] dump_stack_lvl+0x8c/0xd0 [ 39.486689] print_report+0x118/0x5e0 [ 39.487273] kasan_report+0xc8/0x118 [ 39.488032] kasan_check_range+0x100/0x1a8 [ 39.488759] __kasan_check_write+0x20/0x30 [ 39.489356] copy_user_test_oob+0x434/0xec0 [ 39.490038] kunit_try_run_case+0x14c/0x3d0 [ 39.490707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.491478] kthread+0x24c/0x2d0 [ 39.492100] ret_from_fork+0x10/0x20 [ 39.492808] [ 39.493136] Allocated by task 273: [ 39.493645] kasan_save_stack+0x3c/0x68 [ 39.494253] kasan_save_track+0x20/0x40 [ 39.494856] kasan_save_alloc_info+0x40/0x58 [ 39.495371] __kasan_kmalloc+0xd4/0xd8 [ 39.496122] __kmalloc_noprof+0x188/0x4c8 [ 39.496679] kunit_kmalloc_array+0x34/0x88 [ 39.497304] copy_user_test_oob+0xac/0xec0 [ 39.497941] kunit_try_run_case+0x14c/0x3d0 [ 39.498646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.499366] kthread+0x24c/0x2d0 [ 39.499823] ret_from_fork+0x10/0x20 [ 39.500443] [ 39.500814] The buggy address belongs to the object at fff00000c6766e00 [ 39.500814] which belongs to the cache kmalloc-128 of size 128 [ 39.502165] The buggy address is located 0 bytes inside of [ 39.502165] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.503564] [ 39.503911] The buggy address belongs to the physical page: [ 39.504791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.505724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.506649] page_type: f5(slab) [ 39.507263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.508108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.509136] page dumped because: kasan: bad access detected [ 39.509970] [ 39.510318] Memory state around the buggy address: [ 39.510957] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.511940] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.512965] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.513847] ^ [ 39.514781] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.515682] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.516505] ================================================================== [ 39.295031] ================================================================== [ 39.296469] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 39.297285] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.298070] [ 39.299177] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.300510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.301127] Hardware name: linux,dummy-virt (DT) [ 39.301955] Call trace: [ 39.302456] show_stack+0x20/0x38 (C) [ 39.303145] dump_stack_lvl+0x8c/0xd0 [ 39.303850] print_report+0x118/0x5e0 [ 39.304416] kasan_report+0xc8/0x118 [ 39.304961] kasan_check_range+0x100/0x1a8 [ 39.305530] __kasan_check_write+0x20/0x30 [ 39.306481] copy_user_test_oob+0x234/0xec0 [ 39.307154] kunit_try_run_case+0x14c/0x3d0 [ 39.307754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.308514] kthread+0x24c/0x2d0 [ 39.309072] ret_from_fork+0x10/0x20 [ 39.309820] [ 39.310277] Allocated by task 273: [ 39.311228] kasan_save_stack+0x3c/0x68 [ 39.311831] kasan_save_track+0x20/0x40 [ 39.312340] kasan_save_alloc_info+0x40/0x58 [ 39.313083] __kasan_kmalloc+0xd4/0xd8 [ 39.313652] __kmalloc_noprof+0x188/0x4c8 [ 39.314383] kunit_kmalloc_array+0x34/0x88 [ 39.315296] copy_user_test_oob+0xac/0xec0 [ 39.315862] kunit_try_run_case+0x14c/0x3d0 [ 39.316758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.317745] kthread+0x24c/0x2d0 [ 39.319101] ret_from_fork+0x10/0x20 [ 39.319537] [ 39.320099] The buggy address belongs to the object at fff00000c6766e00 [ 39.320099] which belongs to the cache kmalloc-128 of size 128 [ 39.321445] The buggy address is located 0 bytes inside of [ 39.321445] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.323309] [ 39.323785] The buggy address belongs to the physical page: [ 39.324501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.325436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.326485] page_type: f5(slab) [ 39.327275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.328197] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.329154] page dumped because: kasan: bad access detected [ 39.329758] [ 39.330235] Memory state around the buggy address: [ 39.331466] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.332491] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.333464] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.335012] ^ [ 39.335619] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.336830] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.337684] ================================================================== [ 39.346381] ================================================================== [ 39.347785] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 39.348673] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.350179] [ 39.351057] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.352527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.353238] Hardware name: linux,dummy-virt (DT) [ 39.353967] Call trace: [ 39.354372] show_stack+0x20/0x38 (C) [ 39.355017] dump_stack_lvl+0x8c/0xd0 [ 39.355613] print_report+0x118/0x5e0 [ 39.356234] kasan_report+0xc8/0x118 [ 39.356911] kasan_check_range+0x100/0x1a8 [ 39.357642] __kasan_check_read+0x20/0x30 [ 39.358197] copy_user_test_oob+0x728/0xec0 [ 39.358950] kunit_try_run_case+0x14c/0x3d0 [ 39.359697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.360446] kthread+0x24c/0x2d0 [ 39.360999] ret_from_fork+0x10/0x20 [ 39.361732] [ 39.362177] Allocated by task 273: [ 39.362775] kasan_save_stack+0x3c/0x68 [ 39.363259] kasan_save_track+0x20/0x40 [ 39.364003] kasan_save_alloc_info+0x40/0x58 [ 39.364535] __kasan_kmalloc+0xd4/0xd8 [ 39.365185] __kmalloc_noprof+0x188/0x4c8 [ 39.365959] kunit_kmalloc_array+0x34/0x88 [ 39.366521] copy_user_test_oob+0xac/0xec0 [ 39.367238] kunit_try_run_case+0x14c/0x3d0 [ 39.367865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.368607] kthread+0x24c/0x2d0 [ 39.369121] ret_from_fork+0x10/0x20 [ 39.369657] [ 39.370085] The buggy address belongs to the object at fff00000c6766e00 [ 39.370085] which belongs to the cache kmalloc-128 of size 128 [ 39.371451] The buggy address is located 0 bytes inside of [ 39.371451] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.372832] [ 39.373246] The buggy address belongs to the physical page: [ 39.373937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.374942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.375746] page_type: f5(slab) [ 39.376293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.377244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.378188] page dumped because: kasan: bad access detected [ 39.378866] [ 39.379194] Memory state around the buggy address: [ 39.379856] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.380647] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.381656] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.382483] ^ [ 39.383392] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.384304] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.385263] ================================================================== [ 39.394559] ================================================================== [ 39.395345] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 39.396136] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.397018] [ 39.397401] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.399172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.399834] Hardware name: linux,dummy-virt (DT) [ 39.400566] Call trace: [ 39.401104] show_stack+0x20/0x38 (C) [ 39.401939] dump_stack_lvl+0x8c/0xd0 [ 39.402681] print_report+0x118/0x5e0 [ 39.403296] kasan_report+0xc8/0x118 [ 39.403982] kasan_check_range+0x100/0x1a8 [ 39.404695] __kasan_check_write+0x20/0x30 [ 39.405379] copy_user_test_oob+0x35c/0xec0 [ 39.406074] kunit_try_run_case+0x14c/0x3d0 [ 39.406823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.407702] kthread+0x24c/0x2d0 [ 39.408293] ret_from_fork+0x10/0x20 [ 39.408851] [ 39.409108] Allocated by task 273: [ 39.409501] kasan_save_stack+0x3c/0x68 [ 39.409953] kasan_save_track+0x20/0x40 [ 39.410397] kasan_save_alloc_info+0x40/0x58 [ 39.411070] __kasan_kmalloc+0xd4/0xd8 [ 39.411927] __kmalloc_noprof+0x188/0x4c8 [ 39.412588] kunit_kmalloc_array+0x34/0x88 [ 39.413058] copy_user_test_oob+0xac/0xec0 [ 39.416293] kunit_try_run_case+0x14c/0x3d0 [ 39.416977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.417730] kthread+0x24c/0x2d0 [ 39.418219] ret_from_fork+0x10/0x20 [ 39.418962] [ 39.419293] The buggy address belongs to the object at fff00000c6766e00 [ 39.419293] which belongs to the cache kmalloc-128 of size 128 [ 39.420715] The buggy address is located 0 bytes inside of [ 39.420715] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.422574] [ 39.423036] The buggy address belongs to the physical page: [ 39.424033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.424987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.425729] page_type: f5(slab) [ 39.426272] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.427769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.428640] page dumped because: kasan: bad access detected [ 39.429329] [ 39.429668] Memory state around the buggy address: [ 39.430409] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.431258] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.432287] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.433194] ^ [ 39.434131] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.435034] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.436038] ================================================================== [ 39.518205] ================================================================== [ 39.519129] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 39.520418] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.521146] [ 39.521485] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.523027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.523559] Hardware name: linux,dummy-virt (DT) [ 39.524336] Call trace: [ 39.524820] show_stack+0x20/0x38 (C) [ 39.525343] dump_stack_lvl+0x8c/0xd0 [ 39.526069] print_report+0x118/0x5e0 [ 39.526680] kasan_report+0xc8/0x118 [ 39.527270] kasan_check_range+0x100/0x1a8 [ 39.527903] __kasan_check_read+0x20/0x30 [ 39.528490] copy_user_test_oob+0x4a0/0xec0 [ 39.529111] kunit_try_run_case+0x14c/0x3d0 [ 39.529954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.530671] kthread+0x24c/0x2d0 [ 39.531237] ret_from_fork+0x10/0x20 [ 39.531893] [ 39.532260] Allocated by task 273: [ 39.532754] kasan_save_stack+0x3c/0x68 [ 39.533367] kasan_save_track+0x20/0x40 [ 39.534106] kasan_save_alloc_info+0x40/0x58 [ 39.534745] __kasan_kmalloc+0xd4/0xd8 [ 39.535228] __kmalloc_noprof+0x188/0x4c8 [ 39.535920] kunit_kmalloc_array+0x34/0x88 [ 39.536536] copy_user_test_oob+0xac/0xec0 [ 39.537155] kunit_try_run_case+0x14c/0x3d0 [ 39.537698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.538521] kthread+0x24c/0x2d0 [ 39.539067] ret_from_fork+0x10/0x20 [ 39.539807] [ 39.540102] The buggy address belongs to the object at fff00000c6766e00 [ 39.540102] which belongs to the cache kmalloc-128 of size 128 [ 39.541533] The buggy address is located 0 bytes inside of [ 39.541533] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.543031] [ 39.543366] The buggy address belongs to the physical page: [ 39.544113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.545038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.545864] page_type: f5(slab) [ 39.546452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.547407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.548398] page dumped because: kasan: bad access detected [ 39.549090] [ 39.549420] Memory state around the buggy address: [ 39.550090] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.551035] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.551907] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.552782] ^ [ 39.553650] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.554530] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.555436] ==================================================================
[ 30.660639] ================================================================== [ 30.661285] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 30.661949] Write of size 121 at addr ffff8881029a4b00 by task kunit_try_catch/293 [ 30.662603] [ 30.662846] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.663711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.664416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.665338] Call Trace: [ 30.665674] <TASK> [ 30.666005] dump_stack_lvl+0x73/0xb0 [ 30.666395] print_report+0xd1/0x640 [ 30.666750] ? __virt_addr_valid+0x1db/0x2d0 [ 30.667278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.667696] kasan_report+0x102/0x140 [ 30.668165] ? copy_user_test_oob+0x3fe/0x10f0 [ 30.668780] ? copy_user_test_oob+0x3fe/0x10f0 [ 30.669164] kasan_check_range+0x10c/0x1c0 [ 30.669544] __kasan_check_write+0x18/0x20 [ 30.670193] copy_user_test_oob+0x3fe/0x10f0 [ 30.670592] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.671151] ? finish_task_switch.isra.0+0x153/0x700 [ 30.671702] ? __switch_to+0x5d9/0xf60 [ 30.672022] ? __schedule+0xc3e/0x2790 [ 30.672502] ? __pfx_read_tsc+0x10/0x10 [ 30.673012] ? ktime_get_ts64+0x86/0x230 [ 30.673493] kunit_try_run_case+0x1b3/0x490 [ 30.673920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.674585] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.674991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.675577] ? __kthread_parkme+0x82/0x160 [ 30.675969] ? preempt_count_sub+0x50/0x80 [ 30.676429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.676780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.677405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.678072] kthread+0x257/0x310 [ 30.678475] ? __pfx_kthread+0x10/0x10 [ 30.678922] ret_from_fork+0x41/0x80 [ 30.679282] ? __pfx_kthread+0x10/0x10 [ 30.679568] ret_from_fork_asm+0x1a/0x30 [ 30.680339] </TASK> [ 30.680761] [ 30.680923] Allocated by task 293: [ 30.681344] kasan_save_stack+0x3d/0x60 [ 30.682109] kasan_save_track+0x18/0x40 [ 30.682483] kasan_save_alloc_info+0x3b/0x50 [ 30.682997] __kasan_kmalloc+0xb7/0xc0 [ 30.683431] __kmalloc_noprof+0x1c4/0x500 [ 30.683748] kunit_kmalloc_array+0x25/0x60 [ 30.684271] copy_user_test_oob+0xac/0x10f0 [ 30.684763] kunit_try_run_case+0x1b3/0x490 [ 30.685070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.685418] kthread+0x257/0x310 [ 30.685774] ret_from_fork+0x41/0x80 [ 30.686267] ret_from_fork_asm+0x1a/0x30 [ 30.686612] [ 30.686800] The buggy address belongs to the object at ffff8881029a4b00 [ 30.686800] which belongs to the cache kmalloc-128 of size 128 [ 30.688066] The buggy address is located 0 bytes inside of [ 30.688066] allocated 120-byte region [ffff8881029a4b00, ffff8881029a4b78) [ 30.689479] [ 30.689687] The buggy address belongs to the physical page: [ 30.690367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 30.690845] flags: 0x200000000000000(node=0|zone=2) [ 30.691729] page_type: f5(slab) [ 30.691991] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.693311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.693791] page dumped because: kasan: bad access detected [ 30.694414] [ 30.694803] Memory state around the buggy address: [ 30.695138] ffff8881029a4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.695559] ffff8881029a4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.696340] >ffff8881029a4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.697267] ^ [ 30.698057] ffff8881029a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.698596] ffff8881029a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.699029] ================================================================== [ 30.793778] ================================================================== [ 30.794499] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 30.796646] Read of size 121 at addr ffff8881029a4b00 by task kunit_try_catch/293 [ 30.797936] [ 30.798404] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.799728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.800308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.801148] Call Trace: [ 30.801430] <TASK> [ 30.801871] dump_stack_lvl+0x73/0xb0 [ 30.802538] print_report+0xd1/0x640 [ 30.802974] ? __virt_addr_valid+0x1db/0x2d0 [ 30.803722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.804737] kasan_report+0x102/0x140 [ 30.805489] ? copy_user_test_oob+0x605/0x10f0 [ 30.805892] ? copy_user_test_oob+0x605/0x10f0 [ 30.806342] kasan_check_range+0x10c/0x1c0 [ 30.806764] __kasan_check_read+0x15/0x20 [ 30.807437] copy_user_test_oob+0x605/0x10f0 [ 30.807879] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.808492] ? finish_task_switch.isra.0+0x153/0x700 [ 30.809037] ? __switch_to+0x5d9/0xf60 [ 30.809595] ? __schedule+0xc3e/0x2790 [ 30.810114] ? __pfx_read_tsc+0x10/0x10 [ 30.810437] ? ktime_get_ts64+0x86/0x230 [ 30.810988] kunit_try_run_case+0x1b3/0x490 [ 30.811553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.812040] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.812471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.813145] ? __kthread_parkme+0x82/0x160 [ 30.813720] ? preempt_count_sub+0x50/0x80 [ 30.814235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.814884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.815426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.816002] kthread+0x257/0x310 [ 30.816445] ? __pfx_kthread+0x10/0x10 [ 30.816885] ret_from_fork+0x41/0x80 [ 30.817427] ? __pfx_kthread+0x10/0x10 [ 30.817955] ret_from_fork_asm+0x1a/0x30 [ 30.818463] </TASK> [ 30.818723] [ 30.818973] Allocated by task 293: [ 30.819439] kasan_save_stack+0x3d/0x60 [ 30.819974] kasan_save_track+0x18/0x40 [ 30.820466] kasan_save_alloc_info+0x3b/0x50 [ 30.821152] __kasan_kmalloc+0xb7/0xc0 [ 30.821713] __kmalloc_noprof+0x1c4/0x500 [ 30.822289] kunit_kmalloc_array+0x25/0x60 [ 30.822734] copy_user_test_oob+0xac/0x10f0 [ 30.823232] kunit_try_run_case+0x1b3/0x490 [ 30.823745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.824396] kthread+0x257/0x310 [ 30.824690] ret_from_fork+0x41/0x80 [ 30.825161] ret_from_fork_asm+0x1a/0x30 [ 30.825685] [ 30.825925] The buggy address belongs to the object at ffff8881029a4b00 [ 30.825925] which belongs to the cache kmalloc-128 of size 128 [ 30.827011] The buggy address is located 0 bytes inside of [ 30.827011] allocated 120-byte region [ffff8881029a4b00, ffff8881029a4b78) [ 30.828230] [ 30.828445] The buggy address belongs to the physical page: [ 30.829013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 30.829815] flags: 0x200000000000000(node=0|zone=2) [ 30.830427] page_type: f5(slab) [ 30.830773] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.831629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.832412] page dumped because: kasan: bad access detected [ 30.832937] [ 30.833260] Memory state around the buggy address: [ 30.833715] ffff8881029a4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.834314] ffff8881029a4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835149] >ffff8881029a4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.835795] ^ [ 30.836597] ffff8881029a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837307] ffff8881029a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838017] ================================================================== [ 30.744109] ================================================================== [ 30.745827] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 30.746832] Write of size 121 at addr ffff8881029a4b00 by task kunit_try_catch/293 [ 30.747593] [ 30.747793] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.749722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.750673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.751536] Call Trace: [ 30.751849] <TASK> [ 30.752870] dump_stack_lvl+0x73/0xb0 [ 30.753280] print_report+0xd1/0x640 [ 30.753886] ? __virt_addr_valid+0x1db/0x2d0 [ 30.754336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.755178] kasan_report+0x102/0x140 [ 30.755599] ? copy_user_test_oob+0x558/0x10f0 [ 30.756068] ? copy_user_test_oob+0x558/0x10f0 [ 30.756960] kasan_check_range+0x10c/0x1c0 [ 30.757687] __kasan_check_write+0x18/0x20 [ 30.758306] copy_user_test_oob+0x558/0x10f0 [ 30.758897] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.759861] ? finish_task_switch.isra.0+0x153/0x700 [ 30.760716] ? __switch_to+0x5d9/0xf60 [ 30.761091] ? __schedule+0xc3e/0x2790 [ 30.761752] ? __pfx_read_tsc+0x10/0x10 [ 30.762676] ? ktime_get_ts64+0x86/0x230 [ 30.763042] kunit_try_run_case+0x1b3/0x490 [ 30.763967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.765204] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.765864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.766473] ? __kthread_parkme+0x82/0x160 [ 30.766933] ? preempt_count_sub+0x50/0x80 [ 30.767512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.768062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.768980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.769744] kthread+0x257/0x310 [ 30.770392] ? __pfx_kthread+0x10/0x10 [ 30.770975] ret_from_fork+0x41/0x80 [ 30.771276] ? __pfx_kthread+0x10/0x10 [ 30.771985] ret_from_fork_asm+0x1a/0x30 [ 30.772793] </TASK> [ 30.773011] [ 30.773475] Allocated by task 293: [ 30.773798] kasan_save_stack+0x3d/0x60 [ 30.774206] kasan_save_track+0x18/0x40 [ 30.774585] kasan_save_alloc_info+0x3b/0x50 [ 30.774997] __kasan_kmalloc+0xb7/0xc0 [ 30.775368] __kmalloc_noprof+0x1c4/0x500 [ 30.776533] kunit_kmalloc_array+0x25/0x60 [ 30.776911] copy_user_test_oob+0xac/0x10f0 [ 30.777770] kunit_try_run_case+0x1b3/0x490 [ 30.778271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.779189] kthread+0x257/0x310 [ 30.779491] ret_from_fork+0x41/0x80 [ 30.779803] ret_from_fork_asm+0x1a/0x30 [ 30.780329] [ 30.780529] The buggy address belongs to the object at ffff8881029a4b00 [ 30.780529] which belongs to the cache kmalloc-128 of size 128 [ 30.781748] The buggy address is located 0 bytes inside of [ 30.781748] allocated 120-byte region [ffff8881029a4b00, ffff8881029a4b78) [ 30.782567] [ 30.782844] The buggy address belongs to the physical page: [ 30.783571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 30.784318] flags: 0x200000000000000(node=0|zone=2) [ 30.784734] page_type: f5(slab) [ 30.785263] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.785945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.786771] page dumped because: kasan: bad access detected [ 30.787321] [ 30.787570] Memory state around the buggy address: [ 30.787992] ffff8881029a4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.788712] ffff8881029a4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.789381] >ffff8881029a4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.789913] ^ [ 30.790725] ffff8881029a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.791438] ffff8881029a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.792170] ================================================================== [ 30.700493] ================================================================== [ 30.701587] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 30.702484] Read of size 121 at addr ffff8881029a4b00 by task kunit_try_catch/293 [ 30.703151] [ 30.703384] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.704373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.704718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.705547] Call Trace: [ 30.705807] <TASK> [ 30.706016] dump_stack_lvl+0x73/0xb0 [ 30.706319] print_report+0xd1/0x640 [ 30.706743] ? __virt_addr_valid+0x1db/0x2d0 [ 30.707345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.708270] kasan_report+0x102/0x140 [ 30.708817] ? copy_user_test_oob+0x4ab/0x10f0 [ 30.709427] ? copy_user_test_oob+0x4ab/0x10f0 [ 30.709878] kasan_check_range+0x10c/0x1c0 [ 30.710192] __kasan_check_read+0x15/0x20 [ 30.710494] copy_user_test_oob+0x4ab/0x10f0 [ 30.711470] ? __pfx_copy_user_test_oob+0x10/0x10 [ 30.712205] ? finish_task_switch.isra.0+0x153/0x700 [ 30.712825] ? __switch_to+0x5d9/0xf60 [ 30.713341] ? __schedule+0xc3e/0x2790 [ 30.714116] ? __pfx_read_tsc+0x10/0x10 [ 30.714587] ? ktime_get_ts64+0x86/0x230 [ 30.715200] kunit_try_run_case+0x1b3/0x490 [ 30.715765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.716365] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.716835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.717552] ? __kthread_parkme+0x82/0x160 [ 30.718009] ? preempt_count_sub+0x50/0x80 [ 30.718703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.719423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.720197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.720787] kthread+0x257/0x310 [ 30.721242] ? __pfx_kthread+0x10/0x10 [ 30.721551] ret_from_fork+0x41/0x80 [ 30.722186] ? __pfx_kthread+0x10/0x10 [ 30.722486] ret_from_fork_asm+0x1a/0x30 [ 30.723126] </TASK> [ 30.723452] [ 30.723699] Allocated by task 293: [ 30.724015] kasan_save_stack+0x3d/0x60 [ 30.724652] kasan_save_track+0x18/0x40 [ 30.725005] kasan_save_alloc_info+0x3b/0x50 [ 30.725674] __kasan_kmalloc+0xb7/0xc0 [ 30.726248] __kmalloc_noprof+0x1c4/0x500 [ 30.726745] kunit_kmalloc_array+0x25/0x60 [ 30.727140] copy_user_test_oob+0xac/0x10f0 [ 30.727655] kunit_try_run_case+0x1b3/0x490 [ 30.728293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.728695] kthread+0x257/0x310 [ 30.729246] ret_from_fork+0x41/0x80 [ 30.729740] ret_from_fork_asm+0x1a/0x30 [ 30.730264] [ 30.730556] The buggy address belongs to the object at ffff8881029a4b00 [ 30.730556] which belongs to the cache kmalloc-128 of size 128 [ 30.731715] The buggy address is located 0 bytes inside of [ 30.731715] allocated 120-byte region [ffff8881029a4b00, ffff8881029a4b78) [ 30.733145] [ 30.733389] The buggy address belongs to the physical page: [ 30.733819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 30.734737] flags: 0x200000000000000(node=0|zone=2) [ 30.735259] page_type: f5(slab) [ 30.735527] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.736498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.737426] page dumped because: kasan: bad access detected [ 30.737966] [ 30.738248] Memory state around the buggy address: [ 30.738737] ffff8881029a4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.739509] ffff8881029a4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.740042] >ffff8881029a4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.740814] ^ [ 30.741399] ffff8881029a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.742001] ffff8881029a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.742828] ==================================================================