Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.870548] ================================================================== [ 36.872284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 36.873233] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.874308] [ 36.874651] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.876589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.877145] Hardware name: linux,dummy-virt (DT) [ 36.877685] Call trace: [ 36.878193] show_stack+0x20/0x38 (C) [ 36.878785] dump_stack_lvl+0x8c/0xd0 [ 36.879486] print_report+0x118/0x5e0 [ 36.880100] kasan_report+0xc8/0x118 [ 36.880756] kasan_check_range+0x100/0x1a8 [ 36.881700] __kasan_check_write+0x20/0x30 [ 36.882301] copy_user_test_oob+0x234/0xec0 [ 36.882922] kunit_try_run_case+0x14c/0x3d0 [ 36.883795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.884708] kthread+0x24c/0x2d0 [ 36.885301] ret_from_fork+0x10/0x20 [ 36.885869] [ 36.886230] Allocated by task 274: [ 36.886776] kasan_save_stack+0x3c/0x68 [ 36.887701] kasan_save_track+0x20/0x40 [ 36.888291] kasan_save_alloc_info+0x40/0x58 [ 36.888964] __kasan_kmalloc+0xd4/0xd8 [ 36.889536] __kmalloc_noprof+0x188/0x4c8 [ 36.890213] kunit_kmalloc_array+0x34/0x88 [ 36.890892] copy_user_test_oob+0xac/0xec0 [ 36.892057] kunit_try_run_case+0x14c/0x3d0 [ 36.892675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.893671] kthread+0x24c/0x2d0 [ 36.894266] ret_from_fork+0x10/0x20 [ 36.894768] [ 36.895163] The buggy address belongs to the object at fff00000c669bf00 [ 36.895163] which belongs to the cache kmalloc-128 of size 128 [ 36.896672] The buggy address is located 0 bytes inside of [ 36.896672] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.898339] [ 36.898538] The buggy address belongs to the physical page: [ 36.898896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.899589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.900537] page_type: f5(slab) [ 36.901079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.902011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.903055] page dumped because: kasan: bad access detected [ 36.904043] [ 36.904358] Memory state around the buggy address: [ 36.904927] fff00000c669be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.905893] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.906723] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.907989] ^ [ 36.908829] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909665] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.910596] ================================================================== [ 36.918104] ================================================================== [ 36.918896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 36.919922] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.921844] [ 36.922579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.924717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.925260] Hardware name: linux,dummy-virt (DT) [ 36.925902] Call trace: [ 36.926357] show_stack+0x20/0x38 (C) [ 36.926972] dump_stack_lvl+0x8c/0xd0 [ 36.927421] print_report+0x118/0x5e0 [ 36.928416] kasan_report+0xc8/0x118 [ 36.928978] kasan_check_range+0x100/0x1a8 [ 36.929648] __kasan_check_read+0x20/0x30 [ 36.930272] copy_user_test_oob+0x728/0xec0 [ 36.930909] kunit_try_run_case+0x14c/0x3d0 [ 36.931805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.932626] kthread+0x24c/0x2d0 [ 36.933165] ret_from_fork+0x10/0x20 [ 36.933725] [ 36.934104] Allocated by task 274: [ 36.934697] kasan_save_stack+0x3c/0x68 [ 36.935198] kasan_save_track+0x20/0x40 [ 36.935925] kasan_save_alloc_info+0x40/0x58 [ 36.936501] __kasan_kmalloc+0xd4/0xd8 [ 36.937108] __kmalloc_noprof+0x188/0x4c8 [ 36.937711] kunit_kmalloc_array+0x34/0x88 [ 36.938585] copy_user_test_oob+0xac/0xec0 [ 36.939665] kunit_try_run_case+0x14c/0x3d0 [ 36.940426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.941156] kthread+0x24c/0x2d0 [ 36.941600] ret_from_fork+0x10/0x20 [ 36.942253] [ 36.942572] The buggy address belongs to the object at fff00000c669bf00 [ 36.942572] which belongs to the cache kmalloc-128 of size 128 [ 36.944262] The buggy address is located 0 bytes inside of [ 36.944262] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.945691] [ 36.946052] The buggy address belongs to the physical page: [ 36.946691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.948320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.949002] page_type: f5(slab) [ 36.949361] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.950225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.951431] page dumped because: kasan: bad access detected [ 36.952241] [ 36.952487] Memory state around the buggy address: [ 36.953260] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.954181] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.954995] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.956462] ^ [ 36.957682] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.958629] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.959595] ================================================================== [ 37.010658] ================================================================== [ 37.011633] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 37.012527] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.013790] [ 37.014253] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.015762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.016476] Hardware name: linux,dummy-virt (DT) [ 37.017544] Call trace: [ 37.018056] show_stack+0x20/0x38 (C) [ 37.018742] dump_stack_lvl+0x8c/0xd0 [ 37.019728] print_report+0x118/0x5e0 [ 37.020340] kasan_report+0xc8/0x118 [ 37.021048] kasan_check_range+0x100/0x1a8 [ 37.021808] __kasan_check_read+0x20/0x30 [ 37.022511] copy_user_test_oob+0x3c8/0xec0 [ 37.023208] kunit_try_run_case+0x14c/0x3d0 [ 37.023973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024801] kthread+0x24c/0x2d0 [ 37.025419] ret_from_fork+0x10/0x20 [ 37.026050] [ 37.026412] Allocated by task 274: [ 37.027052] kasan_save_stack+0x3c/0x68 [ 37.028026] kasan_save_track+0x20/0x40 [ 37.028687] kasan_save_alloc_info+0x40/0x58 [ 37.029381] __kasan_kmalloc+0xd4/0xd8 [ 37.029917] __kmalloc_noprof+0x188/0x4c8 [ 37.030726] kunit_kmalloc_array+0x34/0x88 [ 37.031350] copy_user_test_oob+0xac/0xec0 [ 37.032002] kunit_try_run_case+0x14c/0x3d0 [ 37.032678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.033441] kthread+0x24c/0x2d0 [ 37.034079] ret_from_fork+0x10/0x20 [ 37.034808] [ 37.035308] The buggy address belongs to the object at fff00000c669bf00 [ 37.035308] which belongs to the cache kmalloc-128 of size 128 [ 37.037253] The buggy address is located 0 bytes inside of [ 37.037253] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.039215] [ 37.039582] The buggy address belongs to the physical page: [ 37.040489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.041679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.042596] page_type: f5(slab) [ 37.043154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.044332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.045284] page dumped because: kasan: bad access detected [ 37.046043] [ 37.046555] Memory state around the buggy address: [ 37.047225] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.049178] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.050619] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.051899] ^ [ 37.052354] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.052767] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.054054] ================================================================== [ 37.098307] ================================================================== [ 37.099059] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 37.100808] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.101687] [ 37.102053] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.103614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.104474] Hardware name: linux,dummy-virt (DT) [ 37.105030] Call trace: [ 37.105475] show_stack+0x20/0x38 (C) [ 37.106032] dump_stack_lvl+0x8c/0xd0 [ 37.106666] print_report+0x118/0x5e0 [ 37.107412] kasan_report+0xc8/0x118 [ 37.108062] kasan_check_range+0x100/0x1a8 [ 37.108720] __kasan_check_read+0x20/0x30 [ 37.109358] copy_user_test_oob+0x4a0/0xec0 [ 37.110003] kunit_try_run_case+0x14c/0x3d0 [ 37.110651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.111686] kthread+0x24c/0x2d0 [ 37.112204] ret_from_fork+0x10/0x20 [ 37.112856] [ 37.113253] Allocated by task 274: [ 37.113697] kasan_save_stack+0x3c/0x68 [ 37.114315] kasan_save_track+0x20/0x40 [ 37.115034] kasan_save_alloc_info+0x40/0x58 [ 37.115728] __kasan_kmalloc+0xd4/0xd8 [ 37.116058] __kmalloc_noprof+0x188/0x4c8 [ 37.116349] kunit_kmalloc_array+0x34/0x88 [ 37.116643] copy_user_test_oob+0xac/0xec0 [ 37.117064] kunit_try_run_case+0x14c/0x3d0 [ 37.117901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.118954] kthread+0x24c/0x2d0 [ 37.119782] ret_from_fork+0x10/0x20 [ 37.120938] [ 37.121209] The buggy address belongs to the object at fff00000c669bf00 [ 37.121209] which belongs to the cache kmalloc-128 of size 128 [ 37.122834] The buggy address is located 0 bytes inside of [ 37.122834] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.124972] [ 37.125306] The buggy address belongs to the physical page: [ 37.126281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.127498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.128635] page_type: f5(slab) [ 37.129485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.130601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.131851] page dumped because: kasan: bad access detected [ 37.132870] [ 37.133237] Memory state around the buggy address: [ 37.134128] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.135153] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.136269] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.137087] ^ [ 37.137779] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.139071] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.140644] ================================================================== [ 37.055830] ================================================================== [ 37.056488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 37.057114] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.058036] [ 37.058393] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.059516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.060145] Hardware name: linux,dummy-virt (DT) [ 37.061591] Call trace: [ 37.062115] show_stack+0x20/0x38 (C) [ 37.062996] dump_stack_lvl+0x8c/0xd0 [ 37.064091] print_report+0x118/0x5e0 [ 37.064919] kasan_report+0xc8/0x118 [ 37.065487] kasan_check_range+0x100/0x1a8 [ 37.066220] __kasan_check_write+0x20/0x30 [ 37.066835] copy_user_test_oob+0x434/0xec0 [ 37.067822] kunit_try_run_case+0x14c/0x3d0 [ 37.068434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.069228] kthread+0x24c/0x2d0 [ 37.069806] ret_from_fork+0x10/0x20 [ 37.070442] [ 37.070771] Allocated by task 274: [ 37.071548] kasan_save_stack+0x3c/0x68 [ 37.072192] kasan_save_track+0x20/0x40 [ 37.072644] kasan_save_alloc_info+0x40/0x58 [ 37.073362] __kasan_kmalloc+0xd4/0xd8 [ 37.073862] __kmalloc_noprof+0x188/0x4c8 [ 37.074452] kunit_kmalloc_array+0x34/0x88 [ 37.075254] copy_user_test_oob+0xac/0xec0 [ 37.075911] kunit_try_run_case+0x14c/0x3d0 [ 37.076684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.077421] kthread+0x24c/0x2d0 [ 37.077947] ret_from_fork+0x10/0x20 [ 37.078681] [ 37.079029] The buggy address belongs to the object at fff00000c669bf00 [ 37.079029] which belongs to the cache kmalloc-128 of size 128 [ 37.081635] The buggy address is located 0 bytes inside of [ 37.081635] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.083121] [ 37.083472] The buggy address belongs to the physical page: [ 37.084550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.085632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.086540] page_type: f5(slab) [ 37.087513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.088413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.089550] page dumped because: kasan: bad access detected [ 37.090235] [ 37.090605] Memory state around the buggy address: [ 37.091615] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.092483] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.093176] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.094135] ^ [ 37.095006] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.096046] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.096990] ================================================================== [ 36.967911] ================================================================== [ 36.968663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 36.969473] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.970269] [ 36.970671] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.972167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.972749] Hardware name: linux,dummy-virt (DT) [ 36.973296] Call trace: [ 36.973774] show_stack+0x20/0x38 (C) [ 36.974439] dump_stack_lvl+0x8c/0xd0 [ 36.975143] print_report+0x118/0x5e0 [ 36.975947] kasan_report+0xc8/0x118 [ 36.976502] kasan_check_range+0x100/0x1a8 [ 36.977137] __kasan_check_write+0x20/0x30 [ 36.977995] copy_user_test_oob+0x35c/0xec0 [ 36.978628] kunit_try_run_case+0x14c/0x3d0 [ 36.979275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.980236] kthread+0x24c/0x2d0 [ 36.980930] ret_from_fork+0x10/0x20 [ 36.981539] [ 36.981825] Allocated by task 274: [ 36.982478] kasan_save_stack+0x3c/0x68 [ 36.983222] kasan_save_track+0x20/0x40 [ 36.983994] kasan_save_alloc_info+0x40/0x58 [ 36.984981] __kasan_kmalloc+0xd4/0xd8 [ 36.985678] __kmalloc_noprof+0x188/0x4c8 [ 36.986493] kunit_kmalloc_array+0x34/0x88 [ 36.987085] copy_user_test_oob+0xac/0xec0 [ 36.987851] kunit_try_run_case+0x14c/0x3d0 [ 36.988773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.990064] kthread+0x24c/0x2d0 [ 36.991272] ret_from_fork+0x10/0x20 [ 36.992262] [ 36.992539] The buggy address belongs to the object at fff00000c669bf00 [ 36.992539] which belongs to the cache kmalloc-128 of size 128 [ 36.994217] The buggy address is located 0 bytes inside of [ 36.994217] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.995821] [ 36.996282] The buggy address belongs to the physical page: [ 36.997002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.998078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.999027] page_type: f5(slab) [ 36.999634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.000663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.001618] page dumped because: kasan: bad access detected [ 37.002401] [ 37.002736] Memory state around the buggy address: [ 37.003523] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.004469] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.005435] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.006355] ^ [ 37.007368] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.008452] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.009511] ==================================================================
[ 35.351293] ================================================================== [ 35.351913] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 35.352502] Write of size 121 at addr ffff888101ac8600 by task kunit_try_catch/292 [ 35.353379] [ 35.353643] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.354937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.355742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.356960] Call Trace: [ 35.357384] <TASK> [ 35.357961] dump_stack_lvl+0x73/0xb0 [ 35.358241] print_report+0xd1/0x640 [ 35.359180] ? __virt_addr_valid+0x1db/0x2d0 [ 35.359701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.360306] kasan_report+0x102/0x140 [ 35.360498] ? copy_user_test_oob+0x558/0x10f0 [ 35.360750] ? copy_user_test_oob+0x558/0x10f0 [ 35.361402] kasan_check_range+0x10c/0x1c0 [ 35.362430] __kasan_check_write+0x18/0x20 [ 35.362749] copy_user_test_oob+0x558/0x10f0 [ 35.363219] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.364047] ? finish_task_switch.isra.0+0x153/0x700 [ 35.364655] ? __switch_to+0x5d9/0xf60 [ 35.365185] ? irqentry_exit+0x2a/0x60 [ 35.365587] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 35.366134] ? trace_hardirqs_on+0x37/0xe0 [ 35.366574] ? __pfx_read_tsc+0x10/0x10 [ 35.367181] ? ktime_get_ts64+0x86/0x230 [ 35.367758] kunit_try_run_case+0x1b3/0x490 [ 35.368364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.369302] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.369836] ? __kthread_parkme+0x82/0x160 [ 35.370204] ? preempt_count_sub+0x50/0x80 [ 35.370567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.371062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.371512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.372230] kthread+0x257/0x310 [ 35.372547] ? __pfx_kthread+0x10/0x10 [ 35.373092] ret_from_fork+0x41/0x80 [ 35.373429] ? __pfx_kthread+0x10/0x10 [ 35.373801] ret_from_fork_asm+0x1a/0x30 [ 35.374327] </TASK> [ 35.374659] [ 35.374933] Allocated by task 292: [ 35.375262] kasan_save_stack+0x3d/0x60 [ 35.375742] kasan_save_track+0x18/0x40 [ 35.376121] kasan_save_alloc_info+0x3b/0x50 [ 35.376576] __kasan_kmalloc+0xb7/0xc0 [ 35.377094] __kmalloc_noprof+0x1c4/0x500 [ 35.377386] kunit_kmalloc_array+0x25/0x60 [ 35.377946] copy_user_test_oob+0xac/0x10f0 [ 35.378482] kunit_try_run_case+0x1b3/0x490 [ 35.378948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.379407] kthread+0x257/0x310 [ 35.379708] ret_from_fork+0x41/0x80 [ 35.380242] ret_from_fork_asm+0x1a/0x30 [ 35.380727] [ 35.380965] The buggy address belongs to the object at ffff888101ac8600 [ 35.380965] which belongs to the cache kmalloc-128 of size 128 [ 35.382120] The buggy address is located 0 bytes inside of [ 35.382120] allocated 120-byte region [ffff888101ac8600, ffff888101ac8678) [ 35.383033] [ 35.383292] The buggy address belongs to the physical page: [ 35.383872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac8 [ 35.384635] flags: 0x200000000000000(node=0|zone=2) [ 35.385161] page_type: f5(slab) [ 35.385486] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.386294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.387078] page dumped because: kasan: bad access detected [ 35.387497] [ 35.387822] Memory state around the buggy address: [ 35.388314] ffff888101ac8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.388799] ffff888101ac8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.389550] >ffff888101ac8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.390040] ^ [ 35.390840] ffff888101ac8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.391447] ffff888101ac8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.391998] ================================================================== [ 35.297396] ================================================================== [ 35.298757] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 35.299768] Read of size 121 at addr ffff888101ac8600 by task kunit_try_catch/292 [ 35.301430] [ 35.301797] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.303013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.303539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.304498] Call Trace: [ 35.305429] <TASK> [ 35.305671] dump_stack_lvl+0x73/0xb0 [ 35.306436] print_report+0xd1/0x640 [ 35.307016] ? __virt_addr_valid+0x1db/0x2d0 [ 35.307469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.308530] kasan_report+0x102/0x140 [ 35.309239] ? copy_user_test_oob+0x4ab/0x10f0 [ 35.309697] ? copy_user_test_oob+0x4ab/0x10f0 [ 35.310636] kasan_check_range+0x10c/0x1c0 [ 35.311235] __kasan_check_read+0x15/0x20 [ 35.311831] copy_user_test_oob+0x4ab/0x10f0 [ 35.312319] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.312815] ? finish_task_switch.isra.0+0x153/0x700 [ 35.314044] ? __switch_to+0x5d9/0xf60 [ 35.314392] ? irqentry_exit+0x2a/0x60 [ 35.315033] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 35.315533] ? trace_hardirqs_on+0x37/0xe0 [ 35.316272] ? __pfx_read_tsc+0x10/0x10 [ 35.316966] ? ktime_get_ts64+0x86/0x230 [ 35.317354] kunit_try_run_case+0x1b3/0x490 [ 35.318177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.318643] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.319655] ? __kthread_parkme+0x82/0x160 [ 35.320382] ? preempt_count_sub+0x50/0x80 [ 35.321154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.321609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.322537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.323285] kthread+0x257/0x310 [ 35.323725] ? __pfx_kthread+0x10/0x10 [ 35.324472] ret_from_fork+0x41/0x80 [ 35.325141] ? __pfx_kthread+0x10/0x10 [ 35.325487] ret_from_fork_asm+0x1a/0x30 [ 35.326308] </TASK> [ 35.326534] [ 35.326705] Allocated by task 292: [ 35.327224] kasan_save_stack+0x3d/0x60 [ 35.328113] kasan_save_track+0x18/0x40 [ 35.328469] kasan_save_alloc_info+0x3b/0x50 [ 35.329473] __kasan_kmalloc+0xb7/0xc0 [ 35.329895] __kmalloc_noprof+0x1c4/0x500 [ 35.330361] kunit_kmalloc_array+0x25/0x60 [ 35.331135] copy_user_test_oob+0xac/0x10f0 [ 35.331614] kunit_try_run_case+0x1b3/0x490 [ 35.332514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.333285] kthread+0x257/0x310 [ 35.333560] ret_from_fork+0x41/0x80 [ 35.334374] ret_from_fork_asm+0x1a/0x30 [ 35.334775] [ 35.335109] The buggy address belongs to the object at ffff888101ac8600 [ 35.335109] which belongs to the cache kmalloc-128 of size 128 [ 35.336745] The buggy address is located 0 bytes inside of [ 35.336745] allocated 120-byte region [ffff888101ac8600, ffff888101ac8678) [ 35.338136] [ 35.338631] The buggy address belongs to the physical page: [ 35.339268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac8 [ 35.340421] flags: 0x200000000000000(node=0|zone=2) [ 35.341191] page_type: f5(slab) [ 35.341663] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.342737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.343627] page dumped because: kasan: bad access detected [ 35.344404] [ 35.344989] Memory state around the buggy address: [ 35.345490] ffff888101ac8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.346381] ffff888101ac8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.347080] >ffff888101ac8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.347359] ^ [ 35.347633] ffff888101ac8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.348819] ffff888101ac8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349701] ================================================================== [ 35.393235] ================================================================== [ 35.393848] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 35.394592] Read of size 121 at addr ffff888101ac8600 by task kunit_try_catch/292 [ 35.395137] [ 35.395319] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.396327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.396741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.397275] Call Trace: [ 35.397494] <TASK> [ 35.397841] dump_stack_lvl+0x73/0xb0 [ 35.398328] print_report+0xd1/0x640 [ 35.398884] ? __virt_addr_valid+0x1db/0x2d0 [ 35.399442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.400029] kasan_report+0x102/0x140 [ 35.400369] ? copy_user_test_oob+0x605/0x10f0 [ 35.400718] ? copy_user_test_oob+0x605/0x10f0 [ 35.401315] kasan_check_range+0x10c/0x1c0 [ 35.401898] __kasan_check_read+0x15/0x20 [ 35.402345] copy_user_test_oob+0x605/0x10f0 [ 35.402827] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.403218] ? finish_task_switch.isra.0+0x153/0x700 [ 35.403651] ? __switch_to+0x5d9/0xf60 [ 35.404202] ? irqentry_exit+0x2a/0x60 [ 35.404657] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 35.405205] ? trace_hardirqs_on+0x37/0xe0 [ 35.405613] ? __pfx_read_tsc+0x10/0x10 [ 35.405977] ? ktime_get_ts64+0x86/0x230 [ 35.406282] kunit_try_run_case+0x1b3/0x490 [ 35.406915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.407454] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.407873] ? __kthread_parkme+0x82/0x160 [ 35.408195] ? preempt_count_sub+0x50/0x80 [ 35.408717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.409319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.410198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.410977] kthread+0x257/0x310 [ 35.411268] ? __pfx_kthread+0x10/0x10 [ 35.412225] ret_from_fork+0x41/0x80 [ 35.413122] ? __pfx_kthread+0x10/0x10 [ 35.413637] ret_from_fork_asm+0x1a/0x30 [ 35.414164] </TASK> [ 35.414448] [ 35.414735] Allocated by task 292: [ 35.415118] kasan_save_stack+0x3d/0x60 [ 35.415473] kasan_save_track+0x18/0x40 [ 35.415958] kasan_save_alloc_info+0x3b/0x50 [ 35.416270] __kasan_kmalloc+0xb7/0xc0 [ 35.416552] __kmalloc_noprof+0x1c4/0x500 [ 35.417147] kunit_kmalloc_array+0x25/0x60 [ 35.417716] copy_user_test_oob+0xac/0x10f0 [ 35.418374] kunit_try_run_case+0x1b3/0x490 [ 35.418888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.419287] kthread+0x257/0x310 [ 35.419550] ret_from_fork+0x41/0x80 [ 35.420125] ret_from_fork_asm+0x1a/0x30 [ 35.420725] [ 35.421059] The buggy address belongs to the object at ffff888101ac8600 [ 35.421059] which belongs to the cache kmalloc-128 of size 128 [ 35.422160] The buggy address is located 0 bytes inside of [ 35.422160] allocated 120-byte region [ffff888101ac8600, ffff888101ac8678) [ 35.423614] [ 35.423904] The buggy address belongs to the physical page: [ 35.424248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac8 [ 35.425249] flags: 0x200000000000000(node=0|zone=2) [ 35.425845] page_type: f5(slab) [ 35.426259] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.426857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.427731] page dumped because: kasan: bad access detected [ 35.428165] [ 35.428398] Memory state around the buggy address: [ 35.429049] ffff888101ac8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.429744] ffff888101ac8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.430525] >ffff888101ac8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.431207] ^ [ 35.431949] ffff888101ac8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.432598] ffff888101ac8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.433367] ================================================================== [ 35.252882] ================================================================== [ 35.253501] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 35.254347] Write of size 121 at addr ffff888101ac8600 by task kunit_try_catch/292 [ 35.255514] [ 35.255875] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.257109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.257656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.258495] Call Trace: [ 35.259191] <TASK> [ 35.259865] dump_stack_lvl+0x73/0xb0 [ 35.260236] print_report+0xd1/0x640 [ 35.260997] ? __virt_addr_valid+0x1db/0x2d0 [ 35.261461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.262594] kasan_report+0x102/0x140 [ 35.263000] ? copy_user_test_oob+0x3fe/0x10f0 [ 35.263577] ? copy_user_test_oob+0x3fe/0x10f0 [ 35.264345] kasan_check_range+0x10c/0x1c0 [ 35.265131] __kasan_check_write+0x18/0x20 [ 35.265555] copy_user_test_oob+0x3fe/0x10f0 [ 35.266234] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.266830] ? finish_task_switch.isra.0+0x153/0x700 [ 35.267612] ? __switch_to+0x5d9/0xf60 [ 35.268212] ? irqentry_exit+0x2a/0x60 [ 35.268597] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 35.269166] ? trace_hardirqs_on+0x37/0xe0 [ 35.269576] ? __pfx_read_tsc+0x10/0x10 [ 35.270006] ? ktime_get_ts64+0x86/0x230 [ 35.270496] kunit_try_run_case+0x1b3/0x490 [ 35.270858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.271410] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.271992] ? __kthread_parkme+0x82/0x160 [ 35.272298] ? preempt_count_sub+0x50/0x80 [ 35.272891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.273466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.274042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.274567] kthread+0x257/0x310 [ 35.274924] ? __pfx_kthread+0x10/0x10 [ 35.275392] ret_from_fork+0x41/0x80 [ 35.275714] ? __pfx_kthread+0x10/0x10 [ 35.276234] ret_from_fork_asm+0x1a/0x30 [ 35.276808] </TASK> [ 35.277138] [ 35.277329] Allocated by task 292: [ 35.277581] kasan_save_stack+0x3d/0x60 [ 35.278166] kasan_save_track+0x18/0x40 [ 35.278573] kasan_save_alloc_info+0x3b/0x50 [ 35.279170] __kasan_kmalloc+0xb7/0xc0 [ 35.279458] __kmalloc_noprof+0x1c4/0x500 [ 35.280103] kunit_kmalloc_array+0x25/0x60 [ 35.280450] copy_user_test_oob+0xac/0x10f0 [ 35.280818] kunit_try_run_case+0x1b3/0x490 [ 35.281314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.282008] kthread+0x257/0x310 [ 35.282361] ret_from_fork+0x41/0x80 [ 35.282666] ret_from_fork_asm+0x1a/0x30 [ 35.283141] [ 35.283401] The buggy address belongs to the object at ffff888101ac8600 [ 35.283401] which belongs to the cache kmalloc-128 of size 128 [ 35.284477] The buggy address is located 0 bytes inside of [ 35.284477] allocated 120-byte region [ffff888101ac8600, ffff888101ac8678) [ 35.285468] [ 35.285653] The buggy address belongs to the physical page: [ 35.286070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac8 [ 35.287028] flags: 0x200000000000000(node=0|zone=2) [ 35.287472] page_type: f5(slab) [ 35.287828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.288598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.289286] page dumped because: kasan: bad access detected [ 35.289928] [ 35.290181] Memory state around the buggy address: [ 35.290548] ffff888101ac8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.292155] ffff888101ac8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.293036] >ffff888101ac8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.293814] ^ [ 35.294493] ffff888101ac8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.295196] ffff888101ac8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.295805] ==================================================================