Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.464382] ================================================================== [ 30.465815] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 30.466620] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.467484] [ 30.468180] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.469376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.470059] Hardware name: linux,dummy-virt (DT) [ 30.470687] Call trace: [ 30.471330] show_stack+0x20/0x38 (C) [ 30.471939] dump_stack_lvl+0x8c/0xd0 [ 30.472626] print_report+0x118/0x5e0 [ 30.473244] kasan_report+0xc8/0x118 [ 30.473902] kasan_check_range+0x100/0x1a8 [ 30.474527] __kasan_check_write+0x20/0x30 [ 30.475374] copy_user_test_oob+0x234/0xec0 [ 30.476057] kunit_try_run_case+0x14c/0x3d0 [ 30.476688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477461] kthread+0x24c/0x2d0 [ 30.478001] ret_from_fork+0x10/0x20 [ 30.478644] [ 30.479398] Allocated by task 273: [ 30.479933] kasan_save_stack+0x3c/0x68 [ 30.480399] kasan_save_track+0x20/0x40 [ 30.481022] kasan_save_alloc_info+0x40/0x58 [ 30.481617] __kasan_kmalloc+0xd4/0xd8 [ 30.482137] __kmalloc_noprof+0x188/0x4c8 [ 30.482764] kunit_kmalloc_array+0x34/0x88 [ 30.483313] copy_user_test_oob+0xac/0xec0 [ 30.483950] kunit_try_run_case+0x14c/0x3d0 [ 30.484741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485425] kthread+0x24c/0x2d0 [ 30.486279] ret_from_fork+0x10/0x20 [ 30.486832] [ 30.487125] The buggy address belongs to the object at fff00000c1313100 [ 30.487125] which belongs to the cache kmalloc-128 of size 128 [ 30.488940] The buggy address is located 0 bytes inside of [ 30.488940] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.490129] [ 30.490448] The buggy address belongs to the physical page: [ 30.491134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.492206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.492899] page_type: f5(slab) [ 30.493479] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.494489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.495487] page dumped because: kasan: bad access detected [ 30.496207] [ 30.496599] Memory state around the buggy address: [ 30.497189] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.497961] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.498748] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.500190] ^ [ 30.500883] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.501848] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.502778] ================================================================== [ 30.552819] ================================================================== [ 30.553454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 30.554130] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.554882] [ 30.555540] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.557022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.557648] Hardware name: linux,dummy-virt (DT) [ 30.558396] Call trace: [ 30.558798] show_stack+0x20/0x38 (C) [ 30.559578] dump_stack_lvl+0x8c/0xd0 [ 30.560145] print_report+0x118/0x5e0 [ 30.560743] kasan_report+0xc8/0x118 [ 30.561302] kasan_check_range+0x100/0x1a8 [ 30.561895] __kasan_check_write+0x20/0x30 [ 30.562522] copy_user_test_oob+0x35c/0xec0 [ 30.563283] kunit_try_run_case+0x14c/0x3d0 [ 30.563857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.564787] kthread+0x24c/0x2d0 [ 30.565180] ret_from_fork+0x10/0x20 [ 30.565851] [ 30.566237] Allocated by task 273: [ 30.566664] kasan_save_stack+0x3c/0x68 [ 30.567774] kasan_save_track+0x20/0x40 [ 30.568459] kasan_save_alloc_info+0x40/0x58 [ 30.569257] __kasan_kmalloc+0xd4/0xd8 [ 30.569900] __kmalloc_noprof+0x188/0x4c8 [ 30.570415] kunit_kmalloc_array+0x34/0x88 [ 30.571111] copy_user_test_oob+0xac/0xec0 [ 30.571574] kunit_try_run_case+0x14c/0x3d0 [ 30.572030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.572354] kthread+0x24c/0x2d0 [ 30.572565] ret_from_fork+0x10/0x20 [ 30.572981] [ 30.573260] The buggy address belongs to the object at fff00000c1313100 [ 30.573260] which belongs to the cache kmalloc-128 of size 128 [ 30.574251] The buggy address is located 0 bytes inside of [ 30.574251] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.576212] [ 30.576639] The buggy address belongs to the physical page: [ 30.577365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.578392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.579090] page_type: f5(slab) [ 30.579518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.580366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.581177] page dumped because: kasan: bad access detected [ 30.581909] [ 30.582269] Memory state around the buggy address: [ 30.583262] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.584256] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.584996] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.585760] ^ [ 30.586535] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.587937] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.588813] ================================================================== [ 30.590604] ================================================================== [ 30.591254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 30.592516] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.593793] [ 30.594260] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.595656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.596397] Hardware name: linux,dummy-virt (DT) [ 30.597018] Call trace: [ 30.597508] show_stack+0x20/0x38 (C) [ 30.598066] dump_stack_lvl+0x8c/0xd0 [ 30.598551] print_report+0x118/0x5e0 [ 30.599026] kasan_report+0xc8/0x118 [ 30.599526] kasan_check_range+0x100/0x1a8 [ 30.600321] __kasan_check_read+0x20/0x30 [ 30.601279] copy_user_test_oob+0x3c8/0xec0 [ 30.602042] kunit_try_run_case+0x14c/0x3d0 [ 30.602743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.603642] kthread+0x24c/0x2d0 [ 30.604281] ret_from_fork+0x10/0x20 [ 30.604912] [ 30.605233] Allocated by task 273: [ 30.605681] kasan_save_stack+0x3c/0x68 [ 30.606175] kasan_save_track+0x20/0x40 [ 30.606649] kasan_save_alloc_info+0x40/0x58 [ 30.607238] __kasan_kmalloc+0xd4/0xd8 [ 30.607884] __kmalloc_noprof+0x188/0x4c8 [ 30.608898] kunit_kmalloc_array+0x34/0x88 [ 30.609595] copy_user_test_oob+0xac/0xec0 [ 30.610281] kunit_try_run_case+0x14c/0x3d0 [ 30.611438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.612452] kthread+0x24c/0x2d0 [ 30.612946] ret_from_fork+0x10/0x20 [ 30.613640] [ 30.614047] The buggy address belongs to the object at fff00000c1313100 [ 30.614047] which belongs to the cache kmalloc-128 of size 128 [ 30.615559] The buggy address is located 0 bytes inside of [ 30.615559] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.617008] [ 30.617342] The buggy address belongs to the physical page: [ 30.617988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.618847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.619629] page_type: f5(slab) [ 30.620112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.620999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.621880] page dumped because: kasan: bad access detected [ 30.622464] [ 30.622812] Memory state around the buggy address: [ 30.623499] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.624395] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.625202] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.626060] ^ [ 30.626783] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.628010] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.628922] ================================================================== [ 30.668250] ================================================================== [ 30.668903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 30.670459] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.671390] [ 30.672474] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.673434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.673983] Hardware name: linux,dummy-virt (DT) [ 30.674565] Call trace: [ 30.675109] show_stack+0x20/0x38 (C) [ 30.675792] dump_stack_lvl+0x8c/0xd0 [ 30.676368] print_report+0x118/0x5e0 [ 30.677038] kasan_report+0xc8/0x118 [ 30.677677] kasan_check_range+0x100/0x1a8 [ 30.678319] __kasan_check_read+0x20/0x30 [ 30.679014] copy_user_test_oob+0x4a0/0xec0 [ 30.679788] kunit_try_run_case+0x14c/0x3d0 [ 30.680395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.681155] kthread+0x24c/0x2d0 [ 30.681649] ret_from_fork+0x10/0x20 [ 30.682199] [ 30.682506] Allocated by task 273: [ 30.683049] kasan_save_stack+0x3c/0x68 [ 30.683868] kasan_save_track+0x20/0x40 [ 30.684361] kasan_save_alloc_info+0x40/0x58 [ 30.684993] __kasan_kmalloc+0xd4/0xd8 [ 30.685506] __kmalloc_noprof+0x188/0x4c8 [ 30.686064] kunit_kmalloc_array+0x34/0x88 [ 30.686601] copy_user_test_oob+0xac/0xec0 [ 30.687234] kunit_try_run_case+0x14c/0x3d0 [ 30.688231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.688906] kthread+0x24c/0x2d0 [ 30.689456] ret_from_fork+0x10/0x20 [ 30.690024] [ 30.690354] The buggy address belongs to the object at fff00000c1313100 [ 30.690354] which belongs to the cache kmalloc-128 of size 128 [ 30.692535] The buggy address is located 0 bytes inside of [ 30.692535] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.693757] [ 30.694065] The buggy address belongs to the physical page: [ 30.694674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.695859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.696823] page_type: f5(slab) [ 30.697297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.698256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.699163] page dumped because: kasan: bad access detected [ 30.699794] [ 30.700144] Memory state around the buggy address: [ 30.700696] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.701794] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.702605] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.703597] ^ [ 30.704253] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.705016] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.705833] ================================================================== [ 30.629967] ================================================================== [ 30.630732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 30.632479] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.633589] [ 30.634038] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.635382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.636126] Hardware name: linux,dummy-virt (DT) [ 30.636375] Call trace: [ 30.636544] show_stack+0x20/0x38 (C) [ 30.636904] dump_stack_lvl+0x8c/0xd0 [ 30.637567] print_report+0x118/0x5e0 [ 30.638248] kasan_report+0xc8/0x118 [ 30.638735] kasan_check_range+0x100/0x1a8 [ 30.639374] __kasan_check_write+0x20/0x30 [ 30.640413] copy_user_test_oob+0x434/0xec0 [ 30.641120] kunit_try_run_case+0x14c/0x3d0 [ 30.641773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.642448] kthread+0x24c/0x2d0 [ 30.643084] ret_from_fork+0x10/0x20 [ 30.643792] [ 30.644120] Allocated by task 273: [ 30.644660] kasan_save_stack+0x3c/0x68 [ 30.645257] kasan_save_track+0x20/0x40 [ 30.645861] kasan_save_alloc_info+0x40/0x58 [ 30.646439] __kasan_kmalloc+0xd4/0xd8 [ 30.647039] __kmalloc_noprof+0x188/0x4c8 [ 30.647798] kunit_kmalloc_array+0x34/0x88 [ 30.648285] copy_user_test_oob+0xac/0xec0 [ 30.648940] kunit_try_run_case+0x14c/0x3d0 [ 30.649509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.650136] kthread+0x24c/0x2d0 [ 30.650672] ret_from_fork+0x10/0x20 [ 30.651680] [ 30.651944] The buggy address belongs to the object at fff00000c1313100 [ 30.651944] which belongs to the cache kmalloc-128 of size 128 [ 30.653014] The buggy address is located 0 bytes inside of [ 30.653014] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.654392] [ 30.654778] The buggy address belongs to the physical page: [ 30.655766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.656744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.657465] page_type: f5(slab) [ 30.657932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.658822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.659864] page dumped because: kasan: bad access detected [ 30.660560] [ 30.660915] Memory state around the buggy address: [ 30.661473] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.662262] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663225] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.664225] ^ [ 30.664892] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.665664] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666472] ================================================================== [ 30.509025] ================================================================== [ 30.509721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 30.510463] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.511657] [ 30.512066] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.513346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.513975] Hardware name: linux,dummy-virt (DT) [ 30.514601] Call trace: [ 30.515240] show_stack+0x20/0x38 (C) [ 30.515903] dump_stack_lvl+0x8c/0xd0 [ 30.516480] print_report+0x118/0x5e0 [ 30.517154] kasan_report+0xc8/0x118 [ 30.517829] kasan_check_range+0x100/0x1a8 [ 30.518474] __kasan_check_read+0x20/0x30 [ 30.519272] copy_user_test_oob+0x728/0xec0 [ 30.519881] kunit_try_run_case+0x14c/0x3d0 [ 30.520489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.521243] kthread+0x24c/0x2d0 [ 30.521851] ret_from_fork+0x10/0x20 [ 30.522448] [ 30.522806] Allocated by task 273: [ 30.523537] kasan_save_stack+0x3c/0x68 [ 30.524128] kasan_save_track+0x20/0x40 [ 30.524765] kasan_save_alloc_info+0x40/0x58 [ 30.525452] __kasan_kmalloc+0xd4/0xd8 [ 30.526058] __kmalloc_noprof+0x188/0x4c8 [ 30.526680] kunit_kmalloc_array+0x34/0x88 [ 30.527388] copy_user_test_oob+0xac/0xec0 [ 30.528069] kunit_try_run_case+0x14c/0x3d0 [ 30.528636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.529362] kthread+0x24c/0x2d0 [ 30.529862] ret_from_fork+0x10/0x20 [ 30.530372] [ 30.530679] The buggy address belongs to the object at fff00000c1313100 [ 30.530679] which belongs to the cache kmalloc-128 of size 128 [ 30.532337] The buggy address is located 0 bytes inside of [ 30.532337] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.533466] [ 30.534551] The buggy address belongs to the physical page: [ 30.535600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.536483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.537280] page_type: f5(slab) [ 30.537774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.538551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.539537] page dumped because: kasan: bad access detected [ 30.540341] [ 30.540569] Memory state around the buggy address: [ 30.541021] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.541882] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.542738] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.543948] ^ [ 30.544745] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.545571] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.546365] ==================================================================
[ 32.133654] ================================================================== [ 32.134420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0 [ 32.135302] Write of size 121 at addr ffff88810296dd00 by task kunit_try_catch/292 [ 32.136280] [ 32.136462] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.137200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.137672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.138679] Call Trace: [ 32.138956] <TASK> [ 32.139270] dump_stack_lvl+0x73/0xb0 [ 32.139835] print_report+0xd1/0x640 [ 32.140156] ? __virt_addr_valid+0x1db/0x2d0 [ 32.140667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.141400] kasan_report+0x102/0x140 [ 32.141777] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.142321] ? copy_user_test_oob+0x3fe/0x10f0 [ 32.142698] kasan_check_range+0x10c/0x1c0 [ 32.143127] __kasan_check_write+0x18/0x20 [ 32.143948] copy_user_test_oob+0x3fe/0x10f0 [ 32.144402] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.144732] ? finish_task_switch.isra.0+0x153/0x700 [ 32.145371] ? __switch_to+0x5d9/0xf60 [ 32.146087] ? __schedule+0xc70/0x27e0 [ 32.146448] ? __pfx_read_tsc+0x10/0x10 [ 32.146745] ? ktime_get_ts64+0x86/0x230 [ 32.147318] kunit_try_run_case+0x1b3/0x490 [ 32.148078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.148854] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.149196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.149843] ? __kthread_parkme+0x82/0x160 [ 32.150501] ? preempt_count_sub+0x50/0x80 [ 32.151125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.151698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.152220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.152697] kthread+0x257/0x310 [ 32.153470] ? __pfx_kthread+0x10/0x10 [ 32.153923] ret_from_fork+0x41/0x80 [ 32.154405] ? __pfx_kthread+0x10/0x10 [ 32.154706] ret_from_fork_asm+0x1a/0x30 [ 32.155171] </TASK> [ 32.155615] [ 32.155920] Allocated by task 292: [ 32.156569] kasan_save_stack+0x3d/0x60 [ 32.157156] kasan_save_track+0x18/0x40 [ 32.157714] kasan_save_alloc_info+0x3b/0x50 [ 32.158496] __kasan_kmalloc+0xb7/0xc0 [ 32.158787] __kmalloc_noprof+0x1c4/0x500 [ 32.159444] kunit_kmalloc_array+0x25/0x60 [ 32.159985] copy_user_test_oob+0xac/0x10f0 [ 32.160584] kunit_try_run_case+0x1b3/0x490 [ 32.161091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.161740] kthread+0x257/0x310 [ 32.162061] ret_from_fork+0x41/0x80 [ 32.162442] ret_from_fork_asm+0x1a/0x30 [ 32.163093] [ 32.163355] The buggy address belongs to the object at ffff88810296dd00 [ 32.163355] which belongs to the cache kmalloc-128 of size 128 [ 32.164516] The buggy address is located 0 bytes inside of [ 32.164516] allocated 120-byte region [ffff88810296dd00, ffff88810296dd78) [ 32.165545] [ 32.165881] The buggy address belongs to the physical page: [ 32.166652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10296d [ 32.167409] flags: 0x200000000000000(node=0|zone=2) [ 32.167755] page_type: f5(slab) [ 32.168070] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.169031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.169851] page dumped because: kasan: bad access detected [ 32.170357] [ 32.170539] Memory state around the buggy address: [ 32.171337] ffff88810296dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.172231] ffff88810296dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.172895] >ffff88810296dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.174302] ^ [ 32.175160] ffff88810296dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.175880] ffff88810296de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176530] ================================================================== [ 32.224549] ================================================================== [ 32.226312] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0 [ 32.227291] Write of size 121 at addr ffff88810296dd00 by task kunit_try_catch/292 [ 32.227594] [ 32.227712] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.229200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.229700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.230369] Call Trace: [ 32.230789] <TASK> [ 32.231467] dump_stack_lvl+0x73/0xb0 [ 32.232009] print_report+0xd1/0x640 [ 32.232551] ? __virt_addr_valid+0x1db/0x2d0 [ 32.233045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.233615] kasan_report+0x102/0x140 [ 32.234120] ? copy_user_test_oob+0x558/0x10f0 [ 32.234568] ? copy_user_test_oob+0x558/0x10f0 [ 32.235113] kasan_check_range+0x10c/0x1c0 [ 32.235912] __kasan_check_write+0x18/0x20 [ 32.236469] copy_user_test_oob+0x558/0x10f0 [ 32.237016] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.237791] ? finish_task_switch.isra.0+0x153/0x700 [ 32.238286] ? __switch_to+0x5d9/0xf60 [ 32.238702] ? __schedule+0xc70/0x27e0 [ 32.239124] ? __pfx_read_tsc+0x10/0x10 [ 32.240012] ? ktime_get_ts64+0x86/0x230 [ 32.240592] kunit_try_run_case+0x1b3/0x490 [ 32.241390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.242387] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.242842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.243557] ? __kthread_parkme+0x82/0x160 [ 32.244522] ? preempt_count_sub+0x50/0x80 [ 32.245111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.245561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.246296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.246997] kthread+0x257/0x310 [ 32.247558] ? __pfx_kthread+0x10/0x10 [ 32.248186] ret_from_fork+0x41/0x80 [ 32.248630] ? __pfx_kthread+0x10/0x10 [ 32.249322] ret_from_fork_asm+0x1a/0x30 [ 32.249765] </TASK> [ 32.250077] [ 32.250291] Allocated by task 292: [ 32.250625] kasan_save_stack+0x3d/0x60 [ 32.251807] kasan_save_track+0x18/0x40 [ 32.252178] kasan_save_alloc_info+0x3b/0x50 [ 32.252777] __kasan_kmalloc+0xb7/0xc0 [ 32.253583] __kmalloc_noprof+0x1c4/0x500 [ 32.254188] kunit_kmalloc_array+0x25/0x60 [ 32.254602] copy_user_test_oob+0xac/0x10f0 [ 32.255277] kunit_try_run_case+0x1b3/0x490 [ 32.256017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.256740] kthread+0x257/0x310 [ 32.257529] ret_from_fork+0x41/0x80 [ 32.258055] ret_from_fork_asm+0x1a/0x30 [ 32.258283] [ 32.258408] The buggy address belongs to the object at ffff88810296dd00 [ 32.258408] which belongs to the cache kmalloc-128 of size 128 [ 32.259094] The buggy address is located 0 bytes inside of [ 32.259094] allocated 120-byte region [ffff88810296dd00, ffff88810296dd78) [ 32.260386] [ 32.260558] The buggy address belongs to the physical page: [ 32.261291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10296d [ 32.262210] flags: 0x200000000000000(node=0|zone=2) [ 32.262706] page_type: f5(slab) [ 32.263281] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.264186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.265094] page dumped because: kasan: bad access detected [ 32.265805] [ 32.266204] Memory state around the buggy address: [ 32.266601] ffff88810296dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.267570] ffff88810296dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.268479] >ffff88810296dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.269450] ^ [ 32.270069] ffff88810296dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.270750] ffff88810296de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.271587] ================================================================== [ 32.177870] ================================================================== [ 32.179317] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0 [ 32.179939] Read of size 121 at addr ffff88810296dd00 by task kunit_try_catch/292 [ 32.180658] [ 32.181669] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.182998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.183659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.184780] Call Trace: [ 32.185308] <TASK> [ 32.185650] dump_stack_lvl+0x73/0xb0 [ 32.186058] print_report+0xd1/0x640 [ 32.186597] ? __virt_addr_valid+0x1db/0x2d0 [ 32.187188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.187787] kasan_report+0x102/0x140 [ 32.188377] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.188800] ? copy_user_test_oob+0x4ab/0x10f0 [ 32.189396] kasan_check_range+0x10c/0x1c0 [ 32.189817] __kasan_check_read+0x15/0x20 [ 32.190280] copy_user_test_oob+0x4ab/0x10f0 [ 32.190745] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.191438] ? finish_task_switch.isra.0+0x153/0x700 [ 32.191884] ? __switch_to+0x5d9/0xf60 [ 32.192301] ? __schedule+0xc70/0x27e0 [ 32.192833] ? __pfx_read_tsc+0x10/0x10 [ 32.193446] ? ktime_get_ts64+0x86/0x230 [ 32.193750] kunit_try_run_case+0x1b3/0x490 [ 32.194439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.194845] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.195511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.195983] ? __kthread_parkme+0x82/0x160 [ 32.196412] ? preempt_count_sub+0x50/0x80 [ 32.196888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.197518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.198158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.198775] kthread+0x257/0x310 [ 32.199455] ? __pfx_kthread+0x10/0x10 [ 32.200068] ret_from_fork+0x41/0x80 [ 32.200426] ? __pfx_kthread+0x10/0x10 [ 32.200868] ret_from_fork_asm+0x1a/0x30 [ 32.201492] </TASK> [ 32.201841] [ 32.202087] Allocated by task 292: [ 32.202470] kasan_save_stack+0x3d/0x60 [ 32.202984] kasan_save_track+0x18/0x40 [ 32.203390] kasan_save_alloc_info+0x3b/0x50 [ 32.203945] __kasan_kmalloc+0xb7/0xc0 [ 32.204447] __kmalloc_noprof+0x1c4/0x500 [ 32.204942] kunit_kmalloc_array+0x25/0x60 [ 32.205525] copy_user_test_oob+0xac/0x10f0 [ 32.205880] kunit_try_run_case+0x1b3/0x490 [ 32.206160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.206888] kthread+0x257/0x310 [ 32.207276] ret_from_fork+0x41/0x80 [ 32.207708] ret_from_fork_asm+0x1a/0x30 [ 32.208113] [ 32.208306] The buggy address belongs to the object at ffff88810296dd00 [ 32.208306] which belongs to the cache kmalloc-128 of size 128 [ 32.210826] The buggy address is located 0 bytes inside of [ 32.210826] allocated 120-byte region [ffff88810296dd00, ffff88810296dd78) [ 32.211781] [ 32.212570] The buggy address belongs to the physical page: [ 32.213083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10296d [ 32.213976] flags: 0x200000000000000(node=0|zone=2) [ 32.214560] page_type: f5(slab) [ 32.215094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.215621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.216532] page dumped because: kasan: bad access detected [ 32.217196] [ 32.217520] Memory state around the buggy address: [ 32.218156] ffff88810296dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.218985] ffff88810296dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.219789] >ffff88810296dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.220531] ^ [ 32.221327] ffff88810296dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.222202] ffff88810296de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.223076] ================================================================== [ 32.272742] ================================================================== [ 32.273246] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0 [ 32.273987] Read of size 121 at addr ffff88810296dd00 by task kunit_try_catch/292 [ 32.274484] [ 32.274995] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.276035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.276335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.277244] Call Trace: [ 32.277699] <TASK> [ 32.278041] dump_stack_lvl+0x73/0xb0 [ 32.278597] print_report+0xd1/0x640 [ 32.279127] ? __virt_addr_valid+0x1db/0x2d0 [ 32.279627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.280217] kasan_report+0x102/0x140 [ 32.280541] ? copy_user_test_oob+0x605/0x10f0 [ 32.281271] ? copy_user_test_oob+0x605/0x10f0 [ 32.281948] kasan_check_range+0x10c/0x1c0 [ 32.282530] __kasan_check_read+0x15/0x20 [ 32.283001] copy_user_test_oob+0x605/0x10f0 [ 32.283551] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.284194] ? finish_task_switch.isra.0+0x153/0x700 [ 32.284621] ? __switch_to+0x5d9/0xf60 [ 32.285012] ? __schedule+0xc70/0x27e0 [ 32.285605] ? __pfx_read_tsc+0x10/0x10 [ 32.286182] ? ktime_get_ts64+0x86/0x230 [ 32.286623] kunit_try_run_case+0x1b3/0x490 [ 32.287067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.287691] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.288365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.289083] ? __kthread_parkme+0x82/0x160 [ 32.289507] ? preempt_count_sub+0x50/0x80 [ 32.289988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.290649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.291098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.291868] kthread+0x257/0x310 [ 32.292377] ? __pfx_kthread+0x10/0x10 [ 32.292871] ret_from_fork+0x41/0x80 [ 32.293177] ? __pfx_kthread+0x10/0x10 [ 32.294203] ret_from_fork_asm+0x1a/0x30 [ 32.295024] </TASK> [ 32.295343] [ 32.295592] Allocated by task 292: [ 32.295934] kasan_save_stack+0x3d/0x60 [ 32.296658] kasan_save_track+0x18/0x40 [ 32.297311] kasan_save_alloc_info+0x3b/0x50 [ 32.297968] __kasan_kmalloc+0xb7/0xc0 [ 32.298467] __kmalloc_noprof+0x1c4/0x500 [ 32.299186] kunit_kmalloc_array+0x25/0x60 [ 32.300189] copy_user_test_oob+0xac/0x10f0 [ 32.300729] kunit_try_run_case+0x1b3/0x490 [ 32.301165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.301716] kthread+0x257/0x310 [ 32.302414] ret_from_fork+0x41/0x80 [ 32.303161] ret_from_fork_asm+0x1a/0x30 [ 32.303743] [ 32.304246] The buggy address belongs to the object at ffff88810296dd00 [ 32.304246] which belongs to the cache kmalloc-128 of size 128 [ 32.305159] The buggy address is located 0 bytes inside of [ 32.305159] allocated 120-byte region [ffff88810296dd00, ffff88810296dd78) [ 32.306695] [ 32.307363] The buggy address belongs to the physical page: [ 32.307866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10296d [ 32.308663] flags: 0x200000000000000(node=0|zone=2) [ 32.309457] page_type: f5(slab) [ 32.309731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.310845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.311728] page dumped because: kasan: bad access detected [ 32.312772] [ 32.313098] Memory state around the buggy address: [ 32.313886] ffff88810296dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.314691] ffff88810296dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.315718] >ffff88810296dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.316702] ^ [ 32.317493] ffff88810296dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.318377] ffff88810296de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.319333] ==================================================================