Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   27.873517] ==================================================================
[   27.873687] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   27.873838] Write of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.873982] 
[   27.874078] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.874278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.874348] Hardware name: linux,dummy-virt (DT)
[   27.874431] Call trace:
[   27.874490]  show_stack+0x20/0x38 (C)
[   27.874632]  dump_stack_lvl+0x8c/0xd0
[   27.874779]  print_report+0x118/0x608
[   27.875012]  kasan_report+0xdc/0x128
[   27.875146]  kasan_check_range+0x100/0x1a8
[   27.875284]  __kasan_check_write+0x20/0x30
[   27.875424]  copy_user_test_oob+0x234/0xec8
[   27.875551]  kunit_try_run_case+0x170/0x3f0
[   27.875766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.875944]  kthread+0x328/0x630
[   27.876149]  ret_from_fork+0x10/0x20
[   27.876290] 
[   27.876346] Allocated by task 287:
[   27.876441]  kasan_save_stack+0x3c/0x68
[   27.876642]  kasan_save_track+0x20/0x40
[   27.876789]  kasan_save_alloc_info+0x40/0x58
[   27.876909]  __kasan_kmalloc+0xd4/0xd8
[   27.877069]  __kmalloc_noprof+0x190/0x4d0
[   27.877186]  kunit_kmalloc_array+0x34/0x88
[   27.877401]  copy_user_test_oob+0xac/0xec8
[   27.877674]  kunit_try_run_case+0x170/0x3f0
[   27.877960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.878090]  kthread+0x328/0x630
[   27.878244]  ret_from_fork+0x10/0x20
[   27.878355] 
[   27.878415] The buggy address belongs to the object at fff00000c67e4900
[   27.878415]  which belongs to the cache kmalloc-128 of size 128
[   27.878571] The buggy address is located 0 bytes inside of
[   27.878571]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.878807] 
[   27.878896] The buggy address belongs to the physical page:
[   27.879040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.879256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.879462] page_type: f5(slab)
[   27.879566] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.879749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.880029] page dumped because: kasan: bad access detected
[   27.880120] 
[   27.880180] Memory state around the buggy address:
[   27.880336]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.880719]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.880836] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.880961]                                                                 ^
[   27.881132]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.881318]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.881467] ==================================================================
[   27.922223] ==================================================================
[   27.922494] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   27.922688] Write of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.922823] 
[   27.922906] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.923263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.923349] Hardware name: linux,dummy-virt (DT)
[   27.923435] Call trace:
[   27.923503]  show_stack+0x20/0x38 (C)
[   27.923826]  dump_stack_lvl+0x8c/0xd0
[   27.924053]  print_report+0x118/0x608
[   27.924245]  kasan_report+0xdc/0x128
[   27.924454]  kasan_check_range+0x100/0x1a8
[   27.925397]  __kasan_check_write+0x20/0x30
[   27.925729]  copy_user_test_oob+0x35c/0xec8
[   27.927505]  kunit_try_run_case+0x170/0x3f0
[   27.927674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.927827]  kthread+0x328/0x630
[   27.927972]  ret_from_fork+0x10/0x20
[   27.929837] 
[   27.930666] Allocated by task 287:
[   27.931012]  kasan_save_stack+0x3c/0x68
[   27.931117]  kasan_save_track+0x20/0x40
[   27.931216]  kasan_save_alloc_info+0x40/0x58
[   27.931312]  __kasan_kmalloc+0xd4/0xd8
[   27.931405]  __kmalloc_noprof+0x190/0x4d0
[   27.931716]  kunit_kmalloc_array+0x34/0x88
[   27.932524]  copy_user_test_oob+0xac/0xec8
[   27.932644]  kunit_try_run_case+0x170/0x3f0
[   27.932847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.933001]  kthread+0x328/0x630
[   27.933115]  ret_from_fork+0x10/0x20
[   27.933215] 
[   27.933409] The buggy address belongs to the object at fff00000c67e4900
[   27.933409]  which belongs to the cache kmalloc-128 of size 128
[   27.933559] The buggy address is located 0 bytes inside of
[   27.933559]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.933726] 
[   27.935612] The buggy address belongs to the physical page:
[   27.935713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.935859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.936001] page_type: f5(slab)
[   27.936113] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.936250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.936371] page dumped because: kasan: bad access detected
[   27.936468] 
[   27.936525] Memory state around the buggy address:
[   27.936621]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.936921]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.937227] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.937543]                                                                 ^
[   27.938065]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.938667]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.938771] ==================================================================
[   27.891477] ==================================================================
[   27.891599] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   27.891751] Read of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.891886] 
[   27.892174] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.892390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.892887] Hardware name: linux,dummy-virt (DT)
[   27.893032] Call trace:
[   27.893454]  show_stack+0x20/0x38 (C)
[   27.893605]  dump_stack_lvl+0x8c/0xd0
[   27.894397]  print_report+0x118/0x608
[   27.895027]  kasan_report+0xdc/0x128
[   27.896132]  kasan_check_range+0x100/0x1a8
[   27.896556]  __kasan_check_read+0x20/0x30
[   27.897972]  copy_user_test_oob+0x728/0xec8
[   27.898116]  kunit_try_run_case+0x170/0x3f0
[   27.898368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.898973]  kthread+0x328/0x630
[   27.899626]  ret_from_fork+0x10/0x20
[   27.899900] 
[   27.900127] Allocated by task 287:
[   27.900209]  kasan_save_stack+0x3c/0x68
[   27.900321]  kasan_save_track+0x20/0x40
[   27.900416]  kasan_save_alloc_info+0x40/0x58
[   27.900518]  __kasan_kmalloc+0xd4/0xd8
[   27.900629]  __kmalloc_noprof+0x190/0x4d0
[   27.900745]  kunit_kmalloc_array+0x34/0x88
[   27.901062]  copy_user_test_oob+0xac/0xec8
[   27.901613]  kunit_try_run_case+0x170/0x3f0
[   27.901722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.902588]  kthread+0x328/0x630
[   27.902731]  ret_from_fork+0x10/0x20
[   27.902828] 
[   27.903006] The buggy address belongs to the object at fff00000c67e4900
[   27.903006]  which belongs to the cache kmalloc-128 of size 128
[   27.903269] The buggy address is located 0 bytes inside of
[   27.903269]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.903430] 
[   27.903485] The buggy address belongs to the physical page:
[   27.903566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.904457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.904927] page_type: f5(slab)
[   27.905047] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.905170] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.905300] page dumped because: kasan: bad access detected
[   27.905387] 
[   27.905445] Memory state around the buggy address:
[   27.905558]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.905762]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.906100] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.906203]                                                                 ^
[   27.906311]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.907607]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.907747] ==================================================================
[   27.966910] ==================================================================
[   27.967059] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   27.967394] Read of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.967526] 
[   27.967844] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.968619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.968696] Hardware name: linux,dummy-virt (DT)
[   27.968771] Call trace:
[   27.968826]  show_stack+0x20/0x38 (C)
[   27.968968]  dump_stack_lvl+0x8c/0xd0
[   27.969084]  print_report+0x118/0x608
[   27.969198]  kasan_report+0xdc/0x128
[   27.969307]  kasan_check_range+0x100/0x1a8
[   27.969984]  __kasan_check_read+0x20/0x30
[   27.970227]  copy_user_test_oob+0x4a0/0xec8
[   27.970367]  kunit_try_run_case+0x170/0x3f0
[   27.970695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.970998]  kthread+0x328/0x630
[   27.971126]  ret_from_fork+0x10/0x20
[   27.971249] 
[   27.971298] Allocated by task 287:
[   27.971370]  kasan_save_stack+0x3c/0x68
[   27.971501]  kasan_save_track+0x20/0x40
[   27.971636]  kasan_save_alloc_info+0x40/0x58
[   27.971913]  __kasan_kmalloc+0xd4/0xd8
[   27.972135]  __kmalloc_noprof+0x190/0x4d0
[   27.972233]  kunit_kmalloc_array+0x34/0x88
[   27.972334]  copy_user_test_oob+0xac/0xec8
[   27.972427]  kunit_try_run_case+0x170/0x3f0
[   27.972526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.972635]  kthread+0x328/0x630
[   27.972722]  ret_from_fork+0x10/0x20
[   27.972850] 
[   27.973224] The buggy address belongs to the object at fff00000c67e4900
[   27.973224]  which belongs to the cache kmalloc-128 of size 128
[   27.973390] The buggy address is located 0 bytes inside of
[   27.973390]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.973557] 
[   27.973626] The buggy address belongs to the physical page:
[   27.973710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.973905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.974140] page_type: f5(slab)
[   27.974246] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.974372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.974963] page dumped because: kasan: bad access detected
[   27.975059] 
[   27.975255] Memory state around the buggy address:
[   27.975384]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.975633]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.975773] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.975890]                                                                 ^
[   27.976084]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.976214]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.976615] ==================================================================
[   27.940212] ==================================================================
[   27.940389] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   27.940515] Read of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.940695] 
[   27.940782] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.941007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.941077] Hardware name: linux,dummy-virt (DT)
[   27.941154] Call trace:
[   27.941228]  show_stack+0x20/0x38 (C)
[   27.941453]  dump_stack_lvl+0x8c/0xd0
[   27.941722]  print_report+0x118/0x608
[   27.941854]  kasan_report+0xdc/0x128
[   27.941988]  kasan_check_range+0x100/0x1a8
[   27.942112]  __kasan_check_read+0x20/0x30
[   27.942245]  copy_user_test_oob+0x3c8/0xec8
[   27.942391]  kunit_try_run_case+0x170/0x3f0
[   27.942557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.942747]  kthread+0x328/0x630
[   27.942915]  ret_from_fork+0x10/0x20
[   27.943151] 
[   27.943211] Allocated by task 287:
[   27.943286]  kasan_save_stack+0x3c/0x68
[   27.943391]  kasan_save_track+0x20/0x40
[   27.943499]  kasan_save_alloc_info+0x40/0x58
[   27.943644]  __kasan_kmalloc+0xd4/0xd8
[   27.943796]  __kmalloc_noprof+0x190/0x4d0
[   27.943951]  kunit_kmalloc_array+0x34/0x88
[   27.944174]  copy_user_test_oob+0xac/0xec8
[   27.944344]  kunit_try_run_case+0x170/0x3f0
[   27.944545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.944687]  kthread+0x328/0x630
[   27.944879]  ret_from_fork+0x10/0x20
[   27.945040] 
[   27.945100] The buggy address belongs to the object at fff00000c67e4900
[   27.945100]  which belongs to the cache kmalloc-128 of size 128
[   27.945272] The buggy address is located 0 bytes inside of
[   27.945272]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.945466] 
[   27.945527] The buggy address belongs to the physical page:
[   27.945605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.945734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.945850] page_type: f5(slab)
[   27.946090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.946223] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.946324] page dumped because: kasan: bad access detected
[   27.946413] 
[   27.946558] Memory state around the buggy address:
[   27.946754]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.946960]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947071] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.947169]                                                                 ^
[   27.947279]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947556]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947681] ==================================================================
[   27.949125] ==================================================================
[   27.949300] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   27.949414] Write of size 121 at addr fff00000c67e4900 by task kunit_try_catch/287
[   27.949559] 
[   27.949661] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.949948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.950031] Hardware name: linux,dummy-virt (DT)
[   27.950113] Call trace:
[   27.950165]  show_stack+0x20/0x38 (C)
[   27.950291]  dump_stack_lvl+0x8c/0xd0
[   27.950415]  print_report+0x118/0x608
[   27.950560]  kasan_report+0xdc/0x128
[   27.950688]  kasan_check_range+0x100/0x1a8
[   27.950860]  __kasan_check_write+0x20/0x30
[   27.951063]  copy_user_test_oob+0x434/0xec8
[   27.951357]  kunit_try_run_case+0x170/0x3f0
[   27.951578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.952260]  kthread+0x328/0x630
[   27.952609]  ret_from_fork+0x10/0x20
[   27.953712] 
[   27.953967] Allocated by task 287:
[   27.955161]  kasan_save_stack+0x3c/0x68
[   27.955281]  kasan_save_track+0x20/0x40
[   27.955394]  kasan_save_alloc_info+0x40/0x58
[   27.955652]  __kasan_kmalloc+0xd4/0xd8
[   27.955919]  __kmalloc_noprof+0x190/0x4d0
[   27.956215]  kunit_kmalloc_array+0x34/0x88
[   27.956495]  copy_user_test_oob+0xac/0xec8
[   27.956773]  kunit_try_run_case+0x170/0x3f0
[   27.956984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.957118]  kthread+0x328/0x630
[   27.957475]  ret_from_fork+0x10/0x20
[   27.957710] 
[   27.958140] The buggy address belongs to the object at fff00000c67e4900
[   27.958140]  which belongs to the cache kmalloc-128 of size 128
[   27.958491] The buggy address is located 0 bytes inside of
[   27.958491]  allocated 120-byte region [fff00000c67e4900, fff00000c67e4978)
[   27.958797] 
[   27.958889] The buggy address belongs to the physical page:
[   27.959044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   27.959195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.959568] page_type: f5(slab)
[   27.960014] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.960147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.960260] page dumped because: kasan: bad access detected
[   27.960485] 
[   27.960575] Memory state around the buggy address:
[   27.960663]  fff00000c67e4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.960803]  fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.961016] >fff00000c67e4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.961129]                                                                 ^
[   27.961741]  fff00000c67e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.961871]  fff00000c67e4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.962006] ==================================================================

[   15.546801] ==================================================================
[   15.547463] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.548150] Read of size 121 at addr ffff888102b49800 by task kunit_try_catch/306
[   15.548977] 
[   15.549168] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.549213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.549226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.549248] Call Trace:
[   15.549262]  <TASK>
[   15.549276]  dump_stack_lvl+0x73/0xb0
[   15.549334]  print_report+0xd1/0x650
[   15.549358]  ? __virt_addr_valid+0x1db/0x2d0
[   15.549381]  ? copy_user_test_oob+0x604/0x10f0
[   15.549401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.549424]  ? copy_user_test_oob+0x604/0x10f0
[   15.549446]  kasan_report+0x141/0x180
[   15.549469]  ? copy_user_test_oob+0x604/0x10f0
[   15.549511]  kasan_check_range+0x10c/0x1c0
[   15.549536]  __kasan_check_read+0x15/0x20
[   15.549556]  copy_user_test_oob+0x604/0x10f0
[   15.549580]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.549600]  ? finish_task_switch.isra.0+0x153/0x700
[   15.549623]  ? __switch_to+0x5d9/0xf60
[   15.549644]  ? dequeue_task_fair+0x166/0x4e0
[   15.549669]  ? __schedule+0x10cc/0x2b30
[   15.549694]  ? __pfx_read_tsc+0x10/0x10
[   15.549714]  ? ktime_get_ts64+0x86/0x230
[   15.549740]  kunit_try_run_case+0x1a5/0x480
[   15.549765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.549795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.549819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.549862]  ? __kthread_parkme+0x82/0x180
[   15.549885]  ? preempt_count_sub+0x50/0x80
[   15.549910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.549934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.549959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.549983]  kthread+0x337/0x6f0
[   15.550004]  ? trace_preempt_on+0x20/0xc0
[   15.550027]  ? __pfx_kthread+0x10/0x10
[   15.550051]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.550073]  ? calculate_sigpending+0x7b/0xa0
[   15.550095]  ? __pfx_kthread+0x10/0x10
[   15.550119]  ret_from_fork+0x41/0x80
[   15.550152]  ? __pfx_kthread+0x10/0x10
[   15.550194]  ret_from_fork_asm+0x1a/0x30
[   15.550226]  </TASK>
[   15.550239] 
[   15.561695] Allocated by task 306:
[   15.561835]  kasan_save_stack+0x45/0x70
[   15.561986]  kasan_save_track+0x18/0x40
[   15.562173]  kasan_save_alloc_info+0x3b/0x50
[   15.562506]  __kasan_kmalloc+0xb7/0xc0
[   15.562697]  __kmalloc_noprof+0x1c9/0x500
[   15.562863]  kunit_kmalloc_array+0x25/0x60
[   15.563027]  copy_user_test_oob+0xab/0x10f0
[   15.563246]  kunit_try_run_case+0x1a5/0x480
[   15.563431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.563641]  kthread+0x337/0x6f0
[   15.563764]  ret_from_fork+0x41/0x80
[   15.563927]  ret_from_fork_asm+0x1a/0x30
[   15.564122] 
[   15.564219] The buggy address belongs to the object at ffff888102b49800
[   15.564219]  which belongs to the cache kmalloc-128 of size 128
[   15.564652] The buggy address is located 0 bytes inside of
[   15.564652]  allocated 120-byte region [ffff888102b49800, ffff888102b49878)
[   15.565176] 
[   15.565262] The buggy address belongs to the physical page:
[   15.565496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.565799] flags: 0x200000000000000(node=0|zone=2)
[   15.565996] page_type: f5(slab)
[   15.566187] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.566483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.566781] page dumped because: kasan: bad access detected
[   15.566976] 
[   15.567071] Memory state around the buggy address:
[   15.567352]  ffff888102b49700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.567628]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.567895] >ffff888102b49800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.568108]                                                                 ^
[   15.568436]  ffff888102b49880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568694]  ffff888102b49900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568907] ==================================================================
[   15.528084] ==================================================================
[   15.528580] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.528871] Write of size 121 at addr ffff888102b49800 by task kunit_try_catch/306
[   15.529225] 
[   15.529311] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.529365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.529378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.529400] Call Trace:
[   15.529416]  <TASK>
[   15.529432]  dump_stack_lvl+0x73/0xb0
[   15.529457]  print_report+0xd1/0x650
[   15.529479]  ? __virt_addr_valid+0x1db/0x2d0
[   15.529502]  ? copy_user_test_oob+0x557/0x10f0
[   15.529522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.529546]  ? copy_user_test_oob+0x557/0x10f0
[   15.529567]  kasan_report+0x141/0x180
[   15.529590]  ? copy_user_test_oob+0x557/0x10f0
[   15.529617]  kasan_check_range+0x10c/0x1c0
[   15.529641]  __kasan_check_write+0x18/0x20
[   15.529662]  copy_user_test_oob+0x557/0x10f0
[   15.529686]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.529706]  ? finish_task_switch.isra.0+0x153/0x700
[   15.529729]  ? __switch_to+0x5d9/0xf60
[   15.529751]  ? dequeue_task_fair+0x166/0x4e0
[   15.529785]  ? __schedule+0x10cc/0x2b30
[   15.529809]  ? __pfx_read_tsc+0x10/0x10
[   15.529830]  ? ktime_get_ts64+0x86/0x230
[   15.529856]  kunit_try_run_case+0x1a5/0x480
[   15.529881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.529904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.529928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.529975]  ? __kthread_parkme+0x82/0x180
[   15.529999]  ? preempt_count_sub+0x50/0x80
[   15.530025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.530049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.530072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.530097]  kthread+0x337/0x6f0
[   15.530119]  ? trace_preempt_on+0x20/0xc0
[   15.530143]  ? __pfx_kthread+0x10/0x10
[   15.530166]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.530189]  ? calculate_sigpending+0x7b/0xa0
[   15.530211]  ? __pfx_kthread+0x10/0x10
[   15.530233]  ret_from_fork+0x41/0x80
[   15.530256]  ? __pfx_kthread+0x10/0x10
[   15.530279]  ret_from_fork_asm+0x1a/0x30
[   15.530311]  </TASK>
[   15.530331] 
[   15.538384] Allocated by task 306:
[   15.538515]  kasan_save_stack+0x45/0x70
[   15.538658]  kasan_save_track+0x18/0x40
[   15.538793]  kasan_save_alloc_info+0x3b/0x50
[   15.538937]  __kasan_kmalloc+0xb7/0xc0
[   15.539108]  __kmalloc_noprof+0x1c9/0x500
[   15.539318]  kunit_kmalloc_array+0x25/0x60
[   15.539557]  copy_user_test_oob+0xab/0x10f0
[   15.539780]  kunit_try_run_case+0x1a5/0x480
[   15.539987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.540313]  kthread+0x337/0x6f0
[   15.540509]  ret_from_fork+0x41/0x80
[   15.540677]  ret_from_fork_asm+0x1a/0x30
[   15.540859] 
[   15.540930] The buggy address belongs to the object at ffff888102b49800
[   15.540930]  which belongs to the cache kmalloc-128 of size 128
[   15.541283] The buggy address is located 0 bytes inside of
[   15.541283]  allocated 120-byte region [ffff888102b49800, ffff888102b49878)
[   15.541762] 
[   15.541861] The buggy address belongs to the physical page:
[   15.542154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.542512] flags: 0x200000000000000(node=0|zone=2)
[   15.542743] page_type: f5(slab)
[   15.542911] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.543276] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.543598] page dumped because: kasan: bad access detected
[   15.543830] 
[   15.543901] Memory state around the buggy address:
[   15.544055]  ffff888102b49700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.544603]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.544854] >ffff888102b49800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.545069]                                                                 ^
[   15.545625]  ffff888102b49880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.545882]  ffff888102b49900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.546095] ==================================================================
[   15.509894] ==================================================================
[   15.510345] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.510920] Read of size 121 at addr ffff888102b49800 by task kunit_try_catch/306
[   15.511206] 
[   15.511339] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.511384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.511397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.511419] Call Trace:
[   15.511434]  <TASK>
[   15.511448]  dump_stack_lvl+0x73/0xb0
[   15.511495]  print_report+0xd1/0x650
[   15.511519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.511542]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.511562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.511586]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.511607]  kasan_report+0x141/0x180
[   15.511631]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.511675]  kasan_check_range+0x10c/0x1c0
[   15.511701]  __kasan_check_read+0x15/0x20
[   15.511722]  copy_user_test_oob+0x4aa/0x10f0
[   15.511745]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.511765]  ? finish_task_switch.isra.0+0x153/0x700
[   15.511789]  ? __switch_to+0x5d9/0xf60
[   15.511809]  ? dequeue_task_fair+0x166/0x4e0
[   15.511835]  ? __schedule+0x10cc/0x2b30
[   15.511859]  ? __pfx_read_tsc+0x10/0x10
[   15.511880]  ? ktime_get_ts64+0x86/0x230
[   15.511906]  kunit_try_run_case+0x1a5/0x480
[   15.511931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.511954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.511979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.512004]  ? __kthread_parkme+0x82/0x180
[   15.512026]  ? preempt_count_sub+0x50/0x80
[   15.512051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.512098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.512122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.512146]  kthread+0x337/0x6f0
[   15.512168]  ? trace_preempt_on+0x20/0xc0
[   15.512191]  ? __pfx_kthread+0x10/0x10
[   15.512215]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.512237]  ? calculate_sigpending+0x7b/0xa0
[   15.512259]  ? __pfx_kthread+0x10/0x10
[   15.512282]  ret_from_fork+0x41/0x80
[   15.512303]  ? __pfx_kthread+0x10/0x10
[   15.512333]  ret_from_fork_asm+0x1a/0x30
[   15.512367]  </TASK>
[   15.512378] 
[   15.519813] Allocated by task 306:
[   15.519945]  kasan_save_stack+0x45/0x70
[   15.520089]  kasan_save_track+0x18/0x40
[   15.520285]  kasan_save_alloc_info+0x3b/0x50
[   15.520519]  __kasan_kmalloc+0xb7/0xc0
[   15.520715]  __kmalloc_noprof+0x1c9/0x500
[   15.520938]  kunit_kmalloc_array+0x25/0x60
[   15.521153]  copy_user_test_oob+0xab/0x10f0
[   15.521398]  kunit_try_run_case+0x1a5/0x480
[   15.521576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.521753]  kthread+0x337/0x6f0
[   15.521948]  ret_from_fork+0x41/0x80
[   15.522137]  ret_from_fork_asm+0x1a/0x30
[   15.522367] 
[   15.522461] The buggy address belongs to the object at ffff888102b49800
[   15.522461]  which belongs to the cache kmalloc-128 of size 128
[   15.522919] The buggy address is located 0 bytes inside of
[   15.522919]  allocated 120-byte region [ffff888102b49800, ffff888102b49878)
[   15.523477] 
[   15.523550] The buggy address belongs to the physical page:
[   15.523793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.524153] flags: 0x200000000000000(node=0|zone=2)
[   15.524385] page_type: f5(slab)
[   15.524507] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.524735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.525024] page dumped because: kasan: bad access detected
[   15.525270] 
[   15.525367] Memory state around the buggy address:
[   15.525620]  ffff888102b49700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.525843]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.526058] >ffff888102b49800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.526525]                                                                 ^
[   15.526844]  ffff888102b49880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.527185]  ffff888102b49900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.527611] ==================================================================
[   15.492146] ==================================================================
[   15.492537] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.492856] Write of size 121 at addr ffff888102b49800 by task kunit_try_catch/306
[   15.493157] 
[   15.493246] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.493293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.493307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.493341] Call Trace:
[   15.493355]  <TASK>
[   15.493384]  dump_stack_lvl+0x73/0xb0
[   15.493411]  print_report+0xd1/0x650
[   15.493435]  ? __virt_addr_valid+0x1db/0x2d0
[   15.493459]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.493479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.493504]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.493525]  kasan_report+0x141/0x180
[   15.493549]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.493576]  kasan_check_range+0x10c/0x1c0
[   15.493602]  __kasan_check_write+0x18/0x20
[   15.493623]  copy_user_test_oob+0x3fd/0x10f0
[   15.493647]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.493667]  ? finish_task_switch.isra.0+0x153/0x700
[   15.493691]  ? __switch_to+0x5d9/0xf60
[   15.493712]  ? dequeue_task_fair+0x166/0x4e0
[   15.493738]  ? __schedule+0x10cc/0x2b30
[   15.493762]  ? __pfx_read_tsc+0x10/0x10
[   15.493787]  ? ktime_get_ts64+0x86/0x230
[   15.493813]  kunit_try_run_case+0x1a5/0x480
[   15.493839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.493862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.493887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.493912]  ? __kthread_parkme+0x82/0x180
[   15.493935]  ? preempt_count_sub+0x50/0x80
[   15.493960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.493985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.494009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.494033]  kthread+0x337/0x6f0
[   15.494055]  ? trace_preempt_on+0x20/0xc0
[   15.494079]  ? __pfx_kthread+0x10/0x10
[   15.494103]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.494135]  ? calculate_sigpending+0x7b/0xa0
[   15.494158]  ? __pfx_kthread+0x10/0x10
[   15.494180]  ret_from_fork+0x41/0x80
[   15.494201]  ? __pfx_kthread+0x10/0x10
[   15.494224]  ret_from_fork_asm+0x1a/0x30
[   15.494257]  </TASK>
[   15.494268] 
[   15.501391] Allocated by task 306:
[   15.501520]  kasan_save_stack+0x45/0x70
[   15.501666]  kasan_save_track+0x18/0x40
[   15.501864]  kasan_save_alloc_info+0x3b/0x50
[   15.502070]  __kasan_kmalloc+0xb7/0xc0
[   15.502258]  __kmalloc_noprof+0x1c9/0x500
[   15.502569]  kunit_kmalloc_array+0x25/0x60
[   15.502714]  copy_user_test_oob+0xab/0x10f0
[   15.502855]  kunit_try_run_case+0x1a5/0x480
[   15.503231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.503496]  kthread+0x337/0x6f0
[   15.503667]  ret_from_fork+0x41/0x80
[   15.503833]  ret_from_fork_asm+0x1a/0x30
[   15.504013] 
[   15.504090] The buggy address belongs to the object at ffff888102b49800
[   15.504090]  which belongs to the cache kmalloc-128 of size 128
[   15.504655] The buggy address is located 0 bytes inside of
[   15.504655]  allocated 120-byte region [ffff888102b49800, ffff888102b49878)
[   15.505019] 
[   15.505091] The buggy address belongs to the physical page:
[   15.505258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.505557] flags: 0x200000000000000(node=0|zone=2)
[   15.505784] page_type: f5(slab)
[   15.505976] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.506274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.506503] page dumped because: kasan: bad access detected
[   15.506667] 
[   15.506735] Memory state around the buggy address:
[   15.506886]  ffff888102b49700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.507572]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.507890] >ffff888102b49800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.508298]                                                                 ^
[   15.508757]  ffff888102b49880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509005]  ffff888102b49900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.509417] ==================================================================

[   25.749095] ==================================================================
[   25.749790] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   25.750459] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.751154] 
[   25.751320] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.751372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.751387] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.751405] Call trace:
[   25.751417]  show_stack+0x20/0x38 (C)
[   25.751452]  dump_stack_lvl+0x8c/0xd0
[   25.751483]  print_report+0x118/0x608
[   25.751514]  kasan_report+0xdc/0x128
[   25.751544]  kasan_check_range+0x100/0x1a8
[   25.751576]  __kasan_check_read+0x20/0x30
[   25.751609]  copy_user_test_oob+0x728/0xec8
[   25.751639]  kunit_try_run_case+0x170/0x3f0
[   25.751674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.751716]  kthread+0x328/0x630
[   25.751750]  ret_from_fork+0x10/0x20
[   25.751783] 
[   25.757663] Allocated by task 339:
[   25.757990]  kasan_save_stack+0x3c/0x68
[   25.758366]  kasan_save_track+0x20/0x40
[   25.758739]  kasan_save_alloc_info+0x40/0x58
[   25.759153]  __kasan_kmalloc+0xd4/0xd8
[   25.759517]  __kmalloc_noprof+0x190/0x4d0
[   25.759907]  kunit_kmalloc_array+0x34/0x88
[   25.760308]  copy_user_test_oob+0xac/0xec8
[   25.760704]  kunit_try_run_case+0x170/0x3f0
[   25.761111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.761637]  kthread+0x328/0x630
[   25.761961]  ret_from_fork+0x10/0x20
[   25.762311] 
[   25.762466] The buggy address belongs to the object at ffff0000101ea500
[   25.762466]  which belongs to the cache kmalloc-128 of size 128
[   25.763599] The buggy address is located 0 bytes inside of
[   25.763599]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.764729] 
[   25.764885] The buggy address belongs to the physical page:
[   25.765402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.766135] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.766749] page_type: f5(slab)
[   25.767062] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.767779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.768488] page dumped because: kasan: bad access detected
[   25.769005] 
[   25.769158] Memory state around the buggy address:
[   25.769608]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.770276]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.770944] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.771608]                                                                 ^
[   25.772265]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.772933]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.773597] ==================================================================
[   25.722839] ==================================================================
[   25.724086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   25.724757] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.725459] 
[   25.725625] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.725676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.725692] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.725712] Call trace:
[   25.725726]  show_stack+0x20/0x38 (C)
[   25.725761]  dump_stack_lvl+0x8c/0xd0
[   25.725795]  print_report+0x118/0x608
[   25.725827]  kasan_report+0xdc/0x128
[   25.725857]  kasan_check_range+0x100/0x1a8
[   25.725891]  __kasan_check_write+0x20/0x30
[   25.725925]  copy_user_test_oob+0x234/0xec8
[   25.725955]  kunit_try_run_case+0x170/0x3f0
[   25.725993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.726033]  kthread+0x328/0x630
[   25.726069]  ret_from_fork+0x10/0x20
[   25.726104] 
[   25.731999] Allocated by task 339:
[   25.732332]  kasan_save_stack+0x3c/0x68
[   25.732710]  kasan_save_track+0x20/0x40
[   25.733083]  kasan_save_alloc_info+0x40/0x58
[   25.733497]  __kasan_kmalloc+0xd4/0xd8
[   25.733861]  __kmalloc_noprof+0x190/0x4d0
[   25.734251]  kunit_kmalloc_array+0x34/0x88
[   25.734654]  copy_user_test_oob+0xac/0xec8
[   25.735048]  kunit_try_run_case+0x170/0x3f0
[   25.735456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.735981]  kthread+0x328/0x630
[   25.736305]  ret_from_fork+0x10/0x20
[   25.736657] 
[   25.736812] The buggy address belongs to the object at ffff0000101ea500
[   25.736812]  which belongs to the cache kmalloc-128 of size 128
[   25.737947] The buggy address is located 0 bytes inside of
[   25.737947]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.739076] 
[   25.739232] The buggy address belongs to the physical page:
[   25.739750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.740482] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.741095] page_type: f5(slab)
[   25.741411] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.742128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.742838] page dumped because: kasan: bad access detected
[   25.743355] 
[   25.743508] Memory state around the buggy address:
[   25.743958]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.744627]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.745294] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.745957]                                                                 ^
[   25.746614]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747282]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747945] ==================================================================
[   25.799636] ==================================================================
[   25.800297] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   25.800945] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.801626] 
[   25.801783] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.801819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.801831] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.801844] Call trace:
[   25.801853]  show_stack+0x20/0x38 (C)
[   25.801876]  dump_stack_lvl+0x8c/0xd0
[   25.801899]  print_report+0x118/0x608
[   25.801922]  kasan_report+0xdc/0x128
[   25.801943]  kasan_check_range+0x100/0x1a8
[   25.801966]  __kasan_check_read+0x20/0x30
[   25.801991]  copy_user_test_oob+0x3c8/0xec8
[   25.802012]  kunit_try_run_case+0x170/0x3f0
[   25.802038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.802067]  kthread+0x328/0x630
[   25.802092]  ret_from_fork+0x10/0x20
[   25.802116] 
[   25.807957] Allocated by task 339:
[   25.808280]  kasan_save_stack+0x3c/0x68
[   25.808649]  kasan_save_track+0x20/0x40
[   25.809009]  kasan_save_alloc_info+0x40/0x58
[   25.809412]  __kasan_kmalloc+0xd4/0xd8
[   25.809765]  __kmalloc_noprof+0x190/0x4d0
[   25.810144]  kunit_kmalloc_array+0x34/0x88
[   25.810534]  copy_user_test_oob+0xac/0xec8
[   25.810918]  kunit_try_run_case+0x170/0x3f0
[   25.811312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.811822]  kthread+0x328/0x630
[   25.812135]  ret_from_fork+0x10/0x20
[   25.812474] 
[   25.812620] The buggy address belongs to the object at ffff0000101ea500
[   25.812620]  which belongs to the cache kmalloc-128 of size 128
[   25.813740] The buggy address is located 0 bytes inside of
[   25.813740]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.814854] 
[   25.815002] The buggy address belongs to the physical page:
[   25.815510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.816230] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.816830] page_type: f5(slab)
[   25.817133] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.817838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.818535] page dumped because: kasan: bad access detected
[   25.819044] 
[   25.819191] Memory state around the buggy address:
[   25.819632]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.820287]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.820942] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.821594]                                                                 ^
[   25.822241]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.822898]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823551] ==================================================================
[   25.824893] ==================================================================
[   25.825570] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   25.826220] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.826909] 
[   25.827064] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.827102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.827112] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.827124] Call trace:
[   25.827133]  show_stack+0x20/0x38 (C)
[   25.827158]  dump_stack_lvl+0x8c/0xd0
[   25.827179]  print_report+0x118/0x608
[   25.827199]  kasan_report+0xdc/0x128
[   25.827217]  kasan_check_range+0x100/0x1a8
[   25.827239]  __kasan_check_write+0x20/0x30
[   25.827260]  copy_user_test_oob+0x434/0xec8
[   25.827278]  kunit_try_run_case+0x170/0x3f0
[   25.827302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.827329]  kthread+0x328/0x630
[   25.827352]  ret_from_fork+0x10/0x20
[   25.827374] 
[   25.833205] Allocated by task 339:
[   25.833523]  kasan_save_stack+0x3c/0x68
[   25.833884]  kasan_save_track+0x20/0x40
[   25.834243]  kasan_save_alloc_info+0x40/0x58
[   25.834641]  __kasan_kmalloc+0xd4/0xd8
[   25.834993]  __kmalloc_noprof+0x190/0x4d0
[   25.835368]  kunit_kmalloc_array+0x34/0x88
[   25.835753]  copy_user_test_oob+0xac/0xec8
[   25.836134]  kunit_try_run_case+0x170/0x3f0
[   25.836526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.837035]  kthread+0x328/0x630
[   25.837345]  ret_from_fork+0x10/0x20
[   25.837682] 
[   25.837829] The buggy address belongs to the object at ffff0000101ea500
[   25.837829]  which belongs to the cache kmalloc-128 of size 128
[   25.838948] The buggy address is located 0 bytes inside of
[   25.838948]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.840061] 
[   25.840208] The buggy address belongs to the physical page:
[   25.840714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.841432] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.842029] page_type: f5(slab)
[   25.842329] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.843031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.843728] page dumped because: kasan: bad access detected
[   25.844232] 
[   25.844378] Memory state around the buggy address:
[   25.844816]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.845470]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.846122] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.846772]                                                                 ^
[   25.847416]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848069]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848718] ==================================================================
[   25.849635] ==================================================================
[   25.850290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   25.850931] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.851609] 
[   25.851759] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.851791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.851800] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.851812] Call trace:
[   25.851819]  show_stack+0x20/0x38 (C)
[   25.851840]  dump_stack_lvl+0x8c/0xd0
[   25.851859]  print_report+0x118/0x608
[   25.851878]  kasan_report+0xdc/0x128
[   25.851897]  kasan_check_range+0x100/0x1a8
[   25.851917]  __kasan_check_read+0x20/0x30
[   25.851939]  copy_user_test_oob+0x4a0/0xec8
[   25.851956]  kunit_try_run_case+0x170/0x3f0
[   25.851979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.852005]  kthread+0x328/0x630
[   25.852027]  ret_from_fork+0x10/0x20
[   25.852048] 
[   25.857869] Allocated by task 339:
[   25.858185]  kasan_save_stack+0x3c/0x68
[   25.858546]  kasan_save_track+0x20/0x40
[   25.858905]  kasan_save_alloc_info+0x40/0x58
[   25.859305]  __kasan_kmalloc+0xd4/0xd8
[   25.859654]  __kmalloc_noprof+0x190/0x4d0
[   25.860027]  kunit_kmalloc_array+0x34/0x88
[   25.860412]  copy_user_test_oob+0xac/0xec8
[   25.860793]  kunit_try_run_case+0x170/0x3f0
[   25.861185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.861693]  kthread+0x328/0x630
[   25.862003]  ret_from_fork+0x10/0x20
[   25.862340] 
[   25.862486] The buggy address belongs to the object at ffff0000101ea500
[   25.862486]  which belongs to the cache kmalloc-128 of size 128
[   25.863603] The buggy address is located 0 bytes inside of
[   25.863603]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.864715] 
[   25.864861] The buggy address belongs to the physical page:
[   25.865365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.866080] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.866675] page_type: f5(slab)
[   25.866972] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.867673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.868368] page dumped because: kasan: bad access detected
[   25.868873] 
[   25.869018] Memory state around the buggy address:
[   25.869455]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.870107]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870761] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.871410]                                                                 ^
[   25.872054]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.872706]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.873355] ==================================================================
[   25.774925] ==================================================================
[   25.775618] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   25.776273] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.776962] 
[   25.777119] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.777157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.777168] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.777181] Call trace:
[   25.777191]  show_stack+0x20/0x38 (C)
[   25.777214]  dump_stack_lvl+0x8c/0xd0
[   25.777237]  print_report+0x118/0x608
[   25.777261]  kasan_report+0xdc/0x128
[   25.777281]  kasan_check_range+0x100/0x1a8
[   25.777305]  __kasan_check_write+0x20/0x30
[   25.777328]  copy_user_test_oob+0x35c/0xec8
[   25.777349]  kunit_try_run_case+0x170/0x3f0
[   25.777376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.777405]  kthread+0x328/0x630
[   25.777430]  ret_from_fork+0x10/0x20
[   25.777455] 
[   25.783298] Allocated by task 339:
[   25.783617]  kasan_save_stack+0x3c/0x68
[   25.783980]  kasan_save_track+0x20/0x40
[   25.784342]  kasan_save_alloc_info+0x40/0x58
[   25.784744]  __kasan_kmalloc+0xd4/0xd8
[   25.785098]  __kmalloc_noprof+0x190/0x4d0
[   25.785475]  kunit_kmalloc_array+0x34/0x88
[   25.785864]  copy_user_test_oob+0xac/0xec8
[   25.786248]  kunit_try_run_case+0x170/0x3f0
[   25.786641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.787152]  kthread+0x328/0x630
[   25.787464]  ret_from_fork+0x10/0x20
[   25.787804] 
[   25.787952] The buggy address belongs to the object at ffff0000101ea500
[   25.787952]  which belongs to the cache kmalloc-128 of size 128
[   25.789072] The buggy address is located 0 bytes inside of
[   25.789072]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.790186] 
[   25.790334] The buggy address belongs to the physical page:
[   25.790843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.791564] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.792165] page_type: f5(slab)
[   25.792468] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.793172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.793871] page dumped because: kasan: bad access detected
[   25.794377] 
[   25.794525] Memory state around the buggy address:
[   25.794965]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.795622]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.796278] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.796929]                                                                 ^
[   25.797576]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.798233]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.798886] ==================================================================