Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   92.341705] ==================================================================
[   92.348968] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0
[   92.356170] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.363098] 
[   92.364593] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.364624] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.364624] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.364654] Call trace: 
[   92.364654]  unwind_backtrace from show_stack+0x18/0x1c
[   92.364685]  show_stack from dump_stack_lvl+0x70/0x90
[   92.364715]  dump_stack_lvl from print_report+0x158/0x528
[   92.364715]  print_report from kasan_report+0xdc/0x118
[   92.364746]  kasan_report from kasan_check_range+0x14c/0x198
[   92.364776]  kasan_check_range from copy_user_test_oob+0x544/0x12b0
[   92.364807]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.364807]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.364837]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.364868]  kthread from ret_from_fork+0x14/0x20
[   92.364898] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.364898] bfa0:                                     00000000 00000000 00000000 00000000
[   92.364929] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.364959] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.364959] 
[   92.476226] Allocated by task 341:
[   92.479644]  kasan_save_track+0x30/0x5c
[   92.483489]  __kasan_kmalloc+0x8c/0x94
[   92.487274]  __kmalloc_noprof+0x20c/0x488
[   92.491333]  kunit_kmalloc_array+0x28/0x60
[   92.495452]  copy_user_test_oob+0xac/0x12b0
[   92.499694]  kunit_try_run_case+0x22c/0x5a8
[   92.503906]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.509429]  kthread+0x464/0x810
[   92.512695]  ret_from_fork+0x14/0x20
[   92.516296] 
[   92.517791] The buggy address belongs to the object at cc23f200
[   92.517791]  which belongs to the cache kmalloc-128 of size 128
[   92.529693] The buggy address is located 0 bytes inside of
[   92.529693]  allocated 120-byte region [cc23f200, cc23f278)
[   92.540802] 
[   92.542327] The buggy address belongs to the physical page:
[   92.547912] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.555206] flags: 0x0(zone=0)
[   92.558288] page_type: f5(slab)
[   92.561431] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.569580] raw: 00000000
[   92.572235] page dumped because: kasan: bad access detected
[   92.577850] 
[   92.579345] Memory state around the buggy address:
[   92.584167]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.590728]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.597320] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.603881]                                                         ^
[   92.610351]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.616943]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.623504] ==================================================================
[   91.474090] ==================================================================
[   91.481353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0
[   91.488555] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.495391] 
[   91.496887] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.496917] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.496917] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.496948] Call trace: 
[   91.496948]  unwind_backtrace from show_stack+0x18/0x1c
[   91.496978]  show_stack from dump_stack_lvl+0x70/0x90
[   91.497009]  dump_stack_lvl from print_report+0x158/0x528
[   91.497039]  print_report from kasan_report+0xdc/0x118
[   91.497039]  kasan_report from kasan_check_range+0x14c/0x198
[   91.497070]  kasan_check_range from copy_user_test_oob+0x800/0x12b0
[   91.497100]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.497131]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.497161]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.497161]  kthread from ret_from_fork+0x14/0x20
[   91.497192] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.497222] bfa0:                                     00000000 00000000 00000000 00000000
[   91.497222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.497253] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.497253] 
[   91.608520] Allocated by task 341:
[   91.611938]  kasan_save_track+0x30/0x5c
[   91.615814]  __kasan_kmalloc+0x8c/0x94
[   91.619598]  __kmalloc_noprof+0x20c/0x488
[   91.623626]  kunit_kmalloc_array+0x28/0x60
[   91.627777]  copy_user_test_oob+0xac/0x12b0
[   91.631988]  kunit_try_run_case+0x22c/0x5a8
[   91.636199]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.641723]  kthread+0x464/0x810
[   91.644989]  ret_from_fork+0x14/0x20
[   91.648590] 
[   91.650085] The buggy address belongs to the object at cc23f200
[   91.650085]  which belongs to the cache kmalloc-128 of size 128
[   91.661987] The buggy address is located 0 bytes inside of
[   91.661987]  allocated 120-byte region [cc23f200, cc23f278)
[   91.673126] 
[   91.674621] The buggy address belongs to the physical page:
[   91.680236] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.687499] flags: 0x0(zone=0)
[   91.690582] page_type: f5(slab)
[   91.693756] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.701904] raw: 00000000
[   91.704528] page dumped because: kasan: bad access detected
[   91.710144] 
[   91.711639] Memory state around the buggy address:
[   91.716461]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   91.723052]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.729614] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.736175]                                                         ^
[   91.742675]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.749237]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.755798] ==================================================================
[   91.178466] ==================================================================
[   91.191864] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0
[   91.199066] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.205993] 
[   91.207519] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.207550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.207550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.207550] Call trace: 
[   91.207580]  unwind_backtrace from show_stack+0x18/0x1c
[   91.207580]  show_stack from dump_stack_lvl+0x70/0x90
[   91.207611]  dump_stack_lvl from print_report+0x158/0x528
[   91.207641]  print_report from kasan_report+0xdc/0x118
[   91.207672]  kasan_report from kasan_check_range+0x14c/0x198
[   91.207702]  kasan_check_range from copy_user_test_oob+0x24c/0x12b0
[   91.207702]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.207733]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.207763]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.207794]  kthread from ret_from_fork+0x14/0x20
[   91.207824] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.207824] bfa0:                                     00000000 00000000 00000000 00000000
[   91.207855] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.207855] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.207885] 
[   91.319122] Allocated by task 341:
[   91.322570]  kasan_save_track+0x30/0x5c
[   91.326416]  __kasan_kmalloc+0x8c/0x94
[   91.330200]  __kmalloc_noprof+0x20c/0x488
[   91.334259]  kunit_kmalloc_array+0x28/0x60
[   91.338378]  copy_user_test_oob+0xac/0x12b0
[   91.342620]  kunit_try_run_case+0x22c/0x5a8
[   91.346832]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.352355]  kthread+0x464/0x810
[   91.355621]  ret_from_fork+0x14/0x20
[   91.359222] 
[   91.360717] The buggy address belongs to the object at cc23f200
[   91.360717]  which belongs to the cache kmalloc-128 of size 128
[   91.372619] The buggy address is located 0 bytes inside of
[   91.372619]  allocated 120-byte region [cc23f200, cc23f278)
[   91.383728] 
[   91.385253] The buggy address belongs to the physical page:
[   91.390838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.398132] flags: 0x0(zone=0)
[   91.401214] page_type: f5(slab)
[   91.404388] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.412506] raw: 00000000
[   91.415161] page dumped because: kasan: bad access detected
[   91.420776] 
[   91.422271] Memory state around the buggy address:
[   91.427093]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   91.433654]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.440246] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.446807]                                                         ^
[   91.453308]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.459869]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.466430] ==================================================================
[   92.052673] ==================================================================
[   92.059936] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0
[   92.067138] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.073974] 
[   92.075469] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.075500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.075500] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.075531] Call trace: 
[   92.075531]  unwind_backtrace from show_stack+0x18/0x1c
[   92.075561]  show_stack from dump_stack_lvl+0x70/0x90
[   92.075561]  dump_stack_lvl from print_report+0x158/0x528
[   92.075592]  print_report from kasan_report+0xdc/0x118
[   92.075622]  kasan_report from kasan_check_range+0x14c/0x198
[   92.075653]  kasan_check_range from copy_user_test_oob+0x484/0x12b0
[   92.075683]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.075683]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.075714]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.075744]  kthread from ret_from_fork+0x14/0x20
[   92.075775] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.075775] bfa0:                                     00000000 00000000 00000000 00000000
[   92.075805] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.075805] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.075836] 
[   92.187072] Allocated by task 341:
[   92.190521]  kasan_save_track+0x30/0x5c
[   92.194366]  __kasan_kmalloc+0x8c/0x94
[   92.198150]  __kmalloc_noprof+0x20c/0x488
[   92.202209]  kunit_kmalloc_array+0x28/0x60
[   92.206329]  copy_user_test_oob+0xac/0x12b0
[   92.210540]  kunit_try_run_case+0x22c/0x5a8
[   92.214782]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.220306]  kthread+0x464/0x810
[   92.223571]  ret_from_fork+0x14/0x20
[   92.227172] 
[   92.228668] The buggy address belongs to the object at cc23f200
[   92.228668]  which belongs to the cache kmalloc-128 of size 128
[   92.240570] The buggy address is located 0 bytes inside of
[   92.240570]  allocated 120-byte region [cc23f200, cc23f278)
[   92.251678] 
[   92.253204] The buggy address belongs to the physical page:
[   92.258789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.266082] flags: 0x0(zone=0)
[   92.269165] page_type: f5(slab)
[   92.272338] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.280456] raw: 00000000
[   92.283111] page dumped because: kasan: bad access detected
[   92.288726] 
[   92.290222] Memory state around the buggy address:
[   92.295043]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.301605]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.308197] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.314758]                                                         ^
[   92.321228]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.327819]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.334381] ==================================================================
[   92.630828] ==================================================================
[   92.638092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0
[   92.645263] Read of size 121 at addr cc23f200 by task kunit_try_catch/341
[   92.652130] 
[   92.653625] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   92.653656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.653656] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.653686] Call trace: 
[   92.653686]  unwind_backtrace from show_stack+0x18/0x1c
[   92.653717]  show_stack from dump_stack_lvl+0x70/0x90
[   92.653717]  dump_stack_lvl from print_report+0x158/0x528
[   92.653747]  print_report from kasan_report+0xdc/0x118
[   92.653778]  kasan_report from kasan_check_range+0x14c/0x198
[   92.653808]  kasan_check_range from copy_user_test_oob+0x604/0x12b0
[   92.653839]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.653839]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.653869]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.653900]  kthread from ret_from_fork+0x14/0x20
[   92.653930] Exception stack(0xf277bfb0 to 0xf277bff8)
[   92.653930] bfa0:                                     00000000 00000000 00000000 00000000
[   92.653961] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.653961] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.653991] 
[   92.765228] Allocated by task 341:
[   92.768676]  kasan_save_track+0x30/0x5c
[   92.772521]  __kasan_kmalloc+0x8c/0x94
[   92.776306]  __kmalloc_noprof+0x20c/0x488
[   92.780364]  kunit_kmalloc_array+0x28/0x60
[   92.784484]  copy_user_test_oob+0xac/0x12b0
[   92.788696]  kunit_try_run_case+0x22c/0x5a8
[   92.792938]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.798461]  kthread+0x464/0x810
[   92.801696]  ret_from_fork+0x14/0x20
[   92.805328] 
[   92.806823] The buggy address belongs to the object at cc23f200
[   92.806823]  which belongs to the cache kmalloc-128 of size 128
[   92.818725] The buggy address is located 0 bytes inside of
[   92.818725]  allocated 120-byte region [cc23f200, cc23f278)
[   92.829833] 
[   92.831329] The buggy address belongs to the physical page:
[   92.836944] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   92.844207] flags: 0x0(zone=0)
[   92.847290] page_type: f5(slab)
[   92.850463] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.858612] raw: 00000000
[   92.861236] page dumped because: kasan: bad access detected
[   92.866851] 
[   92.868347] Memory state around the buggy address:
[   92.873168]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.879760]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.886322] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.892883]                                                         ^
[   92.899383]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.905944]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.912536] ==================================================================
[   91.763458] ==================================================================
[   91.770721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0
[   91.777923] Write of size 121 at addr cc23f200 by task kunit_try_catch/341
[   91.784851] 
[   91.786346] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   91.786376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.786407] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.786407] Call trace: 
[   91.786407]  unwind_backtrace from show_stack+0x18/0x1c
[   91.786437]  show_stack from dump_stack_lvl+0x70/0x90
[   91.786468]  dump_stack_lvl from print_report+0x158/0x528
[   91.786499]  print_report from kasan_report+0xdc/0x118
[   91.786499]  kasan_report from kasan_check_range+0x14c/0x198
[   91.786529]  kasan_check_range from copy_user_test_oob+0x3c4/0x12b0
[   91.786560]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.786590]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.786621]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.786651]  kthread from ret_from_fork+0x14/0x20
[   91.786651] Exception stack(0xf277bfb0 to 0xf277bff8)
[   91.786682] bfa0:                                     00000000 00000000 00000000 00000000
[   91.786682] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.786712] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.786712] 
[   91.897979] Allocated by task 341:
[   91.901397]  kasan_save_track+0x30/0x5c
[   91.905273]  __kasan_kmalloc+0x8c/0x94
[   91.909057]  __kmalloc_noprof+0x20c/0x488
[   91.913116]  kunit_kmalloc_array+0x28/0x60
[   91.917236]  copy_user_test_oob+0xac/0x12b0
[   91.921447]  kunit_try_run_case+0x22c/0x5a8
[   91.925659]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.931213]  kthread+0x464/0x810
[   91.934448]  ret_from_fork+0x14/0x20
[   91.938049] 
[   91.939575] The buggy address belongs to the object at cc23f200
[   91.939575]  which belongs to the cache kmalloc-128 of size 128
[   91.951477] The buggy address is located 0 bytes inside of
[   91.951477]  allocated 120-byte region [cc23f200, cc23f278)
[   91.962585] 
[   91.964080] The buggy address belongs to the physical page:
[   91.969696] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f
[   91.976959] flags: 0x0(zone=0)
[   91.980041] page_type: f5(slab)
[   91.983215] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.991363] raw: 00000000
[   91.993988] page dumped because: kasan: bad access detected
[   91.999603] 
[   92.001098] Memory state around the buggy address:
[   92.005920]  cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   92.012512]  cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.019073] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.025634]                                                         ^
[   92.032135]  cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.038696]  cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.045257] ==================================================================

[   78.253756] ==================================================================
[   78.260997] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   78.268132] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   78.275619] 
[   78.277118] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   78.277126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.277128] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.277131] Call Trace:
[   78.277133]  <TASK>
[   78.277135]  dump_stack_lvl+0x73/0xb0
[   78.277139]  print_report+0xd1/0x650
[   78.277143]  ? __virt_addr_valid+0x1db/0x2d0
[   78.277147]  ? copy_user_test_oob+0x604/0x10f0
[   78.277150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.277155]  ? copy_user_test_oob+0x604/0x10f0
[   78.277158]  kasan_report+0x141/0x180
[   78.277163]  ? copy_user_test_oob+0x604/0x10f0
[   78.277167]  kasan_check_range+0x10c/0x1c0
[   78.277172]  __kasan_check_read+0x15/0x20
[   78.277176]  copy_user_test_oob+0x604/0x10f0
[   78.277180]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.277184]  ? finish_task_switch.isra.0+0x153/0x700
[   78.277188]  ? __switch_to+0x5d9/0xf60
[   78.277192]  ? dequeue_task_fair+0x166/0x4e0
[   78.277197]  ? __schedule+0x10cc/0x2b30
[   78.277201]  ? ktime_get_ts64+0x83/0x230
[   78.277206]  kunit_try_run_case+0x1a2/0x480
[   78.277211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.277215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.277220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.277224]  ? __kthread_parkme+0x82/0x180
[   78.277229]  ? preempt_count_sub+0x50/0x80
[   78.277233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.277238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.277242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.277246]  kthread+0x334/0x6f0
[   78.277250]  ? trace_preempt_on+0x20/0xc0
[   78.277255]  ? __pfx_kthread+0x10/0x10
[   78.277259]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.277263]  ? calculate_sigpending+0x7b/0xa0
[   78.277267]  ? __pfx_kthread+0x10/0x10
[   78.277272]  ret_from_fork+0x3e/0x80
[   78.277276]  ? __pfx_kthread+0x10/0x10
[   78.277280]  ret_from_fork_asm+0x1a/0x30
[   78.277286]  </TASK>
[   78.277288] 
[   78.457141] Allocated by task 328:
[   78.460548]  kasan_save_stack+0x45/0x70
[   78.464386]  kasan_save_track+0x18/0x40
[   78.468227]  kasan_save_alloc_info+0x3b/0x50
[   78.472500]  __kasan_kmalloc+0xb7/0xc0
[   78.476259]  __kmalloc_noprof+0x1c9/0x500
[   78.480274]  kunit_kmalloc_array+0x25/0x60
[   78.484380]  copy_user_test_oob+0xab/0x10f0
[   78.488567]  kunit_try_run_case+0x1a2/0x480
[   78.492762]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.498159]  kthread+0x334/0x6f0
[   78.501393]  ret_from_fork+0x3e/0x80
[   78.504981]  ret_from_fork_asm+0x1a/0x30
[   78.508905] 
[   78.510405] The buggy address belongs to the object at ffff888104ee9700
[   78.510405]  which belongs to the cache kmalloc-128 of size 128
[   78.522920] The buggy address is located 0 bytes inside of
[   78.522920]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   78.535355] 
[   78.536854] The buggy address belongs to the physical page:
[   78.542426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   78.550426] flags: 0x200000000000000(node=0|zone=2)
[   78.555305] page_type: f5(slab)
[   78.558453] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.566201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.573946] page dumped because: kasan: bad access detected
[   78.579517] 
[   78.581019] Memory state around the buggy address:
[   78.585811]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.593038]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.600258] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.607474]                                                                 ^
[   78.614609]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.621837]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.629056] ==================================================================
[   77.488256] ==================================================================
[   77.495482] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   77.502615] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.510102] 
[   77.511601] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.511609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.511611] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.511615] Call Trace:
[   77.511617]  <TASK>
[   77.511619]  dump_stack_lvl+0x73/0xb0
[   77.511623]  print_report+0xd1/0x650
[   77.511627]  ? __virt_addr_valid+0x1db/0x2d0
[   77.511631]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.511639]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511643]  kasan_report+0x141/0x180
[   77.511647]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511652]  kasan_check_range+0x10c/0x1c0
[   77.511657]  __kasan_check_read+0x15/0x20
[   77.511661]  copy_user_test_oob+0x4aa/0x10f0
[   77.511665]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.511668]  ? finish_task_switch.isra.0+0x153/0x700
[   77.511690]  ? __switch_to+0x5d9/0xf60
[   77.511694]  ? dequeue_task_fair+0x166/0x4e0
[   77.511699]  ? __schedule+0x10cc/0x2b30
[   77.511704]  ? ktime_get_ts64+0x83/0x230
[   77.511709]  kunit_try_run_case+0x1a2/0x480
[   77.511714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.511718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.511735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.511740]  ? __kthread_parkme+0x82/0x180
[   77.511744]  ? preempt_count_sub+0x50/0x80
[   77.511749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.511753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.511758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.511762]  kthread+0x334/0x6f0
[   77.511766]  ? trace_preempt_on+0x20/0xc0
[   77.511771]  ? __pfx_kthread+0x10/0x10
[   77.511775]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.511780]  ? calculate_sigpending+0x7b/0xa0
[   77.511784]  ? __pfx_kthread+0x10/0x10
[   77.511788]  ret_from_fork+0x3e/0x80
[   77.511792]  ? __pfx_kthread+0x10/0x10
[   77.511797]  ret_from_fork_asm+0x1a/0x30
[   77.511803]  </TASK>
[   77.511805] 
[   77.691762] Allocated by task 328:
[   77.695170]  kasan_save_stack+0x45/0x70
[   77.699010]  kasan_save_track+0x18/0x40
[   77.702857]  kasan_save_alloc_info+0x3b/0x50
[   77.707129]  __kasan_kmalloc+0xb7/0xc0
[   77.710880]  __kmalloc_noprof+0x1c9/0x500
[   77.714893]  kunit_kmalloc_array+0x25/0x60
[   77.718994]  copy_user_test_oob+0xab/0x10f0
[   77.723179]  kunit_try_run_case+0x1a2/0x480
[   77.727365]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.732764]  kthread+0x334/0x6f0
[   77.735995]  ret_from_fork+0x3e/0x80
[   77.739574]  ret_from_fork_asm+0x1a/0x30
[   77.743500] 
[   77.744999] The buggy address belongs to the object at ffff888104ee9700
[   77.744999]  which belongs to the cache kmalloc-128 of size 128
[   77.757505] The buggy address is located 0 bytes inside of
[   77.757505]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   77.769934] 
[   77.771433] The buggy address belongs to the physical page:
[   77.777006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   77.785012] flags: 0x200000000000000(node=0|zone=2)
[   77.789893] page_type: f5(slab)
[   77.793038] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.800778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.808525] page dumped because: kasan: bad access detected
[   77.814096] 
[   77.815595] Memory state around the buggy address:
[   77.820388]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.827608]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.834837] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.842063]                                                                 ^
[   77.849195]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.856413]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.863632] ==================================================================
[   77.870878] ==================================================================
[   77.878098] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   77.885238] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.892804] 
[   77.894305] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.894313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.894316] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.894319] Call Trace:
[   77.894321]  <TASK>
[   77.894323]  dump_stack_lvl+0x73/0xb0
[   77.894326]  print_report+0xd1/0x650
[   77.894331]  ? __virt_addr_valid+0x1db/0x2d0
[   77.894335]  ? copy_user_test_oob+0x557/0x10f0
[   77.894338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.894343]  ? copy_user_test_oob+0x557/0x10f0
[   77.894347]  kasan_report+0x141/0x180
[   77.894351]  ? copy_user_test_oob+0x557/0x10f0
[   77.894356]  kasan_check_range+0x10c/0x1c0
[   77.894360]  __kasan_check_write+0x18/0x20
[   77.894364]  copy_user_test_oob+0x557/0x10f0
[   77.894368]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.894372]  ? finish_task_switch.isra.0+0x153/0x700
[   77.894376]  ? __switch_to+0x5d9/0xf60
[   77.894380]  ? dequeue_task_fair+0x166/0x4e0
[   77.894385]  ? __schedule+0x10cc/0x2b30
[   77.894389]  ? ktime_get_ts64+0x83/0x230
[   77.894394]  kunit_try_run_case+0x1a2/0x480
[   77.894399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.894403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.894408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.894413]  ? __kthread_parkme+0x82/0x180
[   77.894417]  ? preempt_count_sub+0x50/0x80
[   77.894421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.894426]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.894430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.894434]  kthread+0x334/0x6f0
[   77.894438]  ? trace_preempt_on+0x20/0xc0
[   77.894443]  ? __pfx_kthread+0x10/0x10
[   77.894447]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.894452]  ? calculate_sigpending+0x7b/0xa0
[   77.894456]  ? __pfx_kthread+0x10/0x10
[   77.894460]  ret_from_fork+0x3e/0x80
[   77.894464]  ? __pfx_kthread+0x10/0x10
[   77.894469]  ret_from_fork_asm+0x1a/0x30
[   77.894475]  </TASK>
[   77.894476] 
[   78.074439] Allocated by task 328:
[   78.077847]  kasan_save_stack+0x45/0x70
[   78.081708]  kasan_save_track+0x18/0x40
[   78.085550]  kasan_save_alloc_info+0x3b/0x50
[   78.089822]  __kasan_kmalloc+0xb7/0xc0
[   78.093574]  __kmalloc_noprof+0x1c9/0x500
[   78.097587]  kunit_kmalloc_array+0x25/0x60
[   78.101705]  copy_user_test_oob+0xab/0x10f0
[   78.105899]  kunit_try_run_case+0x1a2/0x480
[   78.110085]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.115485]  kthread+0x334/0x6f0
[   78.118742]  ret_from_fork+0x3e/0x80
[   78.122322]  ret_from_fork_asm+0x1a/0x30
[   78.126255] 
[   78.127754] The buggy address belongs to the object at ffff888104ee9700
[   78.127754]  which belongs to the cache kmalloc-128 of size 128
[   78.140268] The buggy address is located 0 bytes inside of
[   78.140268]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   78.152704] 
[   78.154231] The buggy address belongs to the physical page:
[   78.159803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   78.167809] flags: 0x200000000000000(node=0|zone=2)
[   78.172705] page_type: f5(slab)
[   78.175879] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.183626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.191364] page dumped because: kasan: bad access detected
[   78.196938] 
[   78.198437] Memory state around the buggy address:
[   78.203230]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.210450]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.217703] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.224930]                                                                 ^
[   78.232061]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.239282]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.246508] ==================================================================
[   77.105322] ==================================================================
[   77.112555] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   77.119705] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.127296] 
[   77.128795] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.128804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.128807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.128810] Call Trace:
[   77.128812]  <TASK>
[   77.128814]  dump_stack_lvl+0x73/0xb0
[   77.128819]  print_report+0xd1/0x650
[   77.128823]  ? __virt_addr_valid+0x1db/0x2d0
[   77.128827]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.128836]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128839]  kasan_report+0x141/0x180
[   77.128844]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128848]  kasan_check_range+0x10c/0x1c0
[   77.128853]  __kasan_check_write+0x18/0x20
[   77.128857]  copy_user_test_oob+0x3fd/0x10f0
[   77.128861]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.128865]  ? finish_task_switch.isra.0+0x153/0x700
[   77.128870]  ? __switch_to+0x5d9/0xf60
[   77.128874]  ? dequeue_task_fair+0x166/0x4e0
[   77.128878]  ? __schedule+0x10cc/0x2b30
[   77.128883]  ? ktime_get_ts64+0x83/0x230
[   77.128888]  kunit_try_run_case+0x1a2/0x480
[   77.128893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.128897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.128902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.128907]  ? __kthread_parkme+0x82/0x180
[   77.128911]  ? preempt_count_sub+0x50/0x80
[   77.128916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.128920]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.128925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.128929]  kthread+0x334/0x6f0
[   77.128933]  ? trace_preempt_on+0x20/0xc0
[   77.128938]  ? __pfx_kthread+0x10/0x10
[   77.128942]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.128947]  ? calculate_sigpending+0x7b/0xa0
[   77.128951]  ? __pfx_kthread+0x10/0x10
[   77.128955]  ret_from_fork+0x3e/0x80
[   77.128960]  ? __pfx_kthread+0x10/0x10
[   77.128964]  ret_from_fork_asm+0x1a/0x30
[   77.128970]  </TASK>
[   77.128972] 
[   77.308957] Allocated by task 328:
[   77.312363]  kasan_save_stack+0x45/0x70
[   77.316202]  kasan_save_track+0x18/0x40
[   77.320041]  kasan_save_alloc_info+0x3b/0x50
[   77.324315]  __kasan_kmalloc+0xb7/0xc0
[   77.328074]  __kmalloc_noprof+0x1c9/0x500
[   77.332086]  kunit_kmalloc_array+0x25/0x60
[   77.336187]  copy_user_test_oob+0xab/0x10f0
[   77.340372]  kunit_try_run_case+0x1a2/0x480
[   77.344557]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.349957]  kthread+0x334/0x6f0
[   77.353190]  ret_from_fork+0x3e/0x80
[   77.356769]  ret_from_fork_asm+0x1a/0x30
[   77.360707] 
[   77.362229] The buggy address belongs to the object at ffff888104ee9700
[   77.362229]  which belongs to the cache kmalloc-128 of size 128
[   77.374748] The buggy address is located 0 bytes inside of
[   77.374748]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   77.387178] 
[   77.388704] The buggy address belongs to the physical page:
[   77.394303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   77.402311] flags: 0x200000000000000(node=0|zone=2)
[   77.407189] page_type: f5(slab)
[   77.410336] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.418084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.425831] page dumped because: kasan: bad access detected
[   77.431403] 
[   77.432903] Memory state around the buggy address:
[   77.437707]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.444933]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.452160] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.459386]                                                                 ^
[   77.466519]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.473757]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.480982] ==================================================================