Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   21.613217] ==================================================================
[   21.613406] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.613585] Read of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.613808] 
[   21.613939] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.614146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.614211] Hardware name: linux,dummy-virt (DT)
[   21.614315] Call trace:
[   21.614392]  show_stack+0x20/0x38 (C)
[   21.614559]  dump_stack_lvl+0x8c/0xd0
[   21.614713]  print_report+0x118/0x608
[   21.614854]  kasan_report+0xdc/0x128
[   21.614991]  kasan_check_range+0x100/0x1a8
[   21.615150]  __kasan_check_read+0x20/0x30
[   21.615264]  copy_user_test_oob+0x728/0xec8
[   21.615406]  kunit_try_run_case+0x170/0x3f0
[   21.615560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.615674]  kthread+0x328/0x630
[   21.615778]  ret_from_fork+0x10/0x20
[   21.616202] 
[   21.616314] Allocated by task 287:
[   21.616589]  kasan_save_stack+0x3c/0x68
[   21.616686]  kasan_save_track+0x20/0x40
[   21.616776]  kasan_save_alloc_info+0x40/0x58
[   21.616860]  __kasan_kmalloc+0xd4/0xd8
[   21.616939]  __kmalloc_noprof+0x190/0x4d0
[   21.616983]  kunit_kmalloc_array+0x34/0x88
[   21.617026]  copy_user_test_oob+0xac/0xec8
[   21.617063]  kunit_try_run_case+0x170/0x3f0
[   21.617144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.617236]  kthread+0x328/0x630
[   21.618187]  ret_from_fork+0x10/0x20
[   21.618356] 
[   21.618437] The buggy address belongs to the object at fff00000c42a5300
[   21.618437]  which belongs to the cache kmalloc-128 of size 128
[   21.619084] The buggy address is located 0 bytes inside of
[   21.619084]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.619576] 
[   21.619877] The buggy address belongs to the physical page:
[   21.620207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.620381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.620491] page_type: f5(slab)
[   21.620594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.620712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.620812] page dumped because: kasan: bad access detected
[   21.620898] 
[   21.620944] Memory state around the buggy address:
[   21.622540]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.622681]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.622784] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.622888]                                                                 ^
[   21.623067]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.623505]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.623898] ==================================================================
[   21.656954] ==================================================================
[   21.657078] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.657182] Write of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.657294] 
[   21.657382] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.657598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.657664] Hardware name: linux,dummy-virt (DT)
[   21.658038] Call trace:
[   21.658265]  show_stack+0x20/0x38 (C)
[   21.658501]  dump_stack_lvl+0x8c/0xd0
[   21.658628]  print_report+0x118/0x608
[   21.658750]  kasan_report+0xdc/0x128
[   21.658915]  kasan_check_range+0x100/0x1a8
[   21.659032]  __kasan_check_write+0x20/0x30
[   21.659194]  copy_user_test_oob+0x434/0xec8
[   21.659318]  kunit_try_run_case+0x170/0x3f0
[   21.659418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659581]  kthread+0x328/0x630
[   21.659886]  ret_from_fork+0x10/0x20
[   21.660031] 
[   21.660307] Allocated by task 287:
[   21.660510]  kasan_save_stack+0x3c/0x68
[   21.660662]  kasan_save_track+0x20/0x40
[   21.660786]  kasan_save_alloc_info+0x40/0x58
[   21.660876]  __kasan_kmalloc+0xd4/0xd8
[   21.660941]  __kmalloc_noprof+0x190/0x4d0
[   21.661015]  kunit_kmalloc_array+0x34/0x88
[   21.661099]  copy_user_test_oob+0xac/0xec8
[   21.661185]  kunit_try_run_case+0x170/0x3f0
[   21.661279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.661387]  kthread+0x328/0x630
[   21.661495]  ret_from_fork+0x10/0x20
[   21.661648] 
[   21.661729] The buggy address belongs to the object at fff00000c42a5300
[   21.661729]  which belongs to the cache kmalloc-128 of size 128
[   21.661930] The buggy address is located 0 bytes inside of
[   21.661930]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.662145] 
[   21.662214] The buggy address belongs to the physical page:
[   21.662328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.662466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.662577] page_type: f5(slab)
[   21.662653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.662789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.662931] page dumped because: kasan: bad access detected
[   21.663145] 
[   21.663225] Memory state around the buggy address:
[   21.663306]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.663664]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.663822] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.663933]                                                                 ^
[   21.664244]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.664411]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.664495] ==================================================================
[   21.593915] ==================================================================
[   21.594728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.594912] Write of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.595041] 
[   21.595146] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.595362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.595434] Hardware name: linux,dummy-virt (DT)
[   21.595515] Call trace:
[   21.595589]  show_stack+0x20/0x38 (C)
[   21.595708]  dump_stack_lvl+0x8c/0xd0
[   21.595830]  print_report+0x118/0x608
[   21.595934]  kasan_report+0xdc/0x128
[   21.596032]  kasan_check_range+0x100/0x1a8
[   21.596141]  __kasan_check_write+0x20/0x30
[   21.596251]  copy_user_test_oob+0x234/0xec8
[   21.596361]  kunit_try_run_case+0x170/0x3f0
[   21.596476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.596616]  kthread+0x328/0x630
[   21.596717]  ret_from_fork+0x10/0x20
[   21.596871] 
[   21.596933] Allocated by task 287:
[   21.597027]  kasan_save_stack+0x3c/0x68
[   21.597838]  kasan_save_track+0x20/0x40
[   21.597942]  kasan_save_alloc_info+0x40/0x58
[   21.598072]  __kasan_kmalloc+0xd4/0xd8
[   21.598174]  __kmalloc_noprof+0x190/0x4d0
[   21.598260]  kunit_kmalloc_array+0x34/0x88
[   21.598389]  copy_user_test_oob+0xac/0xec8
[   21.598509]  kunit_try_run_case+0x170/0x3f0
[   21.598657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.598762]  kthread+0x328/0x630
[   21.598853]  ret_from_fork+0x10/0x20
[   21.598983] 
[   21.599040] The buggy address belongs to the object at fff00000c42a5300
[   21.599040]  which belongs to the cache kmalloc-128 of size 128
[   21.599162] The buggy address is located 0 bytes inside of
[   21.599162]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.599639] 
[   21.599704] The buggy address belongs to the physical page:
[   21.599782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.599942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.600087] page_type: f5(slab)
[   21.600191] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.600300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.600640] page dumped because: kasan: bad access detected
[   21.600776] 
[   21.600854] Memory state around the buggy address:
[   21.600972]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.601119]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.601222] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.601326]                                                                 ^
[   21.601483]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.601616]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.601714] ==================================================================
[   21.647146] ==================================================================
[   21.647266] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.647374] Read of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.647488] 
[   21.647623] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.648163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.648372] Hardware name: linux,dummy-virt (DT)
[   21.648509] Call trace:
[   21.648569]  show_stack+0x20/0x38 (C)
[   21.649006]  dump_stack_lvl+0x8c/0xd0
[   21.649399]  print_report+0x118/0x608
[   21.649576]  kasan_report+0xdc/0x128
[   21.649724]  kasan_check_range+0x100/0x1a8
[   21.649833]  __kasan_check_read+0x20/0x30
[   21.650036]  copy_user_test_oob+0x3c8/0xec8
[   21.650313]  kunit_try_run_case+0x170/0x3f0
[   21.650430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.650636]  kthread+0x328/0x630
[   21.651027]  ret_from_fork+0x10/0x20
[   21.651189] 
[   21.651239] Allocated by task 287:
[   21.651811]  kasan_save_stack+0x3c/0x68
[   21.652060]  kasan_save_track+0x20/0x40
[   21.652205]  kasan_save_alloc_info+0x40/0x58
[   21.652311]  __kasan_kmalloc+0xd4/0xd8
[   21.652395]  __kmalloc_noprof+0x190/0x4d0
[   21.652476]  kunit_kmalloc_array+0x34/0x88
[   21.652575]  copy_user_test_oob+0xac/0xec8
[   21.652669]  kunit_try_run_case+0x170/0x3f0
[   21.652764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.652913]  kthread+0x328/0x630
[   21.653030]  ret_from_fork+0x10/0x20
[   21.653150] 
[   21.653205] The buggy address belongs to the object at fff00000c42a5300
[   21.653205]  which belongs to the cache kmalloc-128 of size 128
[   21.653416] The buggy address is located 0 bytes inside of
[   21.653416]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.653586] 
[   21.653637] The buggy address belongs to the physical page:
[   21.653705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.653865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.654192] page_type: f5(slab)
[   21.654276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.654387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.654484] page dumped because: kasan: bad access detected
[   21.654569] 
[   21.654610] Memory state around the buggy address:
[   21.655068]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.655225]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.655351] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.655462]                                                                 ^
[   21.655566]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.655800]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.656003] ==================================================================
[   21.637042] ==================================================================
[   21.637252] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.637375] Write of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.637493] 
[   21.637594] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.638075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.638162] Hardware name: linux,dummy-virt (DT)
[   21.638249] Call trace:
[   21.638305]  show_stack+0x20/0x38 (C)
[   21.638421]  dump_stack_lvl+0x8c/0xd0
[   21.638539]  print_report+0x118/0x608
[   21.638648]  kasan_report+0xdc/0x128
[   21.638755]  kasan_check_range+0x100/0x1a8
[   21.638866]  __kasan_check_write+0x20/0x30
[   21.639400]  copy_user_test_oob+0x35c/0xec8
[   21.639656]  kunit_try_run_case+0x170/0x3f0
[   21.639879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.640115]  kthread+0x328/0x630
[   21.640480]  ret_from_fork+0x10/0x20
[   21.640677] 
[   21.640727] Allocated by task 287:
[   21.640798]  kasan_save_stack+0x3c/0x68
[   21.640881]  kasan_save_track+0x20/0x40
[   21.641016]  kasan_save_alloc_info+0x40/0x58
[   21.641115]  __kasan_kmalloc+0xd4/0xd8
[   21.641367]  __kmalloc_noprof+0x190/0x4d0
[   21.641848]  kunit_kmalloc_array+0x34/0x88
[   21.642024]  copy_user_test_oob+0xac/0xec8
[   21.642124]  kunit_try_run_case+0x170/0x3f0
[   21.642210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.642661]  kthread+0x328/0x630
[   21.643174]  ret_from_fork+0x10/0x20
[   21.643334] 
[   21.643412] The buggy address belongs to the object at fff00000c42a5300
[   21.643412]  which belongs to the cache kmalloc-128 of size 128
[   21.643632] The buggy address is located 0 bytes inside of
[   21.643632]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.643839] 
[   21.643886] The buggy address belongs to the physical page:
[   21.643959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.644123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.644296] page_type: f5(slab)
[   21.644396] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.644564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.644656] page dumped because: kasan: bad access detected
[   21.644735] 
[   21.644791] Memory state around the buggy address:
[   21.645059]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.645221]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.645566] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.645698]                                                                 ^
[   21.645813]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.645950]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.646040] ==================================================================
[   21.666526] ==================================================================
[   21.666759] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.667185] Read of size 121 at addr fff00000c42a5300 by task kunit_try_catch/287
[   21.667371] 
[   21.667451] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.667859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.667944] Hardware name: linux,dummy-virt (DT)
[   21.668009] Call trace:
[   21.668050]  show_stack+0x20/0x38 (C)
[   21.668158]  dump_stack_lvl+0x8c/0xd0
[   21.668257]  print_report+0x118/0x608
[   21.668629]  kasan_report+0xdc/0x128
[   21.669077]  kasan_check_range+0x100/0x1a8
[   21.669309]  __kasan_check_read+0x20/0x30
[   21.669557]  copy_user_test_oob+0x4a0/0xec8
[   21.669696]  kunit_try_run_case+0x170/0x3f0
[   21.669811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.669926]  kthread+0x328/0x630
[   21.670030]  ret_from_fork+0x10/0x20
[   21.670152] 
[   21.670204] Allocated by task 287:
[   21.671314]  kasan_save_stack+0x3c/0x68
[   21.671548]  kasan_save_track+0x20/0x40
[   21.671657]  kasan_save_alloc_info+0x40/0x58
[   21.671837]  __kasan_kmalloc+0xd4/0xd8
[   21.671974]  __kmalloc_noprof+0x190/0x4d0
[   21.672064]  kunit_kmalloc_array+0x34/0x88
[   21.672147]  copy_user_test_oob+0xac/0xec8
[   21.672214]  kunit_try_run_case+0x170/0x3f0
[   21.672278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.672362]  kthread+0x328/0x630
[   21.672425]  ret_from_fork+0x10/0x20
[   21.672488] 
[   21.672539] The buggy address belongs to the object at fff00000c42a5300
[   21.672539]  which belongs to the cache kmalloc-128 of size 128
[   21.672669] The buggy address is located 0 bytes inside of
[   21.672669]  allocated 120-byte region [fff00000c42a5300, fff00000c42a5378)
[   21.672813] 
[   21.675465] The buggy address belongs to the physical page:
[   21.675598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042a5
[   21.675739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.675856] page_type: f5(slab)
[   21.675945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.676057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.676135] page dumped because: kasan: bad access detected
[   21.676200] 
[   21.676241] Memory state around the buggy address:
[   21.676315]  fff00000c42a5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.676420]  fff00000c42a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.676525] >fff00000c42a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.676631]                                                                 ^
[   21.676732]  fff00000c42a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.676837]  fff00000c42a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.677370] ==================================================================

[   25.531076] ==================================================================
[   25.531671] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   25.533599] Write of size 121 at addr ffff888103c6f300 by task kunit_try_catch/305
[   25.534293] 
[   25.535659] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.535793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.535836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.535898] Call Trace:
[   25.535951]  <TASK>
[   25.535995]  dump_stack_lvl+0x73/0xb0
[   25.536066]  print_report+0xd1/0x650
[   25.536127]  ? __virt_addr_valid+0x1db/0x2d0
[   25.536180]  ? copy_user_test_oob+0x557/0x10f0
[   25.536231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.536287]  ? copy_user_test_oob+0x557/0x10f0
[   25.536340]  kasan_report+0x141/0x180
[   25.536395]  ? copy_user_test_oob+0x557/0x10f0
[   25.536564]  kasan_check_range+0x10c/0x1c0
[   25.536630]  __kasan_check_write+0x18/0x20
[   25.536681]  copy_user_test_oob+0x557/0x10f0
[   25.536737]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.536785]  ? finish_task_switch.isra.0+0x153/0x700
[   25.536841]  ? __switch_to+0x5d9/0xf60
[   25.536889]  ? dequeue_task_fair+0x166/0x4e0
[   25.536952]  ? __schedule+0x10cc/0x2b30
[   25.537009]  ? __pfx_read_tsc+0x10/0x10
[   25.537101]  ? ktime_get_ts64+0x86/0x230
[   25.537190]  kunit_try_run_case+0x1a5/0x480
[   25.537273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.537351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.537504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.537606]  ? __kthread_parkme+0x82/0x180
[   25.537685]  ? preempt_count_sub+0x50/0x80
[   25.537767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.537846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.537926]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.537991]  kthread+0x337/0x6f0
[   25.538061]  ? trace_preempt_on+0x20/0xc0
[   25.538132]  ? __pfx_kthread+0x10/0x10
[   25.538193]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.538258]  ? calculate_sigpending+0x7b/0xa0
[   25.538315]  ? __pfx_kthread+0x10/0x10
[   25.538372]  ret_from_fork+0x41/0x80
[   25.539566]  ? __pfx_kthread+0x10/0x10
[   25.539646]  ret_from_fork_asm+0x1a/0x30
[   25.539704]  </TASK>
[   25.539720] 
[   25.560748] Allocated by task 305:
[   25.561578]  kasan_save_stack+0x45/0x70
[   25.562276]  kasan_save_track+0x18/0x40
[   25.562955]  kasan_save_alloc_info+0x3b/0x50
[   25.563311]  __kasan_kmalloc+0xb7/0xc0
[   25.563768]  __kmalloc_noprof+0x1c9/0x500
[   25.564630]  kunit_kmalloc_array+0x25/0x60
[   25.564957]  copy_user_test_oob+0xab/0x10f0
[   25.565273]  kunit_try_run_case+0x1a5/0x480
[   25.566343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.566894]  kthread+0x337/0x6f0
[   25.567177]  ret_from_fork+0x41/0x80
[   25.567541]  ret_from_fork_asm+0x1a/0x30
[   25.568276] 
[   25.568865] The buggy address belongs to the object at ffff888103c6f300
[   25.568865]  which belongs to the cache kmalloc-128 of size 128
[   25.570124] The buggy address is located 0 bytes inside of
[   25.570124]  allocated 120-byte region [ffff888103c6f300, ffff888103c6f378)
[   25.571431] 
[   25.571978] The buggy address belongs to the physical page:
[   25.572298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.573225] flags: 0x200000000000000(node=0|zone=2)
[   25.573948] page_type: f5(slab)
[   25.574258] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.575649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.576270] page dumped because: kasan: bad access detected
[   25.577167] 
[   25.577359] Memory state around the buggy address:
[   25.577697]  ffff888103c6f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.578774]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.579302] >ffff888103c6f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.579973]                                                                 ^
[   25.580851]  ffff888103c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.581337]  ffff888103c6f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.581912] ==================================================================
[   25.487922] ==================================================================
[   25.488396] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   25.488922] Read of size 121 at addr ffff888103c6f300 by task kunit_try_catch/305
[   25.489946] 
[   25.490340] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.490492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.490536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.490598] Call Trace:
[   25.490648]  <TASK>
[   25.490700]  dump_stack_lvl+0x73/0xb0
[   25.490778]  print_report+0xd1/0x650
[   25.490852]  ? __virt_addr_valid+0x1db/0x2d0
[   25.490927]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.491001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.491079]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.491152]  kasan_report+0x141/0x180
[   25.491234]  ? copy_user_test_oob+0x4aa/0x10f0
[   25.491323]  kasan_check_range+0x10c/0x1c0
[   25.491405]  __kasan_check_read+0x15/0x20
[   25.491524]  copy_user_test_oob+0x4aa/0x10f0
[   25.491612]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.491685]  ? finish_task_switch.isra.0+0x153/0x700
[   25.491762]  ? __switch_to+0x5d9/0xf60
[   25.491834]  ? dequeue_task_fair+0x166/0x4e0
[   25.491941]  ? __schedule+0x10cc/0x2b30
[   25.492051]  ? __pfx_read_tsc+0x10/0x10
[   25.492108]  ? ktime_get_ts64+0x86/0x230
[   25.492178]  kunit_try_run_case+0x1a5/0x480
[   25.492261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.492340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.492423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.492524]  ? __kthread_parkme+0x82/0x180
[   25.492601]  ? preempt_count_sub+0x50/0x80
[   25.492682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.492762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.492843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.492921]  kthread+0x337/0x6f0
[   25.492995]  ? trace_preempt_on+0x20/0xc0
[   25.493076]  ? __pfx_kthread+0x10/0x10
[   25.493153]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.493225]  ? calculate_sigpending+0x7b/0xa0
[   25.493297]  ? __pfx_kthread+0x10/0x10
[   25.493376]  ret_from_fork+0x41/0x80
[   25.493517]  ? __pfx_kthread+0x10/0x10
[   25.493611]  ret_from_fork_asm+0x1a/0x30
[   25.493712]  </TASK>
[   25.493749] 
[   25.510873] Allocated by task 305:
[   25.511215]  kasan_save_stack+0x45/0x70
[   25.511708]  kasan_save_track+0x18/0x40
[   25.512119]  kasan_save_alloc_info+0x3b/0x50
[   25.512536]  __kasan_kmalloc+0xb7/0xc0
[   25.512859]  __kmalloc_noprof+0x1c9/0x500
[   25.513253]  kunit_kmalloc_array+0x25/0x60
[   25.513771]  copy_user_test_oob+0xab/0x10f0
[   25.514219]  kunit_try_run_case+0x1a5/0x480
[   25.514736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.515283]  kthread+0x337/0x6f0
[   25.515731]  ret_from_fork+0x41/0x80
[   25.516041]  ret_from_fork_asm+0x1a/0x30
[   25.516491] 
[   25.516721] The buggy address belongs to the object at ffff888103c6f300
[   25.516721]  which belongs to the cache kmalloc-128 of size 128
[   25.517829] The buggy address is located 0 bytes inside of
[   25.517829]  allocated 120-byte region [ffff888103c6f300, ffff888103c6f378)
[   25.518779] 
[   25.518999] The buggy address belongs to the physical page:
[   25.519550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.520126] flags: 0x200000000000000(node=0|zone=2)
[   25.520561] page_type: f5(slab)
[   25.520953] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.521723] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.522170] page dumped because: kasan: bad access detected
[   25.522649] 
[   25.522876] Memory state around the buggy address:
[   25.523333]  ffff888103c6f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.526040]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.527204] >ffff888103c6f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.527645]                                                                 ^
[   25.528002]  ffff888103c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.528556]  ffff888103c6f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.529643] ==================================================================
[   25.449867] ==================================================================
[   25.450419] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   25.451033] Write of size 121 at addr ffff888103c6f300 by task kunit_try_catch/305
[   25.451674] 
[   25.451954] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.452087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.452126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.452191] Call Trace:
[   25.452236]  <TASK>
[   25.452286]  dump_stack_lvl+0x73/0xb0
[   25.452368]  print_report+0xd1/0x650
[   25.452517]  ? __virt_addr_valid+0x1db/0x2d0
[   25.452605]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.452674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.452750]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.452821]  kasan_report+0x141/0x180
[   25.452901]  ? copy_user_test_oob+0x3fd/0x10f0
[   25.452987]  kasan_check_range+0x10c/0x1c0
[   25.453049]  __kasan_check_write+0x18/0x20
[   25.453080]  copy_user_test_oob+0x3fd/0x10f0
[   25.453114]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.453141]  ? finish_task_switch.isra.0+0x153/0x700
[   25.453177]  ? __switch_to+0x5d9/0xf60
[   25.453206]  ? dequeue_task_fair+0x166/0x4e0
[   25.453241]  ? __schedule+0x10cc/0x2b30
[   25.453275]  ? __pfx_read_tsc+0x10/0x10
[   25.453304]  ? ktime_get_ts64+0x86/0x230
[   25.453340]  kunit_try_run_case+0x1a5/0x480
[   25.453374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.453413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.453513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.453552]  ? __kthread_parkme+0x82/0x180
[   25.453601]  ? preempt_count_sub+0x50/0x80
[   25.453637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.453672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.453705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.453738]  kthread+0x337/0x6f0
[   25.453768]  ? trace_preempt_on+0x20/0xc0
[   25.453803]  ? __pfx_kthread+0x10/0x10
[   25.453836]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.453869]  ? calculate_sigpending+0x7b/0xa0
[   25.453899]  ? __pfx_kthread+0x10/0x10
[   25.453931]  ret_from_fork+0x41/0x80
[   25.453961]  ? __pfx_kthread+0x10/0x10
[   25.453993]  ret_from_fork_asm+0x1a/0x30
[   25.454036]  </TASK>
[   25.454050] 
[   25.469631] Allocated by task 305:
[   25.469936]  kasan_save_stack+0x45/0x70
[   25.470263]  kasan_save_track+0x18/0x40
[   25.470913]  kasan_save_alloc_info+0x3b/0x50
[   25.471407]  __kasan_kmalloc+0xb7/0xc0
[   25.471859]  __kmalloc_noprof+0x1c9/0x500
[   25.472312]  kunit_kmalloc_array+0x25/0x60
[   25.472821]  copy_user_test_oob+0xab/0x10f0
[   25.473274]  kunit_try_run_case+0x1a5/0x480
[   25.473764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.474209]  kthread+0x337/0x6f0
[   25.474704]  ret_from_fork+0x41/0x80
[   25.475111]  ret_from_fork_asm+0x1a/0x30
[   25.475579] 
[   25.475733] The buggy address belongs to the object at ffff888103c6f300
[   25.475733]  which belongs to the cache kmalloc-128 of size 128
[   25.476382] The buggy address is located 0 bytes inside of
[   25.476382]  allocated 120-byte region [ffff888103c6f300, ffff888103c6f378)
[   25.477093] 
[   25.477290] The buggy address belongs to the physical page:
[   25.477828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.478617] flags: 0x200000000000000(node=0|zone=2)
[   25.479134] page_type: f5(slab)
[   25.479545] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.480257] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.481032] page dumped because: kasan: bad access detected
[   25.481647] 
[   25.481830] Memory state around the buggy address:
[   25.482167]  ffff888103c6f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.482857]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.483469] >ffff888103c6f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.484517]                                                                 ^
[   25.485045]  ffff888103c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.485546]  ffff888103c6f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.486231] ==================================================================
[   25.584181] ==================================================================
[   25.584833] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   25.585531] Read of size 121 at addr ffff888103c6f300 by task kunit_try_catch/305
[   25.586232] 
[   25.587168] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.587560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.587605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.587666] Call Trace:
[   25.587714]  <TASK>
[   25.587765]  dump_stack_lvl+0x73/0xb0
[   25.587844]  print_report+0xd1/0x650
[   25.587887]  ? __virt_addr_valid+0x1db/0x2d0
[   25.587918]  ? copy_user_test_oob+0x604/0x10f0
[   25.587946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.587979]  ? copy_user_test_oob+0x604/0x10f0
[   25.588010]  kasan_report+0x141/0x180
[   25.588044]  ? copy_user_test_oob+0x604/0x10f0
[   25.588081]  kasan_check_range+0x10c/0x1c0
[   25.588117]  __kasan_check_read+0x15/0x20
[   25.588146]  copy_user_test_oob+0x604/0x10f0
[   25.588177]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.588204]  ? finish_task_switch.isra.0+0x153/0x700
[   25.588238]  ? __switch_to+0x5d9/0xf60
[   25.588268]  ? dequeue_task_fair+0x166/0x4e0
[   25.588305]  ? __schedule+0x10cc/0x2b30
[   25.588340]  ? __pfx_read_tsc+0x10/0x10
[   25.588369]  ? ktime_get_ts64+0x86/0x230
[   25.588431]  kunit_try_run_case+0x1a5/0x480
[   25.588507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.588544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.588580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.588615]  ? __kthread_parkme+0x82/0x180
[   25.588647]  ? preempt_count_sub+0x50/0x80
[   25.588682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.588716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.588749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.588782]  kthread+0x337/0x6f0
[   25.588812]  ? trace_preempt_on+0x20/0xc0
[   25.588846]  ? __pfx_kthread+0x10/0x10
[   25.588877]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.588908]  ? calculate_sigpending+0x7b/0xa0
[   25.588939]  ? __pfx_kthread+0x10/0x10
[   25.588972]  ret_from_fork+0x41/0x80
[   25.589003]  ? __pfx_kthread+0x10/0x10
[   25.589035]  ret_from_fork_asm+0x1a/0x30
[   25.589078]  </TASK>
[   25.589092] 
[   25.607178] Allocated by task 305:
[   25.607596]  kasan_save_stack+0x45/0x70
[   25.607942]  kasan_save_track+0x18/0x40
[   25.608343]  kasan_save_alloc_info+0x3b/0x50
[   25.608887]  __kasan_kmalloc+0xb7/0xc0
[   25.609323]  __kmalloc_noprof+0x1c9/0x500
[   25.609810]  kunit_kmalloc_array+0x25/0x60
[   25.610212]  copy_user_test_oob+0xab/0x10f0
[   25.610722]  kunit_try_run_case+0x1a5/0x480
[   25.611198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.611829]  kthread+0x337/0x6f0
[   25.612229]  ret_from_fork+0x41/0x80
[   25.612727]  ret_from_fork_asm+0x1a/0x30
[   25.613173] 
[   25.613503] The buggy address belongs to the object at ffff888103c6f300
[   25.613503]  which belongs to the cache kmalloc-128 of size 128
[   25.614279] The buggy address is located 0 bytes inside of
[   25.614279]  allocated 120-byte region [ffff888103c6f300, ffff888103c6f378)
[   25.615434] 
[   25.615696] The buggy address belongs to the physical page:
[   25.616161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6f
[   25.616896] flags: 0x200000000000000(node=0|zone=2)
[   25.617344] page_type: f5(slab)
[   25.617811] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.618586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.619040] page dumped because: kasan: bad access detected
[   25.619670] 
[   25.619944] Memory state around the buggy address:
[   25.620497]  ffff888103c6f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.621095]  ffff888103c6f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.621783] >ffff888103c6f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.622446]                                                                 ^
[   25.623092]  ffff888103c6f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.623742]  ffff888103c6f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.624340] ==================================================================

[   24.056969] ==================================================================
[   24.058211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   24.058898] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.059602] 
[   24.059768] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.059821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.059837] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.059855] Call trace:
[   24.059868]  show_stack+0x20/0x38 (C)
[   24.059901]  dump_stack_lvl+0x8c/0xd0
[   24.059934]  print_report+0x118/0x608
[   24.059964]  kasan_report+0xdc/0x128
[   24.059993]  kasan_check_range+0x100/0x1a8
[   24.060027]  __kasan_check_write+0x20/0x30
[   24.060060]  copy_user_test_oob+0x234/0xec8
[   24.060088]  kunit_try_run_case+0x170/0x3f0
[   24.060125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.060165]  kthread+0x328/0x630
[   24.060201]  ret_from_fork+0x10/0x20
[   24.060235] 
[   24.066123] Allocated by task 343:
[   24.066453]  kasan_save_stack+0x3c/0x68
[   24.066831]  kasan_save_track+0x20/0x40
[   24.067204]  kasan_save_alloc_info+0x40/0x58
[   24.067620]  __kasan_kmalloc+0xd4/0xd8
[   24.067984]  __kmalloc_noprof+0x190/0x4d0
[   24.068373]  kunit_kmalloc_array+0x34/0x88
[   24.068776]  copy_user_test_oob+0xac/0xec8
[   24.069171]  kunit_try_run_case+0x170/0x3f0
[   24.069579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.070106]  kthread+0x328/0x630
[   24.070430]  ret_from_fork+0x10/0x20
[   24.070781] 
[   24.070936] The buggy address belongs to the object at ffff00000c98ed00
[   24.070936]  which belongs to the cache kmalloc-128 of size 128
[   24.072072] The buggy address is located 0 bytes inside of
[   24.072072]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.073201] 
[   24.073356] The buggy address belongs to the physical page:
[   24.073875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.074600] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.075213] page_type: f5(slab)
[   24.075528] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.076246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.076956] page dumped because: kasan: bad access detected
[   24.077472] 
[   24.077627] Memory state around the buggy address:
[   24.078078]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.078746]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.079414] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.080078]                                                                 ^
[   24.080735]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.081403]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.082068] ==================================================================
[   24.107767] ==================================================================
[   24.108430] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   24.109078] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.109766] 
[   24.109923] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.109961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.109972] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.109985] Call trace:
[   24.109995]  show_stack+0x20/0x38 (C)
[   24.110019]  dump_stack_lvl+0x8c/0xd0
[   24.110042]  print_report+0x118/0x608
[   24.110064]  kasan_report+0xdc/0x128
[   24.110085]  kasan_check_range+0x100/0x1a8
[   24.110109]  __kasan_check_write+0x20/0x30
[   24.110133]  copy_user_test_oob+0x35c/0xec8
[   24.110153]  kunit_try_run_case+0x170/0x3f0
[   24.110179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.110208]  kthread+0x328/0x630
[   24.110232]  ret_from_fork+0x10/0x20
[   24.110257] 
[   24.116095] Allocated by task 343:
[   24.116412]  kasan_save_stack+0x3c/0x68
[   24.116775]  kasan_save_track+0x20/0x40
[   24.117136]  kasan_save_alloc_info+0x40/0x58
[   24.117538]  __kasan_kmalloc+0xd4/0xd8
[   24.117893]  __kmalloc_noprof+0x190/0x4d0
[   24.118270]  kunit_kmalloc_array+0x34/0x88
[   24.118658]  copy_user_test_oob+0xac/0xec8
[   24.119042]  kunit_try_run_case+0x170/0x3f0
[   24.119436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.119947]  kthread+0x328/0x630
[   24.120258]  ret_from_fork+0x10/0x20
[   24.120598] 
[   24.120744] The buggy address belongs to the object at ffff00000c98ed00
[   24.120744]  which belongs to the cache kmalloc-128 of size 128
[   24.121864] The buggy address is located 0 bytes inside of
[   24.121864]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.122978] 
[   24.123126] The buggy address belongs to the physical page:
[   24.123634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.124347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.124947] page_type: f5(slab)
[   24.125249] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.125953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.126653] page dumped because: kasan: bad access detected
[   24.127161] 
[   24.127308] Memory state around the buggy address:
[   24.127747]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.128404]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.129059] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.129711]                                                                 ^
[   24.130358]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.131014]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.131666] ==================================================================
[   24.082940] ==================================================================
[   24.083619] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   24.084281] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.084963] 
[   24.085119] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.085157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.085168] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.085181] Call trace:
[   24.085191]  show_stack+0x20/0x38 (C)
[   24.085215]  dump_stack_lvl+0x8c/0xd0
[   24.085239]  print_report+0x118/0x608
[   24.085261]  kasan_report+0xdc/0x128
[   24.085282]  kasan_check_range+0x100/0x1a8
[   24.085305]  __kasan_check_read+0x20/0x30
[   24.085329]  copy_user_test_oob+0x728/0xec8
[   24.085349]  kunit_try_run_case+0x170/0x3f0
[   24.085375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.085404]  kthread+0x328/0x630
[   24.085429]  ret_from_fork+0x10/0x20
[   24.085455] 
[   24.091289] Allocated by task 343:
[   24.091611]  kasan_save_stack+0x3c/0x68
[   24.091976]  kasan_save_track+0x20/0x40
[   24.092338]  kasan_save_alloc_info+0x40/0x58
[   24.092740]  __kasan_kmalloc+0xd4/0xd8
[   24.093094]  __kmalloc_noprof+0x190/0x4d0
[   24.093473]  kunit_kmalloc_array+0x34/0x88
[   24.093862]  copy_user_test_oob+0xac/0xec8
[   24.094247]  kunit_try_run_case+0x170/0x3f0
[   24.094642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.095152]  kthread+0x328/0x630
[   24.095466]  ret_from_fork+0x10/0x20
[   24.095804] 
[   24.095952] The buggy address belongs to the object at ffff00000c98ed00
[   24.095952]  which belongs to the cache kmalloc-128 of size 128
[   24.097072] The buggy address is located 0 bytes inside of
[   24.097072]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.098186] 
[   24.098334] The buggy address belongs to the physical page:
[   24.098843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.099555] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.100156] page_type: f5(slab)
[   24.100459] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.101162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.101860] page dumped because: kasan: bad access detected
[   24.102367] 
[   24.102515] Memory state around the buggy address:
[   24.102955]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.103611]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.104266] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.104918]                                                                 ^
[   24.105564]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.106219]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.106872] ==================================================================
[   24.181822] ==================================================================
[   24.182477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   24.183117] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.183794] 
[   24.183942] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.183974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.183984] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.183995] Call trace:
[   24.184002]  show_stack+0x20/0x38 (C)
[   24.184023]  dump_stack_lvl+0x8c/0xd0
[   24.184042]  print_report+0x118/0x608
[   24.184061]  kasan_report+0xdc/0x128
[   24.184079]  kasan_check_range+0x100/0x1a8
[   24.184100]  __kasan_check_read+0x20/0x30
[   24.184121]  copy_user_test_oob+0x4a0/0xec8
[   24.184139]  kunit_try_run_case+0x170/0x3f0
[   24.184161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.184188]  kthread+0x328/0x630
[   24.184209]  ret_from_fork+0x10/0x20
[   24.184230] 
[   24.190052] Allocated by task 343:
[   24.190368]  kasan_save_stack+0x3c/0x68
[   24.190726]  kasan_save_track+0x20/0x40
[   24.191084]  kasan_save_alloc_info+0x40/0x58
[   24.191483]  __kasan_kmalloc+0xd4/0xd8
[   24.191834]  __kmalloc_noprof+0x190/0x4d0
[   24.192207]  kunit_kmalloc_array+0x34/0x88
[   24.192591]  copy_user_test_oob+0xac/0xec8
[   24.192971]  kunit_try_run_case+0x170/0x3f0
[   24.193363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193872]  kthread+0x328/0x630
[   24.194181]  ret_from_fork+0x10/0x20
[   24.194519] 
[   24.194664] The buggy address belongs to the object at ffff00000c98ed00
[   24.194664]  which belongs to the cache kmalloc-128 of size 128
[   24.195780] The buggy address is located 0 bytes inside of
[   24.195780]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.196892] 
[   24.197038] The buggy address belongs to the physical page:
[   24.197542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.198250] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.198845] page_type: f5(slab)
[   24.199143] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.199844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.200539] page dumped because: kasan: bad access detected
[   24.201043] 
[   24.201189] Memory state around the buggy address:
[   24.201626]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.202278]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.202931] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.203580]                                                                 ^
[   24.204225]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.204878]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.205528] ==================================================================
[   24.157295] ==================================================================
[   24.157950] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   24.158588] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.159273] 
[   24.159423] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.159456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.159465] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.159476] Call trace:
[   24.159483]  show_stack+0x20/0x38 (C)
[   24.159505]  dump_stack_lvl+0x8c/0xd0
[   24.159523]  print_report+0x118/0x608
[   24.159542]  kasan_report+0xdc/0x128
[   24.159561]  kasan_check_range+0x100/0x1a8
[   24.159581]  __kasan_check_write+0x20/0x30
[   24.159602]  copy_user_test_oob+0x434/0xec8
[   24.159620]  kunit_try_run_case+0x170/0x3f0
[   24.159642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159669]  kthread+0x328/0x630
[   24.159691]  ret_from_fork+0x10/0x20
[   24.159712] 
[   24.165545] Allocated by task 343:
[   24.165862]  kasan_save_stack+0x3c/0x68
[   24.166223]  kasan_save_track+0x20/0x40
[   24.166581]  kasan_save_alloc_info+0x40/0x58
[   24.166980]  __kasan_kmalloc+0xd4/0xd8
[   24.167331]  __kmalloc_noprof+0x190/0x4d0
[   24.167706]  kunit_kmalloc_array+0x34/0x88
[   24.168091]  copy_user_test_oob+0xac/0xec8
[   24.168470]  kunit_try_run_case+0x170/0x3f0
[   24.168862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.169371]  kthread+0x328/0x630
[   24.169680]  ret_from_fork+0x10/0x20
[   24.170018] 
[   24.170165] The buggy address belongs to the object at ffff00000c98ed00
[   24.170165]  which belongs to the cache kmalloc-128 of size 128
[   24.171281] The buggy address is located 0 bytes inside of
[   24.171281]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.172393] 
[   24.172539] The buggy address belongs to the physical page:
[   24.173043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.173751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.174346] page_type: f5(slab)
[   24.174644] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.175345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.176041] page dumped because: kasan: bad access detected
[   24.176546] 
[   24.176692] Memory state around the buggy address:
[   24.177130]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.177782]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.178434] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.179084]                                                                 ^
[   24.179727]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.180381]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.181030] ==================================================================
[   24.132667] ==================================================================
[   24.133343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   24.133993] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.134675] 
[   24.134830] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.134867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.134877] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.134890] Call trace:
[   24.134898]  show_stack+0x20/0x38 (C)
[   24.134922]  dump_stack_lvl+0x8c/0xd0
[   24.134944]  print_report+0x118/0x608
[   24.134964]  kasan_report+0xdc/0x128
[   24.134983]  kasan_check_range+0x100/0x1a8
[   24.135003]  __kasan_check_read+0x20/0x30
[   24.135025]  copy_user_test_oob+0x3c8/0xec8
[   24.135043]  kunit_try_run_case+0x170/0x3f0
[   24.135067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.135094]  kthread+0x328/0x630
[   24.135117]  ret_from_fork+0x10/0x20
[   24.135138] 
[   24.140969] Allocated by task 343:
[   24.141286]  kasan_save_stack+0x3c/0x68
[   24.141649]  kasan_save_track+0x20/0x40
[   24.142008]  kasan_save_alloc_info+0x40/0x58
[   24.142408]  __kasan_kmalloc+0xd4/0xd8
[   24.142759]  __kmalloc_noprof+0x190/0x4d0
[   24.143135]  kunit_kmalloc_array+0x34/0x88
[   24.143520]  copy_user_test_oob+0xac/0xec8
[   24.143901]  kunit_try_run_case+0x170/0x3f0
[   24.144293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.144802]  kthread+0x328/0x630
[   24.145111]  ret_from_fork+0x10/0x20
[   24.145448] 
[   24.145595] The buggy address belongs to the object at ffff00000c98ed00
[   24.145595]  which belongs to the cache kmalloc-128 of size 128
[   24.146713] The buggy address is located 0 bytes inside of
[   24.146713]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.147825] 
[   24.147972] The buggy address belongs to the physical page:
[   24.148477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.149189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.149785] page_type: f5(slab)
[   24.150086] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.150788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.151484] page dumped because: kasan: bad access detected
[   24.151989] 
[   24.152136] Memory state around the buggy address:
[   24.152574]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.153226]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.153879] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.154528]                                                                 ^
[   24.155174]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.155827]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.156478] ==================================================================