Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.606061] ==================================================================
[   32.606263] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   32.606790] Read of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.606985] 
[   32.607092] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.607339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.607434] Hardware name: linux,dummy-virt (DT)
[   32.607904] Call trace:
[   32.608165]  show_stack+0x20/0x38 (C)
[   32.608362]  dump_stack_lvl+0x8c/0xd0
[   32.608531]  print_report+0x118/0x608
[   32.608722]  kasan_report+0xdc/0x128
[   32.608860]  kasan_check_range+0x100/0x1a8
[   32.609007]  __kasan_check_read+0x20/0x30
[   32.609125]  copy_user_test_oob+0x728/0xec8
[   32.609272]  kunit_try_run_case+0x170/0x3f0
[   32.609405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.609592]  kthread+0x328/0x630
[   32.609747]  ret_from_fork+0x10/0x20
[   32.609892] 
[   32.609953] Allocated by task 287:
[   32.610049]  kasan_save_stack+0x3c/0x68
[   32.610285]  kasan_save_track+0x20/0x40
[   32.610418]  kasan_save_alloc_info+0x40/0x58
[   32.610591]  __kasan_kmalloc+0xd4/0xd8
[   32.610739]  __kmalloc_noprof+0x190/0x4d0
[   32.610859]  kunit_kmalloc_array+0x34/0x88
[   32.610975]  copy_user_test_oob+0xac/0xec8
[   32.611087]  kunit_try_run_case+0x170/0x3f0
[   32.611210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.611351]  kthread+0x328/0x630
[   32.611490]  ret_from_fork+0x10/0x20
[   32.611597] 
[   32.611666] The buggy address belongs to the object at fff00000c78a6100
[   32.611666]  which belongs to the cache kmalloc-128 of size 128
[   32.611853] The buggy address is located 0 bytes inside of
[   32.611853]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.612077] 
[   32.612153] The buggy address belongs to the physical page:
[   32.612282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.612511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.612726] page_type: f5(slab)
[   32.612856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.613004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.613107] page dumped because: kasan: bad access detected
[   32.613219] 
[   32.613274] Memory state around the buggy address:
[   32.613375]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.613539]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.613675] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.613785]                                                                 ^
[   32.613945]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614087]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.614217] ==================================================================
[   32.627407] ==================================================================
[   32.627665] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   32.627888] Write of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.628092] 
[   32.628207] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.628493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.628624] Hardware name: linux,dummy-virt (DT)
[   32.628723] Call trace:
[   32.628805]  show_stack+0x20/0x38 (C)
[   32.628980]  dump_stack_lvl+0x8c/0xd0
[   32.629154]  print_report+0x118/0x608
[   32.629299]  kasan_report+0xdc/0x128
[   32.629504]  kasan_check_range+0x100/0x1a8
[   32.629718]  __kasan_check_write+0x20/0x30
[   32.629871]  copy_user_test_oob+0x35c/0xec8
[   32.629999]  kunit_try_run_case+0x170/0x3f0
[   32.630122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.630318]  kthread+0x328/0x630
[   32.630539]  ret_from_fork+0x10/0x20
[   32.630744] 
[   32.630831] Allocated by task 287:
[   32.630961]  kasan_save_stack+0x3c/0x68
[   32.631119]  kasan_save_track+0x20/0x40
[   32.631237]  kasan_save_alloc_info+0x40/0x58
[   32.631365]  __kasan_kmalloc+0xd4/0xd8
[   32.631723]  __kmalloc_noprof+0x190/0x4d0
[   32.631876]  kunit_kmalloc_array+0x34/0x88
[   32.632016]  copy_user_test_oob+0xac/0xec8
[   32.632162]  kunit_try_run_case+0x170/0x3f0
[   32.632275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.632399]  kthread+0x328/0x630
[   32.632526]  ret_from_fork+0x10/0x20
[   32.632627] 
[   32.632683] The buggy address belongs to the object at fff00000c78a6100
[   32.632683]  which belongs to the cache kmalloc-128 of size 128
[   32.632843] The buggy address is located 0 bytes inside of
[   32.632843]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.633025] 
[   32.633096] The buggy address belongs to the physical page:
[   32.633192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.633340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.633570] page_type: f5(slab)
[   32.633720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.633874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.634010] page dumped because: kasan: bad access detected
[   32.634120] 
[   32.634175] Memory state around the buggy address:
[   32.634307]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.634506]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.634688] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.634853]                                                                 ^
[   32.635000]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.635219]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.635390] ==================================================================
[   32.659564] ==================================================================
[   32.660135] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   32.660378] Read of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.660550] 
[   32.660649] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.660886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.660978] Hardware name: linux,dummy-virt (DT)
[   32.661870] Call trace:
[   32.661988]  show_stack+0x20/0x38 (C)
[   32.662333]  dump_stack_lvl+0x8c/0xd0
[   32.662927]  print_report+0x118/0x608
[   32.663098]  kasan_report+0xdc/0x128
[   32.663235]  kasan_check_range+0x100/0x1a8
[   32.663473]  __kasan_check_read+0x20/0x30
[   32.663622]  copy_user_test_oob+0x4a0/0xec8
[   32.664287]  kunit_try_run_case+0x170/0x3f0
[   32.664859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.665120]  kthread+0x328/0x630
[   32.665357]  ret_from_fork+0x10/0x20
[   32.665611] 
[   32.665698] Allocated by task 287:
[   32.666163]  kasan_save_stack+0x3c/0x68
[   32.666311]  kasan_save_track+0x20/0x40
[   32.666493]  kasan_save_alloc_info+0x40/0x58
[   32.666699]  __kasan_kmalloc+0xd4/0xd8
[   32.666823]  __kmalloc_noprof+0x190/0x4d0
[   32.667419]  kunit_kmalloc_array+0x34/0x88
[   32.667674]  copy_user_test_oob+0xac/0xec8
[   32.667818]  kunit_try_run_case+0x170/0x3f0
[   32.668029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668566]  kthread+0x328/0x630
[   32.668812]  ret_from_fork+0x10/0x20
[   32.669018] 
[   32.669165] The buggy address belongs to the object at fff00000c78a6100
[   32.669165]  which belongs to the cache kmalloc-128 of size 128
[   32.669772] The buggy address is located 0 bytes inside of
[   32.669772]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.670012] 
[   32.670099] The buggy address belongs to the physical page:
[   32.670288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.670908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.671084] page_type: f5(slab)
[   32.671208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.671370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.671533] page dumped because: kasan: bad access detected
[   32.672213] 
[   32.672285] Memory state around the buggy address:
[   32.672919]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.673286]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.673423] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.673535]                                                                 ^
[   32.674089]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.674282]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.674414] ==================================================================
[   32.637278] ==================================================================
[   32.637416] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   32.637577] Read of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.637786] 
[   32.637913] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.638160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.638246] Hardware name: linux,dummy-virt (DT)
[   32.638346] Call trace:
[   32.638430]  show_stack+0x20/0x38 (C)
[   32.638633]  dump_stack_lvl+0x8c/0xd0
[   32.638809]  print_report+0x118/0x608
[   32.638993]  kasan_report+0xdc/0x128
[   32.639139]  kasan_check_range+0x100/0x1a8
[   32.639323]  __kasan_check_read+0x20/0x30
[   32.639515]  copy_user_test_oob+0x3c8/0xec8
[   32.639703]  kunit_try_run_case+0x170/0x3f0
[   32.639873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.640075]  kthread+0x328/0x630
[   32.640271]  ret_from_fork+0x10/0x20
[   32.640474] 
[   32.640541] Allocated by task 287:
[   32.640628]  kasan_save_stack+0x3c/0x68
[   32.640754]  kasan_save_track+0x20/0x40
[   32.640872]  kasan_save_alloc_info+0x40/0x58
[   32.640996]  __kasan_kmalloc+0xd4/0xd8
[   32.641110]  __kmalloc_noprof+0x190/0x4d0
[   32.641227]  kunit_kmalloc_array+0x34/0x88
[   32.641361]  copy_user_test_oob+0xac/0xec8
[   32.641548]  kunit_try_run_case+0x170/0x3f0
[   32.641938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.642104]  kthread+0x328/0x630
[   32.642208]  ret_from_fork+0x10/0x20
[   32.642300] 
[   32.642350] The buggy address belongs to the object at fff00000c78a6100
[   32.642350]  which belongs to the cache kmalloc-128 of size 128
[   32.642569] The buggy address is located 0 bytes inside of
[   32.642569]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.642804] 
[   32.642908] The buggy address belongs to the physical page:
[   32.643012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.643172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.643328] page_type: f5(slab)
[   32.643486] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.643664] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.643839] page dumped because: kasan: bad access detected
[   32.643983] 
[   32.644048] Memory state around the buggy address:
[   32.644176]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.644351]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.644546] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.644700]                                                                 ^
[   32.644964]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.645111]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.645218] ==================================================================
[   32.574756] ==================================================================
[   32.575348] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   32.575821] Write of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.576503] 
[   32.576693] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.576965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.577055] Hardware name: linux,dummy-virt (DT)
[   32.577237] Call trace:
[   32.577314]  show_stack+0x20/0x38 (C)
[   32.577950]  dump_stack_lvl+0x8c/0xd0
[   32.578106]  print_report+0x118/0x608
[   32.578813]  kasan_report+0xdc/0x128
[   32.579356]  kasan_check_range+0x100/0x1a8
[   32.579593]  __kasan_check_write+0x20/0x30
[   32.579832]  copy_user_test_oob+0x234/0xec8
[   32.580048]  kunit_try_run_case+0x170/0x3f0
[   32.580376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.580583]  kthread+0x328/0x630
[   32.580729]  ret_from_fork+0x10/0x20
[   32.581606] 
[   32.581703] Allocated by task 287:
[   32.581874]  kasan_save_stack+0x3c/0x68
[   32.582265]  kasan_save_track+0x20/0x40
[   32.582385]  kasan_save_alloc_info+0x40/0x58
[   32.582529]  __kasan_kmalloc+0xd4/0xd8
[   32.583597]  __kmalloc_noprof+0x190/0x4d0
[   32.583777]  kunit_kmalloc_array+0x34/0x88
[   32.583896]  copy_user_test_oob+0xac/0xec8
[   32.584003]  kunit_try_run_case+0x170/0x3f0
[   32.584100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.584613]  kthread+0x328/0x630
[   32.584743]  ret_from_fork+0x10/0x20
[   32.584852] 
[   32.585063] The buggy address belongs to the object at fff00000c78a6100
[   32.585063]  which belongs to the cache kmalloc-128 of size 128
[   32.585436] The buggy address is located 0 bytes inside of
[   32.585436]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.586145] 
[   32.586230] The buggy address belongs to the physical page:
[   32.586387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.586585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.586746] page_type: f5(slab)
[   32.587354] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.587566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.587706] page dumped because: kasan: bad access detected
[   32.587822] 
[   32.587888] Memory state around the buggy address:
[   32.588480]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.588649]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.589140] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.589290]                                                                 ^
[   32.589432]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590565]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590728] ==================================================================
[   32.646692] ==================================================================
[   32.646899] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   32.647096] Write of size 121 at addr fff00000c78a6100 by task kunit_try_catch/287
[   32.647308] 
[   32.647501] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.648110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.648333] Hardware name: linux,dummy-virt (DT)
[   32.648520] Call trace:
[   32.648622]  show_stack+0x20/0x38 (C)
[   32.649014]  dump_stack_lvl+0x8c/0xd0
[   32.649167]  print_report+0x118/0x608
[   32.649309]  kasan_report+0xdc/0x128
[   32.649464]  kasan_check_range+0x100/0x1a8
[   32.649608]  __kasan_check_write+0x20/0x30
[   32.650337]  copy_user_test_oob+0x434/0xec8
[   32.650591]  kunit_try_run_case+0x170/0x3f0
[   32.650825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651025]  kthread+0x328/0x630
[   32.651137]  ret_from_fork+0x10/0x20
[   32.651247] 
[   32.651736] Allocated by task 287:
[   32.651854]  kasan_save_stack+0x3c/0x68
[   32.652056]  kasan_save_track+0x20/0x40
[   32.652583]  kasan_save_alloc_info+0x40/0x58
[   32.652732]  __kasan_kmalloc+0xd4/0xd8
[   32.652934]  __kmalloc_noprof+0x190/0x4d0
[   32.653118]  kunit_kmalloc_array+0x34/0x88
[   32.653237]  copy_user_test_oob+0xac/0xec8
[   32.653817]  kunit_try_run_case+0x170/0x3f0
[   32.653986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.654131]  kthread+0x328/0x630
[   32.654250]  ret_from_fork+0x10/0x20
[   32.654373] 
[   32.654435] The buggy address belongs to the object at fff00000c78a6100
[   32.654435]  which belongs to the cache kmalloc-128 of size 128
[   32.654684] The buggy address is located 0 bytes inside of
[   32.654684]  allocated 120-byte region [fff00000c78a6100, fff00000c78a6178)
[   32.655066] 
[   32.655194] The buggy address belongs to the physical page:
[   32.655350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a6
[   32.655658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.655815] page_type: f5(slab)
[   32.655968] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.656119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.656307] page dumped because: kasan: bad access detected
[   32.656404] 
[   32.656477] Memory state around the buggy address:
[   32.656611]  fff00000c78a6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.656839]  fff00000c78a6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.657005] >fff00000c78a6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.657150]                                                                 ^
[   32.657322]  fff00000c78a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.657469]  fff00000c78a6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.657647] ==================================================================

[   16.487095] ==================================================================
[   16.487519] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.487748] Read of size 121 at addr ffff888102a4e100 by task kunit_try_catch/304
[   16.488205] 
[   16.488407] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.488454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.488479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.488502] Call Trace:
[   16.488516]  <TASK>
[   16.488532]  dump_stack_lvl+0x73/0xb0
[   16.488560]  print_report+0xd1/0x650
[   16.488583]  ? __virt_addr_valid+0x1db/0x2d0
[   16.488606]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.488627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.488650]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.488672]  kasan_report+0x141/0x180
[   16.488696]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.488722]  kasan_check_range+0x10c/0x1c0
[   16.488743]  __kasan_check_read+0x15/0x20
[   16.488764]  copy_user_test_oob+0x4aa/0x10f0
[   16.488788]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.488851]  ? finish_task_switch.isra.0+0x153/0x700
[   16.488901]  ? __switch_to+0x5d9/0xf60
[   16.488946]  ? dequeue_task_fair+0x166/0x4e0
[   16.489018]  ? __schedule+0x10cc/0x2b30
[   16.489087]  ? __pfx_read_tsc+0x10/0x10
[   16.489109]  ? ktime_get_ts64+0x86/0x230
[   16.489136]  kunit_try_run_case+0x1a5/0x480
[   16.489161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.489214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.489239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.489263]  ? __kthread_parkme+0x82/0x180
[   16.489286]  ? preempt_count_sub+0x50/0x80
[   16.489321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.489346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.489370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.489394]  kthread+0x337/0x6f0
[   16.489412]  ? trace_preempt_on+0x20/0xc0
[   16.489437]  ? __pfx_kthread+0x10/0x10
[   16.489457]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.489478]  ? calculate_sigpending+0x7b/0xa0
[   16.489500]  ? __pfx_kthread+0x10/0x10
[   16.489520]  ret_from_fork+0x41/0x80
[   16.489541]  ? __pfx_kthread+0x10/0x10
[   16.489560]  ret_from_fork_asm+0x1a/0x30
[   16.489593]  </TASK>
[   16.489605] 
[   16.497975] Allocated by task 304:
[   16.498111]  kasan_save_stack+0x45/0x70
[   16.498257]  kasan_save_track+0x18/0x40
[   16.498424]  kasan_save_alloc_info+0x3b/0x50
[   16.498593]  __kasan_kmalloc+0xb7/0xc0
[   16.498734]  __kmalloc_noprof+0x1c9/0x500
[   16.498879]  kunit_kmalloc_array+0x25/0x60
[   16.499089]  copy_user_test_oob+0xab/0x10f0
[   16.499301]  kunit_try_run_case+0x1a5/0x480
[   16.499652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.499921]  kthread+0x337/0x6f0
[   16.500096]  ret_from_fork+0x41/0x80
[   16.500266]  ret_from_fork_asm+0x1a/0x30
[   16.500510] 
[   16.500622] The buggy address belongs to the object at ffff888102a4e100
[   16.500622]  which belongs to the cache kmalloc-128 of size 128
[   16.501255] The buggy address is located 0 bytes inside of
[   16.501255]  allocated 120-byte region [ffff888102a4e100, ffff888102a4e178)
[   16.501635] 
[   16.501712] The buggy address belongs to the physical page:
[   16.501886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[   16.502129] flags: 0x200000000000000(node=0|zone=2)
[   16.502295] page_type: f5(slab)
[   16.502474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.502937] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.503579] page dumped because: kasan: bad access detected
[   16.503890] 
[   16.503992] Memory state around the buggy address:
[   16.504219]  ffff888102a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.504771]  ffff888102a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.505111] >ffff888102a4e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.505428]                                                                 ^
[   16.505760]  ffff888102a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506097]  ffff888102a4e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506362] ==================================================================
[   16.467758] ==================================================================
[   16.468144] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.468475] Write of size 121 at addr ffff888102a4e100 by task kunit_try_catch/304
[   16.468810] 
[   16.468931] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.468981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.468995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.469035] Call Trace:
[   16.469049]  <TASK>
[   16.469066]  dump_stack_lvl+0x73/0xb0
[   16.469113]  print_report+0xd1/0x650
[   16.469137]  ? __virt_addr_valid+0x1db/0x2d0
[   16.469159]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.469180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.469204]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.469226]  kasan_report+0x141/0x180
[   16.469250]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.469276]  kasan_check_range+0x10c/0x1c0
[   16.469299]  __kasan_check_write+0x18/0x20
[   16.469329]  copy_user_test_oob+0x3fd/0x10f0
[   16.469352]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.469373]  ? finish_task_switch.isra.0+0x153/0x700
[   16.469397]  ? __switch_to+0x5d9/0xf60
[   16.469418]  ? dequeue_task_fair+0x166/0x4e0
[   16.469444]  ? __schedule+0x10cc/0x2b30
[   16.469476]  ? __pfx_read_tsc+0x10/0x10
[   16.469496]  ? ktime_get_ts64+0x86/0x230
[   16.469523]  kunit_try_run_case+0x1a5/0x480
[   16.469548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.469572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.469597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.469623]  ? __kthread_parkme+0x82/0x180
[   16.469646]  ? preempt_count_sub+0x50/0x80
[   16.469671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.469696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.469719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.469744]  kthread+0x337/0x6f0
[   16.469762]  ? trace_preempt_on+0x20/0xc0
[   16.469787]  ? __pfx_kthread+0x10/0x10
[   16.469807]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.469830]  ? calculate_sigpending+0x7b/0xa0
[   16.469852]  ? __pfx_kthread+0x10/0x10
[   16.469872]  ret_from_fork+0x41/0x80
[   16.469894]  ? __pfx_kthread+0x10/0x10
[   16.469913]  ret_from_fork_asm+0x1a/0x30
[   16.469944]  </TASK>
[   16.469956] 
[   16.477577] Allocated by task 304:
[   16.477862]  kasan_save_stack+0x45/0x70
[   16.478104]  kasan_save_track+0x18/0x40
[   16.478314]  kasan_save_alloc_info+0x3b/0x50
[   16.478634]  __kasan_kmalloc+0xb7/0xc0
[   16.478855]  __kmalloc_noprof+0x1c9/0x500
[   16.479033]  kunit_kmalloc_array+0x25/0x60
[   16.479207]  copy_user_test_oob+0xab/0x10f0
[   16.479462]  kunit_try_run_case+0x1a5/0x480
[   16.479700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.479964]  kthread+0x337/0x6f0
[   16.480146]  ret_from_fork+0x41/0x80
[   16.480324]  ret_from_fork_asm+0x1a/0x30
[   16.480531] 
[   16.480633] The buggy address belongs to the object at ffff888102a4e100
[   16.480633]  which belongs to the cache kmalloc-128 of size 128
[   16.481191] The buggy address is located 0 bytes inside of
[   16.481191]  allocated 120-byte region [ffff888102a4e100, ffff888102a4e178)
[   16.481798] 
[   16.481899] The buggy address belongs to the physical page:
[   16.482160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[   16.482552] flags: 0x200000000000000(node=0|zone=2)
[   16.482809] page_type: f5(slab)
[   16.483000] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.483388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.483766] page dumped because: kasan: bad access detected
[   16.484043] 
[   16.484127] Memory state around the buggy address:
[   16.484370]  ffff888102a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.484755]  ffff888102a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485114] >ffff888102a4e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.485436]                                                                 ^
[   16.485756]  ffff888102a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.486077]  ffff888102a4e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.486430] ==================================================================
[   16.507138] ==================================================================
[   16.507464] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.507795] Write of size 121 at addr ffff888102a4e100 by task kunit_try_catch/304
[   16.508167] 
[   16.508279] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.508336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.508350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.508371] Call Trace:
[   16.508389]  <TASK>
[   16.508406]  dump_stack_lvl+0x73/0xb0
[   16.508435]  print_report+0xd1/0x650
[   16.508458]  ? __virt_addr_valid+0x1db/0x2d0
[   16.508481]  ? copy_user_test_oob+0x557/0x10f0
[   16.508537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.508563]  ? copy_user_test_oob+0x557/0x10f0
[   16.508584]  kasan_report+0x141/0x180
[   16.508608]  ? copy_user_test_oob+0x557/0x10f0
[   16.508662]  kasan_check_range+0x10c/0x1c0
[   16.508707]  __kasan_check_write+0x18/0x20
[   16.508728]  copy_user_test_oob+0x557/0x10f0
[   16.508752]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.508772]  ? finish_task_switch.isra.0+0x153/0x700
[   16.508797]  ? __switch_to+0x5d9/0xf60
[   16.508818]  ? dequeue_task_fair+0x166/0x4e0
[   16.508843]  ? __schedule+0x10cc/0x2b30
[   16.508867]  ? __pfx_read_tsc+0x10/0x10
[   16.508888]  ? ktime_get_ts64+0x86/0x230
[   16.508915]  kunit_try_run_case+0x1a5/0x480
[   16.508939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.508962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.508987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.509011]  ? __kthread_parkme+0x82/0x180
[   16.509034]  ? preempt_count_sub+0x50/0x80
[   16.509059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.509084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.509108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.509132]  kthread+0x337/0x6f0
[   16.509150]  ? trace_preempt_on+0x20/0xc0
[   16.509206]  ? __pfx_kthread+0x10/0x10
[   16.509226]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.509249]  ? calculate_sigpending+0x7b/0xa0
[   16.509295]  ? __pfx_kthread+0x10/0x10
[   16.509323]  ret_from_fork+0x41/0x80
[   16.509346]  ? __pfx_kthread+0x10/0x10
[   16.509365]  ret_from_fork_asm+0x1a/0x30
[   16.509397]  </TASK>
[   16.509409] 
[   16.517672] Allocated by task 304:
[   16.517862]  kasan_save_stack+0x45/0x70
[   16.518219]  kasan_save_track+0x18/0x40
[   16.518430]  kasan_save_alloc_info+0x3b/0x50
[   16.518638]  __kasan_kmalloc+0xb7/0xc0
[   16.518835]  __kmalloc_noprof+0x1c9/0x500
[   16.519003]  kunit_kmalloc_array+0x25/0x60
[   16.519293]  copy_user_test_oob+0xab/0x10f0
[   16.519520]  kunit_try_run_case+0x1a5/0x480
[   16.519814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.520083]  kthread+0x337/0x6f0
[   16.520205]  ret_from_fork+0x41/0x80
[   16.520361]  ret_from_fork_asm+0x1a/0x30
[   16.520559] 
[   16.520657] The buggy address belongs to the object at ffff888102a4e100
[   16.520657]  which belongs to the cache kmalloc-128 of size 128
[   16.521332] The buggy address is located 0 bytes inside of
[   16.521332]  allocated 120-byte region [ffff888102a4e100, ffff888102a4e178)
[   16.521967] 
[   16.522067] The buggy address belongs to the physical page:
[   16.522457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[   16.523082] flags: 0x200000000000000(node=0|zone=2)
[   16.523349] page_type: f5(slab)
[   16.523689] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.524057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.524412] page dumped because: kasan: bad access detected
[   16.524641] 
[   16.524727] Memory state around the buggy address:
[   16.524957]  ffff888102a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.525207]  ffff888102a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.525527] >ffff888102a4e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.525742]                                                                 ^
[   16.526166]  ffff888102a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.526557]  ffff888102a4e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.526797] ==================================================================
[   16.527478] ==================================================================
[   16.527952] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.528322] Read of size 121 at addr ffff888102a4e100 by task kunit_try_catch/304
[   16.528773] 
[   16.528905] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.528953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.528968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.528991] Call Trace:
[   16.529039]  <TASK>
[   16.529057]  dump_stack_lvl+0x73/0xb0
[   16.529085]  print_report+0xd1/0x650
[   16.529110]  ? __virt_addr_valid+0x1db/0x2d0
[   16.529132]  ? copy_user_test_oob+0x604/0x10f0
[   16.529184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.529208]  ? copy_user_test_oob+0x604/0x10f0
[   16.529229]  kasan_report+0x141/0x180
[   16.529253]  ? copy_user_test_oob+0x604/0x10f0
[   16.529279]  kasan_check_range+0x10c/0x1c0
[   16.529343]  __kasan_check_read+0x15/0x20
[   16.529364]  copy_user_test_oob+0x604/0x10f0
[   16.529388]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.529408]  ? finish_task_switch.isra.0+0x153/0x700
[   16.529432]  ? __switch_to+0x5d9/0xf60
[   16.529463]  ? dequeue_task_fair+0x166/0x4e0
[   16.529520]  ? __schedule+0x10cc/0x2b30
[   16.529544]  ? __pfx_read_tsc+0x10/0x10
[   16.529566]  ? ktime_get_ts64+0x86/0x230
[   16.529593]  kunit_try_run_case+0x1a5/0x480
[   16.529618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.529672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.529697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.529721]  ? __kthread_parkme+0x82/0x180
[   16.529744]  ? preempt_count_sub+0x50/0x80
[   16.529770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.529795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.529818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.529843]  kthread+0x337/0x6f0
[   16.529860]  ? trace_preempt_on+0x20/0xc0
[   16.529885]  ? __pfx_kthread+0x10/0x10
[   16.529904]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.529925]  ? calculate_sigpending+0x7b/0xa0
[   16.530000]  ? __pfx_kthread+0x10/0x10
[   16.530044]  ret_from_fork+0x41/0x80
[   16.530089]  ? __pfx_kthread+0x10/0x10
[   16.530108]  ret_from_fork_asm+0x1a/0x30
[   16.530164]  </TASK>
[   16.530194] 
[   16.538566] Allocated by task 304:
[   16.538770]  kasan_save_stack+0x45/0x70
[   16.538965]  kasan_save_track+0x18/0x40
[   16.539170]  kasan_save_alloc_info+0x3b/0x50
[   16.539420]  __kasan_kmalloc+0xb7/0xc0
[   16.539607]  __kmalloc_noprof+0x1c9/0x500
[   16.539839]  kunit_kmalloc_array+0x25/0x60
[   16.540060]  copy_user_test_oob+0xab/0x10f0
[   16.540282]  kunit_try_run_case+0x1a5/0x480
[   16.540524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.540713]  kthread+0x337/0x6f0
[   16.540853]  ret_from_fork+0x41/0x80
[   16.541029]  ret_from_fork_asm+0x1a/0x30
[   16.541238] 
[   16.541352] The buggy address belongs to the object at ffff888102a4e100
[   16.541352]  which belongs to the cache kmalloc-128 of size 128
[   16.541845] The buggy address is located 0 bytes inside of
[   16.541845]  allocated 120-byte region [ffff888102a4e100, ffff888102a4e178)
[   16.542295] 
[   16.542433] The buggy address belongs to the physical page:
[   16.542894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[   16.543331] flags: 0x200000000000000(node=0|zone=2)
[   16.543612] page_type: f5(slab)
[   16.543746] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.544086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.544507] page dumped because: kasan: bad access detected
[   16.544768] 
[   16.544865] Memory state around the buggy address:
[   16.545127]  ffff888102a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.545471]  ffff888102a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.545787] >ffff888102a4e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.546120]                                                                 ^
[   16.546469]  ffff888102a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.546836]  ffff888102a4e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547164] ==================================================================