Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   43.587617] ==================================================================
[   43.588391] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   43.588999] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.589982] 
[   43.590378] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.591294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.591890] Hardware name: linux,dummy-virt (DT)
[   43.592537] Call trace:
[   43.592905]  show_stack+0x20/0x38 (C)
[   43.593534]  dump_stack_lvl+0x8c/0xd0
[   43.594140]  print_report+0x118/0x5e0
[   43.594658]  kasan_report+0xc8/0x118
[   43.595323]  kasan_check_range+0x100/0x1a8
[   43.595996]  __kasan_check_write+0x20/0x30
[   43.596682]  copy_user_test_oob+0x35c/0xec0
[   43.597290]  kunit_try_run_case+0x14c/0x3d0
[   43.597985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.598760]  kthread+0x24c/0x2d0
[   43.599320]  ret_from_fork+0x10/0x20
[   43.599865] 
[   43.600211] Allocated by task 274:
[   43.600758]  kasan_save_stack+0x3c/0x68
[   43.601252]  kasan_save_track+0x20/0x40
[   43.601857]  kasan_save_alloc_info+0x40/0x58
[   43.602473]  __kasan_kmalloc+0xd4/0xd8
[   43.602914]  __kmalloc_noprof+0x188/0x4c8
[   43.603532]  kunit_kmalloc_array+0x34/0x88
[   43.604138]  copy_user_test_oob+0xac/0xec0
[   43.604786]  kunit_try_run_case+0x14c/0x3d0
[   43.605482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.606156]  kthread+0x24c/0x2d0
[   43.606643]  ret_from_fork+0x10/0x20
[   43.607114] 
[   43.607474] The buggy address belongs to the object at fff00000c65d5200
[   43.607474]  which belongs to the cache kmalloc-128 of size 128
[   43.608720] The buggy address is located 0 bytes inside of
[   43.608720]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.609982] 
[   43.610315] The buggy address belongs to the physical page:
[   43.611021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.611802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.612640] page_type: f5(slab)
[   43.613146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.613976] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.614775] page dumped because: kasan: bad access detected
[   43.615482] 
[   43.615803] Memory state around the buggy address:
[   43.616461]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.617238]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.618043] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.618826]                                                                 ^
[   43.619722]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.620504]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.621288] ==================================================================
[   43.488366] ==================================================================
[   43.489705] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   43.490872] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.491753] 
[   43.492181] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.493580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.494309] Hardware name: linux,dummy-virt (DT)
[   43.495675] Call trace:
[   43.496184]  show_stack+0x20/0x38 (C)
[   43.496855]  dump_stack_lvl+0x8c/0xd0
[   43.497585]  print_report+0x118/0x5e0
[   43.498319]  kasan_report+0xc8/0x118
[   43.498917]  kasan_check_range+0x100/0x1a8
[   43.499600]  __kasan_check_write+0x20/0x30
[   43.500247]  copy_user_test_oob+0x234/0xec0
[   43.500823]  kunit_try_run_case+0x14c/0x3d0
[   43.501873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.502781]  kthread+0x24c/0x2d0
[   43.503201]  ret_from_fork+0x10/0x20
[   43.503894] 
[   43.504333] Allocated by task 274:
[   43.504983]  kasan_save_stack+0x3c/0x68
[   43.505938]  kasan_save_track+0x20/0x40
[   43.506640]  kasan_save_alloc_info+0x40/0x58
[   43.507304]  __kasan_kmalloc+0xd4/0xd8
[   43.507899]  __kmalloc_noprof+0x188/0x4c8
[   43.508531]  kunit_kmalloc_array+0x34/0x88
[   43.509150]  copy_user_test_oob+0xac/0xec0
[   43.510225]  kunit_try_run_case+0x14c/0x3d0
[   43.510833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.511603]  kthread+0x24c/0x2d0
[   43.512343]  ret_from_fork+0x10/0x20
[   43.513040] 
[   43.513745] The buggy address belongs to the object at fff00000c65d5200
[   43.513745]  which belongs to the cache kmalloc-128 of size 128
[   43.515140] The buggy address is located 0 bytes inside of
[   43.515140]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.516480] 
[   43.516851] The buggy address belongs to the physical page:
[   43.517525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.518366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.519822] page_type: f5(slab)
[   43.520946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.522142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.523276] page dumped because: kasan: bad access detected
[   43.523851] 
[   43.524088] Memory state around the buggy address:
[   43.524625]  fff00000c65d5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   43.526179]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.527038] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.528472]                                                                 ^
[   43.529491]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.530684]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.531425] ==================================================================
[   43.540117] ==================================================================
[   43.540926] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   43.542267] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.543589] 
[   43.543898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.545171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.546262] Hardware name: linux,dummy-virt (DT)
[   43.547208] Call trace:
[   43.547588]  show_stack+0x20/0x38 (C)
[   43.548152]  dump_stack_lvl+0x8c/0xd0
[   43.548603]  print_report+0x118/0x5e0
[   43.549259]  kasan_report+0xc8/0x118
[   43.549936]  kasan_check_range+0x100/0x1a8
[   43.550561]  __kasan_check_read+0x20/0x30
[   43.551161]  copy_user_test_oob+0x728/0xec0
[   43.551882]  kunit_try_run_case+0x14c/0x3d0
[   43.552598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.553391]  kthread+0x24c/0x2d0
[   43.554032]  ret_from_fork+0x10/0x20
[   43.554656] 
[   43.555040] Allocated by task 274:
[   43.555525]  kasan_save_stack+0x3c/0x68
[   43.556126]  kasan_save_track+0x20/0x40
[   43.556780]  kasan_save_alloc_info+0x40/0x58
[   43.557482]  __kasan_kmalloc+0xd4/0xd8
[   43.558067]  __kmalloc_noprof+0x188/0x4c8
[   43.558658]  kunit_kmalloc_array+0x34/0x88
[   43.559277]  copy_user_test_oob+0xac/0xec0
[   43.559929]  kunit_try_run_case+0x14c/0x3d0
[   43.560487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.561278]  kthread+0x24c/0x2d0
[   43.561876]  ret_from_fork+0x10/0x20
[   43.562519] 
[   43.562900] The buggy address belongs to the object at fff00000c65d5200
[   43.562900]  which belongs to the cache kmalloc-128 of size 128
[   43.564146] The buggy address is located 0 bytes inside of
[   43.564146]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.565520] 
[   43.565926] The buggy address belongs to the physical page:
[   43.566623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.567519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.568298] page_type: f5(slab)
[   43.568917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.569786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.570757] page dumped because: kasan: bad access detected
[   43.571382] 
[   43.571748] Memory state around the buggy address:
[   43.572334]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.573111]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.573939] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.574621]                                                                 ^
[   43.575417]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.576179]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.577021] ==================================================================
[   43.623388] ==================================================================
[   43.624526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   43.625146] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.626512] 
[   43.626864] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.628382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.629118] Hardware name: linux,dummy-virt (DT)
[   43.629916] Call trace:
[   43.630501]  show_stack+0x20/0x38 (C)
[   43.631240]  dump_stack_lvl+0x8c/0xd0
[   43.631845]  print_report+0x118/0x5e0
[   43.632628]  kasan_report+0xc8/0x118
[   43.633337]  kasan_check_range+0x100/0x1a8
[   43.634125]  __kasan_check_read+0x20/0x30
[   43.634869]  copy_user_test_oob+0x3c8/0xec0
[   43.635716]  kunit_try_run_case+0x14c/0x3d0
[   43.636561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.637472]  kthread+0x24c/0x2d0
[   43.638003]  ret_from_fork+0x10/0x20
[   43.638758] 
[   43.639090] Allocated by task 274:
[   43.639598]  kasan_save_stack+0x3c/0x68
[   43.640237]  kasan_save_track+0x20/0x40
[   43.640840]  kasan_save_alloc_info+0x40/0x58
[   43.641418]  __kasan_kmalloc+0xd4/0xd8
[   43.642002]  __kmalloc_noprof+0x188/0x4c8
[   43.642652]  kunit_kmalloc_array+0x34/0x88
[   43.643306]  copy_user_test_oob+0xac/0xec0
[   43.643919]  kunit_try_run_case+0x14c/0x3d0
[   43.644546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.645140]  kthread+0x24c/0x2d0
[   43.645718]  ret_from_fork+0x10/0x20
[   43.646284] 
[   43.646678] The buggy address belongs to the object at fff00000c65d5200
[   43.646678]  which belongs to the cache kmalloc-128 of size 128
[   43.648024] The buggy address is located 0 bytes inside of
[   43.648024]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.649372] 
[   43.649737] The buggy address belongs to the physical page:
[   43.650370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.651422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.652076] page_type: f5(slab)
[   43.652504] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.653665] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.654721] page dumped because: kasan: bad access detected
[   43.655549] 
[   43.655938] Memory state around the buggy address:
[   43.656655]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.657485]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.658301] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.659148]                                                                 ^
[   43.660005]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.660888]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.661732] ==================================================================
[   43.702615] ==================================================================
[   43.703584] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   43.704396] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.705209] 
[   43.705684] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.706906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.707530] Hardware name: linux,dummy-virt (DT)
[   43.708164] Call trace:
[   43.708615]  show_stack+0x20/0x38 (C)
[   43.709302]  dump_stack_lvl+0x8c/0xd0
[   43.709891]  print_report+0x118/0x5e0
[   43.710481]  kasan_report+0xc8/0x118
[   43.711107]  kasan_check_range+0x100/0x1a8
[   43.711800]  __kasan_check_read+0x20/0x30
[   43.712420]  copy_user_test_oob+0x4a0/0xec0
[   43.713125]  kunit_try_run_case+0x14c/0x3d0
[   43.713874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.714624]  kthread+0x24c/0x2d0
[   43.715076]  ret_from_fork+0x10/0x20
[   43.715594] 
[   43.715893] Allocated by task 274:
[   43.716363]  kasan_save_stack+0x3c/0x68
[   43.716915]  kasan_save_track+0x20/0x40
[   43.717519]  kasan_save_alloc_info+0x40/0x58
[   43.718045]  __kasan_kmalloc+0xd4/0xd8
[   43.718709]  __kmalloc_noprof+0x188/0x4c8
[   43.719306]  kunit_kmalloc_array+0x34/0x88
[   43.719847]  copy_user_test_oob+0xac/0xec0
[   43.720495]  kunit_try_run_case+0x14c/0x3d0
[   43.721089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.721886]  kthread+0x24c/0x2d0
[   43.722484]  ret_from_fork+0x10/0x20
[   43.723052] 
[   43.723375] The buggy address belongs to the object at fff00000c65d5200
[   43.723375]  which belongs to the cache kmalloc-128 of size 128
[   43.724635] The buggy address is located 0 bytes inside of
[   43.724635]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.725840] 
[   43.726184] The buggy address belongs to the physical page:
[   43.726897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.727835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.728605] page_type: f5(slab)
[   43.729185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.730136] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.731025] page dumped because: kasan: bad access detected
[   43.731677] 
[   43.732053] Memory state around the buggy address:
[   43.732697]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.733611]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.734393] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.735248]                                                                 ^
[   43.736071]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.736943]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.737713] ==================================================================
[   43.663780] ==================================================================
[   43.664660] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   43.665070] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.665718] 
[   43.666166] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.667379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.667860] Hardware name: linux,dummy-virt (DT)
[   43.668333] Call trace:
[   43.669275]  show_stack+0x20/0x38 (C)
[   43.670002]  dump_stack_lvl+0x8c/0xd0
[   43.670723]  print_report+0x118/0x5e0
[   43.671326]  kasan_report+0xc8/0x118
[   43.672130]  kasan_check_range+0x100/0x1a8
[   43.672914]  __kasan_check_write+0x20/0x30
[   43.673684]  copy_user_test_oob+0x434/0xec0
[   43.674296]  kunit_try_run_case+0x14c/0x3d0
[   43.675106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.675986]  kthread+0x24c/0x2d0
[   43.676698]  ret_from_fork+0x10/0x20
[   43.677280] 
[   43.677855] Allocated by task 274:
[   43.678482]  kasan_save_stack+0x3c/0x68
[   43.679067]  kasan_save_track+0x20/0x40
[   43.679579]  kasan_save_alloc_info+0x40/0x58
[   43.680107]  __kasan_kmalloc+0xd4/0xd8
[   43.681140]  __kmalloc_noprof+0x188/0x4c8
[   43.681647]  kunit_kmalloc_array+0x34/0x88
[   43.682480]  copy_user_test_oob+0xac/0xec0
[   43.683048]  kunit_try_run_case+0x14c/0x3d0
[   43.683594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.684371]  kthread+0x24c/0x2d0
[   43.684876]  ret_from_fork+0x10/0x20
[   43.685481] 
[   43.685827] The buggy address belongs to the object at fff00000c65d5200
[   43.685827]  which belongs to the cache kmalloc-128 of size 128
[   43.687074] The buggy address is located 0 bytes inside of
[   43.687074]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.688334] 
[   43.688778] The buggy address belongs to the physical page:
[   43.689423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.690257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.691129] page_type: f5(slab)
[   43.691724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.692684] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.693594] page dumped because: kasan: bad access detected
[   43.694239] 
[   43.694636] Memory state around the buggy address:
[   43.695285]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.696011]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.696656] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.697541]                                                                 ^
[   43.698326]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.699239]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.700115] ==================================================================

[   35.991465] ==================================================================
[   35.991998] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   35.992683] Write of size 121 at addr ffff888101adc700 by task kunit_try_catch/292
[   35.994211] 
[   35.994529] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.995900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.996505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.997578] Call Trace:
[   35.997939]  <TASK>
[   35.998149]  dump_stack_lvl+0x73/0xb0
[   35.998857]  print_report+0xd1/0x640
[   35.999426]  ? __virt_addr_valid+0x1db/0x2d0
[   35.999984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.000857]  kasan_report+0x102/0x140
[   36.001556]  ? copy_user_test_oob+0x558/0x10f0
[   36.002063]  ? copy_user_test_oob+0x558/0x10f0
[   36.003014]  kasan_check_range+0x10c/0x1c0
[   36.003749]  __kasan_check_write+0x18/0x20
[   36.004212]  copy_user_test_oob+0x558/0x10f0
[   36.004580]  ? __pfx_copy_user_test_oob+0x10/0x10
[   36.005233]  ? finish_task_switch.isra.0+0x153/0x700
[   36.005923]  ? __switch_to+0x5d9/0xf60
[   36.006380]  ? __schedule+0xc3e/0x2790
[   36.006769]  ? __pfx_read_tsc+0x10/0x10
[   36.007262]  ? ktime_get_ts64+0x84/0x230
[   36.007657]  kunit_try_run_case+0x1b3/0x490
[   36.008233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.008903]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   36.009516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.009991]  ? __kthread_parkme+0x82/0x160
[   36.010681]  ? preempt_count_sub+0x50/0x80
[   36.011150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.011654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.012233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   36.012961]  kthread+0x257/0x310
[   36.013275]  ? __pfx_kthread+0x10/0x10
[   36.013784]  ret_from_fork+0x41/0x80
[   36.014208]  ? __pfx_kthread+0x10/0x10
[   36.014695]  ret_from_fork_asm+0x1a/0x30
[   36.015320]  </TASK>
[   36.015524] 
[   36.015868] Allocated by task 292:
[   36.016361]  kasan_save_stack+0x3d/0x60
[   36.017004]  kasan_save_track+0x18/0x40
[   36.017382]  kasan_save_alloc_info+0x3b/0x50
[   36.017997]  __kasan_kmalloc+0xb7/0xc0
[   36.018648]  __kmalloc_noprof+0x1c4/0x500
[   36.019147]  kunit_kmalloc_array+0x25/0x60
[   36.019477]  copy_user_test_oob+0xac/0x10f0
[   36.019852]  kunit_try_run_case+0x1b3/0x490
[   36.020617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   36.021174]  kthread+0x257/0x310
[   36.021429]  ret_from_fork+0x41/0x80
[   36.022122]  ret_from_fork_asm+0x1a/0x30
[   36.022734] 
[   36.022995] The buggy address belongs to the object at ffff888101adc700
[   36.022995]  which belongs to the cache kmalloc-128 of size 128
[   36.024183] The buggy address is located 0 bytes inside of
[   36.024183]  allocated 120-byte region [ffff888101adc700, ffff888101adc778)
[   36.025371] 
[   36.025558] The buggy address belongs to the physical page:
[   36.026145] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adc
[   36.026906] flags: 0x200000000000000(node=0|zone=2)
[   36.027223] page_type: f5(slab)
[   36.027647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   36.028294] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.029381] page dumped because: kasan: bad access detected
[   36.030021] 
[   36.030216] Memory state around the buggy address:
[   36.030516]  ffff888101adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.031475]  ffff888101adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.032175] >ffff888101adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.032819]                                                                 ^
[   36.033523]  ffff888101adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.034227]  ffff888101adc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.034775] ==================================================================
[   35.895357] ==================================================================
[   35.896041] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   35.896479] Write of size 121 at addr ffff888101adc700 by task kunit_try_catch/292
[   35.897222] 
[   35.897510] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.898847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.899376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.900343] Call Trace:
[   35.900543]  <TASK>
[   35.900965]  dump_stack_lvl+0x73/0xb0
[   35.901422]  print_report+0xd1/0x640
[   35.902282]  ? __virt_addr_valid+0x1db/0x2d0
[   35.902838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.903435]  kasan_report+0x102/0x140
[   35.904078]  ? copy_user_test_oob+0x3fe/0x10f0
[   35.904650]  ? copy_user_test_oob+0x3fe/0x10f0
[   35.905266]  kasan_check_range+0x10c/0x1c0
[   35.905774]  __kasan_check_write+0x18/0x20
[   35.906303]  copy_user_test_oob+0x3fe/0x10f0
[   35.906994]  ? __pfx_copy_user_test_oob+0x10/0x10
[   35.907424]  ? finish_task_switch.isra.0+0x153/0x700
[   35.907985]  ? __switch_to+0x5d9/0xf60
[   35.908494]  ? __schedule+0xc3e/0x2790
[   35.908923]  ? __pfx_read_tsc+0x10/0x10
[   35.909304]  ? ktime_get_ts64+0x84/0x230
[   35.909859]  kunit_try_run_case+0x1b3/0x490
[   35.910393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.910986]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.911771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.912254]  ? __kthread_parkme+0x82/0x160
[   35.912764]  ? preempt_count_sub+0x50/0x80
[   35.913211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.913830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.914542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.915091]  kthread+0x257/0x310
[   35.915446]  ? __pfx_kthread+0x10/0x10
[   35.916095]  ret_from_fork+0x41/0x80
[   35.916451]  ? __pfx_kthread+0x10/0x10
[   35.917022]  ret_from_fork_asm+0x1a/0x30
[   35.917438]  </TASK>
[   35.917671] 
[   35.917942] Allocated by task 292:
[   35.918422]  kasan_save_stack+0x3d/0x60
[   35.918914]  kasan_save_track+0x18/0x40
[   35.919291]  kasan_save_alloc_info+0x3b/0x50
[   35.919946]  __kasan_kmalloc+0xb7/0xc0
[   35.920398]  __kmalloc_noprof+0x1c4/0x500
[   35.920945]  kunit_kmalloc_array+0x25/0x60
[   35.921421]  copy_user_test_oob+0xac/0x10f0
[   35.921943]  kunit_try_run_case+0x1b3/0x490
[   35.922435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.923143]  kthread+0x257/0x310
[   35.923667]  ret_from_fork+0x41/0x80
[   35.924104]  ret_from_fork_asm+0x1a/0x30
[   35.924389] 
[   35.924789] The buggy address belongs to the object at ffff888101adc700
[   35.924789]  which belongs to the cache kmalloc-128 of size 128
[   35.925900] The buggy address is located 0 bytes inside of
[   35.925900]  allocated 120-byte region [ffff888101adc700, ffff888101adc778)
[   35.926977] 
[   35.927165] The buggy address belongs to the physical page:
[   35.927835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adc
[   35.928314] flags: 0x200000000000000(node=0|zone=2)
[   35.929056] page_type: f5(slab)
[   35.929524] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   35.930293] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.931070] page dumped because: kasan: bad access detected
[   35.931547] 
[   35.931860] Memory state around the buggy address:
[   35.932357]  ffff888101adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.932910]  ffff888101adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.933798] >ffff888101adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.934350]                                                                 ^
[   35.935194]  ffff888101adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935912]  ffff888101adc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.936568] ==================================================================
[   36.035913] ==================================================================
[   36.036537] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   36.037435] Read of size 121 at addr ffff888101adc700 by task kunit_try_catch/292
[   36.038079] 
[   36.038254] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.039203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.039818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   36.040600] Call Trace:
[   36.041013]  <TASK>
[   36.041341]  dump_stack_lvl+0x73/0xb0
[   36.041935]  print_report+0xd1/0x640
[   36.042379]  ? __virt_addr_valid+0x1db/0x2d0
[   36.042831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.043412]  kasan_report+0x102/0x140
[   36.043969]  ? copy_user_test_oob+0x605/0x10f0
[   36.044756]  ? copy_user_test_oob+0x605/0x10f0
[   36.045352]  kasan_check_range+0x10c/0x1c0
[   36.045967]  __kasan_check_read+0x15/0x20
[   36.046435]  copy_user_test_oob+0x605/0x10f0
[   36.046883]  ? __pfx_copy_user_test_oob+0x10/0x10
[   36.047550]  ? finish_task_switch.isra.0+0x153/0x700
[   36.048046]  ? __switch_to+0x5d9/0xf60
[   36.048555]  ? __schedule+0xc3e/0x2790
[   36.048954]  ? __pfx_read_tsc+0x10/0x10
[   36.049483]  ? ktime_get_ts64+0x84/0x230
[   36.049965]  kunit_try_run_case+0x1b3/0x490
[   36.050756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.051145]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   36.051792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.052414]  ? __kthread_parkme+0x82/0x160
[   36.052733]  ? preempt_count_sub+0x50/0x80
[   36.053258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.054041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.054619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   36.055485]  kthread+0x257/0x310
[   36.055996]  ? __pfx_kthread+0x10/0x10
[   36.056306]  ret_from_fork+0x41/0x80
[   36.056586]  ? __pfx_kthread+0x10/0x10
[   36.057148]  ret_from_fork_asm+0x1a/0x30
[   36.057781]  </TASK>
[   36.058085] 
[   36.058243] Allocated by task 292:
[   36.058583]  kasan_save_stack+0x3d/0x60
[   36.059136]  kasan_save_track+0x18/0x40
[   36.059646]  kasan_save_alloc_info+0x3b/0x50
[   36.060071]  __kasan_kmalloc+0xb7/0xc0
[   36.060408]  __kmalloc_noprof+0x1c4/0x500
[   36.060903]  kunit_kmalloc_array+0x25/0x60
[   36.061202]  copy_user_test_oob+0xac/0x10f0
[   36.061745]  kunit_try_run_case+0x1b3/0x490
[   36.062459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   36.063058]  kthread+0x257/0x310
[   36.063464]  ret_from_fork+0x41/0x80
[   36.063976]  ret_from_fork_asm+0x1a/0x30
[   36.064423] 
[   36.064582] The buggy address belongs to the object at ffff888101adc700
[   36.064582]  which belongs to the cache kmalloc-128 of size 128
[   36.066776] The buggy address is located 0 bytes inside of
[   36.066776]  allocated 120-byte region [ffff888101adc700, ffff888101adc778)
[   36.067920] 
[   36.068184] The buggy address belongs to the physical page:
[   36.068685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adc
[   36.069431] flags: 0x200000000000000(node=0|zone=2)
[   36.070113] page_type: f5(slab)
[   36.070425] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   36.071218] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.071976] page dumped because: kasan: bad access detected
[   36.072582] 
[   36.072904] Memory state around the buggy address:
[   36.073323]  ffff888101adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.074091]  ffff888101adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.074886] >ffff888101adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.075466]                                                                 ^
[   36.076111]  ffff888101adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.076666]  ffff888101adc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.077421] ==================================================================
[   35.937687] ==================================================================
[   35.938571] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   35.939299] Read of size 121 at addr ffff888101adc700 by task kunit_try_catch/292
[   35.939958] 
[   35.940222] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.941192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.941817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.942527] Call Trace:
[   35.942917]  <TASK>
[   35.943192]  dump_stack_lvl+0x73/0xb0
[   35.943752]  print_report+0xd1/0x640
[   35.944146]  ? __virt_addr_valid+0x1db/0x2d0
[   35.944736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.945274]  kasan_report+0x102/0x140
[   35.945736]  ? copy_user_test_oob+0x4ab/0x10f0
[   35.946361]  ? copy_user_test_oob+0x4ab/0x10f0
[   35.947040]  kasan_check_range+0x10c/0x1c0
[   35.948017]  __kasan_check_read+0x15/0x20
[   35.950524]  copy_user_test_oob+0x4ab/0x10f0
[   35.951421]  ? __pfx_copy_user_test_oob+0x10/0x10
[   35.952050]  ? finish_task_switch.isra.0+0x153/0x700
[   35.953375]  ? __switch_to+0x5d9/0xf60
[   35.954142]  ? __schedule+0xc3e/0x2790
[   35.954405]  ? __pfx_read_tsc+0x10/0x10
[   35.954678]  ? ktime_get_ts64+0x84/0x230
[   35.954968]  kunit_try_run_case+0x1b3/0x490
[   35.955245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.957846]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.959206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.960461]  ? __kthread_parkme+0x82/0x160
[   35.961613]  ? preempt_count_sub+0x50/0x80
[   35.962162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.962608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.963361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.964055]  kthread+0x257/0x310
[   35.964255]  ? __pfx_kthread+0x10/0x10
[   35.964446]  ret_from_fork+0x41/0x80
[   35.964625]  ? __pfx_kthread+0x10/0x10
[   35.964975]  ret_from_fork_asm+0x1a/0x30
[   35.965543]  </TASK>
[   35.966390] 
[   35.966759] Allocated by task 292:
[   35.967121]  kasan_save_stack+0x3d/0x60
[   35.967547]  kasan_save_track+0x18/0x40
[   35.968496]  kasan_save_alloc_info+0x3b/0x50
[   35.969246]  __kasan_kmalloc+0xb7/0xc0
[   35.969505]  __kmalloc_noprof+0x1c4/0x500
[   35.970153]  kunit_kmalloc_array+0x25/0x60
[   35.970607]  copy_user_test_oob+0xac/0x10f0
[   35.971304]  kunit_try_run_case+0x1b3/0x490
[   35.972017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.973205]  kthread+0x257/0x310
[   35.973555]  ret_from_fork+0x41/0x80
[   35.974284]  ret_from_fork_asm+0x1a/0x30
[   35.974911] 
[   35.975173] The buggy address belongs to the object at ffff888101adc700
[   35.975173]  which belongs to the cache kmalloc-128 of size 128
[   35.976235] The buggy address is located 0 bytes inside of
[   35.976235]  allocated 120-byte region [ffff888101adc700, ffff888101adc778)
[   35.978095] 
[   35.978475] The buggy address belongs to the physical page:
[   35.978827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adc
[   35.979929] flags: 0x200000000000000(node=0|zone=2)
[   35.980234] page_type: f5(slab)
[   35.981117] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   35.982320] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.983519] page dumped because: kasan: bad access detected
[   35.983892] 
[   35.984128] Memory state around the buggy address:
[   35.985149]  ffff888101adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.986135]  ffff888101adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.986671] >ffff888101adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.987934]                                                                 ^
[   35.988482]  ffff888101adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.989288]  ffff888101adc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.990143] ==================================================================