Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   37.363728] ==================================================================
[   37.364429] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   37.365023] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.365956] 
[   37.366396] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.368217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.368805] Hardware name: linux,dummy-virt (DT)
[   37.369300] Call trace:
[   37.369727]  show_stack+0x20/0x38 (C)
[   37.370279]  dump_stack_lvl+0x8c/0xd0
[   37.370942]  print_report+0x118/0x5e0
[   37.371567]  kasan_report+0xc8/0x118
[   37.372147]  kasan_check_range+0x100/0x1a8
[   37.372762]  __kasan_check_read+0x20/0x30
[   37.373501]  copy_user_test_oob+0x4a0/0xec0
[   37.374165]  kunit_try_run_case+0x14c/0x3d0
[   37.374846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.375593]  kthread+0x24c/0x2d0
[   37.376187]  ret_from_fork+0x10/0x20
[   37.376830] 
[   37.377172] Allocated by task 273:
[   37.377592]  kasan_save_stack+0x3c/0x68
[   37.378183]  kasan_save_track+0x20/0x40
[   37.378772]  kasan_save_alloc_info+0x40/0x58
[   37.379499]  __kasan_kmalloc+0xd4/0xd8
[   37.380084]  __kmalloc_noprof+0x188/0x4c8
[   37.380747]  kunit_kmalloc_array+0x34/0x88
[   37.381308]  copy_user_test_oob+0xac/0xec0
[   37.381956]  kunit_try_run_case+0x14c/0x3d0
[   37.382622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.383258]  kthread+0x24c/0x2d0
[   37.383826]  ret_from_fork+0x10/0x20
[   37.384438] 
[   37.384749] The buggy address belongs to the object at fff00000c6409200
[   37.384749]  which belongs to the cache kmalloc-128 of size 128
[   37.385995] The buggy address is located 0 bytes inside of
[   37.385995]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.387257] 
[   37.387640] The buggy address belongs to the physical page:
[   37.388330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.389230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.390033] page_type: f5(slab)
[   37.390532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.391441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.392269] page dumped because: kasan: bad access detected
[   37.392926] 
[   37.393318] Memory state around the buggy address:
[   37.393913]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.394725]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.395577] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.396391]                                                                 ^
[   37.397205]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398030]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398876] ==================================================================
[   37.326955] ==================================================================
[   37.327576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   37.328440] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.329399] 
[   37.329814] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.330946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.331576] Hardware name: linux,dummy-virt (DT)
[   37.332131] Call trace:
[   37.332571]  show_stack+0x20/0x38 (C)
[   37.333193]  dump_stack_lvl+0x8c/0xd0
[   37.333885]  print_report+0x118/0x5e0
[   37.334498]  kasan_report+0xc8/0x118
[   37.335035]  kasan_check_range+0x100/0x1a8
[   37.335680]  __kasan_check_write+0x20/0x30
[   37.336605]  copy_user_test_oob+0x434/0xec0
[   37.337277]  kunit_try_run_case+0x14c/0x3d0
[   37.337982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.338724]  kthread+0x24c/0x2d0
[   37.339300]  ret_from_fork+0x10/0x20
[   37.339881] 
[   37.340234] Allocated by task 273:
[   37.340789]  kasan_save_stack+0x3c/0x68
[   37.341341]  kasan_save_track+0x20/0x40
[   37.341856]  kasan_save_alloc_info+0x40/0x58
[   37.342515]  __kasan_kmalloc+0xd4/0xd8
[   37.343078]  __kmalloc_noprof+0x188/0x4c8
[   37.343723]  kunit_kmalloc_array+0x34/0x88
[   37.344271]  copy_user_test_oob+0xac/0xec0
[   37.344924]  kunit_try_run_case+0x14c/0x3d0
[   37.345525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.346264]  kthread+0x24c/0x2d0
[   37.346775]  ret_from_fork+0x10/0x20
[   37.347384] 
[   37.347759] The buggy address belongs to the object at fff00000c6409200
[   37.347759]  which belongs to the cache kmalloc-128 of size 128
[   37.348984] The buggy address is located 0 bytes inside of
[   37.348984]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.350316] 
[   37.350655] The buggy address belongs to the physical page:
[   37.351372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.352316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.353034] page_type: f5(slab)
[   37.353615] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.354499] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.355354] page dumped because: kasan: bad access detected
[   37.356009] 
[   37.356393] Memory state around the buggy address:
[   37.356920]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.357845]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.358594] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.359453]                                                                 ^
[   37.360259]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.361075]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.361876] ==================================================================
[   37.208218] ==================================================================
[   37.208967] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   37.209878] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.210865] 
[   37.211274] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.212597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.213394] Hardware name: linux,dummy-virt (DT)
[   37.214139] Call trace:
[   37.214710]  show_stack+0x20/0x38 (C)
[   37.215299]  dump_stack_lvl+0x8c/0xd0
[   37.215815]  print_report+0x118/0x5e0
[   37.216323]  kasan_report+0xc8/0x118
[   37.217021]  kasan_check_range+0x100/0x1a8
[   37.217840]  __kasan_check_read+0x20/0x30
[   37.218584]  copy_user_test_oob+0x728/0xec0
[   37.219228]  kunit_try_run_case+0x14c/0x3d0
[   37.219871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.220616]  kthread+0x24c/0x2d0
[   37.221512]  ret_from_fork+0x10/0x20
[   37.222035] 
[   37.222268] Allocated by task 273:
[   37.222831]  kasan_save_stack+0x3c/0x68
[   37.223428]  kasan_save_track+0x20/0x40
[   37.224000]  kasan_save_alloc_info+0x40/0x58
[   37.224609]  __kasan_kmalloc+0xd4/0xd8
[   37.225640]  __kmalloc_noprof+0x188/0x4c8
[   37.226351]  kunit_kmalloc_array+0x34/0x88
[   37.226942]  copy_user_test_oob+0xac/0xec0
[   37.227363]  kunit_try_run_case+0x14c/0x3d0
[   37.228032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.228820]  kthread+0x24c/0x2d0
[   37.229322]  ret_from_fork+0x10/0x20
[   37.229869] 
[   37.230241] The buggy address belongs to the object at fff00000c6409200
[   37.230241]  which belongs to the cache kmalloc-128 of size 128
[   37.231514] The buggy address is located 0 bytes inside of
[   37.231514]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.232762] 
[   37.233209] The buggy address belongs to the physical page:
[   37.233964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.234860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.235665] page_type: f5(slab)
[   37.236211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.237040] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.237882] page dumped because: kasan: bad access detected
[   37.238634] 
[   37.238977] Memory state around the buggy address:
[   37.239611]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.240501]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.241164] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.242098]                                                                 ^
[   37.242999]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.243769]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.244654] ==================================================================
[   37.290408] ==================================================================
[   37.291071] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   37.291969] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.292845] 
[   37.293293] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.294376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.294942] Hardware name: linux,dummy-virt (DT)
[   37.295679] Call trace:
[   37.296052]  show_stack+0x20/0x38 (C)
[   37.296721]  dump_stack_lvl+0x8c/0xd0
[   37.297404]  print_report+0x118/0x5e0
[   37.298102]  kasan_report+0xc8/0x118
[   37.298661]  kasan_check_range+0x100/0x1a8
[   37.299348]  __kasan_check_read+0x20/0x30
[   37.300037]  copy_user_test_oob+0x3c8/0xec0
[   37.300665]  kunit_try_run_case+0x14c/0x3d0
[   37.301362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.302022]  kthread+0x24c/0x2d0
[   37.302655]  ret_from_fork+0x10/0x20
[   37.303316] 
[   37.303691] Allocated by task 273:
[   37.304173]  kasan_save_stack+0x3c/0x68
[   37.304801]  kasan_save_track+0x20/0x40
[   37.305377]  kasan_save_alloc_info+0x40/0x58
[   37.306051]  __kasan_kmalloc+0xd4/0xd8
[   37.306600]  __kmalloc_noprof+0x188/0x4c8
[   37.307244]  kunit_kmalloc_array+0x34/0x88
[   37.307854]  copy_user_test_oob+0xac/0xec0
[   37.308452]  kunit_try_run_case+0x14c/0x3d0
[   37.309087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.309791]  kthread+0x24c/0x2d0
[   37.310332]  ret_from_fork+0x10/0x20
[   37.310892] 
[   37.311287] The buggy address belongs to the object at fff00000c6409200
[   37.311287]  which belongs to the cache kmalloc-128 of size 128
[   37.312442] The buggy address is located 0 bytes inside of
[   37.312442]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.313631] 
[   37.314008] The buggy address belongs to the physical page:
[   37.314717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.315571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.316385] page_type: f5(slab)
[   37.316832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.317769] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.318598] page dumped because: kasan: bad access detected
[   37.319210] 
[   37.319588] Memory state around the buggy address:
[   37.320229]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.320957]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.321840] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.322643]                                                                 ^
[   37.323448]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.324269]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.325071] ==================================================================
[   37.156251] ==================================================================
[   37.157829] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   37.159155] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.159945] 
[   37.160338] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.161405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.161927] Hardware name: linux,dummy-virt (DT)
[   37.162580] Call trace:
[   37.162967]  show_stack+0x20/0x38 (C)
[   37.163466]  dump_stack_lvl+0x8c/0xd0
[   37.164069]  print_report+0x118/0x5e0
[   37.164696]  kasan_report+0xc8/0x118
[   37.165352]  kasan_check_range+0x100/0x1a8
[   37.166005]  __kasan_check_write+0x20/0x30
[   37.166672]  copy_user_test_oob+0x234/0xec0
[   37.167812]  kunit_try_run_case+0x14c/0x3d0
[   37.168352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.169200]  kthread+0x24c/0x2d0
[   37.169662]  ret_from_fork+0x10/0x20
[   37.170156] 
[   37.170434] Allocated by task 273:
[   37.170749]  kasan_save_stack+0x3c/0x68
[   37.171016]  kasan_save_track+0x20/0x40
[   37.171611]  kasan_save_alloc_info+0x40/0x58
[   37.172307]  __kasan_kmalloc+0xd4/0xd8
[   37.172881]  __kmalloc_noprof+0x188/0x4c8
[   37.174565]  kunit_kmalloc_array+0x34/0x88
[   37.175421]  copy_user_test_oob+0xac/0xec0
[   37.176050]  kunit_try_run_case+0x14c/0x3d0
[   37.176815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.177866]  kthread+0x24c/0x2d0
[   37.178309]  ret_from_fork+0x10/0x20
[   37.178872] 
[   37.179234] The buggy address belongs to the object at fff00000c6409200
[   37.179234]  which belongs to the cache kmalloc-128 of size 128
[   37.180916] The buggy address is located 0 bytes inside of
[   37.180916]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.182918] 
[   37.183311] The buggy address belongs to the physical page:
[   37.183935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.184821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.185841] page_type: f5(slab)
[   37.186991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.188035] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.188924] page dumped because: kasan: bad access detected
[   37.189930] 
[   37.190531] Memory state around the buggy address:
[   37.191201]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.192190]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.193437] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.195174]                                                                 ^
[   37.195922]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196677]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.197838] ==================================================================
[   37.253650] ==================================================================
[   37.254357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   37.255151] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.255958] 
[   37.256327] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.257540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.258058] Hardware name: linux,dummy-virt (DT)
[   37.258725] Call trace:
[   37.259174]  show_stack+0x20/0x38 (C)
[   37.259766]  dump_stack_lvl+0x8c/0xd0
[   37.260427]  print_report+0x118/0x5e0
[   37.261022]  kasan_report+0xc8/0x118
[   37.261692]  kasan_check_range+0x100/0x1a8
[   37.262265]  __kasan_check_write+0x20/0x30
[   37.262967]  copy_user_test_oob+0x35c/0xec0
[   37.263573]  kunit_try_run_case+0x14c/0x3d0
[   37.264254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.265066]  kthread+0x24c/0x2d0
[   37.265737]  ret_from_fork+0x10/0x20
[   37.266347] 
[   37.266708] Allocated by task 273:
[   37.267270]  kasan_save_stack+0x3c/0x68
[   37.267863]  kasan_save_track+0x20/0x40
[   37.268493]  kasan_save_alloc_info+0x40/0x58
[   37.269195]  __kasan_kmalloc+0xd4/0xd8
[   37.269793]  __kmalloc_noprof+0x188/0x4c8
[   37.270451]  kunit_kmalloc_array+0x34/0x88
[   37.270975]  copy_user_test_oob+0xac/0xec0
[   37.271633]  kunit_try_run_case+0x14c/0x3d0
[   37.272271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.273012]  kthread+0x24c/0x2d0
[   37.273575]  ret_from_fork+0x10/0x20
[   37.274145] 
[   37.274483] The buggy address belongs to the object at fff00000c6409200
[   37.274483]  which belongs to the cache kmalloc-128 of size 128
[   37.275684] The buggy address is located 0 bytes inside of
[   37.275684]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.276862] 
[   37.277299] The buggy address belongs to the physical page:
[   37.278011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.278893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.279808] page_type: f5(slab)
[   37.280302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.281231] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.282054] page dumped because: kasan: bad access detected
[   37.282788] 
[   37.283133] Memory state around the buggy address:
[   37.283819]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.284673]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.285518] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.286312]                                                                 ^
[   37.287062]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.287921]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288735] ==================================================================

[   28.808412] ==================================================================
[   28.809418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   28.810965] Read of size 121 at addr ffff888101b6b500 by task kunit_try_catch/293
[   28.811756] 
[   28.812019] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.812860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.813358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.814415] Call Trace:
[   28.814627]  <TASK>
[   28.815018]  dump_stack_lvl+0x73/0xb0
[   28.815557]  print_report+0xd1/0x640
[   28.815889]  ? __virt_addr_valid+0x1db/0x2d0
[   28.816601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.817115]  kasan_report+0x102/0x140
[   28.817668]  ? copy_user_test_oob+0x605/0x10f0
[   28.818262]  ? copy_user_test_oob+0x605/0x10f0
[   28.818820]  kasan_check_range+0x10c/0x1c0
[   28.819304]  __kasan_check_read+0x15/0x20
[   28.819824]  copy_user_test_oob+0x605/0x10f0
[   28.820279]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.820907]  ? finish_task_switch.isra.0+0x153/0x700
[   28.821542]  ? __switch_to+0x5d9/0xf60
[   28.822051]  ? __schedule+0xc3e/0x2790
[   28.822470]  ? __pfx_read_tsc+0x10/0x10
[   28.822895]  ? ktime_get_ts64+0x84/0x230
[   28.823511]  kunit_try_run_case+0x1b3/0x490
[   28.823925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.824484]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.825133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.825549]  ? __kthread_parkme+0x82/0x160
[   28.826134]  ? preempt_count_sub+0x50/0x80
[   28.826558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.827038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.827790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.828403]  kthread+0x257/0x310
[   28.828796]  ? __pfx_kthread+0x10/0x10
[   28.829358]  ret_from_fork+0x41/0x80
[   28.829720]  ? __pfx_kthread+0x10/0x10
[   28.830242]  ret_from_fork_asm+0x1a/0x30
[   28.830677]  </TASK>
[   28.831050] 
[   28.831324] Allocated by task 293:
[   28.831729]  kasan_save_stack+0x3d/0x60
[   28.832179]  kasan_save_track+0x18/0x40
[   28.832598]  kasan_save_alloc_info+0x3b/0x50
[   28.833123]  __kasan_kmalloc+0xb7/0xc0
[   28.833587]  __kmalloc_noprof+0x1c4/0x500
[   28.834179]  kunit_kmalloc_array+0x25/0x60
[   28.834683]  copy_user_test_oob+0xac/0x10f0
[   28.835250]  kunit_try_run_case+0x1b3/0x490
[   28.835662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.836378]  kthread+0x257/0x310
[   28.836839]  ret_from_fork+0x41/0x80
[   28.837174]  ret_from_fork_asm+0x1a/0x30
[   28.837752] 
[   28.838003] The buggy address belongs to the object at ffff888101b6b500
[   28.838003]  which belongs to the cache kmalloc-128 of size 128
[   28.838903] The buggy address is located 0 bytes inside of
[   28.838903]  allocated 120-byte region [ffff888101b6b500, ffff888101b6b578)
[   28.840867] 
[   28.841024] The buggy address belongs to the physical page:
[   28.841926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b6b
[   28.843085] flags: 0x200000000000000(node=0|zone=2)
[   28.843727] page_type: f5(slab)
[   28.844443] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.845493] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.846429] page dumped because: kasan: bad access detected
[   28.846892] 
[   28.847126] Memory state around the buggy address:
[   28.848085]  ffff888101b6b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.848795]  ffff888101b6b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.849690] >ffff888101b6b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.850358]                                                                 ^
[   28.850942]  ffff888101b6b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.851640]  ffff888101b6b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.852215] ==================================================================
[   28.762684] ==================================================================
[   28.764350] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   28.765063] Write of size 121 at addr ffff888101b6b500 by task kunit_try_catch/293
[   28.765964] 
[   28.766216] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.767294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.767923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.769115] Call Trace:
[   28.769653]  <TASK>
[   28.769958]  dump_stack_lvl+0x73/0xb0
[   28.770837]  print_report+0xd1/0x640
[   28.771544]  ? __virt_addr_valid+0x1db/0x2d0
[   28.772038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.772599]  kasan_report+0x102/0x140
[   28.772994]  ? copy_user_test_oob+0x558/0x10f0
[   28.773970]  ? copy_user_test_oob+0x558/0x10f0
[   28.774776]  kasan_check_range+0x10c/0x1c0
[   28.775114]  __kasan_check_write+0x18/0x20
[   28.775752]  copy_user_test_oob+0x558/0x10f0
[   28.776257]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.776860]  ? finish_task_switch.isra.0+0x153/0x700
[   28.777472]  ? __switch_to+0x5d9/0xf60
[   28.777974]  ? __schedule+0xc3e/0x2790
[   28.778739]  ? __pfx_read_tsc+0x10/0x10
[   28.779590]  ? ktime_get_ts64+0x84/0x230
[   28.779995]  kunit_try_run_case+0x1b3/0x490
[   28.780506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.780878]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.781394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.781795]  ? __kthread_parkme+0x82/0x160
[   28.782321]  ? preempt_count_sub+0x50/0x80
[   28.782671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.783282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.783942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.784461]  kthread+0x257/0x310
[   28.784824]  ? __pfx_kthread+0x10/0x10
[   28.785414]  ret_from_fork+0x41/0x80
[   28.786055]  ? __pfx_kthread+0x10/0x10
[   28.786819]  ret_from_fork_asm+0x1a/0x30
[   28.787385]  </TASK>
[   28.787746] 
[   28.787896] Allocated by task 293:
[   28.788382]  kasan_save_stack+0x3d/0x60
[   28.789042]  kasan_save_track+0x18/0x40
[   28.789320]  kasan_save_alloc_info+0x3b/0x50
[   28.790221]  __kasan_kmalloc+0xb7/0xc0
[   28.790811]  __kmalloc_noprof+0x1c4/0x500
[   28.791495]  kunit_kmalloc_array+0x25/0x60
[   28.791880]  copy_user_test_oob+0xac/0x10f0
[   28.792319]  kunit_try_run_case+0x1b3/0x490
[   28.792709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.793253]  kthread+0x257/0x310
[   28.793731]  ret_from_fork+0x41/0x80
[   28.794232]  ret_from_fork_asm+0x1a/0x30
[   28.794699] 
[   28.794899] The buggy address belongs to the object at ffff888101b6b500
[   28.794899]  which belongs to the cache kmalloc-128 of size 128
[   28.796105] The buggy address is located 0 bytes inside of
[   28.796105]  allocated 120-byte region [ffff888101b6b500, ffff888101b6b578)
[   28.797280] 
[   28.797574] The buggy address belongs to the physical page:
[   28.798194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b6b
[   28.798963] flags: 0x200000000000000(node=0|zone=2)
[   28.799466] page_type: f5(slab)
[   28.799870] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.800654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.801431] page dumped because: kasan: bad access detected
[   28.801923] 
[   28.802212] Memory state around the buggy address:
[   28.802703]  ffff888101b6b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.803454]  ffff888101b6b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.804207] >ffff888101b6b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.804857]                                                                 ^
[   28.805594]  ffff888101b6b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.806373]  ffff888101b6b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.807008] ==================================================================
[   28.675158] ==================================================================
[   28.675888] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   28.676641] Write of size 121 at addr ffff888101b6b500 by task kunit_try_catch/293
[   28.677310] 
[   28.677517] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.678212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.678743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.679550] Call Trace:
[   28.679781]  <TASK>
[   28.679984]  dump_stack_lvl+0x73/0xb0
[   28.680808]  print_report+0xd1/0x640
[   28.681086]  ? __virt_addr_valid+0x1db/0x2d0
[   28.681611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.682172]  kasan_report+0x102/0x140
[   28.682606]  ? copy_user_test_oob+0x3fe/0x10f0
[   28.683002]  ? copy_user_test_oob+0x3fe/0x10f0
[   28.683593]  kasan_check_range+0x10c/0x1c0
[   28.684102]  __kasan_check_write+0x18/0x20
[   28.684437]  copy_user_test_oob+0x3fe/0x10f0
[   28.684960]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.685613]  ? finish_task_switch.isra.0+0x153/0x700
[   28.685951]  ? __switch_to+0x5d9/0xf60
[   28.686680]  ? __schedule+0xc3e/0x2790
[   28.687050]  ? __pfx_read_tsc+0x10/0x10
[   28.687444]  ? ktime_get_ts64+0x84/0x230
[   28.687866]  kunit_try_run_case+0x1b3/0x490
[   28.688227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.688595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.689273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.689776]  ? __kthread_parkme+0x82/0x160
[   28.690110]  ? preempt_count_sub+0x50/0x80
[   28.690624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.691190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.691734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.692204]  kthread+0x257/0x310
[   28.692723]  ? __pfx_kthread+0x10/0x10
[   28.693012]  ret_from_fork+0x41/0x80
[   28.693287]  ? __pfx_kthread+0x10/0x10
[   28.693790]  ret_from_fork_asm+0x1a/0x30
[   28.694413]  </TASK>
[   28.694728] 
[   28.694960] Allocated by task 293:
[   28.695255]  kasan_save_stack+0x3d/0x60
[   28.695580]  kasan_save_track+0x18/0x40
[   28.696069]  kasan_save_alloc_info+0x3b/0x50
[   28.696493]  __kasan_kmalloc+0xb7/0xc0
[   28.696784]  __kmalloc_noprof+0x1c4/0x500
[   28.697069]  kunit_kmalloc_array+0x25/0x60
[   28.697785]  copy_user_test_oob+0xac/0x10f0
[   28.698281]  kunit_try_run_case+0x1b3/0x490
[   28.700044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.700448]  kthread+0x257/0x310
[   28.700688]  ret_from_fork+0x41/0x80
[   28.700942]  ret_from_fork_asm+0x1a/0x30
[   28.701397] 
[   28.701714] The buggy address belongs to the object at ffff888101b6b500
[   28.701714]  which belongs to the cache kmalloc-128 of size 128
[   28.703645] The buggy address is located 0 bytes inside of
[   28.703645]  allocated 120-byte region [ffff888101b6b500, ffff888101b6b578)
[   28.705000] 
[   28.705252] The buggy address belongs to the physical page:
[   28.705761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b6b
[   28.706548] flags: 0x200000000000000(node=0|zone=2)
[   28.706998] page_type: f5(slab)
[   28.707291] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.707868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.708738] page dumped because: kasan: bad access detected
[   28.709767] 
[   28.710086] Memory state around the buggy address:
[   28.710820]  ffff888101b6b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.711851]  ffff888101b6b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.712769] >ffff888101b6b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.713531]                                                                 ^
[   28.714037]  ffff888101b6b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.714386]  ffff888101b6b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.714909] ==================================================================
[   28.716035] ==================================================================
[   28.717245] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   28.717872] Read of size 121 at addr ffff888101b6b500 by task kunit_try_catch/293
[   28.719100] 
[   28.719502] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.720416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.721011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.721837] Call Trace:
[   28.722391]  <TASK>
[   28.722680]  dump_stack_lvl+0x73/0xb0
[   28.723139]  print_report+0xd1/0x640
[   28.723682]  ? __virt_addr_valid+0x1db/0x2d0
[   28.724184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.724942]  kasan_report+0x102/0x140
[   28.725470]  ? copy_user_test_oob+0x4ab/0x10f0
[   28.726020]  ? copy_user_test_oob+0x4ab/0x10f0
[   28.726734]  kasan_check_range+0x10c/0x1c0
[   28.727354]  __kasan_check_read+0x15/0x20
[   28.727823]  copy_user_test_oob+0x4ab/0x10f0
[   28.728374]  ? __pfx_copy_user_test_oob+0x10/0x10
[   28.728817]  ? finish_task_switch.isra.0+0x153/0x700
[   28.729327]  ? __switch_to+0x5d9/0xf60
[   28.729705]  ? __schedule+0xc3e/0x2790
[   28.730235]  ? __pfx_read_tsc+0x10/0x10
[   28.730664]  ? ktime_get_ts64+0x84/0x230
[   28.731166]  kunit_try_run_case+0x1b3/0x490
[   28.731590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.732295]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.732755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.733295]  ? __kthread_parkme+0x82/0x160
[   28.733904]  ? preempt_count_sub+0x50/0x80
[   28.734394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.734963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.735687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.736326]  kthread+0x257/0x310
[   28.736715]  ? __pfx_kthread+0x10/0x10
[   28.737220]  ret_from_fork+0x41/0x80
[   28.737733]  ? __pfx_kthread+0x10/0x10
[   28.738282]  ret_from_fork_asm+0x1a/0x30
[   28.738788]  </TASK>
[   28.739103] 
[   28.739395] Allocated by task 293:
[   28.739673]  kasan_save_stack+0x3d/0x60
[   28.740265]  kasan_save_track+0x18/0x40
[   28.740601]  kasan_save_alloc_info+0x3b/0x50
[   28.741180]  __kasan_kmalloc+0xb7/0xc0
[   28.741506]  __kmalloc_noprof+0x1c4/0x500
[   28.741950]  kunit_kmalloc_array+0x25/0x60
[   28.742451]  copy_user_test_oob+0xac/0x10f0
[   28.742852]  kunit_try_run_case+0x1b3/0x490
[   28.743287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.743943]  kthread+0x257/0x310
[   28.744251]  ret_from_fork+0x41/0x80
[   28.744548]  ret_from_fork_asm+0x1a/0x30
[   28.745031] 
[   28.745359] The buggy address belongs to the object at ffff888101b6b500
[   28.745359]  which belongs to the cache kmalloc-128 of size 128
[   28.747193] The buggy address is located 0 bytes inside of
[   28.747193]  allocated 120-byte region [ffff888101b6b500, ffff888101b6b578)
[   28.748875] 
[   28.749081] The buggy address belongs to the physical page:
[   28.750049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b6b
[   28.750963] flags: 0x200000000000000(node=0|zone=2)
[   28.751720] page_type: f5(slab)
[   28.752154] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.753020] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.753932] page dumped because: kasan: bad access detected
[   28.754628] 
[   28.754801] Memory state around the buggy address:
[   28.755926]  ffff888101b6b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.756600]  ffff888101b6b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.757620] >ffff888101b6b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.758390]                                                                 ^
[   28.759007]  ffff888101b6b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.760087]  ffff888101b6b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.760758] ==================================================================