Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   37.532586] ==================================================================
[   37.533493] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   37.534134] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.535405] 
[   37.535729] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.537050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.537603] Hardware name: linux,dummy-virt (DT)
[   37.538203] Call trace:
[   37.538785]  show_stack+0x20/0x38 (C)
[   37.539513]  dump_stack_lvl+0x8c/0xd0
[   37.540715]  print_report+0x118/0x5e0
[   37.541572]  kasan_report+0xc8/0x118
[   37.542151]  kasan_check_range+0x100/0x1a8
[   37.542836]  __kasan_check_write+0x20/0x30
[   37.543690]  copy_user_test_oob+0x35c/0xec0
[   37.544486]  kunit_try_run_case+0x14c/0x3d0
[   37.545174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.545952]  kthread+0x24c/0x2d0
[   37.546519]  ret_from_fork+0x10/0x20
[   37.547278] 
[   37.548054] Allocated by task 274:
[   37.548470]  kasan_save_stack+0x3c/0x68
[   37.548968]  kasan_save_track+0x20/0x40
[   37.549665]  kasan_save_alloc_info+0x40/0x58
[   37.550309]  __kasan_kmalloc+0xd4/0xd8
[   37.550898]  __kmalloc_noprof+0x188/0x4c8
[   37.552074]  kunit_kmalloc_array+0x34/0x88
[   37.552738]  copy_user_test_oob+0xac/0xec0
[   37.553366]  kunit_try_run_case+0x14c/0x3d0
[   37.553986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.554786]  kthread+0x24c/0x2d0
[   37.555254]  ret_from_fork+0x10/0x20
[   37.555934] 
[   37.556190] The buggy address belongs to the object at fff00000c594bf00
[   37.556190]  which belongs to the cache kmalloc-128 of size 128
[   37.557907] The buggy address is located 0 bytes inside of
[   37.557907]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.560917] 
[   37.561231] The buggy address belongs to the physical page:
[   37.562053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.562925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.564042] page_type: f5(slab)
[   37.564809] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.566030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.566684] page dumped because: kasan: bad access detected
[   37.567824] 
[   37.568452] Memory state around the buggy address:
[   37.569245]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.570219]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.571446] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.572081]                                                                 ^
[   37.572959]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.573955]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.574921] ==================================================================
[   37.576677] ==================================================================
[   37.577397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   37.578539] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.579606] 
[   37.580014] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.581690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.582426] Hardware name: linux,dummy-virt (DT)
[   37.583571] Call trace:
[   37.584120]  show_stack+0x20/0x38 (C)
[   37.584944]  dump_stack_lvl+0x8c/0xd0
[   37.585658]  print_report+0x118/0x5e0
[   37.586314]  kasan_report+0xc8/0x118
[   37.587016]  kasan_check_range+0x100/0x1a8
[   37.588240]  __kasan_check_read+0x20/0x30
[   37.588899]  copy_user_test_oob+0x3c8/0xec0
[   37.589701]  kunit_try_run_case+0x14c/0x3d0
[   37.590388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.591486]  kthread+0x24c/0x2d0
[   37.591797]  ret_from_fork+0x10/0x20
[   37.592094] 
[   37.592262] Allocated by task 274:
[   37.592557]  kasan_save_stack+0x3c/0x68
[   37.592851]  kasan_save_track+0x20/0x40
[   37.593135]  kasan_save_alloc_info+0x40/0x58
[   37.594285]  __kasan_kmalloc+0xd4/0xd8
[   37.595232]  __kmalloc_noprof+0x188/0x4c8
[   37.597113]  kunit_kmalloc_array+0x34/0x88
[   37.598011]  copy_user_test_oob+0xac/0xec0
[   37.598875]  kunit_try_run_case+0x14c/0x3d0
[   37.599793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.600689]  kthread+0x24c/0x2d0
[   37.601178]  ret_from_fork+0x10/0x20
[   37.601779] 
[   37.602116] The buggy address belongs to the object at fff00000c594bf00
[   37.602116]  which belongs to the cache kmalloc-128 of size 128
[   37.603492] The buggy address is located 0 bytes inside of
[   37.603492]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.604918] 
[   37.605220] The buggy address belongs to the physical page:
[   37.606112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.607037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.607873] page_type: f5(slab)
[   37.608538] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.609734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.611407] page dumped because: kasan: bad access detected
[   37.613469] 
[   37.613824] Memory state around the buggy address:
[   37.614756]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.616383]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.617295] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.618450]                                                                 ^
[   37.620508]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.621632]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.622653] ==================================================================
[   37.625306] ==================================================================
[   37.626142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   37.626863] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.629771] 
[   37.630579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.631604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.632486] Hardware name: linux,dummy-virt (DT)
[   37.633277] Call trace:
[   37.633760]  show_stack+0x20/0x38 (C)
[   37.634304]  dump_stack_lvl+0x8c/0xd0
[   37.635223]  print_report+0x118/0x5e0
[   37.636322]  kasan_report+0xc8/0x118
[   37.636779]  kasan_check_range+0x100/0x1a8
[   37.637268]  __kasan_check_write+0x20/0x30
[   37.638144]  copy_user_test_oob+0x434/0xec0
[   37.638840]  kunit_try_run_case+0x14c/0x3d0
[   37.639635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.640473]  kthread+0x24c/0x2d0
[   37.641261]  ret_from_fork+0x10/0x20
[   37.642352] 
[   37.642731] Allocated by task 274:
[   37.643364]  kasan_save_stack+0x3c/0x68
[   37.644056]  kasan_save_track+0x20/0x40
[   37.644706]  kasan_save_alloc_info+0x40/0x58
[   37.645351]  __kasan_kmalloc+0xd4/0xd8
[   37.646110]  __kmalloc_noprof+0x188/0x4c8
[   37.646605]  kunit_kmalloc_array+0x34/0x88
[   37.647219]  copy_user_test_oob+0xac/0xec0
[   37.648677]  kunit_try_run_case+0x14c/0x3d0
[   37.649403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.650178]  kthread+0x24c/0x2d0
[   37.650668]  ret_from_fork+0x10/0x20
[   37.651839] 
[   37.652177] The buggy address belongs to the object at fff00000c594bf00
[   37.652177]  which belongs to the cache kmalloc-128 of size 128
[   37.654138] The buggy address is located 0 bytes inside of
[   37.654138]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.656254] 
[   37.656636] The buggy address belongs to the physical page:
[   37.657572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.658527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.659736] page_type: f5(slab)
[   37.660253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.661244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.662801] page dumped because: kasan: bad access detected
[   37.663539] 
[   37.664390] Memory state around the buggy address:
[   37.665063]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.666111]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.667073] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.668260]                                                                 ^
[   37.669647]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.671643]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.672634] ==================================================================
[   37.482800] ==================================================================
[   37.483692] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   37.484578] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.485604] 
[   37.485951] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.487205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.487722] Hardware name: linux,dummy-virt (DT)
[   37.488262] Call trace:
[   37.488879]  show_stack+0x20/0x38 (C)
[   37.489569]  dump_stack_lvl+0x8c/0xd0
[   37.490230]  print_report+0x118/0x5e0
[   37.490933]  kasan_report+0xc8/0x118
[   37.491481]  kasan_check_range+0x100/0x1a8
[   37.492293]  __kasan_check_read+0x20/0x30
[   37.492921]  copy_user_test_oob+0x728/0xec0
[   37.493583]  kunit_try_run_case+0x14c/0x3d0
[   37.494431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.495166]  kthread+0x24c/0x2d0
[   37.495813]  ret_from_fork+0x10/0x20
[   37.496541] 
[   37.496877] Allocated by task 274:
[   37.497347]  kasan_save_stack+0x3c/0x68
[   37.498068]  kasan_save_track+0x20/0x40
[   37.498758]  kasan_save_alloc_info+0x40/0x58
[   37.499093]  __kasan_kmalloc+0xd4/0xd8
[   37.499487]  __kmalloc_noprof+0x188/0x4c8
[   37.500321]  kunit_kmalloc_array+0x34/0x88
[   37.500967]  copy_user_test_oob+0xac/0xec0
[   37.501589]  kunit_try_run_case+0x14c/0x3d0
[   37.502280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.503073]  kthread+0x24c/0x2d0
[   37.503567]  ret_from_fork+0x10/0x20
[   37.504167] 
[   37.504570] The buggy address belongs to the object at fff00000c594bf00
[   37.504570]  which belongs to the cache kmalloc-128 of size 128
[   37.505966] The buggy address is located 0 bytes inside of
[   37.505966]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.507312] 
[   37.507616] The buggy address belongs to the physical page:
[   37.508436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.509399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.510201] page_type: f5(slab)
[   37.510733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.511684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.512683] page dumped because: kasan: bad access detected
[   37.513470] 
[   37.513824] Memory state around the buggy address:
[   37.514496]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.515319]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.516233] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.517169]                                                                 ^
[   37.518018]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.518944]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.519915] ==================================================================
[   37.435893] ==================================================================
[   37.437361] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   37.438088] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.439196] 
[   37.439912] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.441272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.441862] Hardware name: linux,dummy-virt (DT)
[   37.442510] Call trace:
[   37.442901]  show_stack+0x20/0x38 (C)
[   37.443523]  dump_stack_lvl+0x8c/0xd0
[   37.444124]  print_report+0x118/0x5e0
[   37.444731]  kasan_report+0xc8/0x118
[   37.445245]  kasan_check_range+0x100/0x1a8
[   37.445969]  __kasan_check_write+0x20/0x30
[   37.446515]  copy_user_test_oob+0x234/0xec0
[   37.447356]  kunit_try_run_case+0x14c/0x3d0
[   37.448102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.448976]  kthread+0x24c/0x2d0
[   37.449540]  ret_from_fork+0x10/0x20
[   37.450125] 
[   37.450518] Allocated by task 274:
[   37.450977]  kasan_save_stack+0x3c/0x68
[   37.451688]  kasan_save_track+0x20/0x40
[   37.452276]  kasan_save_alloc_info+0x40/0x58
[   37.452911]  __kasan_kmalloc+0xd4/0xd8
[   37.453496]  __kmalloc_noprof+0x188/0x4c8
[   37.454055]  kunit_kmalloc_array+0x34/0x88
[   37.454738]  copy_user_test_oob+0xac/0xec0
[   37.455315]  kunit_try_run_case+0x14c/0x3d0
[   37.455987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.456751]  kthread+0x24c/0x2d0
[   37.457248]  ret_from_fork+0x10/0x20
[   37.457802] 
[   37.458279] The buggy address belongs to the object at fff00000c594bf00
[   37.458279]  which belongs to the cache kmalloc-128 of size 128
[   37.459659] The buggy address is located 0 bytes inside of
[   37.459659]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.461037] 
[   37.461409] The buggy address belongs to the physical page:
[   37.462188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.463060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.463955] page_type: f5(slab)
[   37.464465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.465594] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.466571] page dumped because: kasan: bad access detected
[   37.467191] 
[   37.467638] Memory state around the buggy address:
[   37.468404]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.469384]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.470298] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.471120]                                                                 ^
[   37.472073]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.472963]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.473862] ==================================================================
[   37.674320] ==================================================================
[   37.676292] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   37.677262] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.678046] 
[   37.678605] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.680672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.681662] Hardware name: linux,dummy-virt (DT)
[   37.682670] Call trace:
[   37.683491]  show_stack+0x20/0x38 (C)
[   37.684854]  dump_stack_lvl+0x8c/0xd0
[   37.685913]  print_report+0x118/0x5e0
[   37.686730]  kasan_report+0xc8/0x118
[   37.687448]  kasan_check_range+0x100/0x1a8
[   37.688169]  __kasan_check_read+0x20/0x30
[   37.689397]  copy_user_test_oob+0x4a0/0xec0
[   37.690084]  kunit_try_run_case+0x14c/0x3d0
[   37.690509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.691688]  kthread+0x24c/0x2d0
[   37.692164]  ret_from_fork+0x10/0x20
[   37.692966] 
[   37.693571] Allocated by task 274:
[   37.694233]  kasan_save_stack+0x3c/0x68
[   37.695415]  kasan_save_track+0x20/0x40
[   37.696047]  kasan_save_alloc_info+0x40/0x58
[   37.696669]  __kasan_kmalloc+0xd4/0xd8
[   37.697204]  __kmalloc_noprof+0x188/0x4c8
[   37.698303]  kunit_kmalloc_array+0x34/0x88
[   37.698895]  copy_user_test_oob+0xac/0xec0
[   37.699651]  kunit_try_run_case+0x14c/0x3d0
[   37.700252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.701090]  kthread+0x24c/0x2d0
[   37.701543]  ret_from_fork+0x10/0x20
[   37.701972] 
[   37.702235] The buggy address belongs to the object at fff00000c594bf00
[   37.702235]  which belongs to the cache kmalloc-128 of size 128
[   37.704871] The buggy address is located 0 bytes inside of
[   37.704871]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.706460] 
[   37.706858] The buggy address belongs to the physical page:
[   37.708253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.709481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.710316] page_type: f5(slab)
[   37.710826] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.712847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.714011] page dumped because: kasan: bad access detected
[   37.714782] 
[   37.715277] Memory state around the buggy address:
[   37.716079]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.717038]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.718095] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.719547]                                                                 ^
[   37.720898]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.722173]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.723177] ==================================================================

[   32.680041] ==================================================================
[   32.680584] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   32.681497] Write of size 121 at addr ffff888102a99200 by task kunit_try_catch/294
[   32.682221] 
[   32.682475] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.683497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.683853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.684849] Call Trace:
[   32.685165]  <TASK>
[   32.685580]  dump_stack_lvl+0x73/0xb0
[   32.686098]  print_report+0xd1/0x640
[   32.686518]  ? __virt_addr_valid+0x1db/0x2d0
[   32.686975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.687724]  kasan_report+0x102/0x140
[   32.688203]  ? copy_user_test_oob+0x558/0x10f0
[   32.688724]  ? copy_user_test_oob+0x558/0x10f0
[   32.689205]  kasan_check_range+0x10c/0x1c0
[   32.689899]  __kasan_check_write+0x18/0x20
[   32.690402]  copy_user_test_oob+0x558/0x10f0
[   32.690984]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.691593]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   32.691934]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.692763]  kunit_try_run_case+0x1b3/0x490
[   32.693252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.693844]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.694320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.694854]  ? __kthread_parkme+0x82/0x160
[   32.695374]  ? preempt_count_sub+0x50/0x80
[   32.695745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.696391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.697115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.698024]  kthread+0x257/0x310
[   32.698413]  ? __pfx_kthread+0x10/0x10
[   32.699155]  ret_from_fork+0x41/0x80
[   32.699408]  ? __pfx_kthread+0x10/0x10
[   32.699814]  ret_from_fork_asm+0x1a/0x30
[   32.700272]  </TASK>
[   32.700499] 
[   32.700707] Allocated by task 294:
[   32.701074]  kasan_save_stack+0x3d/0x60
[   32.701432]  kasan_save_track+0x18/0x40
[   32.701850]  kasan_save_alloc_info+0x3b/0x50
[   32.702151]  __kasan_kmalloc+0xb7/0xc0
[   32.702411]  __kmalloc_noprof+0x1c4/0x500
[   32.702884]  kunit_kmalloc_array+0x25/0x60
[   32.703481]  copy_user_test_oob+0xac/0x10f0
[   32.704101]  kunit_try_run_case+0x1b3/0x490
[   32.704439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.704754]  kthread+0x257/0x310
[   32.705105]  ret_from_fork+0x41/0x80
[   32.705529]  ret_from_fork_asm+0x1a/0x30
[   32.705923] 
[   32.706149] The buggy address belongs to the object at ffff888102a99200
[   32.706149]  which belongs to the cache kmalloc-128 of size 128
[   32.707136] The buggy address is located 0 bytes inside of
[   32.707136]  allocated 120-byte region [ffff888102a99200, ffff888102a99278)
[   32.708118] 
[   32.708323] The buggy address belongs to the physical page:
[   32.708786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a99
[   32.709274] flags: 0x200000000000000(node=0|zone=2)
[   32.709751] page_type: f5(slab)
[   32.710102] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.710864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.711303] page dumped because: kasan: bad access detected
[   32.711663] 
[   32.711865] Memory state around the buggy address:
[   32.712413]  ffff888102a99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.712941]  ffff888102a99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.713328] >ffff888102a99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.713684]                                                                 ^
[   32.714037]  ffff888102a99280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.714654]  ffff888102a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.715257] ==================================================================
[   32.642025] ==================================================================
[   32.642567] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   32.642959] Read of size 121 at addr ffff888102a99200 by task kunit_try_catch/294
[   32.643591] 
[   32.643893] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.644922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.645245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.645936] Call Trace:
[   32.646279]  <TASK>
[   32.646579]  dump_stack_lvl+0x73/0xb0
[   32.647069]  print_report+0xd1/0x640
[   32.647344]  ? __virt_addr_valid+0x1db/0x2d0
[   32.647899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.648666]  kasan_report+0x102/0x140
[   32.649022]  ? copy_user_test_oob+0x4ab/0x10f0
[   32.649374]  ? copy_user_test_oob+0x4ab/0x10f0
[   32.649682]  kasan_check_range+0x10c/0x1c0
[   32.650287]  __kasan_check_read+0x15/0x20
[   32.650734]  copy_user_test_oob+0x4ab/0x10f0
[   32.651203]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.651849]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   32.652317]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.652693]  kunit_try_run_case+0x1b3/0x490
[   32.652987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.653716]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.654552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.655131]  ? __kthread_parkme+0x82/0x160
[   32.655717]  ? preempt_count_sub+0x50/0x80
[   32.656164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.656671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.657527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.657993]  kthread+0x257/0x310
[   32.658515]  ? __pfx_kthread+0x10/0x10
[   32.658954]  ret_from_fork+0x41/0x80
[   32.659434]  ? __pfx_kthread+0x10/0x10
[   32.660008]  ret_from_fork_asm+0x1a/0x30
[   32.660425]  </TASK>
[   32.660654] 
[   32.660803] Allocated by task 294:
[   32.661085]  kasan_save_stack+0x3d/0x60
[   32.661760]  kasan_save_track+0x18/0x40
[   32.662180]  kasan_save_alloc_info+0x3b/0x50
[   32.662724]  __kasan_kmalloc+0xb7/0xc0
[   32.663294]  __kmalloc_noprof+0x1c4/0x500
[   32.663824]  kunit_kmalloc_array+0x25/0x60
[   32.664281]  copy_user_test_oob+0xac/0x10f0
[   32.664622]  kunit_try_run_case+0x1b3/0x490
[   32.664889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.665403]  kthread+0x257/0x310
[   32.666104]  ret_from_fork+0x41/0x80
[   32.666606]  ret_from_fork_asm+0x1a/0x30
[   32.667016] 
[   32.667315] The buggy address belongs to the object at ffff888102a99200
[   32.667315]  which belongs to the cache kmalloc-128 of size 128
[   32.668549] The buggy address is located 0 bytes inside of
[   32.668549]  allocated 120-byte region [ffff888102a99200, ffff888102a99278)
[   32.669563] 
[   32.669783] The buggy address belongs to the physical page:
[   32.670299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a99
[   32.670912] flags: 0x200000000000000(node=0|zone=2)
[   32.671649] page_type: f5(slab)
[   32.672091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.672942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.673397] page dumped because: kasan: bad access detected
[   32.674010] 
[   32.674240] Memory state around the buggy address:
[   32.674741]  ffff888102a99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.675155]  ffff888102a99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676112] >ffff888102a99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.676755]                                                                 ^
[   32.677308]  ffff888102a99280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.678039]  ffff888102a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.678678] ==================================================================
[   32.600337] ==================================================================
[   32.601261] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   32.601750] Write of size 121 at addr ffff888102a99200 by task kunit_try_catch/294
[   32.602380] 
[   32.602680] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.603508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.603888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.604381] Call Trace:
[   32.605145]  <TASK>
[   32.605881]  dump_stack_lvl+0x73/0xb0
[   32.606364]  print_report+0xd1/0x640
[   32.606876]  ? __virt_addr_valid+0x1db/0x2d0
[   32.607397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.608184]  kasan_report+0x102/0x140
[   32.608757]  ? copy_user_test_oob+0x3fe/0x10f0
[   32.609351]  ? copy_user_test_oob+0x3fe/0x10f0
[   32.609994]  kasan_check_range+0x10c/0x1c0
[   32.610618]  __kasan_check_write+0x18/0x20
[   32.611197]  copy_user_test_oob+0x3fe/0x10f0
[   32.611853]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.612492]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   32.612996]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.613455]  kunit_try_run_case+0x1b3/0x490
[   32.614512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.614794]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.615328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.616037]  ? __kthread_parkme+0x82/0x160
[   32.616690]  ? preempt_count_sub+0x50/0x80
[   32.617258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.618005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.618490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.619106]  kthread+0x257/0x310
[   32.619650]  ? __pfx_kthread+0x10/0x10
[   32.619896]  ret_from_fork+0x41/0x80
[   32.620287]  ? __pfx_kthread+0x10/0x10
[   32.621293]  ret_from_fork_asm+0x1a/0x30
[   32.621686]  </TASK>
[   32.621955] 
[   32.622567] Allocated by task 294:
[   32.622796]  kasan_save_stack+0x3d/0x60
[   32.623669]  kasan_save_track+0x18/0x40
[   32.624283]  kasan_save_alloc_info+0x3b/0x50
[   32.624900]  __kasan_kmalloc+0xb7/0xc0
[   32.625236]  __kmalloc_noprof+0x1c4/0x500
[   32.625958]  kunit_kmalloc_array+0x25/0x60
[   32.626327]  copy_user_test_oob+0xac/0x10f0
[   32.626911]  kunit_try_run_case+0x1b3/0x490
[   32.627298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.627802]  kthread+0x257/0x310
[   32.628069]  ret_from_fork+0x41/0x80
[   32.628503]  ret_from_fork_asm+0x1a/0x30
[   32.628878] 
[   32.629036] The buggy address belongs to the object at ffff888102a99200
[   32.629036]  which belongs to the cache kmalloc-128 of size 128
[   32.629962] The buggy address is located 0 bytes inside of
[   32.629962]  allocated 120-byte region [ffff888102a99200, ffff888102a99278)
[   32.631246] 
[   32.631408] The buggy address belongs to the physical page:
[   32.631727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a99
[   32.632427] flags: 0x200000000000000(node=0|zone=2)
[   32.632947] page_type: f5(slab)
[   32.633321] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.633711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.634280] page dumped because: kasan: bad access detected
[   32.635037] 
[   32.635295] Memory state around the buggy address:
[   32.635947]  ffff888102a99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.637134]  ffff888102a99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.637839] >ffff888102a99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.638510]                                                                 ^
[   32.639666]  ffff888102a99280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.640253]  ffff888102a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.640854] ==================================================================
[   32.717092] ==================================================================
[   32.717781] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   32.718347] Read of size 121 at addr ffff888102a99200 by task kunit_try_catch/294
[   32.718658] 
[   32.718798] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.719874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.720273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.720954] Call Trace:
[   32.721233]  <TASK>
[   32.721425]  dump_stack_lvl+0x73/0xb0
[   32.721896]  print_report+0xd1/0x640
[   32.722360]  ? __virt_addr_valid+0x1db/0x2d0
[   32.722858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.723237]  kasan_report+0x102/0x140
[   32.723676]  ? copy_user_test_oob+0x605/0x10f0
[   32.723979]  ? copy_user_test_oob+0x605/0x10f0
[   32.724456]  kasan_check_range+0x10c/0x1c0
[   32.724814]  __kasan_check_read+0x15/0x20
[   32.725135]  copy_user_test_oob+0x605/0x10f0
[   32.725433]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.725923]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   32.726444]  ? __pfx_copy_user_test_oob+0x10/0x10
[   32.726959]  kunit_try_run_case+0x1b3/0x490
[   32.727416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.727799]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.728535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.729276]  ? __kthread_parkme+0x82/0x160
[   32.729724]  ? preempt_count_sub+0x50/0x80
[   32.730174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.730641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.732079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.732950]  kthread+0x257/0x310
[   32.733927]  ? __pfx_kthread+0x10/0x10
[   32.735204]  ret_from_fork+0x41/0x80
[   32.735525]  ? __pfx_kthread+0x10/0x10
[   32.735786]  ret_from_fork_asm+0x1a/0x30
[   32.736095]  </TASK>
[   32.736285] 
[   32.736438] Allocated by task 294:
[   32.736660]  kasan_save_stack+0x3d/0x60
[   32.736843]  kasan_save_track+0x18/0x40
[   32.736986]  kasan_save_alloc_info+0x3b/0x50
[   32.737490]  __kasan_kmalloc+0xb7/0xc0
[   32.737977]  __kmalloc_noprof+0x1c4/0x500
[   32.738499]  kunit_kmalloc_array+0x25/0x60
[   32.739001]  copy_user_test_oob+0xac/0x10f0
[   32.739576]  kunit_try_run_case+0x1b3/0x490
[   32.740082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.740677]  kthread+0x257/0x310
[   32.740944]  ret_from_fork+0x41/0x80
[   32.741281]  ret_from_fork_asm+0x1a/0x30
[   32.741761] 
[   32.741930] The buggy address belongs to the object at ffff888102a99200
[   32.741930]  which belongs to the cache kmalloc-128 of size 128
[   32.742850] The buggy address is located 0 bytes inside of
[   32.742850]  allocated 120-byte region [ffff888102a99200, ffff888102a99278)
[   32.743630] 
[   32.743796] The buggy address belongs to the physical page:
[   32.744141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a99
[   32.744915] flags: 0x200000000000000(node=0|zone=2)
[   32.745408] page_type: f5(slab)
[   32.745822] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   32.746546] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.747284] page dumped because: kasan: bad access detected
[   32.747876] 
[   32.748158] Memory state around the buggy address:
[   32.748787]  ffff888102a99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.749559]  ffff888102a99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.750257] >ffff888102a99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.751048]                                                                 ^
[   32.751793]  ffff888102a99280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.752545]  ffff888102a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.752991] ==================================================================