Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.559775] ==================================================================
[   22.560284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   22.560775] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.561205] 
[   22.561432] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.561535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.561570] Hardware name: linux,dummy-virt (DT)
[   22.561611] Call trace:
[   22.561658]  show_stack+0x20/0x38 (C)
[   22.561721]  dump_stack_lvl+0x8c/0xd0
[   22.561807]  print_report+0x118/0x608
[   22.561867]  kasan_report+0xdc/0x128
[   22.561918]  kasan_check_range+0x100/0x1a8
[   22.561975]  __kasan_check_read+0x20/0x30
[   22.562028]  copy_user_test_oob+0x728/0xec0
[   22.562092]  kunit_try_run_case+0x170/0x3f0
[   22.562151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.562213]  kthread+0x318/0x620
[   22.562263]  ret_from_fork+0x10/0x20
[   22.562318] 
[   22.566589] Allocated by task 274:
[   22.566908]  kasan_save_stack+0x3c/0x68
[   22.567240]  kasan_save_track+0x20/0x40
[   22.567541]  kasan_save_alloc_info+0x40/0x58
[   22.567829]  __kasan_kmalloc+0xd4/0xd8
[   22.568140]  __kmalloc_noprof+0x190/0x4d0
[   22.568428]  kunit_kmalloc_array+0x34/0x88
[   22.568731]  copy_user_test_oob+0xac/0xec0
[   22.569060]  kunit_try_run_case+0x170/0x3f0
[   22.569322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.569772]  kthread+0x318/0x620
[   22.570083]  ret_from_fork+0x10/0x20
[   22.570328] 
[   22.570523] The buggy address belongs to the object at fff00000c6649400
[   22.570523]  which belongs to the cache kmalloc-128 of size 128
[   22.571191] The buggy address is located 0 bytes inside of
[   22.571191]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.571906] 
[   22.572086] The buggy address belongs to the physical page:
[   22.572378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.572816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.573247] page_type: f5(slab)
[   22.573554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.573945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.574312] page dumped because: kasan: bad access detected
[   22.574780] 
[   22.574933] Memory state around the buggy address:
[   22.575195]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.575720]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.576072] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.576503]                                                                 ^
[   22.576979]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577375]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577800] ==================================================================
[   22.532360] ==================================================================
[   22.533170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   22.533641] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.534004] 
[   22.534237] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.534352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.534391] Hardware name: linux,dummy-virt (DT)
[   22.534435] Call trace:
[   22.534484]  show_stack+0x20/0x38 (C)
[   22.535554]  dump_stack_lvl+0x8c/0xd0
[   22.535621]  print_report+0x118/0x608
[   22.535678]  kasan_report+0xdc/0x128
[   22.535731]  kasan_check_range+0x100/0x1a8
[   22.535806]  __kasan_check_write+0x20/0x30
[   22.535859]  copy_user_test_oob+0x234/0xec0
[   22.535915]  kunit_try_run_case+0x170/0x3f0
[   22.535970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.536029]  kthread+0x318/0x620
[   22.536081]  ret_from_fork+0x10/0x20
[   22.536137] 
[   22.540033] Allocated by task 274:
[   22.540248]  kasan_save_stack+0x3c/0x68
[   22.540474]  kasan_save_track+0x20/0x40
[   22.540643]  kasan_save_alloc_info+0x40/0x58
[   22.541921]  __kasan_kmalloc+0xd4/0xd8
[   22.542242]  __kmalloc_noprof+0x190/0x4d0
[   22.542435]  kunit_kmalloc_array+0x34/0x88
[   22.542610]  copy_user_test_oob+0xac/0xec0
[   22.542876]  kunit_try_run_case+0x170/0x3f0
[   22.543170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544068]  kthread+0x318/0x620
[   22.544367]  ret_from_fork+0x10/0x20
[   22.544601] 
[   22.544846] The buggy address belongs to the object at fff00000c6649400
[   22.544846]  which belongs to the cache kmalloc-128 of size 128
[   22.545292] The buggy address is located 0 bytes inside of
[   22.545292]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.545879] 
[   22.546028] The buggy address belongs to the physical page:
[   22.546695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.547265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.547510] page_type: f5(slab)
[   22.547686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.548050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.548675] page dumped because: kasan: bad access detected
[   22.548964] 
[   22.549074] Memory state around the buggy address:
[   22.549893]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.550319]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.550891] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.551343]                                                                 ^
[   22.551687]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.552034]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.552359] ==================================================================
[   22.635929] ==================================================================
[   22.636319] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   22.637165] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.637474] 
[   22.637619] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.637714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.637768] Hardware name: linux,dummy-virt (DT)
[   22.637809] Call trace:
[   22.637839]  show_stack+0x20/0x38 (C)
[   22.637897]  dump_stack_lvl+0x8c/0xd0
[   22.637952]  print_report+0x118/0x608
[   22.638001]  kasan_report+0xdc/0x128
[   22.638049]  kasan_check_range+0x100/0x1a8
[   22.638127]  __kasan_check_read+0x20/0x30
[   22.638181]  copy_user_test_oob+0x4a0/0xec0
[   22.638234]  kunit_try_run_case+0x170/0x3f0
[   22.638291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.638347]  kthread+0x318/0x620
[   22.638394]  ret_from_fork+0x10/0x20
[   22.638446] 
[   22.642664] Allocated by task 274:
[   22.643090]  kasan_save_stack+0x3c/0x68
[   22.643421]  kasan_save_track+0x20/0x40
[   22.643773]  kasan_save_alloc_info+0x40/0x58
[   22.644000]  __kasan_kmalloc+0xd4/0xd8
[   22.644376]  __kmalloc_noprof+0x190/0x4d0
[   22.644616]  kunit_kmalloc_array+0x34/0x88
[   22.644950]  copy_user_test_oob+0xac/0xec0
[   22.645229]  kunit_try_run_case+0x170/0x3f0
[   22.645453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645836]  kthread+0x318/0x620
[   22.646063]  ret_from_fork+0x10/0x20
[   22.646321] 
[   22.646474] The buggy address belongs to the object at fff00000c6649400
[   22.646474]  which belongs to the cache kmalloc-128 of size 128
[   22.646963] The buggy address is located 0 bytes inside of
[   22.646963]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.647685] 
[   22.647930] The buggy address belongs to the physical page:
[   22.648237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.648532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.649061] page_type: f5(slab)
[   22.649318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.649734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.650182] page dumped because: kasan: bad access detected
[   22.650452] 
[   22.650643] Memory state around the buggy address:
[   22.650855]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.651252]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.651678] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.652098]                                                                 ^
[   22.652494]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.652896]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.653272] ==================================================================
[   22.619314] ==================================================================
[   22.619712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   22.620757] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.621114] 
[   22.621262] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.621362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.621397] Hardware name: linux,dummy-virt (DT)
[   22.621436] Call trace:
[   22.621466]  show_stack+0x20/0x38 (C)
[   22.621549]  dump_stack_lvl+0x8c/0xd0
[   22.621605]  print_report+0x118/0x608
[   22.621658]  kasan_report+0xdc/0x128
[   22.621711]  kasan_check_range+0x100/0x1a8
[   22.621785]  __kasan_check_write+0x20/0x30
[   22.621838]  copy_user_test_oob+0x434/0xec0
[   22.621892]  kunit_try_run_case+0x170/0x3f0
[   22.621943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.622001]  kthread+0x318/0x620
[   22.622051]  ret_from_fork+0x10/0x20
[   22.622119] 
[   22.624887] Allocated by task 274:
[   22.625076]  kasan_save_stack+0x3c/0x68
[   22.625352]  kasan_save_track+0x20/0x40
[   22.625629]  kasan_save_alloc_info+0x40/0x58
[   22.625885]  __kasan_kmalloc+0xd4/0xd8
[   22.626139]  __kmalloc_noprof+0x190/0x4d0
[   22.626416]  kunit_kmalloc_array+0x34/0x88
[   22.626690]  copy_user_test_oob+0xac/0xec0
[   22.626906]  kunit_try_run_case+0x170/0x3f0
[   22.627121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.627566]  kthread+0x318/0x620
[   22.627862]  ret_from_fork+0x10/0x20
[   22.628093] 
[   22.628280] The buggy address belongs to the object at fff00000c6649400
[   22.628280]  which belongs to the cache kmalloc-128 of size 128
[   22.628767] The buggy address is located 0 bytes inside of
[   22.628767]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.629187] 
[   22.629375] The buggy address belongs to the physical page:
[   22.629780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.630202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.630615] page_type: f5(slab)
[   22.630847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.631226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.631693] page dumped because: kasan: bad access detected
[   22.631992] 
[   22.632143] Memory state around the buggy address:
[   22.632359]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.632580]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.633122] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.633482]                                                                 ^
[   22.634032]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.634422]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.634778] ==================================================================
[   22.583829] ==================================================================
[   22.584294] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   22.584762] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.585086] 
[   22.585283] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.585421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.585458] Hardware name: linux,dummy-virt (DT)
[   22.585498] Call trace:
[   22.585530]  show_stack+0x20/0x38 (C)
[   22.585591]  dump_stack_lvl+0x8c/0xd0
[   22.585665]  print_report+0x118/0x608
[   22.585728]  kasan_report+0xdc/0x128
[   22.585815]  kasan_check_range+0x100/0x1a8
[   22.585877]  __kasan_check_write+0x20/0x30
[   22.585934]  copy_user_test_oob+0x35c/0xec0
[   22.585989]  kunit_try_run_case+0x170/0x3f0
[   22.586042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.586119]  kthread+0x318/0x620
[   22.586175]  ret_from_fork+0x10/0x20
[   22.586235] 
[   22.590308] Allocated by task 274:
[   22.590667]  kasan_save_stack+0x3c/0x68
[   22.591090]  kasan_save_track+0x20/0x40
[   22.591344]  kasan_save_alloc_info+0x40/0x58
[   22.591699]  __kasan_kmalloc+0xd4/0xd8
[   22.591976]  __kmalloc_noprof+0x190/0x4d0
[   22.592194]  kunit_kmalloc_array+0x34/0x88
[   22.592555]  copy_user_test_oob+0xac/0xec0
[   22.592861]  kunit_try_run_case+0x170/0x3f0
[   22.593140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.593493]  kthread+0x318/0x620
[   22.593802]  ret_from_fork+0x10/0x20
[   22.594021] 
[   22.594232] The buggy address belongs to the object at fff00000c6649400
[   22.594232]  which belongs to the cache kmalloc-128 of size 128
[   22.594865] The buggy address is located 0 bytes inside of
[   22.594865]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.595526] 
[   22.595687] The buggy address belongs to the physical page:
[   22.596047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.596502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.596896] page_type: f5(slab)
[   22.597123] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.597479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.597952] page dumped because: kasan: bad access detected
[   22.598265] 
[   22.598461] Memory state around the buggy address:
[   22.598804]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.599209]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.599590] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.600105]                                                                 ^
[   22.600455]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.600828]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601205] ==================================================================
[   22.602360] ==================================================================
[   22.602695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   22.603495] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.604350] 
[   22.604553] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.604669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.604705] Hardware name: linux,dummy-virt (DT)
[   22.604758] Call trace:
[   22.604791]  show_stack+0x20/0x38 (C)
[   22.604856]  dump_stack_lvl+0x8c/0xd0
[   22.604912]  print_report+0x118/0x608
[   22.604963]  kasan_report+0xdc/0x128
[   22.605012]  kasan_check_range+0x100/0x1a8
[   22.605063]  __kasan_check_read+0x20/0x30
[   22.605110]  copy_user_test_oob+0x3c8/0xec0
[   22.605160]  kunit_try_run_case+0x170/0x3f0
[   22.605208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.605260]  kthread+0x318/0x620
[   22.605310]  ret_from_fork+0x10/0x20
[   22.605361] 
[   22.608397] Allocated by task 274:
[   22.608600]  kasan_save_stack+0x3c/0x68
[   22.608851]  kasan_save_track+0x20/0x40
[   22.609188]  kasan_save_alloc_info+0x40/0x58
[   22.609490]  __kasan_kmalloc+0xd4/0xd8
[   22.609802]  __kmalloc_noprof+0x190/0x4d0
[   22.610090]  kunit_kmalloc_array+0x34/0x88
[   22.610379]  copy_user_test_oob+0xac/0xec0
[   22.610747]  kunit_try_run_case+0x170/0x3f0
[   22.611056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.611345]  kthread+0x318/0x620
[   22.611637]  ret_from_fork+0x10/0x20
[   22.611893] 
[   22.612051] The buggy address belongs to the object at fff00000c6649400
[   22.612051]  which belongs to the cache kmalloc-128 of size 128
[   22.612648] The buggy address is located 0 bytes inside of
[   22.612648]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.613151] 
[   22.613340] The buggy address belongs to the physical page:
[   22.613668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.614202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.614555] page_type: f5(slab)
[   22.614874] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.615178] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.615483] page dumped because: kasan: bad access detected
[   22.615757] 
[   22.615942] Memory state around the buggy address:
[   22.616204]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.616604]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.616956] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.617245]                                                                 ^
[   22.617604]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.617967]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.618291] ==================================================================

[   16.289305] ==================================================================
[   16.289688] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   16.290131] Write of size 121 at addr ffff888102adde00 by task kunit_try_catch/293
[   16.290408] 
[   16.290524] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.290574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.290587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.290610] Call Trace:
[   16.290627]  <TASK>
[   16.290647]  dump_stack_lvl+0x73/0xb0
[   16.290677]  print_report+0xd1/0x650
[   16.290700]  ? __virt_addr_valid+0x1db/0x2d0
[   16.290723]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.290747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.290774]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.290797]  kasan_report+0x140/0x180
[   16.290820]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.290859]  kasan_check_range+0x10c/0x1c0
[   16.290883]  __kasan_check_write+0x18/0x20
[   16.290907]  copy_user_test_oob+0x3fe/0x10f0
[   16.290932]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.290954]  ? finish_task_switch.isra.0+0x153/0x700
[   16.290980]  ? __switch_to+0x5d9/0xf60
[   16.291007]  ? __schedule+0xce8/0x2840
[   16.291033]  ? __pfx_read_tsc+0x10/0x10
[   16.291069]  ? ktime_get_ts64+0x86/0x230
[   16.291096]  kunit_try_run_case+0x1a6/0x480
[   16.291121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.291143]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.291165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.291191]  ? __kthread_parkme+0x82/0x160
[   16.291215]  ? preempt_count_sub+0x50/0x80
[   16.291240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.291264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.291291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.291321]  kthread+0x324/0x6e0
[   16.291345]  ? trace_preempt_on+0x20/0xc0
[   16.291371]  ? __pfx_kthread+0x10/0x10
[   16.291394]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.291419]  ? calculate_sigpending+0x7b/0xa0
[   16.291442]  ? __pfx_kthread+0x10/0x10
[   16.291467]  ret_from_fork+0x41/0x80
[   16.291486]  ? __pfx_kthread+0x10/0x10
[   16.291510]  ret_from_fork_asm+0x1a/0x30
[   16.291542]  </TASK>
[   16.291555] 
[   16.298545] Allocated by task 293:
[   16.298750]  kasan_save_stack+0x45/0x70
[   16.298952]  kasan_save_track+0x18/0x40
[   16.299136]  kasan_save_alloc_info+0x3b/0x50
[   16.299290]  __kasan_kmalloc+0xb7/0xc0
[   16.299425]  __kmalloc_noprof+0x1ca/0x500
[   16.299634]  kunit_kmalloc_array+0x25/0x60
[   16.299845]  copy_user_test_oob+0xac/0x10f0
[   16.300090]  kunit_try_run_case+0x1a6/0x480
[   16.300238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.300416]  kthread+0x324/0x6e0
[   16.300578]  ret_from_fork+0x41/0x80
[   16.300770]  ret_from_fork_asm+0x1a/0x30
[   16.300984] 
[   16.301120] The buggy address belongs to the object at ffff888102adde00
[   16.301120]  which belongs to the cache kmalloc-128 of size 128
[   16.301664] The buggy address is located 0 bytes inside of
[   16.301664]  allocated 120-byte region [ffff888102adde00, ffff888102adde78)
[   16.302178] 
[   16.302281] The buggy address belongs to the physical page:
[   16.302501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   16.302828] flags: 0x200000000000000(node=0|zone=2)
[   16.303030] page_type: f5(slab)
[   16.303161] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.303576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.303927] page dumped because: kasan: bad access detected
[   16.304141] 
[   16.304238] Memory state around the buggy address:
[   16.304458]  ffff888102addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.304675]  ffff888102addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304923] >ffff888102adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.305235]                                                                 ^
[   16.305550]  ffff888102adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.305981]  ffff888102addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.306195] ==================================================================
[   16.324606] ==================================================================
[   16.325114] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   16.325349] Write of size 121 at addr ffff888102adde00 by task kunit_try_catch/293
[   16.326048] 
[   16.326159] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.326203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.326216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.326239] Call Trace:
[   16.326259]  <TASK>
[   16.326279]  dump_stack_lvl+0x73/0xb0
[   16.326306]  print_report+0xd1/0x650
[   16.326328]  ? __virt_addr_valid+0x1db/0x2d0
[   16.326351]  ? copy_user_test_oob+0x558/0x10f0
[   16.326374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.326400]  ? copy_user_test_oob+0x558/0x10f0
[   16.326424]  kasan_report+0x140/0x180
[   16.326447]  ? copy_user_test_oob+0x558/0x10f0
[   16.326476]  kasan_check_range+0x10c/0x1c0
[   16.326500]  __kasan_check_write+0x18/0x20
[   16.326523]  copy_user_test_oob+0x558/0x10f0
[   16.326548]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.326571]  ? finish_task_switch.isra.0+0x153/0x700
[   16.326596]  ? __switch_to+0x5d9/0xf60
[   16.326624]  ? __schedule+0xce8/0x2840
[   16.326650]  ? __pfx_read_tsc+0x10/0x10
[   16.326673]  ? ktime_get_ts64+0x86/0x230
[   16.326699]  kunit_try_run_case+0x1a6/0x480
[   16.326722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.326745]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.326767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.326793]  ? __kthread_parkme+0x82/0x160
[   16.326816]  ? preempt_count_sub+0x50/0x80
[   16.326852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.326875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.326902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.326929]  kthread+0x324/0x6e0
[   16.326951]  ? trace_preempt_on+0x20/0xc0
[   16.326976]  ? __pfx_kthread+0x10/0x10
[   16.327000]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.327024]  ? calculate_sigpending+0x7b/0xa0
[   16.327047]  ? __pfx_kthread+0x10/0x10
[   16.327079]  ret_from_fork+0x41/0x80
[   16.327099]  ? __pfx_kthread+0x10/0x10
[   16.327122]  ret_from_fork_asm+0x1a/0x30
[   16.327155]  </TASK>
[   16.327167] 
[   16.334267] Allocated by task 293:
[   16.334464]  kasan_save_stack+0x45/0x70
[   16.334671]  kasan_save_track+0x18/0x40
[   16.334858]  kasan_save_alloc_info+0x3b/0x50
[   16.335008]  __kasan_kmalloc+0xb7/0xc0
[   16.335263]  __kmalloc_noprof+0x1ca/0x500
[   16.335631]  kunit_kmalloc_array+0x25/0x60
[   16.335777]  copy_user_test_oob+0xac/0x10f0
[   16.335933]  kunit_try_run_case+0x1a6/0x480
[   16.336080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.336257]  kthread+0x324/0x6e0
[   16.336383]  ret_from_fork+0x41/0x80
[   16.336513]  ret_from_fork_asm+0x1a/0x30
[   16.336656] 
[   16.336729] The buggy address belongs to the object at ffff888102adde00
[   16.336729]  which belongs to the cache kmalloc-128 of size 128
[   16.337549] The buggy address is located 0 bytes inside of
[   16.337549]  allocated 120-byte region [ffff888102adde00, ffff888102adde78)
[   16.338110] 
[   16.338208] The buggy address belongs to the physical page:
[   16.338393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   16.338632] flags: 0x200000000000000(node=0|zone=2)
[   16.338799] page_type: f5(slab)
[   16.338934] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.339165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.339391] page dumped because: kasan: bad access detected
[   16.339847] 
[   16.339946] Memory state around the buggy address:
[   16.340325]  ffff888102addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.340654]  ffff888102addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340986] >ffff888102adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.341644]                                                                 ^
[   16.341981]  ffff888102adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342243]  ffff888102addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342486] ==================================================================
[   16.306801] ==================================================================
[   16.307211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   16.307723] Read of size 121 at addr ffff888102adde00 by task kunit_try_catch/293
[   16.308038] 
[   16.308161] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.308206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.308220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.308243] Call Trace:
[   16.308265]  <TASK>
[   16.308286]  dump_stack_lvl+0x73/0xb0
[   16.308313]  print_report+0xd1/0x650
[   16.308336]  ? __virt_addr_valid+0x1db/0x2d0
[   16.308359]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.308382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.308408]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.308432]  kasan_report+0x140/0x180
[   16.308455]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.308483]  kasan_check_range+0x10c/0x1c0
[   16.308507]  __kasan_check_read+0x15/0x20
[   16.308530]  copy_user_test_oob+0x4ab/0x10f0
[   16.308555]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.308578]  ? finish_task_switch.isra.0+0x153/0x700
[   16.308604]  ? __switch_to+0x5d9/0xf60
[   16.308632]  ? __schedule+0xce8/0x2840
[   16.308657]  ? __pfx_read_tsc+0x10/0x10
[   16.308681]  ? ktime_get_ts64+0x86/0x230
[   16.308708]  kunit_try_run_case+0x1a6/0x480
[   16.308733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308755]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.308776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.308803]  ? __kthread_parkme+0x82/0x160
[   16.308826]  ? preempt_count_sub+0x50/0x80
[   16.308861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.308884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.308911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.308938]  kthread+0x324/0x6e0
[   16.308961]  ? trace_preempt_on+0x20/0xc0
[   16.308986]  ? __pfx_kthread+0x10/0x10
[   16.309009]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.309033]  ? calculate_sigpending+0x7b/0xa0
[   16.309066]  ? __pfx_kthread+0x10/0x10
[   16.309090]  ret_from_fork+0x41/0x80
[   16.309110]  ? __pfx_kthread+0x10/0x10
[   16.309133]  ret_from_fork_asm+0x1a/0x30
[   16.309168]  </TASK>
[   16.309180] 
[   16.316120] Allocated by task 293:
[   16.316314]  kasan_save_stack+0x45/0x70
[   16.316520]  kasan_save_track+0x18/0x40
[   16.316859]  kasan_save_alloc_info+0x3b/0x50
[   16.317030]  __kasan_kmalloc+0xb7/0xc0
[   16.317218]  __kmalloc_noprof+0x1ca/0x500
[   16.317368]  kunit_kmalloc_array+0x25/0x60
[   16.317512]  copy_user_test_oob+0xac/0x10f0
[   16.317719]  kunit_try_run_case+0x1a6/0x480
[   16.317942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318281]  kthread+0x324/0x6e0
[   16.318448]  ret_from_fork+0x41/0x80
[   16.318607]  ret_from_fork_asm+0x1a/0x30
[   16.318773] 
[   16.318879] The buggy address belongs to the object at ffff888102adde00
[   16.318879]  which belongs to the cache kmalloc-128 of size 128
[   16.319394] The buggy address is located 0 bytes inside of
[   16.319394]  allocated 120-byte region [ffff888102adde00, ffff888102adde78)
[   16.319865] 
[   16.319970] The buggy address belongs to the physical page:
[   16.320229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   16.320533] flags: 0x200000000000000(node=0|zone=2)
[   16.320766] page_type: f5(slab)
[   16.320930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.321242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.321558] page dumped because: kasan: bad access detected
[   16.321783] 
[   16.321892] Memory state around the buggy address:
[   16.322061]  ffff888102addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.322278]  ffff888102addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322495] >ffff888102adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.322709]                                                                 ^
[   16.322970]  ffff888102adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.323563]  ffff888102addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.323886] ==================================================================
[   16.343157] ==================================================================
[   16.343471] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   16.343708] Read of size 121 at addr ffff888102adde00 by task kunit_try_catch/293
[   16.343951] 
[   16.344039] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.344085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.344098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.344122] Call Trace:
[   16.344143]  <TASK>
[   16.344164]  dump_stack_lvl+0x73/0xb0
[   16.344191]  print_report+0xd1/0x650
[   16.344214]  ? __virt_addr_valid+0x1db/0x2d0
[   16.344238]  ? copy_user_test_oob+0x605/0x10f0
[   16.344261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.344288]  ? copy_user_test_oob+0x605/0x10f0
[   16.344312]  kasan_report+0x140/0x180
[   16.344335]  ? copy_user_test_oob+0x605/0x10f0
[   16.344362]  kasan_check_range+0x10c/0x1c0
[   16.344386]  __kasan_check_read+0x15/0x20
[   16.344409]  copy_user_test_oob+0x605/0x10f0
[   16.344434]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.344457]  ? finish_task_switch.isra.0+0x153/0x700
[   16.344482]  ? __switch_to+0x5d9/0xf60
[   16.344528]  ? __schedule+0xce8/0x2840
[   16.344557]  ? __pfx_read_tsc+0x10/0x10
[   16.344580]  ? ktime_get_ts64+0x86/0x230
[   16.344606]  kunit_try_run_case+0x1a6/0x480
[   16.344630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344653]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.344675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.344701]  ? __kthread_parkme+0x82/0x160
[   16.344725]  ? preempt_count_sub+0x50/0x80
[   16.344750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344828]  kthread+0x324/0x6e0
[   16.344861]  ? trace_preempt_on+0x20/0xc0
[   16.344886]  ? __pfx_kthread+0x10/0x10
[   16.344911]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.344936]  ? calculate_sigpending+0x7b/0xa0
[   16.344959]  ? __pfx_kthread+0x10/0x10
[   16.344983]  ret_from_fork+0x41/0x80
[   16.345002]  ? __pfx_kthread+0x10/0x10
[   16.345025]  ret_from_fork_asm+0x1a/0x30
[   16.345058]  </TASK>
[   16.345071] 
[   16.352307] Allocated by task 293:
[   16.352500]  kasan_save_stack+0x45/0x70
[   16.352705]  kasan_save_track+0x18/0x40
[   16.352898]  kasan_save_alloc_info+0x3b/0x50
[   16.353061]  __kasan_kmalloc+0xb7/0xc0
[   16.353260]  __kmalloc_noprof+0x1ca/0x500
[   16.353462]  kunit_kmalloc_array+0x25/0x60
[   16.353635]  copy_user_test_oob+0xac/0x10f0
[   16.353829]  kunit_try_run_case+0x1a6/0x480
[   16.353986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354414]  kthread+0x324/0x6e0
[   16.354570]  ret_from_fork+0x41/0x80
[   16.354784]  ret_from_fork_asm+0x1a/0x30
[   16.355011] 
[   16.355138] The buggy address belongs to the object at ffff888102adde00
[   16.355138]  which belongs to the cache kmalloc-128 of size 128
[   16.355506] The buggy address is located 0 bytes inside of
[   16.355506]  allocated 120-byte region [ffff888102adde00, ffff888102adde78)
[   16.355880] 
[   16.355998] The buggy address belongs to the physical page:
[   16.356448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   16.356803] flags: 0x200000000000000(node=0|zone=2)
[   16.357051] page_type: f5(slab)
[   16.357259] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.357603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.357829] page dumped because: kasan: bad access detected
[   16.358005] 
[   16.358076] Memory state around the buggy address:
[   16.358230]  ffff888102addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.358790]  ffff888102addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.359512] >ffff888102adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.359857]                                                                 ^
[   16.360450]  ffff888102adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361434]  ffff888102addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.361883] ==================================================================