Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.617428] ==================================================================
[   21.617913] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   21.618649] Write of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.619222] 
[   21.619571] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.619676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.619711] Hardware name: linux,dummy-virt (DT)
[   21.619827] Call trace:
[   21.619937]  show_stack+0x20/0x38 (C)
[   21.620072]  dump_stack_lvl+0x8c/0xd0
[   21.620134]  print_report+0x118/0x608
[   21.620209]  kasan_report+0xdc/0x128
[   21.620263]  kasan_check_range+0x100/0x1a8
[   21.620314]  __kasan_check_write+0x20/0x30
[   21.620366]  copy_user_test_oob+0x35c/0xec0
[   21.620419]  kunit_try_run_case+0x170/0x3f0
[   21.620473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.620532]  kthread+0x318/0x620
[   21.620584]  ret_from_fork+0x10/0x20
[   21.620640] 
[   21.624671] Allocated by task 275:
[   21.625035]  kasan_save_stack+0x3c/0x68
[   21.625406]  kasan_save_track+0x20/0x40
[   21.625744]  kasan_save_alloc_info+0x40/0x58
[   21.626094]  __kasan_kmalloc+0xd4/0xd8
[   21.626493]  __kmalloc_noprof+0x198/0x4c8
[   21.626803]  kunit_kmalloc_array+0x34/0x88
[   21.627163]  copy_user_test_oob+0xac/0xec0
[   21.627502]  kunit_try_run_case+0x170/0x3f0
[   21.627738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.628043]  kthread+0x318/0x620
[   21.628434]  ret_from_fork+0x10/0x20
[   21.628735] 
[   21.628966] The buggy address belongs to the object at fff00000c65b6300
[   21.628966]  which belongs to the cache kmalloc-128 of size 128
[   21.629816] The buggy address is located 0 bytes inside of
[   21.629816]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.630271] 
[   21.630576] The buggy address belongs to the physical page:
[   21.630891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.631325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.631663] page_type: f5(slab)
[   21.631886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.632494] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.632854] page dumped because: kasan: bad access detected
[   21.633368] 
[   21.633602] Memory state around the buggy address:
[   21.634032]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.634534]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.635033] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.635555]                                                                 ^
[   21.636017]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.636483]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.636938] ==================================================================
[   21.638469] ==================================================================
[   21.638861] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   21.639270] Read of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.639549] 
[   21.639723] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.639812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.639843] Hardware name: linux,dummy-virt (DT)
[   21.639882] Call trace:
[   21.639911]  show_stack+0x20/0x38 (C)
[   21.639966]  dump_stack_lvl+0x8c/0xd0
[   21.640019]  print_report+0x118/0x608
[   21.640069]  kasan_report+0xdc/0x128
[   21.640119]  kasan_check_range+0x100/0x1a8
[   21.640184]  __kasan_check_read+0x20/0x30
[   21.640238]  copy_user_test_oob+0x3c8/0xec0
[   21.640287]  kunit_try_run_case+0x170/0x3f0
[   21.640337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.640392]  kthread+0x318/0x620
[   21.640440]  ret_from_fork+0x10/0x20
[   21.640493] 
[   21.644825] Allocated by task 275:
[   21.645232]  kasan_save_stack+0x3c/0x68
[   21.645604]  kasan_save_track+0x20/0x40
[   21.645950]  kasan_save_alloc_info+0x40/0x58
[   21.646307]  __kasan_kmalloc+0xd4/0xd8
[   21.646643]  __kmalloc_noprof+0x198/0x4c8
[   21.646977]  kunit_kmalloc_array+0x34/0x88
[   21.647268]  copy_user_test_oob+0xac/0xec0
[   21.647621]  kunit_try_run_case+0x170/0x3f0
[   21.647961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.648505]  kthread+0x318/0x620
[   21.648789]  ret_from_fork+0x10/0x20
[   21.649116] 
[   21.649360] The buggy address belongs to the object at fff00000c65b6300
[   21.649360]  which belongs to the cache kmalloc-128 of size 128
[   21.649978] The buggy address is located 0 bytes inside of
[   21.649978]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.650541] 
[   21.650699] The buggy address belongs to the physical page:
[   21.650998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.651740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.652106] page_type: f5(slab)
[   21.652418] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.653013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.653557] page dumped because: kasan: bad access detected
[   21.653956] 
[   21.654193] Memory state around the buggy address:
[   21.654526]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.655036]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.655499] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.656029]                                                                 ^
[   21.656478]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.656963]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.657452] ==================================================================
[   21.592549] ==================================================================
[   21.592982] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   21.593472] Read of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.594054] 
[   21.594264] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.594367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.594403] Hardware name: linux,dummy-virt (DT)
[   21.594443] Call trace:
[   21.594474]  show_stack+0x20/0x38 (C)
[   21.594535]  dump_stack_lvl+0x8c/0xd0
[   21.594587]  print_report+0x118/0x608
[   21.594638]  kasan_report+0xdc/0x128
[   21.594689]  kasan_check_range+0x100/0x1a8
[   21.594740]  __kasan_check_read+0x20/0x30
[   21.594793]  copy_user_test_oob+0x728/0xec0
[   21.594847]  kunit_try_run_case+0x170/0x3f0
[   21.594901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.594960]  kthread+0x318/0x620
[   21.595009]  ret_from_fork+0x10/0x20
[   21.595066] 
[   21.599385] Allocated by task 275:
[   21.599686]  kasan_save_stack+0x3c/0x68
[   21.600070]  kasan_save_track+0x20/0x40
[   21.600499]  kasan_save_alloc_info+0x40/0x58
[   21.600822]  __kasan_kmalloc+0xd4/0xd8
[   21.601085]  __kmalloc_noprof+0x198/0x4c8
[   21.601342]  kunit_kmalloc_array+0x34/0x88
[   21.601576]  copy_user_test_oob+0xac/0xec0
[   21.601819]  kunit_try_run_case+0x170/0x3f0
[   21.602303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.602535]  kthread+0x318/0x620
[   21.602869]  ret_from_fork+0x10/0x20
[   21.603138] 
[   21.603359] The buggy address belongs to the object at fff00000c65b6300
[   21.603359]  which belongs to the cache kmalloc-128 of size 128
[   21.603966] The buggy address is located 0 bytes inside of
[   21.603966]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.604665] 
[   21.604849] The buggy address belongs to the physical page:
[   21.605119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.605680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.605926] page_type: f5(slab)
[   21.606272] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.606927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.607396] page dumped because: kasan: bad access detected
[   21.607796] 
[   21.607975] Memory state around the buggy address:
[   21.608233]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.608644]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609072] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.609482]                                                                 ^
[   21.609852]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.610604]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.610870] ==================================================================
[   21.677651] ==================================================================
[   21.678115] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   21.678594] Read of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.679106] 
[   21.679268] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.679374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.679435] Hardware name: linux,dummy-virt (DT)
[   21.679497] Call trace:
[   21.679532]  show_stack+0x20/0x38 (C)
[   21.679602]  dump_stack_lvl+0x8c/0xd0
[   21.679671]  print_report+0x118/0x608
[   21.679725]  kasan_report+0xdc/0x128
[   21.679776]  kasan_check_range+0x100/0x1a8
[   21.679828]  __kasan_check_read+0x20/0x30
[   21.679877]  copy_user_test_oob+0x4a0/0xec0
[   21.679928]  kunit_try_run_case+0x170/0x3f0
[   21.679979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.680033]  kthread+0x318/0x620
[   21.680082]  ret_from_fork+0x10/0x20
[   21.680134] 
[   21.682848] Allocated by task 275:
[   21.683139]  kasan_save_stack+0x3c/0x68
[   21.683563]  kasan_save_track+0x20/0x40
[   21.683916]  kasan_save_alloc_info+0x40/0x58
[   21.684204]  __kasan_kmalloc+0xd4/0xd8
[   21.684374]  __kmalloc_noprof+0x198/0x4c8
[   21.684651]  kunit_kmalloc_array+0x34/0x88
[   21.685055]  copy_user_test_oob+0xac/0xec0
[   21.685462]  kunit_try_run_case+0x170/0x3f0
[   21.685874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.686143]  kthread+0x318/0x620
[   21.686462]  ret_from_fork+0x10/0x20
[   21.686705] 
[   21.686875] The buggy address belongs to the object at fff00000c65b6300
[   21.686875]  which belongs to the cache kmalloc-128 of size 128
[   21.687457] The buggy address is located 0 bytes inside of
[   21.687457]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.688168] 
[   21.688341] The buggy address belongs to the physical page:
[   21.688617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.689045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.689503] page_type: f5(slab)
[   21.689756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.690209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.690703] page dumped because: kasan: bad access detected
[   21.690970] 
[   21.691147] Memory state around the buggy address:
[   21.691479]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.691866]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.692315] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.692731]                                                                 ^
[   21.693179]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.693602]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.694000] ==================================================================
[   21.659008] ==================================================================
[   21.659343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   21.660027] Write of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.660428] 
[   21.660607] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.660712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.660761] Hardware name: linux,dummy-virt (DT)
[   21.660810] Call trace:
[   21.660840]  show_stack+0x20/0x38 (C)
[   21.660901]  dump_stack_lvl+0x8c/0xd0
[   21.660957]  print_report+0x118/0x608
[   21.661014]  kasan_report+0xdc/0x128
[   21.661068]  kasan_check_range+0x100/0x1a8
[   21.661122]  __kasan_check_write+0x20/0x30
[   21.661282]  copy_user_test_oob+0x434/0xec0
[   21.661374]  kunit_try_run_case+0x170/0x3f0
[   21.661430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.661491]  kthread+0x318/0x620
[   21.661567]  ret_from_fork+0x10/0x20
[   21.661631] 
[   21.664804] Allocated by task 275:
[   21.665166]  kasan_save_stack+0x3c/0x68
[   21.665484]  kasan_save_track+0x20/0x40
[   21.665808]  kasan_save_alloc_info+0x40/0x58
[   21.666123]  __kasan_kmalloc+0xd4/0xd8
[   21.666313]  __kmalloc_noprof+0x198/0x4c8
[   21.666492]  kunit_kmalloc_array+0x34/0x88
[   21.666661]  copy_user_test_oob+0xac/0xec0
[   21.666839]  kunit_try_run_case+0x170/0x3f0
[   21.667011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.667256]  kthread+0x318/0x620
[   21.667449]  ret_from_fork+0x10/0x20
[   21.667664] 
[   21.667876] The buggy address belongs to the object at fff00000c65b6300
[   21.667876]  which belongs to the cache kmalloc-128 of size 128
[   21.668875] The buggy address is located 0 bytes inside of
[   21.668875]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.669591] 
[   21.669706] The buggy address belongs to the physical page:
[   21.670212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.670770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.671358] page_type: f5(slab)
[   21.671716] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.672199] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.672636] page dumped because: kasan: bad access detected
[   21.672984] 
[   21.673149] Memory state around the buggy address:
[   21.673480]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.673965]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.674411] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.674860]                                                                 ^
[   21.675311]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.675743]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.676183] ==================================================================
[   21.567254] ==================================================================
[   21.568048] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   21.568798] Write of size 121 at addr fff00000c65b6300 by task kunit_try_catch/275
[   21.569360] 
[   21.569582] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   21.569696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.569733] Hardware name: linux,dummy-virt (DT)
[   21.569774] Call trace:
[   21.569804]  show_stack+0x20/0x38 (C)
[   21.569877]  dump_stack_lvl+0x8c/0xd0
[   21.569938]  print_report+0x118/0x608
[   21.569994]  kasan_report+0xdc/0x128
[   21.570047]  kasan_check_range+0x100/0x1a8
[   21.570347]  __kasan_check_write+0x20/0x30
[   21.570632]  copy_user_test_oob+0x234/0xec0
[   21.570688]  kunit_try_run_case+0x170/0x3f0
[   21.570745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.570800]  kthread+0x318/0x620
[   21.570852]  ret_from_fork+0x10/0x20
[   21.570906] 
[   21.574884] Allocated by task 275:
[   21.575253]  kasan_save_stack+0x3c/0x68
[   21.575709]  kasan_save_track+0x20/0x40
[   21.576044]  kasan_save_alloc_info+0x40/0x58
[   21.576422]  __kasan_kmalloc+0xd4/0xd8
[   21.576625]  __kmalloc_noprof+0x198/0x4c8
[   21.576841]  kunit_kmalloc_array+0x34/0x88
[   21.577064]  copy_user_test_oob+0xac/0xec0
[   21.577656]  kunit_try_run_case+0x170/0x3f0
[   21.577928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.578443]  kthread+0x318/0x620
[   21.578800]  ret_from_fork+0x10/0x20
[   21.579118] 
[   21.579300] The buggy address belongs to the object at fff00000c65b6300
[   21.579300]  which belongs to the cache kmalloc-128 of size 128
[   21.579971] The buggy address is located 0 bytes inside of
[   21.579971]  allocated 120-byte region [fff00000c65b6300, fff00000c65b6378)
[   21.580576] 
[   21.580813] The buggy address belongs to the physical page:
[   21.581208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6
[   21.581825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.582331] page_type: f5(slab)
[   21.583092] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.583503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.583967] page dumped because: kasan: bad access detected
[   21.584225] 
[   21.584356] Memory state around the buggy address:
[   21.584533]  fff00000c65b6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.584862]  fff00000c65b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.585490] >fff00000c65b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.585965]                                                                 ^
[   21.586377]  fff00000c65b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.586847]  fff00000c65b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.587079] ==================================================================

[   16.839523] ==================================================================
[   16.839886] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x605/0x10f0
[   16.840477] Read of size 121 at addr ffff888102a2cf00 by task kunit_try_catch/293
[   16.840700] 
[   16.840779] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.840816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.840828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.840850] Call Trace:
[   16.840864]  <TASK>
[   16.840899]  dump_stack_lvl+0x73/0xb0
[   16.840930]  print_report+0xd1/0x650
[   16.840958]  ? __virt_addr_valid+0x1db/0x2d0
[   16.840987]  ? copy_user_test_oob+0x605/0x10f0
[   16.841025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.841056]  ? copy_user_test_oob+0x605/0x10f0
[   16.841093]  kasan_report+0x140/0x180
[   16.841120]  ? copy_user_test_oob+0x605/0x10f0
[   16.841164]  kasan_check_range+0x10c/0x1c0
[   16.841192]  __kasan_check_read+0x15/0x20
[   16.841227]  copy_user_test_oob+0x605/0x10f0
[   16.841256]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.841282]  ? finish_task_switch.isra.0+0x153/0x700
[   16.841321]  ? __switch_to+0x5d9/0xf60
[   16.841352]  ? __schedule+0xce8/0x2840
[   16.841380]  ? __pfx_read_tsc+0x10/0x10
[   16.841406]  ? ktime_get_ts64+0x86/0x230
[   16.841436]  kunit_try_run_case+0x1a6/0x480
[   16.841464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.841490]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.841528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.841556]  ? __kthread_parkme+0x82/0x160
[   16.841594]  ? preempt_count_sub+0x50/0x80
[   16.841623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.841652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.841682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.841713]  kthread+0x324/0x6e0
[   16.841744]  ? trace_preempt_on+0x20/0xc0
[   16.841782]  ? __pfx_kthread+0x10/0x10
[   16.841809]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.841847]  ? calculate_sigpending+0x7b/0xa0
[   16.841875]  ? __pfx_kthread+0x10/0x10
[   16.841902]  ret_from_fork+0x41/0x80
[   16.841934]  ? __pfx_kthread+0x10/0x10
[   16.841961]  ret_from_fork_asm+0x1a/0x30
[   16.842006]  </TASK>
[   16.842025] 
[   16.849283] Allocated by task 293:
[   16.849411]  kasan_save_stack+0x45/0x70
[   16.849686]  kasan_save_track+0x18/0x40
[   16.849898]  kasan_save_alloc_info+0x3b/0x50
[   16.850153]  __kasan_kmalloc+0xb7/0xc0
[   16.850364]  __kmalloc_noprof+0x1ca/0x500
[   16.850622]  kunit_kmalloc_array+0x25/0x60
[   16.850773]  copy_user_test_oob+0xac/0x10f0
[   16.850924]  kunit_try_run_case+0x1a6/0x480
[   16.851084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.851266]  kthread+0x324/0x6e0
[   16.851392]  ret_from_fork+0x41/0x80
[   16.851537]  ret_from_fork_asm+0x1a/0x30
[   16.851738] 
[   16.851834] The buggy address belongs to the object at ffff888102a2cf00
[   16.851834]  which belongs to the cache kmalloc-128 of size 128
[   16.852424] The buggy address is located 0 bytes inside of
[   16.852424]  allocated 120-byte region [ffff888102a2cf00, ffff888102a2cf78)
[   16.853065] 
[   16.853164] The buggy address belongs to the physical page:
[   16.853459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   16.853694] flags: 0x200000000000000(node=0|zone=2)
[   16.853864] page_type: f5(slab)
[   16.853984] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.854222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.854931] page dumped because: kasan: bad access detected
[   16.855201] 
[   16.855310] Memory state around the buggy address:
[   16.855562]  ffff888102a2ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.855917]  ffff888102a2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856251] >ffff888102a2cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.856614]                                                                 ^
[   16.856837]  ffff888102a2cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.857061]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.857395] ==================================================================
[   16.820808] ==================================================================
[   16.821431] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x558/0x10f0
[   16.821822] Write of size 121 at addr ffff888102a2cf00 by task kunit_try_catch/293
[   16.822172] 
[   16.822279] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.822328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.822341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.822362] Call Trace:
[   16.822389]  <TASK>
[   16.822404]  dump_stack_lvl+0x73/0xb0
[   16.822434]  print_report+0xd1/0x650
[   16.822470]  ? __virt_addr_valid+0x1db/0x2d0
[   16.822498]  ? copy_user_test_oob+0x558/0x10f0
[   16.822526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.822567]  ? copy_user_test_oob+0x558/0x10f0
[   16.822594]  kasan_report+0x140/0x180
[   16.822621]  ? copy_user_test_oob+0x558/0x10f0
[   16.822652]  kasan_check_range+0x10c/0x1c0
[   16.822688]  __kasan_check_write+0x18/0x20
[   16.822715]  copy_user_test_oob+0x558/0x10f0
[   16.822753]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.822780]  ? finish_task_switch.isra.0+0x153/0x700
[   16.822808]  ? __switch_to+0x5d9/0xf60
[   16.822838]  ? __schedule+0xce8/0x2840
[   16.822866]  ? __pfx_read_tsc+0x10/0x10
[   16.822891]  ? ktime_get_ts64+0x86/0x230
[   16.822921]  kunit_try_run_case+0x1a6/0x480
[   16.822949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.822975]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.823003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.823039]  ? __kthread_parkme+0x82/0x160
[   16.823066]  ? preempt_count_sub+0x50/0x80
[   16.823095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.823123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.823153]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.823185]  kthread+0x324/0x6e0
[   16.823211]  ? trace_preempt_on+0x20/0xc0
[   16.823248]  ? __pfx_kthread+0x10/0x10
[   16.823276]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.823313]  ? calculate_sigpending+0x7b/0xa0
[   16.823341]  ? __pfx_kthread+0x10/0x10
[   16.823368]  ret_from_fork+0x41/0x80
[   16.823391]  ? __pfx_kthread+0x10/0x10
[   16.823418]  ret_from_fork_asm+0x1a/0x30
[   16.823453]  </TASK>
[   16.823464] 
[   16.830934] Allocated by task 293:
[   16.831141]  kasan_save_stack+0x45/0x70
[   16.831300]  kasan_save_track+0x18/0x40
[   16.831441]  kasan_save_alloc_info+0x3b/0x50
[   16.831614]  __kasan_kmalloc+0xb7/0xc0
[   16.831807]  __kmalloc_noprof+0x1ca/0x500
[   16.832044]  kunit_kmalloc_array+0x25/0x60
[   16.832342]  copy_user_test_oob+0xac/0x10f0
[   16.832723]  kunit_try_run_case+0x1a6/0x480
[   16.832920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.833179]  kthread+0x324/0x6e0
[   16.833346]  ret_from_fork+0x41/0x80
[   16.833480]  ret_from_fork_asm+0x1a/0x30
[   16.833833] 
[   16.833945] The buggy address belongs to the object at ffff888102a2cf00
[   16.833945]  which belongs to the cache kmalloc-128 of size 128
[   16.834463] The buggy address is located 0 bytes inside of
[   16.834463]  allocated 120-byte region [ffff888102a2cf00, ffff888102a2cf78)
[   16.835001] 
[   16.835103] The buggy address belongs to the physical page:
[   16.835336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   16.835737] flags: 0x200000000000000(node=0|zone=2)
[   16.835959] page_type: f5(slab)
[   16.836140] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.836464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.836816] page dumped because: kasan: bad access detected
[   16.837054] 
[   16.837151] Memory state around the buggy address:
[   16.837374]  ffff888102a2ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.837621]  ffff888102a2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837964] >ffff888102a2cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.838226]                                                                 ^
[   16.838510]  ffff888102a2cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.838884]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.839130] ==================================================================
[   16.802811] ==================================================================
[   16.803156] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4ab/0x10f0
[   16.803461] Read of size 121 at addr ffff888102a2cf00 by task kunit_try_catch/293
[   16.803719] 
[   16.803802] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.803842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.803855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.803876] Call Trace:
[   16.803892]  <TASK>
[   16.803909]  dump_stack_lvl+0x73/0xb0
[   16.803938]  print_report+0xd1/0x650
[   16.803966]  ? __virt_addr_valid+0x1db/0x2d0
[   16.804035]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.804065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.804094]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.804122]  kasan_report+0x140/0x180
[   16.804148]  ? copy_user_test_oob+0x4ab/0x10f0
[   16.804180]  kasan_check_range+0x10c/0x1c0
[   16.804208]  __kasan_check_read+0x15/0x20
[   16.804247]  copy_user_test_oob+0x4ab/0x10f0
[   16.804277]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.804314]  ? finish_task_switch.isra.0+0x153/0x700
[   16.804343]  ? __switch_to+0x5d9/0xf60
[   16.804373]  ? __schedule+0xce8/0x2840
[   16.804402]  ? __pfx_read_tsc+0x10/0x10
[   16.804428]  ? ktime_get_ts64+0x86/0x230
[   16.804458]  kunit_try_run_case+0x1a6/0x480
[   16.804487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.804513]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.804541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.804578]  ? __kthread_parkme+0x82/0x160
[   16.804606]  ? preempt_count_sub+0x50/0x80
[   16.804635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.804674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.804705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.804735]  kthread+0x324/0x6e0
[   16.804762]  ? trace_preempt_on+0x20/0xc0
[   16.804791]  ? __pfx_kthread+0x10/0x10
[   16.804818]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.804845]  ? calculate_sigpending+0x7b/0xa0
[   16.804872]  ? __pfx_kthread+0x10/0x10
[   16.804900]  ret_from_fork+0x41/0x80
[   16.804923]  ? __pfx_kthread+0x10/0x10
[   16.804949]  ret_from_fork_asm+0x1a/0x30
[   16.804986]  </TASK>
[   16.804998] 
[   16.812342] Allocated by task 293:
[   16.812548]  kasan_save_stack+0x45/0x70
[   16.812774]  kasan_save_track+0x18/0x40
[   16.812945]  kasan_save_alloc_info+0x3b/0x50
[   16.813112]  __kasan_kmalloc+0xb7/0xc0
[   16.813288]  __kmalloc_noprof+0x1ca/0x500
[   16.813521]  kunit_kmalloc_array+0x25/0x60
[   16.813771]  copy_user_test_oob+0xac/0x10f0
[   16.814008]  kunit_try_run_case+0x1a6/0x480
[   16.814227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.814409]  kthread+0x324/0x6e0
[   16.814537]  ret_from_fork+0x41/0x80
[   16.814723]  ret_from_fork_asm+0x1a/0x30
[   16.815052] 
[   16.815173] The buggy address belongs to the object at ffff888102a2cf00
[   16.815173]  which belongs to the cache kmalloc-128 of size 128
[   16.815753] The buggy address is located 0 bytes inside of
[   16.815753]  allocated 120-byte region [ffff888102a2cf00, ffff888102a2cf78)
[   16.816198] 
[   16.816296] The buggy address belongs to the physical page:
[   16.816582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   16.816859] flags: 0x200000000000000(node=0|zone=2)
[   16.817107] page_type: f5(slab)
[   16.817248] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.817538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.817890] page dumped because: kasan: bad access detected
[   16.818125] 
[   16.818231] Memory state around the buggy address:
[   16.818407]  ffff888102a2ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.818778]  ffff888102a2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.819118] >ffff888102a2cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.819331]                                                                 ^
[   16.819809]  ffff888102a2cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.820109]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.820367] ==================================================================
[   16.783622] ==================================================================
[   16.783888] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fe/0x10f0
[   16.784168] Write of size 121 at addr ffff888102a2cf00 by task kunit_try_catch/293
[   16.784424] 
[   16.784510] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.784551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.784563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.784597] Call Trace:
[   16.784611]  <TASK>
[   16.784629]  dump_stack_lvl+0x73/0xb0
[   16.784660]  print_report+0xd1/0x650
[   16.784698]  ? __virt_addr_valid+0x1db/0x2d0
[   16.784726]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.784753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.784783]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.784811]  kasan_report+0x140/0x180
[   16.784837]  ? copy_user_test_oob+0x3fe/0x10f0
[   16.784869]  kasan_check_range+0x10c/0x1c0
[   16.784905]  __kasan_check_write+0x18/0x20
[   16.784933]  copy_user_test_oob+0x3fe/0x10f0
[   16.784972]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.784998]  ? finish_task_switch.isra.0+0x153/0x700
[   16.785048]  ? __switch_to+0x5d9/0xf60
[   16.785079]  ? __schedule+0xce8/0x2840
[   16.785108]  ? __pfx_read_tsc+0x10/0x10
[   16.785134]  ? ktime_get_ts64+0x86/0x230
[   16.785164]  kunit_try_run_case+0x1a6/0x480
[   16.785192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.785218]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.785247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.785276]  ? __kthread_parkme+0x82/0x160
[   16.785304]  ? preempt_count_sub+0x50/0x80
[   16.785333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.785361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.785392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.785423]  kthread+0x324/0x6e0
[   16.785448]  ? trace_preempt_on+0x20/0xc0
[   16.785477]  ? __pfx_kthread+0x10/0x10
[   16.785505]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.785533]  ? calculate_sigpending+0x7b/0xa0
[   16.785559]  ? __pfx_kthread+0x10/0x10
[   16.785588]  ret_from_fork+0x41/0x80
[   16.785612]  ? __pfx_kthread+0x10/0x10
[   16.785640]  ret_from_fork_asm+0x1a/0x30
[   16.785675]  </TASK>
[   16.785687] 
[   16.793519] Allocated by task 293:
[   16.793726]  kasan_save_stack+0x45/0x70
[   16.793978]  kasan_save_track+0x18/0x40
[   16.794194]  kasan_save_alloc_info+0x3b/0x50
[   16.794353]  __kasan_kmalloc+0xb7/0xc0
[   16.794491]  __kmalloc_noprof+0x1ca/0x500
[   16.794774]  kunit_kmalloc_array+0x25/0x60
[   16.794980]  copy_user_test_oob+0xac/0x10f0
[   16.795190]  kunit_try_run_case+0x1a6/0x480
[   16.795345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.795526]  kthread+0x324/0x6e0
[   16.795716]  ret_from_fork+0x41/0x80
[   16.795931]  ret_from_fork_asm+0x1a/0x30
[   16.796180] 
[   16.796259] The buggy address belongs to the object at ffff888102a2cf00
[   16.796259]  which belongs to the cache kmalloc-128 of size 128
[   16.797552] The buggy address is located 0 bytes inside of
[   16.797552]  allocated 120-byte region [ffff888102a2cf00, ffff888102a2cf78)
[   16.798071] 
[   16.798167] The buggy address belongs to the physical page:
[   16.798384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   16.798772] flags: 0x200000000000000(node=0|zone=2)
[   16.799021] page_type: f5(slab)
[   16.799191] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.799445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.799735] page dumped because: kasan: bad access detected
[   16.800004] 
[   16.800117] Memory state around the buggy address:
[   16.800330]  ffff888102a2ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.800663]  ffff888102a2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.800950] >ffff888102a2cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.801257]                                                                 ^
[   16.801542]  ffff888102a2cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.801762]  ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.802114] ==================================================================