Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   26.200097] ==================================================================
[   26.200343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   26.200693] Read of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.200862] 
[   26.201060] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.201396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.201490] Hardware name: linux,dummy-virt (DT)
[   26.201570] Call trace:
[   26.201629]  show_stack+0x20/0x38 (C)
[   26.201740]  dump_stack_lvl+0x8c/0xd0
[   26.201852]  print_report+0x118/0x608
[   26.201944]  kasan_report+0xdc/0x128
[   26.202044]  kasan_check_range+0x100/0x1a8
[   26.202166]  __kasan_check_read+0x20/0x30
[   26.202285]  copy_user_test_oob+0x728/0xec8
[   26.202404]  kunit_try_run_case+0x170/0x3f0
[   26.202553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.202671]  kthread+0x328/0x630
[   26.202793]  ret_from_fork+0x10/0x20
[   26.202970] 
[   26.203021] Allocated by task 287:
[   26.203134]  kasan_save_stack+0x3c/0x68
[   26.203237]  kasan_save_track+0x20/0x40
[   26.203331]  kasan_save_alloc_info+0x40/0x58
[   26.203439]  __kasan_kmalloc+0xd4/0xd8
[   26.203567]  __kmalloc_noprof+0x198/0x4c8
[   26.203697]  kunit_kmalloc_array+0x34/0x88
[   26.203802]  copy_user_test_oob+0xac/0xec8
[   26.203911]  kunit_try_run_case+0x170/0x3f0
[   26.204054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.204225]  kthread+0x328/0x630
[   26.204318]  ret_from_fork+0x10/0x20
[   26.204408] 
[   26.204464] The buggy address belongs to the object at fff00000c73ad900
[   26.204464]  which belongs to the cache kmalloc-128 of size 128
[   26.204616] The buggy address is located 0 bytes inside of
[   26.204616]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.204788] 
[   26.204839] The buggy address belongs to the physical page:
[   26.204921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.205110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.205229] page_type: f5(slab)
[   26.205403] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.205546] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.205808] page dumped because: kasan: bad access detected
[   26.205905] 
[   26.205958] Memory state around the buggy address:
[   26.206054]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.206228]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.206366] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.206448]                                                                 ^
[   26.206527]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.206607]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.206718] ==================================================================
[   26.229668] ==================================================================
[   26.229903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   26.230037] Read of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.232205] 
[   26.235002] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.235302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.235373] Hardware name: linux,dummy-virt (DT)
[   26.235457] Call trace:
[   26.235517]  show_stack+0x20/0x38 (C)
[   26.235658]  dump_stack_lvl+0x8c/0xd0
[   26.235805]  print_report+0x118/0x608
[   26.235908]  kasan_report+0xdc/0x128
[   26.236009]  kasan_check_range+0x100/0x1a8
[   26.236121]  __kasan_check_read+0x20/0x30
[   26.236231]  copy_user_test_oob+0x3c8/0xec8
[   26.236342]  kunit_try_run_case+0x170/0x3f0
[   26.236451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.236578]  kthread+0x328/0x630
[   26.236695]  ret_from_fork+0x10/0x20
[   26.237449] 
[   26.237507] Allocated by task 287:
[   26.237581]  kasan_save_stack+0x3c/0x68
[   26.237690]  kasan_save_track+0x20/0x40
[   26.237864]  kasan_save_alloc_info+0x40/0x58
[   26.237951]  __kasan_kmalloc+0xd4/0xd8
[   26.238025]  __kmalloc_noprof+0x198/0x4c8
[   26.238104]  kunit_kmalloc_array+0x34/0x88
[   26.238195]  copy_user_test_oob+0xac/0xec8
[   26.238276]  kunit_try_run_case+0x170/0x3f0
[   26.239949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.240127]  kthread+0x328/0x630
[   26.240228]  ret_from_fork+0x10/0x20
[   26.240337] 
[   26.240394] The buggy address belongs to the object at fff00000c73ad900
[   26.240394]  which belongs to the cache kmalloc-128 of size 128
[   26.240554] The buggy address is located 0 bytes inside of
[   26.240554]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.240718] 
[   26.240784] The buggy address belongs to the physical page:
[   26.240854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.240961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.241083] page_type: f5(slab)
[   26.241178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.241301] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.241393] page dumped because: kasan: bad access detected
[   26.241461] 
[   26.241502] Memory state around the buggy address:
[   26.241584]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.241697]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.241843] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.241944]                                                                 ^
[   26.242034]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.243289]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.243464] ==================================================================
[   26.256905] ==================================================================
[   26.257270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   26.257515] Read of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.257586] 
[   26.257640] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.257765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.257872] Hardware name: linux,dummy-virt (DT)
[   26.258151] Call trace:
[   26.258249]  show_stack+0x20/0x38 (C)
[   26.258468]  dump_stack_lvl+0x8c/0xd0
[   26.258627]  print_report+0x118/0x608
[   26.258900]  kasan_report+0xdc/0x128
[   26.259020]  kasan_check_range+0x100/0x1a8
[   26.259156]  __kasan_check_read+0x20/0x30
[   26.259326]  copy_user_test_oob+0x4a0/0xec8
[   26.259490]  kunit_try_run_case+0x170/0x3f0
[   26.259656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.259864]  kthread+0x328/0x630
[   26.260017]  ret_from_fork+0x10/0x20
[   26.260148] 
[   26.260199] Allocated by task 287:
[   26.260288]  kasan_save_stack+0x3c/0x68
[   26.260392]  kasan_save_track+0x20/0x40
[   26.260488]  kasan_save_alloc_info+0x40/0x58
[   26.260591]  __kasan_kmalloc+0xd4/0xd8
[   26.260718]  __kmalloc_noprof+0x198/0x4c8
[   26.260813]  kunit_kmalloc_array+0x34/0x88
[   26.261574]  copy_user_test_oob+0xac/0xec8
[   26.261795]  kunit_try_run_case+0x170/0x3f0
[   26.262003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.262128]  kthread+0x328/0x630
[   26.262230]  ret_from_fork+0x10/0x20
[   26.262326] 
[   26.262381] The buggy address belongs to the object at fff00000c73ad900
[   26.262381]  which belongs to the cache kmalloc-128 of size 128
[   26.262527] The buggy address is located 0 bytes inside of
[   26.262527]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.262645] 
[   26.262690] The buggy address belongs to the physical page:
[   26.262794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.262925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.263102] page_type: f5(slab)
[   26.263256] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.263443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.263595] page dumped because: kasan: bad access detected
[   26.263716] 
[   26.263775] Memory state around the buggy address:
[   26.263848]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.264482]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264631] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.264725]                                                                 ^
[   26.264845]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.265155]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.265264] ==================================================================
[   26.171630] ==================================================================
[   26.172085] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   26.172285] Write of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.172429] 
[   26.172542] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.172778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.172859] Hardware name: linux,dummy-virt (DT)
[   26.172955] Call trace:
[   26.173020]  show_stack+0x20/0x38 (C)
[   26.173149]  dump_stack_lvl+0x8c/0xd0
[   26.174064]  print_report+0x118/0x608
[   26.174268]  kasan_report+0xdc/0x128
[   26.174387]  kasan_check_range+0x100/0x1a8
[   26.174487]  __kasan_check_write+0x20/0x30
[   26.174581]  copy_user_test_oob+0x234/0xec8
[   26.174669]  kunit_try_run_case+0x170/0x3f0
[   26.174824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.174950]  kthread+0x328/0x630
[   26.175040]  ret_from_fork+0x10/0x20
[   26.175152] 
[   26.175196] Allocated by task 287:
[   26.175262]  kasan_save_stack+0x3c/0x68
[   26.175357]  kasan_save_track+0x20/0x40
[   26.175426]  kasan_save_alloc_info+0x40/0x58
[   26.175516]  __kasan_kmalloc+0xd4/0xd8
[   26.175671]  __kmalloc_noprof+0x198/0x4c8
[   26.175947]  kunit_kmalloc_array+0x34/0x88
[   26.176196]  copy_user_test_oob+0xac/0xec8
[   26.176427]  kunit_try_run_case+0x170/0x3f0
[   26.176539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.176654]  kthread+0x328/0x630
[   26.176763]  ret_from_fork+0x10/0x20
[   26.177236] 
[   26.177318] The buggy address belongs to the object at fff00000c73ad900
[   26.177318]  which belongs to the cache kmalloc-128 of size 128
[   26.177686] The buggy address is located 0 bytes inside of
[   26.177686]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.177883] 
[   26.178169] The buggy address belongs to the physical page:
[   26.178250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.178402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.178502] page_type: f5(slab)
[   26.178590] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.178685] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.178787] page dumped because: kasan: bad access detected
[   26.178859] 
[   26.178907] Memory state around the buggy address:
[   26.179202]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.179742]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.180077] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.180476]                                                                 ^
[   26.180949]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.181218]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.181633] ==================================================================
[   26.219931] ==================================================================
[   26.220120] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   26.220298] Write of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.220467] 
[   26.220605] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.220903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.220991] Hardware name: linux,dummy-virt (DT)
[   26.221083] Call trace:
[   26.221138]  show_stack+0x20/0x38 (C)
[   26.221254]  dump_stack_lvl+0x8c/0xd0
[   26.221462]  print_report+0x118/0x608
[   26.221572]  kasan_report+0xdc/0x128
[   26.221663]  kasan_check_range+0x100/0x1a8
[   26.221799]  __kasan_check_write+0x20/0x30
[   26.221909]  copy_user_test_oob+0x35c/0xec8
[   26.222075]  kunit_try_run_case+0x170/0x3f0
[   26.222234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.222416]  kthread+0x328/0x630
[   26.222566]  ret_from_fork+0x10/0x20
[   26.222736] 
[   26.222834] Allocated by task 287:
[   26.222910]  kasan_save_stack+0x3c/0x68
[   26.223014]  kasan_save_track+0x20/0x40
[   26.223112]  kasan_save_alloc_info+0x40/0x58
[   26.223209]  __kasan_kmalloc+0xd4/0xd8
[   26.223307]  __kmalloc_noprof+0x198/0x4c8
[   26.223410]  kunit_kmalloc_array+0x34/0x88
[   26.223509]  copy_user_test_oob+0xac/0xec8
[   26.223605]  kunit_try_run_case+0x170/0x3f0
[   26.223701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.223827]  kthread+0x328/0x630
[   26.223920]  ret_from_fork+0x10/0x20
[   26.224016] 
[   26.224068] The buggy address belongs to the object at fff00000c73ad900
[   26.224068]  which belongs to the cache kmalloc-128 of size 128
[   26.224245] The buggy address is located 0 bytes inside of
[   26.224245]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.224405] 
[   26.224466] The buggy address belongs to the physical page:
[   26.224553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.224692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.226351] page_type: f5(slab)
[   26.226472] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.226583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.226676] page dumped because: kasan: bad access detected
[   26.226777] 
[   26.226819] Memory state around the buggy address:
[   26.226900]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.227003]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227101] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.227183]                                                                 ^
[   26.227268]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227358]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227445] ==================================================================
[   26.244127] ==================================================================
[   26.244244] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   26.244761] Write of size 121 at addr fff00000c73ad900 by task kunit_try_catch/287
[   26.245132] 
[   26.245445] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   26.245961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.246039] Hardware name: linux,dummy-virt (DT)
[   26.246141] Call trace:
[   26.246194]  show_stack+0x20/0x38 (C)
[   26.246312]  dump_stack_lvl+0x8c/0xd0
[   26.246431]  print_report+0x118/0x608
[   26.246679]  kasan_report+0xdc/0x128
[   26.246831]  kasan_check_range+0x100/0x1a8
[   26.247240]  __kasan_check_write+0x20/0x30
[   26.247615]  copy_user_test_oob+0x434/0xec8
[   26.247754]  kunit_try_run_case+0x170/0x3f0
[   26.247914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.248035]  kthread+0x328/0x630
[   26.248236]  ret_from_fork+0x10/0x20
[   26.248561] 
[   26.248675] Allocated by task 287:
[   26.248826]  kasan_save_stack+0x3c/0x68
[   26.248955]  kasan_save_track+0x20/0x40
[   26.249345]  kasan_save_alloc_info+0x40/0x58
[   26.249459]  __kasan_kmalloc+0xd4/0xd8
[   26.249642]  __kmalloc_noprof+0x198/0x4c8
[   26.249939]  kunit_kmalloc_array+0x34/0x88
[   26.250144]  copy_user_test_oob+0xac/0xec8
[   26.250249]  kunit_try_run_case+0x170/0x3f0
[   26.250346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.250530]  kthread+0x328/0x630
[   26.250786]  ret_from_fork+0x10/0x20
[   26.251107] 
[   26.251324] The buggy address belongs to the object at fff00000c73ad900
[   26.251324]  which belongs to the cache kmalloc-128 of size 128
[   26.251480] The buggy address is located 0 bytes inside of
[   26.251480]  allocated 120-byte region [fff00000c73ad900, fff00000c73ad978)
[   26.251757] 
[   26.252072] The buggy address belongs to the physical page:
[   26.252173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   26.252464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.252912] page_type: f5(slab)
[   26.253119] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.253411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.253812] page dumped because: kasan: bad access detected
[   26.254007] 
[   26.254168] Memory state around the buggy address:
[   26.254394]  fff00000c73ad800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.254514]  fff00000c73ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.254833] >fff00000c73ad900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.255404]                                                                 ^
[   26.255517]  fff00000c73ad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.255605]  fff00000c73ada00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.255679] ==================================================================

[   26.836266] ==================================================================
[   26.837159] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   26.838876] Read of size 121 at addr ffff888102ed7700 by task kunit_try_catch/305
[   26.839451] 
[   26.839739] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.839904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.839949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.840013] Call Trace:
[   26.840062]  <TASK>
[   26.840111]  dump_stack_lvl+0x73/0xb0
[   26.840162]  print_report+0xd1/0x650
[   26.840243]  ? __virt_addr_valid+0x1db/0x2d0
[   26.840286]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.840375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.840453]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.840530]  kasan_report+0x141/0x180
[   26.840610]  ? copy_user_test_oob+0x4aa/0x10f0
[   26.840697]  kasan_check_range+0x10c/0x1c0
[   26.840771]  __kasan_check_read+0x15/0x20
[   26.840843]  copy_user_test_oob+0x4aa/0x10f0
[   26.840924]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.840971]  ? finish_task_switch.isra.0+0x153/0x700
[   26.841016]  ? __switch_to+0x5d9/0xf60
[   26.841087]  ? dequeue_task_fair+0x166/0x4e0
[   26.841135]  ? __schedule+0x10cc/0x2b60
[   26.841175]  ? __pfx_read_tsc+0x10/0x10
[   26.841212]  ? ktime_get_ts64+0x86/0x230
[   26.841256]  kunit_try_run_case+0x1a5/0x480
[   26.841324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.841368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.841410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.841451]  ? __kthread_parkme+0x82/0x180
[   26.841489]  ? preempt_count_sub+0x50/0x80
[   26.841528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.841568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.841606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.841645]  kthread+0x337/0x6f0
[   26.841673]  ? trace_preempt_on+0x20/0xc0
[   26.841714]  ? __pfx_kthread+0x10/0x10
[   26.841743]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.841778]  ? calculate_sigpending+0x7b/0xa0
[   26.841812]  ? __pfx_kthread+0x10/0x10
[   26.841843]  ret_from_fork+0x41/0x80
[   26.841878]  ? __pfx_kthread+0x10/0x10
[   26.841909]  ret_from_fork_asm+0x1a/0x30
[   26.841957]  </TASK>
[   26.841974] 
[   26.858218] Allocated by task 305:
[   26.858557]  kasan_save_stack+0x45/0x70
[   26.858923]  kasan_save_track+0x18/0x40
[   26.859667]  kasan_save_alloc_info+0x3b/0x50
[   26.860948]  __kasan_kmalloc+0xb7/0xc0
[   26.861661]  __kmalloc_noprof+0x1c9/0x500
[   26.862002]  kunit_kmalloc_array+0x25/0x60
[   26.862382]  copy_user_test_oob+0xab/0x10f0
[   26.862738]  kunit_try_run_case+0x1a5/0x480
[   26.863686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.864322]  kthread+0x337/0x6f0
[   26.864778]  ret_from_fork+0x41/0x80
[   26.865327]  ret_from_fork_asm+0x1a/0x30
[   26.866064] 
[   26.866340] The buggy address belongs to the object at ffff888102ed7700
[   26.866340]  which belongs to the cache kmalloc-128 of size 128
[   26.867261] The buggy address is located 0 bytes inside of
[   26.867261]  allocated 120-byte region [ffff888102ed7700, ffff888102ed7778)
[   26.868191] 
[   26.868448] The buggy address belongs to the physical page:
[   26.868873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   26.869918] flags: 0x200000000000000(node=0|zone=2)
[   26.870928] page_type: f5(slab)
[   26.871305] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.872210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.872839] page dumped because: kasan: bad access detected
[   26.873673] 
[   26.873904] Memory state around the buggy address:
[   26.874697]  ffff888102ed7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.875453]  ffff888102ed7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.876170] >ffff888102ed7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.876910]                                                                 ^
[   26.877727]  ffff888102ed7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.878493]  ffff888102ed7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.879283] ==================================================================
[   26.924599] ==================================================================
[   26.925008] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   26.926762] Read of size 121 at addr ffff888102ed7700 by task kunit_try_catch/305
[   26.927570] 
[   26.928391] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.928467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.928489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.928522] Call Trace:
[   26.928550]  <TASK>
[   26.928577]  dump_stack_lvl+0x73/0xb0
[   26.928622]  print_report+0xd1/0x650
[   26.928664]  ? __virt_addr_valid+0x1db/0x2d0
[   26.928701]  ? copy_user_test_oob+0x604/0x10f0
[   26.928734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.928772]  ? copy_user_test_oob+0x604/0x10f0
[   26.928805]  kasan_report+0x141/0x180
[   26.928843]  ? copy_user_test_oob+0x604/0x10f0
[   26.928883]  kasan_check_range+0x10c/0x1c0
[   26.928918]  __kasan_check_read+0x15/0x20
[   26.928950]  copy_user_test_oob+0x604/0x10f0
[   26.928987]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.929020]  ? finish_task_switch.isra.0+0x153/0x700
[   26.929086]  ? __switch_to+0x5d9/0xf60
[   26.929125]  ? dequeue_task_fair+0x166/0x4e0
[   26.929167]  ? __schedule+0x10cc/0x2b60
[   26.929209]  ? __pfx_read_tsc+0x10/0x10
[   26.929245]  ? ktime_get_ts64+0x86/0x230
[   26.929287]  kunit_try_run_case+0x1a5/0x480
[   26.929355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.929396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.929435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.929474]  ? __kthread_parkme+0x82/0x180
[   26.929510]  ? preempt_count_sub+0x50/0x80
[   26.929549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.929589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.929627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.929667]  kthread+0x337/0x6f0
[   26.929695]  ? trace_preempt_on+0x20/0xc0
[   26.929736]  ? __pfx_kthread+0x10/0x10
[   26.929765]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.929799]  ? calculate_sigpending+0x7b/0xa0
[   26.929835]  ? __pfx_kthread+0x10/0x10
[   26.929865]  ret_from_fork+0x41/0x80
[   26.929902]  ? __pfx_kthread+0x10/0x10
[   26.929931]  ret_from_fork_asm+0x1a/0x30
[   26.929978]  </TASK>
[   26.929996] 
[   26.950308] Allocated by task 305:
[   26.950703]  kasan_save_stack+0x45/0x70
[   26.951093]  kasan_save_track+0x18/0x40
[   26.951568]  kasan_save_alloc_info+0x3b/0x50
[   26.951928]  __kasan_kmalloc+0xb7/0xc0
[   26.952384]  __kmalloc_noprof+0x1c9/0x500
[   26.953081]  kunit_kmalloc_array+0x25/0x60
[   26.953673]  copy_user_test_oob+0xab/0x10f0
[   26.954153]  kunit_try_run_case+0x1a5/0x480
[   26.954683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.955378]  kthread+0x337/0x6f0
[   26.955860]  ret_from_fork+0x41/0x80
[   26.956367]  ret_from_fork_asm+0x1a/0x30
[   26.956851] 
[   26.957140] The buggy address belongs to the object at ffff888102ed7700
[   26.957140]  which belongs to the cache kmalloc-128 of size 128
[   26.958322] The buggy address is located 0 bytes inside of
[   26.958322]  allocated 120-byte region [ffff888102ed7700, ffff888102ed7778)
[   26.959462] 
[   26.959713] The buggy address belongs to the physical page:
[   26.960423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   26.961251] flags: 0x200000000000000(node=0|zone=2)
[   26.961788] page_type: f5(slab)
[   26.962277] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.963019] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.963864] page dumped because: kasan: bad access detected
[   26.964685] 
[   26.964782] Memory state around the buggy address:
[   26.964957]  ffff888102ed7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.965580]  ffff888102ed7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.966343] >ffff888102ed7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.967015]                                                                 ^
[   26.967787]  ffff888102ed7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.968732]  ffff888102ed7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.969505] ==================================================================
[   26.785394] ==================================================================
[   26.786000] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   26.787107] Write of size 121 at addr ffff888102ed7700 by task kunit_try_catch/305
[   26.787849] 
[   26.788086] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.789165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.789202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.789262] Call Trace:
[   26.789330]  <TASK>
[   26.789387]  dump_stack_lvl+0x73/0xb0
[   26.789475]  print_report+0xd1/0x650
[   26.789556]  ? __virt_addr_valid+0x1db/0x2d0
[   26.789631]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.789701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.789775]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.789843]  kasan_report+0x141/0x180
[   26.789918]  ? copy_user_test_oob+0x3fd/0x10f0
[   26.789999]  kasan_check_range+0x10c/0x1c0
[   26.790099]  __kasan_check_write+0x18/0x20
[   26.790164]  copy_user_test_oob+0x3fd/0x10f0
[   26.790226]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.790284]  ? finish_task_switch.isra.0+0x153/0x700
[   26.790372]  ? __switch_to+0x5d9/0xf60
[   26.790431]  ? dequeue_task_fair+0x166/0x4e0
[   26.790496]  ? __schedule+0x10cc/0x2b60
[   26.790562]  ? __pfx_read_tsc+0x10/0x10
[   26.790616]  ? ktime_get_ts64+0x86/0x230
[   26.790685]  kunit_try_run_case+0x1a5/0x480
[   26.790758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.790823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.790895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.790968]  ? __kthread_parkme+0x82/0x180
[   26.791044]  ? preempt_count_sub+0x50/0x80
[   26.791129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.791207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.791278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.791383]  kthread+0x337/0x6f0
[   26.791435]  ? trace_preempt_on+0x20/0xc0
[   26.791509]  ? __pfx_kthread+0x10/0x10
[   26.791563]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.791622]  ? calculate_sigpending+0x7b/0xa0
[   26.791681]  ? __pfx_kthread+0x10/0x10
[   26.791730]  ret_from_fork+0x41/0x80
[   26.791787]  ? __pfx_kthread+0x10/0x10
[   26.791836]  ret_from_fork_asm+0x1a/0x30
[   26.791926]  </TASK>
[   26.791957] 
[   26.814590] Allocated by task 305:
[   26.815007]  kasan_save_stack+0x45/0x70
[   26.816102]  kasan_save_track+0x18/0x40
[   26.816676]  kasan_save_alloc_info+0x3b/0x50
[   26.817059]  __kasan_kmalloc+0xb7/0xc0
[   26.817484]  __kmalloc_noprof+0x1c9/0x500
[   26.817865]  kunit_kmalloc_array+0x25/0x60
[   26.818891]  copy_user_test_oob+0xab/0x10f0
[   26.819320]  kunit_try_run_case+0x1a5/0x480
[   26.819870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.820594]  kthread+0x337/0x6f0
[   26.821341]  ret_from_fork+0x41/0x80
[   26.821847]  ret_from_fork_asm+0x1a/0x30
[   26.822239] 
[   26.822675] The buggy address belongs to the object at ffff888102ed7700
[   26.822675]  which belongs to the cache kmalloc-128 of size 128
[   26.823758] The buggy address is located 0 bytes inside of
[   26.823758]  allocated 120-byte region [ffff888102ed7700, ffff888102ed7778)
[   26.825123] 
[   26.825545] The buggy address belongs to the physical page:
[   26.826141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   26.826587] flags: 0x200000000000000(node=0|zone=2)
[   26.827231] page_type: f5(slab)
[   26.827630] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.828465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.829229] page dumped because: kasan: bad access detected
[   26.829675] 
[   26.830126] Memory state around the buggy address:
[   26.830665]  ffff888102ed7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.831317]  ffff888102ed7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.832211] >ffff888102ed7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.832861]                                                                 ^
[   26.833652]  ffff888102ed7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.834559]  ffff888102ed7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835311] ==================================================================
[   26.880280] ==================================================================
[   26.880835] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   26.882169] Write of size 121 at addr ffff888102ed7700 by task kunit_try_catch/305
[   26.883875] 
[   26.884539] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.884816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.884852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.884886] Call Trace:
[   26.884915]  <TASK>
[   26.884942]  dump_stack_lvl+0x73/0xb0
[   26.884989]  print_report+0xd1/0x650
[   26.885031]  ? __virt_addr_valid+0x1db/0x2d0
[   26.885110]  ? copy_user_test_oob+0x557/0x10f0
[   26.885148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.885187]  ? copy_user_test_oob+0x557/0x10f0
[   26.885220]  kasan_report+0x141/0x180
[   26.885256]  ? copy_user_test_oob+0x557/0x10f0
[   26.885319]  kasan_check_range+0x10c/0x1c0
[   26.885359]  __kasan_check_write+0x18/0x20
[   26.885393]  copy_user_test_oob+0x557/0x10f0
[   26.885429]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.885460]  ? finish_task_switch.isra.0+0x153/0x700
[   26.885501]  ? __switch_to+0x5d9/0xf60
[   26.885534]  ? dequeue_task_fair+0x166/0x4e0
[   26.885572]  ? __schedule+0x10cc/0x2b60
[   26.885610]  ? __pfx_read_tsc+0x10/0x10
[   26.885646]  ? ktime_get_ts64+0x86/0x230
[   26.885694]  kunit_try_run_case+0x1a5/0x480
[   26.885738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.885776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.885817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.885857]  ? __kthread_parkme+0x82/0x180
[   26.885894]  ? preempt_count_sub+0x50/0x80
[   26.885934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.885974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.886013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.886063]  kthread+0x337/0x6f0
[   26.886110]  ? trace_preempt_on+0x20/0xc0
[   26.886150]  ? __pfx_kthread+0x10/0x10
[   26.886180]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.886215]  ? calculate_sigpending+0x7b/0xa0
[   26.886251]  ? __pfx_kthread+0x10/0x10
[   26.886279]  ret_from_fork+0x41/0x80
[   26.886340]  ? __pfx_kthread+0x10/0x10
[   26.886371]  ret_from_fork_asm+0x1a/0x30
[   26.886420]  </TASK>
[   26.886438] 
[   26.901625] Allocated by task 305:
[   26.902109]  kasan_save_stack+0x45/0x70
[   26.902604]  kasan_save_track+0x18/0x40
[   26.903078]  kasan_save_alloc_info+0x3b/0x50
[   26.903552]  __kasan_kmalloc+0xb7/0xc0
[   26.904009]  __kmalloc_noprof+0x1c9/0x500
[   26.904498]  kunit_kmalloc_array+0x25/0x60
[   26.904833]  copy_user_test_oob+0xab/0x10f0
[   26.905207]  kunit_try_run_case+0x1a5/0x480
[   26.905927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.906564]  kthread+0x337/0x6f0
[   26.906957]  ret_from_fork+0x41/0x80
[   26.907412]  ret_from_fork_asm+0x1a/0x30
[   26.907837] 
[   26.908046] The buggy address belongs to the object at ffff888102ed7700
[   26.908046]  which belongs to the cache kmalloc-128 of size 128
[   26.909441] The buggy address is located 0 bytes inside of
[   26.909441]  allocated 120-byte region [ffff888102ed7700, ffff888102ed7778)
[   26.910554] 
[   26.910784] The buggy address belongs to the physical page:
[   26.911188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   26.911936] flags: 0x200000000000000(node=0|zone=2)
[   26.913854] page_type: f5(slab)
[   26.915087] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.915778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.916602] page dumped because: kasan: bad access detected
[   26.917354] 
[   26.917740] Memory state around the buggy address:
[   26.918348]  ffff888102ed7600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.919263]  ffff888102ed7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.920011] >ffff888102ed7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.920746]                                                                 ^
[   26.921447]  ffff888102ed7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.922322]  ffff888102ed7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.923012] ==================================================================