Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.956158] ==================================================================
[   28.956466] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   28.957220] Write of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   28.957588] 
[   28.957679] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.957897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.958518] Hardware name: linux,dummy-virt (DT)
[   28.958617] Call trace:
[   28.958966]  show_stack+0x20/0x38 (C)
[   28.959748]  dump_stack_lvl+0x8c/0xd0
[   28.960002]  print_report+0x118/0x608
[   28.960462]  kasan_report+0xdc/0x128
[   28.960588]  kasan_check_range+0x100/0x1a8
[   28.960709]  __kasan_check_write+0x20/0x30
[   28.960825]  copy_user_test_oob+0x35c/0xec8
[   28.961791]  kunit_try_run_case+0x170/0x3f0
[   28.962399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.962859]  kthread+0x328/0x630
[   28.963600]  ret_from_fork+0x10/0x20
[   28.964067] 
[   28.964124] Allocated by task 287:
[   28.964206]  kasan_save_stack+0x3c/0x68
[   28.965211]  kasan_save_track+0x20/0x40
[   28.965321]  kasan_save_alloc_info+0x40/0x58
[   28.965548]  __kasan_kmalloc+0xd4/0xd8
[   28.965781]  __kmalloc_noprof+0x198/0x4c8
[   28.966371]  kunit_kmalloc_array+0x34/0x88
[   28.966760]  copy_user_test_oob+0xac/0xec8
[   28.967187]  kunit_try_run_case+0x170/0x3f0
[   28.967300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.968060]  kthread+0x328/0x630
[   28.968579]  ret_from_fork+0x10/0x20
[   28.968939] 
[   28.968999] The buggy address belongs to the object at fff00000c5a7bb00
[   28.968999]  which belongs to the cache kmalloc-128 of size 128
[   28.969142] The buggy address is located 0 bytes inside of
[   28.969142]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   28.969306] 
[   28.969361] The buggy address belongs to the physical page:
[   28.970671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   28.971132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.971734] page_type: f5(slab)
[   28.972027] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.972173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.972876] page dumped because: kasan: bad access detected
[   28.973296] 
[   28.973567] Memory state around the buggy address:
[   28.974423]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.975007]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.975375] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.975804]                                                                 ^
[   28.975964]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.976083]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.976198] ==================================================================
[   28.991943] ==================================================================
[   28.992232] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   28.992370] Write of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   28.992615] 
[   28.992694] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.993336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.993518] Hardware name: linux,dummy-virt (DT)
[   28.993635] Call trace:
[   28.993748]  show_stack+0x20/0x38 (C)
[   28.994270]  dump_stack_lvl+0x8c/0xd0
[   28.994495]  print_report+0x118/0x608
[   28.994981]  kasan_report+0xdc/0x128
[   28.995516]  kasan_check_range+0x100/0x1a8
[   28.995976]  __kasan_check_write+0x20/0x30
[   28.996675]  copy_user_test_oob+0x434/0xec8
[   28.997096]  kunit_try_run_case+0x170/0x3f0
[   28.997236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.998863]  kthread+0x328/0x630
[   28.999218]  ret_from_fork+0x10/0x20
[   28.999917] 
[   29.000105] Allocated by task 287:
[   29.000331]  kasan_save_stack+0x3c/0x68
[   29.000480]  kasan_save_track+0x20/0x40
[   29.000794]  kasan_save_alloc_info+0x40/0x58
[   29.001077]  __kasan_kmalloc+0xd4/0xd8
[   29.001273]  __kmalloc_noprof+0x198/0x4c8
[   29.001709]  kunit_kmalloc_array+0x34/0x88
[   29.002158]  copy_user_test_oob+0xac/0xec8
[   29.002289]  kunit_try_run_case+0x170/0x3f0
[   29.002589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.002732]  kthread+0x328/0x630
[   29.002828]  ret_from_fork+0x10/0x20
[   29.003020] 
[   29.003080] The buggy address belongs to the object at fff00000c5a7bb00
[   29.003080]  which belongs to the cache kmalloc-128 of size 128
[   29.003358] The buggy address is located 0 bytes inside of
[   29.003358]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   29.003532] 
[   29.003582] The buggy address belongs to the physical page:
[   29.003655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   29.003778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.003898] page_type: f5(slab)
[   29.004118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.004266] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.004478] page dumped because: kasan: bad access detected
[   29.004608] 
[   29.004669] Memory state around the buggy address:
[   29.004764]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.004927]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.005050] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.005201]                                                                 ^
[   29.005326]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.005479]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.005590] ==================================================================
[   29.006655] ==================================================================
[   29.006805] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   29.007016] Read of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   29.007391] 
[   29.007465] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   29.007695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.007778] Hardware name: linux,dummy-virt (DT)
[   29.007912] Call trace:
[   29.007976]  show_stack+0x20/0x38 (C)
[   29.008172]  dump_stack_lvl+0x8c/0xd0
[   29.008327]  print_report+0x118/0x608
[   29.008478]  kasan_report+0xdc/0x128
[   29.008657]  kasan_check_range+0x100/0x1a8
[   29.008912]  __kasan_check_read+0x20/0x30
[   29.009171]  copy_user_test_oob+0x4a0/0xec8
[   29.009302]  kunit_try_run_case+0x170/0x3f0
[   29.009461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.010100]  kthread+0x328/0x630
[   29.010174]  ret_from_fork+0x10/0x20
[   29.010278] 
[   29.010361] Allocated by task 287:
[   29.010492]  kasan_save_stack+0x3c/0x68
[   29.010627]  kasan_save_track+0x20/0x40
[   29.010721]  kasan_save_alloc_info+0x40/0x58
[   29.010830]  __kasan_kmalloc+0xd4/0xd8
[   29.011065]  __kmalloc_noprof+0x198/0x4c8
[   29.011232]  kunit_kmalloc_array+0x34/0x88
[   29.011364]  copy_user_test_oob+0xac/0xec8
[   29.011543]  kunit_try_run_case+0x170/0x3f0
[   29.011819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.012050]  kthread+0x328/0x630
[   29.012171]  ret_from_fork+0x10/0x20
[   29.012283] 
[   29.012349] The buggy address belongs to the object at fff00000c5a7bb00
[   29.012349]  which belongs to the cache kmalloc-128 of size 128
[   29.012533] The buggy address is located 0 bytes inside of
[   29.012533]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   29.012740] 
[   29.012809] The buggy address belongs to the physical page:
[   29.012902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   29.013026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.013166] page_type: f5(slab)
[   29.013327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.013488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.013600] page dumped because: kasan: bad access detected
[   29.013874] 
[   29.013936] Memory state around the buggy address:
[   29.014021]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.014156]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.014269] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.014514]                                                                 ^
[   29.014715]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.014881]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.015165] ==================================================================
[   28.978465] ==================================================================
[   28.978760] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   28.979015] Read of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   28.979172] 
[   28.979393] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.979634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.979715] Hardware name: linux,dummy-virt (DT)
[   28.979810] Call trace:
[   28.979880]  show_stack+0x20/0x38 (C)
[   28.980163]  dump_stack_lvl+0x8c/0xd0
[   28.980439]  print_report+0x118/0x608
[   28.980745]  kasan_report+0xdc/0x128
[   28.980941]  kasan_check_range+0x100/0x1a8
[   28.981116]  __kasan_check_read+0x20/0x30
[   28.981393]  copy_user_test_oob+0x3c8/0xec8
[   28.981592]  kunit_try_run_case+0x170/0x3f0
[   28.981773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.981920]  kthread+0x328/0x630
[   28.982069]  ret_from_fork+0x10/0x20
[   28.982189] 
[   28.982237] Allocated by task 287:
[   28.982399]  kasan_save_stack+0x3c/0x68
[   28.982614]  kasan_save_track+0x20/0x40
[   28.982846]  kasan_save_alloc_info+0x40/0x58
[   28.983071]  __kasan_kmalloc+0xd4/0xd8
[   28.983296]  __kmalloc_noprof+0x198/0x4c8
[   28.983433]  kunit_kmalloc_array+0x34/0x88
[   28.983597]  copy_user_test_oob+0xac/0xec8
[   28.983721]  kunit_try_run_case+0x170/0x3f0
[   28.984017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.984229]  kthread+0x328/0x630
[   28.984435]  ret_from_fork+0x10/0x20
[   28.984590] 
[   28.984660] The buggy address belongs to the object at fff00000c5a7bb00
[   28.984660]  which belongs to the cache kmalloc-128 of size 128
[   28.984892] The buggy address is located 0 bytes inside of
[   28.984892]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   28.985061] 
[   28.985114] The buggy address belongs to the physical page:
[   28.985226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   28.985357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.985492] page_type: f5(slab)
[   28.985588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.985716] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.985859] page dumped because: kasan: bad access detected
[   28.986084] 
[   28.986134] Memory state around the buggy address:
[   28.986212]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.986326]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.986462] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.986621]                                                                 ^
[   28.986732]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.986877]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.987042] ==================================================================
[   28.918077] ==================================================================
[   28.918193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   28.918493] Read of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   28.918676] 
[   28.918752] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.919869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.919962] Hardware name: linux,dummy-virt (DT)
[   28.920088] Call trace:
[   28.920456]  show_stack+0x20/0x38 (C)
[   28.921457]  dump_stack_lvl+0x8c/0xd0
[   28.922330]  print_report+0x118/0x608
[   28.922481]  kasan_report+0xdc/0x128
[   28.922593]  kasan_check_range+0x100/0x1a8
[   28.922717]  __kasan_check_read+0x20/0x30
[   28.924217]  copy_user_test_oob+0x728/0xec8
[   28.925187]  kunit_try_run_case+0x170/0x3f0
[   28.925326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.925933]  kthread+0x328/0x630
[   28.926567]  ret_from_fork+0x10/0x20
[   28.926957] 
[   28.927156] Allocated by task 287:
[   28.927627]  kasan_save_stack+0x3c/0x68
[   28.928410]  kasan_save_track+0x20/0x40
[   28.928678]  kasan_save_alloc_info+0x40/0x58
[   28.928785]  __kasan_kmalloc+0xd4/0xd8
[   28.928878]  __kmalloc_noprof+0x198/0x4c8
[   28.928983]  kunit_kmalloc_array+0x34/0x88
[   28.929095]  copy_user_test_oob+0xac/0xec8
[   28.930412]  kunit_try_run_case+0x170/0x3f0
[   28.930941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.932162]  kthread+0x328/0x630
[   28.932567]  ret_from_fork+0x10/0x20
[   28.932755] 
[   28.932890] The buggy address belongs to the object at fff00000c5a7bb00
[   28.932890]  which belongs to the cache kmalloc-128 of size 128
[   28.933464] The buggy address is located 0 bytes inside of
[   28.933464]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   28.934446] 
[   28.934645] The buggy address belongs to the physical page:
[   28.934786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   28.935438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.936115] page_type: f5(slab)
[   28.937178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.937476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.937587] page dumped because: kasan: bad access detected
[   28.937674] 
[   28.938679] Memory state around the buggy address:
[   28.939153]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.940409]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.940578] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.940799]                                                                 ^
[   28.941008]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.941137]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.941501] ==================================================================
[   28.898118] ==================================================================
[   28.898603] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   28.898768] Write of size 121 at addr fff00000c5a7bb00 by task kunit_try_catch/287
[   28.898896] 
[   28.898992] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.899203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.899277] Hardware name: linux,dummy-virt (DT)
[   28.899357] Call trace:
[   28.900223]  show_stack+0x20/0x38 (C)
[   28.900496]  dump_stack_lvl+0x8c/0xd0
[   28.900761]  print_report+0x118/0x608
[   28.901305]  kasan_report+0xdc/0x128
[   28.901444]  kasan_check_range+0x100/0x1a8
[   28.902275]  __kasan_check_write+0x20/0x30
[   28.903531]  copy_user_test_oob+0x234/0xec8
[   28.904046]  kunit_try_run_case+0x170/0x3f0
[   28.904550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.904853]  kthread+0x328/0x630
[   28.905429]  ret_from_fork+0x10/0x20
[   28.905687] 
[   28.905718] Allocated by task 287:
[   28.905763]  kasan_save_stack+0x3c/0x68
[   28.905819]  kasan_save_track+0x20/0x40
[   28.905868]  kasan_save_alloc_info+0x40/0x58
[   28.905918]  __kasan_kmalloc+0xd4/0xd8
[   28.905965]  __kmalloc_noprof+0x198/0x4c8
[   28.906013]  kunit_kmalloc_array+0x34/0x88
[   28.906064]  copy_user_test_oob+0xac/0xec8
[   28.906113]  kunit_try_run_case+0x170/0x3f0
[   28.906166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.906226]  kthread+0x328/0x630
[   28.906273]  ret_from_fork+0x10/0x20
[   28.906320] 
[   28.906350] The buggy address belongs to the object at fff00000c5a7bb00
[   28.906350]  which belongs to the cache kmalloc-128 of size 128
[   28.906493] The buggy address is located 0 bytes inside of
[   28.906493]  allocated 120-byte region [fff00000c5a7bb00, fff00000c5a7bb78)
[   28.907015] 
[   28.907083] The buggy address belongs to the physical page:
[   28.907161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7b
[   28.907299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.907447] page_type: f5(slab)
[   28.907555] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.907941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.908222] page dumped because: kasan: bad access detected
[   28.908351] 
[   28.908429] Memory state around the buggy address:
[   28.908567]  fff00000c5a7ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.908732]  fff00000c5a7ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.909037] >fff00000c5a7bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.909145]                                                                 ^
[   28.909304]  fff00000c5a7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.909510]  fff00000c5a7bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.909675] ==================================================================

[   16.642311] ==================================================================
[   16.643299] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   16.643949] Read of size 121 at addr ffff8881029ed100 by task kunit_try_catch/305
[   16.644383] 
[   16.644916] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.645032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.645058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.645096] Call Trace:
[   16.645134]  <TASK>
[   16.645164]  dump_stack_lvl+0x73/0xb0
[   16.645201]  print_report+0xd1/0x650
[   16.645237]  ? __virt_addr_valid+0x1db/0x2d0
[   16.645264]  ? copy_user_test_oob+0x604/0x10f0
[   16.645285]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.645307]  ? copy_user_test_oob+0x604/0x10f0
[   16.645327]  kasan_report+0x141/0x180
[   16.645348]  ? copy_user_test_oob+0x604/0x10f0
[   16.645372]  kasan_check_range+0x10c/0x1c0
[   16.645392]  __kasan_check_read+0x15/0x20
[   16.645411]  copy_user_test_oob+0x604/0x10f0
[   16.645433]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.645452]  ? finish_task_switch.isra.0+0x153/0x700
[   16.645476]  ? __switch_to+0x5d9/0xf60
[   16.645497]  ? dequeue_task_fair+0x166/0x4e0
[   16.645520]  ? __schedule+0x10cc/0x2b60
[   16.645547]  ? __pfx_read_tsc+0x10/0x10
[   16.645577]  ? ktime_get_ts64+0x86/0x230
[   16.645666]  kunit_try_run_case+0x1a5/0x480
[   16.645718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.645763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.645812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.645847]  ? __kthread_parkme+0x82/0x180
[   16.645871]  ? preempt_count_sub+0x50/0x80
[   16.645895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.645918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.645955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.645983]  kthread+0x337/0x6f0
[   16.646002]  ? trace_preempt_on+0x20/0xc0
[   16.646026]  ? __pfx_kthread+0x10/0x10
[   16.646045]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.646067]  ? calculate_sigpending+0x7b/0xa0
[   16.646087]  ? __pfx_kthread+0x10/0x10
[   16.646107]  ret_from_fork+0x41/0x80
[   16.646127]  ? __pfx_kthread+0x10/0x10
[   16.646146]  ret_from_fork_asm+0x1a/0x30
[   16.646177]  </TASK>
[   16.646191] 
[   16.655790] Allocated by task 305:
[   16.656123]  kasan_save_stack+0x45/0x70
[   16.656363]  kasan_save_track+0x18/0x40
[   16.656534]  kasan_save_alloc_info+0x3b/0x50
[   16.656860]  __kasan_kmalloc+0xb7/0xc0
[   16.657182]  __kmalloc_noprof+0x1c9/0x500
[   16.657492]  kunit_kmalloc_array+0x25/0x60
[   16.657925]  copy_user_test_oob+0xab/0x10f0
[   16.658303]  kunit_try_run_case+0x1a5/0x480
[   16.658686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.659094]  kthread+0x337/0x6f0
[   16.659365]  ret_from_fork+0x41/0x80
[   16.659634]  ret_from_fork_asm+0x1a/0x30
[   16.659817] 
[   16.659975] The buggy address belongs to the object at ffff8881029ed100
[   16.659975]  which belongs to the cache kmalloc-128 of size 128
[   16.660849] The buggy address is located 0 bytes inside of
[   16.660849]  allocated 120-byte region [ffff8881029ed100, ffff8881029ed178)
[   16.661573] 
[   16.661798] The buggy address belongs to the physical page:
[   16.662110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ed
[   16.662461] flags: 0x200000000000000(node=0|zone=2)
[   16.662922] page_type: f5(slab)
[   16.663200] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.663736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.664259] page dumped because: kasan: bad access detected
[   16.664605] 
[   16.664778] Memory state around the buggy address:
[   16.665065]  ffff8881029ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.665380]  ffff8881029ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.665937] >ffff8881029ed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.666277]                                                                 ^
[   16.666785]  ffff8881029ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.667228]  ffff8881029ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.667746] ==================================================================
[   16.582619] ==================================================================
[   16.583215] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   16.583797] Read of size 121 at addr ffff8881029ed100 by task kunit_try_catch/305
[   16.584307] 
[   16.584461] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.584593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.584633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.584684] Call Trace:
[   16.584729]  <TASK>
[   16.584774]  dump_stack_lvl+0x73/0xb0
[   16.584832]  print_report+0xd1/0x650
[   16.584873]  ? __virt_addr_valid+0x1db/0x2d0
[   16.584947]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.584989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.585049]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.585091]  kasan_report+0x141/0x180
[   16.585137]  ? copy_user_test_oob+0x4aa/0x10f0
[   16.585186]  kasan_check_range+0x10c/0x1c0
[   16.585228]  __kasan_check_read+0x15/0x20
[   16.585269]  copy_user_test_oob+0x4aa/0x10f0
[   16.585317]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.585358]  ? finish_task_switch.isra.0+0x153/0x700
[   16.585404]  ? __switch_to+0x5d9/0xf60
[   16.585445]  ? dequeue_task_fair+0x166/0x4e0
[   16.586250]  ? __schedule+0x10cc/0x2b60
[   16.586330]  ? __pfx_read_tsc+0x10/0x10
[   16.586357]  ? ktime_get_ts64+0x86/0x230
[   16.586386]  kunit_try_run_case+0x1a5/0x480
[   16.586431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.586525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.586567]  ? __kthread_parkme+0x82/0x180
[   16.586613]  ? preempt_count_sub+0x50/0x80
[   16.586683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.586733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.586785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.586836]  kthread+0x337/0x6f0
[   16.586877]  ? trace_preempt_on+0x20/0xc0
[   16.586927]  ? __pfx_kthread+0x10/0x10
[   16.586968]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.586996]  ? calculate_sigpending+0x7b/0xa0
[   16.587019]  ? __pfx_kthread+0x10/0x10
[   16.587038]  ret_from_fork+0x41/0x80
[   16.587058]  ? __pfx_kthread+0x10/0x10
[   16.587075]  ret_from_fork_asm+0x1a/0x30
[   16.587105]  </TASK>
[   16.587120] 
[   16.598344] Allocated by task 305:
[   16.598631]  kasan_save_stack+0x45/0x70
[   16.598869]  kasan_save_track+0x18/0x40
[   16.599189]  kasan_save_alloc_info+0x3b/0x50
[   16.599544]  __kasan_kmalloc+0xb7/0xc0
[   16.599892]  __kmalloc_noprof+0x1c9/0x500
[   16.600070]  kunit_kmalloc_array+0x25/0x60
[   16.600252]  copy_user_test_oob+0xab/0x10f0
[   16.600789]  kunit_try_run_case+0x1a5/0x480
[   16.601000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.601239]  kthread+0x337/0x6f0
[   16.601404]  ret_from_fork+0x41/0x80
[   16.602181]  ret_from_fork_asm+0x1a/0x30
[   16.602742] 
[   16.602951] The buggy address belongs to the object at ffff8881029ed100
[   16.602951]  which belongs to the cache kmalloc-128 of size 128
[   16.603470] The buggy address is located 0 bytes inside of
[   16.603470]  allocated 120-byte region [ffff8881029ed100, ffff8881029ed178)
[   16.604440] 
[   16.604915] The buggy address belongs to the physical page:
[   16.605213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ed
[   16.605779] flags: 0x200000000000000(node=0|zone=2)
[   16.606179] page_type: f5(slab)
[   16.606366] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.607065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.607519] page dumped because: kasan: bad access detected
[   16.607841] 
[   16.607946] Memory state around the buggy address:
[   16.608167]  ffff8881029ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.608463]  ffff8881029ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.609359] >ffff8881029ed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.610000]                                                                 ^
[   16.610441]  ffff8881029ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.610704]  ffff8881029ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.611272] ==================================================================
[   16.559275] ==================================================================
[   16.559695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   16.560074] Write of size 121 at addr ffff8881029ed100 by task kunit_try_catch/305
[   16.560534] 
[   16.560797] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.560905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.560929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.560971] Call Trace:
[   16.561006]  <TASK>
[   16.561046]  dump_stack_lvl+0x73/0xb0
[   16.561108]  print_report+0xd1/0x650
[   16.561158]  ? __virt_addr_valid+0x1db/0x2d0
[   16.561199]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.561236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.561283]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.561326]  kasan_report+0x141/0x180
[   16.561368]  ? copy_user_test_oob+0x3fd/0x10f0
[   16.561445]  kasan_check_range+0x10c/0x1c0
[   16.561489]  __kasan_check_write+0x18/0x20
[   16.561533]  copy_user_test_oob+0x3fd/0x10f0
[   16.561578]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.561618]  ? finish_task_switch.isra.0+0x153/0x700
[   16.561684]  ? __switch_to+0x5d9/0xf60
[   16.561721]  ? dequeue_task_fair+0x166/0x4e0
[   16.561770]  ? __schedule+0x10cc/0x2b60
[   16.561802]  ? __pfx_read_tsc+0x10/0x10
[   16.561829]  ? ktime_get_ts64+0x86/0x230
[   16.561861]  kunit_try_run_case+0x1a5/0x480
[   16.561895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.561916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.561941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.561980]  ? __kthread_parkme+0x82/0x180
[   16.562004]  ? preempt_count_sub+0x50/0x80
[   16.562029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.562052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.562077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.562099]  kthread+0x337/0x6f0
[   16.562117]  ? trace_preempt_on+0x20/0xc0
[   16.562142]  ? __pfx_kthread+0x10/0x10
[   16.562160]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.562182]  ? calculate_sigpending+0x7b/0xa0
[   16.562204]  ? __pfx_kthread+0x10/0x10
[   16.562223]  ret_from_fork+0x41/0x80
[   16.562244]  ? __pfx_kthread+0x10/0x10
[   16.562262]  ret_from_fork_asm+0x1a/0x30
[   16.562293]  </TASK>
[   16.562306] 
[   16.571112] Allocated by task 305:
[   16.571463]  kasan_save_stack+0x45/0x70
[   16.571828]  kasan_save_track+0x18/0x40
[   16.572034]  kasan_save_alloc_info+0x3b/0x50
[   16.572215]  __kasan_kmalloc+0xb7/0xc0
[   16.572431]  __kmalloc_noprof+0x1c9/0x500
[   16.572797]  kunit_kmalloc_array+0x25/0x60
[   16.573107]  copy_user_test_oob+0xab/0x10f0
[   16.573424]  kunit_try_run_case+0x1a5/0x480
[   16.573664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.574030]  kthread+0x337/0x6f0
[   16.574212]  ret_from_fork+0x41/0x80
[   16.574517]  ret_from_fork_asm+0x1a/0x30
[   16.574717] 
[   16.574822] The buggy address belongs to the object at ffff8881029ed100
[   16.574822]  which belongs to the cache kmalloc-128 of size 128
[   16.575450] The buggy address is located 0 bytes inside of
[   16.575450]  allocated 120-byte region [ffff8881029ed100, ffff8881029ed178)
[   16.575822] 
[   16.575935] The buggy address belongs to the physical page:
[   16.576135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ed
[   16.576404] flags: 0x200000000000000(node=0|zone=2)
[   16.576601] page_type: f5(slab)
[   16.576932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.577451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.577980] page dumped because: kasan: bad access detected
[   16.578376] 
[   16.578560] Memory state around the buggy address:
[   16.578914]  ffff8881029ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.579396]  ffff8881029ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.579835] >ffff8881029ed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.580071]                                                                 ^
[   16.580316]  ffff8881029ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.580578]  ffff8881029ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581090] ==================================================================
[   16.614004] ==================================================================
[   16.614379] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   16.614634] Write of size 121 at addr ffff8881029ed100 by task kunit_try_catch/305
[   16.615258] 
[   16.615929] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.616045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.616070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.616104] Call Trace:
[   16.616131]  <TASK>
[   16.616160]  dump_stack_lvl+0x73/0xb0
[   16.616196]  print_report+0xd1/0x650
[   16.616220]  ? __virt_addr_valid+0x1db/0x2d0
[   16.616243]  ? copy_user_test_oob+0x557/0x10f0
[   16.616262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.616284]  ? copy_user_test_oob+0x557/0x10f0
[   16.616304]  kasan_report+0x141/0x180
[   16.616326]  ? copy_user_test_oob+0x557/0x10f0
[   16.616350]  kasan_check_range+0x10c/0x1c0
[   16.616370]  __kasan_check_write+0x18/0x20
[   16.616389]  copy_user_test_oob+0x557/0x10f0
[   16.616411]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.616430]  ? finish_task_switch.isra.0+0x153/0x700
[   16.616453]  ? __switch_to+0x5d9/0xf60
[   16.616474]  ? dequeue_task_fair+0x166/0x4e0
[   16.616497]  ? __schedule+0x10cc/0x2b60
[   16.616520]  ? __pfx_read_tsc+0x10/0x10
[   16.616542]  ? ktime_get_ts64+0x86/0x230
[   16.616579]  kunit_try_run_case+0x1a5/0x480
[   16.616633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.616678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.616725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.616773]  ? __kthread_parkme+0x82/0x180
[   16.616807]  ? preempt_count_sub+0x50/0x80
[   16.616832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.616855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.616878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.616901]  kthread+0x337/0x6f0
[   16.616919]  ? trace_preempt_on+0x20/0xc0
[   16.616942]  ? __pfx_kthread+0x10/0x10
[   16.616960]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.616980]  ? calculate_sigpending+0x7b/0xa0
[   16.617002]  ? __pfx_kthread+0x10/0x10
[   16.617020]  ret_from_fork+0x41/0x80
[   16.617040]  ? __pfx_kthread+0x10/0x10
[   16.617058]  ret_from_fork_asm+0x1a/0x30
[   16.617089]  </TASK>
[   16.617103] 
[   16.629050] Allocated by task 305:
[   16.629329]  kasan_save_stack+0x45/0x70
[   16.630014]  kasan_save_track+0x18/0x40
[   16.630220]  kasan_save_alloc_info+0x3b/0x50
[   16.630410]  __kasan_kmalloc+0xb7/0xc0
[   16.631028]  __kmalloc_noprof+0x1c9/0x500
[   16.631235]  kunit_kmalloc_array+0x25/0x60
[   16.631386]  copy_user_test_oob+0xab/0x10f0
[   16.631954]  kunit_try_run_case+0x1a5/0x480
[   16.632213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.632748]  kthread+0x337/0x6f0
[   16.632996]  ret_from_fork+0x41/0x80
[   16.633376]  ret_from_fork_asm+0x1a/0x30
[   16.633976] 
[   16.634099] The buggy address belongs to the object at ffff8881029ed100
[   16.634099]  which belongs to the cache kmalloc-128 of size 128
[   16.634571] The buggy address is located 0 bytes inside of
[   16.634571]  allocated 120-byte region [ffff8881029ed100, ffff8881029ed178)
[   16.635033] 
[   16.635144] The buggy address belongs to the physical page:
[   16.635379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ed
[   16.635752] flags: 0x200000000000000(node=0|zone=2)
[   16.635959] page_type: f5(slab)
[   16.636127] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.637169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.637474] page dumped because: kasan: bad access detected
[   16.637718] 
[   16.637834] Memory state around the buggy address:
[   16.638568]  ffff8881029ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.638972]  ffff8881029ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639441] >ffff8881029ed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.639852]                                                                 ^
[   16.640270]  ffff8881029ed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.640807]  ffff8881029ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.641090] ==================================================================