Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.459601] ==================================================================
[   18.459865] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.460057] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.460115] 
[   18.460151] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.460401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.460536] Hardware name: linux,dummy-virt (DT)
[   18.460600] Call trace:
[   18.460860]  show_stack+0x20/0x38 (C)
[   18.460996]  dump_stack_lvl+0x8c/0xd0
[   18.461053]  print_report+0x118/0x608
[   18.461100]  kasan_report+0xdc/0x128
[   18.461283]  kasan_check_range+0x100/0x1a8
[   18.461346]  __kasan_check_read+0x20/0x30
[   18.461646]  copy_user_test_oob+0x3c8/0xec8
[   18.461716]  kunit_try_run_case+0x170/0x3f0
[   18.461848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.461909]  kthread+0x328/0x630
[   18.461966]  ret_from_fork+0x10/0x20
[   18.462015] 
[   18.462035] Allocated by task 288:
[   18.462066]  kasan_save_stack+0x3c/0x68
[   18.462124]  kasan_save_track+0x20/0x40
[   18.462193]  kasan_save_alloc_info+0x40/0x58
[   18.462235]  __kasan_kmalloc+0xd4/0xd8
[   18.462295]  __kmalloc_noprof+0x198/0x4c8
[   18.462594]  kunit_kmalloc_array+0x34/0x88
[   18.462784]  copy_user_test_oob+0xac/0xec8
[   18.462851]  kunit_try_run_case+0x170/0x3f0
[   18.463114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.463220]  kthread+0x328/0x630
[   18.463405]  ret_from_fork+0x10/0x20
[   18.463623] 
[   18.463912] The buggy address belongs to the object at fff00000c77faa00
[   18.463912]  which belongs to the cache kmalloc-128 of size 128
[   18.464182] The buggy address is located 0 bytes inside of
[   18.464182]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.464444] 
[   18.464481] The buggy address belongs to the physical page:
[   18.464556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.464726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.464831] page_type: f5(slab)
[   18.464971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.465028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.465072] page dumped because: kasan: bad access detected
[   18.465127] 
[   18.465153] Memory state around the buggy address:
[   18.465203]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.465262]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465317] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.465358]                                                                 ^
[   18.465399]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465452]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465493] ==================================================================
[   18.422881] ==================================================================
[   18.423451] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.423555] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.423611] 
[   18.423692] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.423889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.423923] Hardware name: linux,dummy-virt (DT)
[   18.423972] Call trace:
[   18.424165]  show_stack+0x20/0x38 (C)
[   18.424255]  dump_stack_lvl+0x8c/0xd0
[   18.424315]  print_report+0x118/0x608
[   18.424487]  kasan_report+0xdc/0x128
[   18.424548]  kasan_check_range+0x100/0x1a8
[   18.424595]  __kasan_check_write+0x20/0x30
[   18.424767]  copy_user_test_oob+0x234/0xec8
[   18.424959]  kunit_try_run_case+0x170/0x3f0
[   18.425070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.425213]  kthread+0x328/0x630
[   18.425397]  ret_from_fork+0x10/0x20
[   18.425457] 
[   18.425478] Allocated by task 288:
[   18.425547]  kasan_save_stack+0x3c/0x68
[   18.425591]  kasan_save_track+0x20/0x40
[   18.425628]  kasan_save_alloc_info+0x40/0x58
[   18.425807]  __kasan_kmalloc+0xd4/0xd8
[   18.425855]  __kmalloc_noprof+0x198/0x4c8
[   18.425929]  kunit_kmalloc_array+0x34/0x88
[   18.425979]  copy_user_test_oob+0xac/0xec8
[   18.426017]  kunit_try_run_case+0x170/0x3f0
[   18.426057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.426101]  kthread+0x328/0x630
[   18.426152]  ret_from_fork+0x10/0x20
[   18.426189] 
[   18.426212] The buggy address belongs to the object at fff00000c77faa00
[   18.426212]  which belongs to the cache kmalloc-128 of size 128
[   18.426272] The buggy address is located 0 bytes inside of
[   18.426272]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.426334] 
[   18.426358] The buggy address belongs to the physical page:
[   18.426403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.426466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.426529] page_type: f5(slab)
[   18.426572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.426624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.426681] page dumped because: kasan: bad access detected
[   18.426715] 
[   18.426744] Memory state around the buggy address:
[   18.426788]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.426834]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.426887] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.426927]                                                                 ^
[   18.427300]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.427349]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.427391] ==================================================================
[   18.473990] ==================================================================
[   18.474575] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.474643] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.474911] 
[   18.475257] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.475516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.475551] Hardware name: linux,dummy-virt (DT)
[   18.475631] Call trace:
[   18.475750]  show_stack+0x20/0x38 (C)
[   18.476122]  dump_stack_lvl+0x8c/0xd0
[   18.476388]  print_report+0x118/0x608
[   18.476583]  kasan_report+0xdc/0x128
[   18.476796]  kasan_check_range+0x100/0x1a8
[   18.476997]  __kasan_check_read+0x20/0x30
[   18.477071]  copy_user_test_oob+0x4a0/0xec8
[   18.477296]  kunit_try_run_case+0x170/0x3f0
[   18.477382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.477835]  kthread+0x328/0x630
[   18.477917]  ret_from_fork+0x10/0x20
[   18.478145] 
[   18.478239] Allocated by task 288:
[   18.478491]  kasan_save_stack+0x3c/0x68
[   18.478544]  kasan_save_track+0x20/0x40
[   18.478582]  kasan_save_alloc_info+0x40/0x58
[   18.478623]  __kasan_kmalloc+0xd4/0xd8
[   18.478853]  __kmalloc_noprof+0x198/0x4c8
[   18.478926]  kunit_kmalloc_array+0x34/0x88
[   18.479027]  copy_user_test_oob+0xac/0xec8
[   18.479142]  kunit_try_run_case+0x170/0x3f0
[   18.479356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.479560]  kthread+0x328/0x630
[   18.479721]  ret_from_fork+0x10/0x20
[   18.479934] 
[   18.479990] The buggy address belongs to the object at fff00000c77faa00
[   18.479990]  which belongs to the cache kmalloc-128 of size 128
[   18.480052] The buggy address is located 0 bytes inside of
[   18.480052]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.480520] 
[   18.480587] The buggy address belongs to the physical page:
[   18.480802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.480994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.481060] page_type: f5(slab)
[   18.481215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.481348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.481435] page dumped because: kasan: bad access detected
[   18.481469] 
[   18.481501] Memory state around the buggy address:
[   18.481546]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.481592]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481641] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.481688]                                                                 ^
[   18.481740]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481785]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481835] ==================================================================
[   18.449813] ==================================================================
[   18.450111] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.450241] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.450323] 
[   18.450539] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.450725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.451027] Hardware name: linux,dummy-virt (DT)
[   18.451125] Call trace:
[   18.451224]  show_stack+0x20/0x38 (C)
[   18.451337]  dump_stack_lvl+0x8c/0xd0
[   18.451589]  print_report+0x118/0x608
[   18.451663]  kasan_report+0xdc/0x128
[   18.451766]  kasan_check_range+0x100/0x1a8
[   18.451926]  __kasan_check_write+0x20/0x30
[   18.452155]  copy_user_test_oob+0x35c/0xec8
[   18.452382]  kunit_try_run_case+0x170/0x3f0
[   18.452488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452722]  kthread+0x328/0x630
[   18.452795]  ret_from_fork+0x10/0x20
[   18.453205] 
[   18.453347] Allocated by task 288:
[   18.453406]  kasan_save_stack+0x3c/0x68
[   18.453581]  kasan_save_track+0x20/0x40
[   18.453718]  kasan_save_alloc_info+0x40/0x58
[   18.454015]  __kasan_kmalloc+0xd4/0xd8
[   18.454156]  __kmalloc_noprof+0x198/0x4c8
[   18.454281]  kunit_kmalloc_array+0x34/0x88
[   18.454518]  copy_user_test_oob+0xac/0xec8
[   18.454573]  kunit_try_run_case+0x170/0x3f0
[   18.454613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.454659]  kthread+0x328/0x630
[   18.455025]  ret_from_fork+0x10/0x20
[   18.455124] 
[   18.455315] The buggy address belongs to the object at fff00000c77faa00
[   18.455315]  which belongs to the cache kmalloc-128 of size 128
[   18.455525] The buggy address is located 0 bytes inside of
[   18.455525]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.455672] 
[   18.455732] The buggy address belongs to the physical page:
[   18.455793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.456196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.456310] page_type: f5(slab)
[   18.456655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.456727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.456852] page dumped because: kasan: bad access detected
[   18.457043] 
[   18.457115] Memory state around the buggy address:
[   18.457171]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.457221]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.457474] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.457630]                                                                 ^
[   18.457883]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.458056]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.458298] ==================================================================
[   18.433457] ==================================================================
[   18.433688] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.433878] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.433939] 
[   18.433983] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.434356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.434402] Hardware name: linux,dummy-virt (DT)
[   18.434641] Call trace:
[   18.434800]  show_stack+0x20/0x38 (C)
[   18.434879]  dump_stack_lvl+0x8c/0xd0
[   18.435094]  print_report+0x118/0x608
[   18.435208]  kasan_report+0xdc/0x128
[   18.435287]  kasan_check_range+0x100/0x1a8
[   18.435430]  __kasan_check_read+0x20/0x30
[   18.435542]  copy_user_test_oob+0x728/0xec8
[   18.435765]  kunit_try_run_case+0x170/0x3f0
[   18.436007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.436179]  kthread+0x328/0x630
[   18.436246]  ret_from_fork+0x10/0x20
[   18.436303] 
[   18.436662] Allocated by task 288:
[   18.436723]  kasan_save_stack+0x3c/0x68
[   18.437033]  kasan_save_track+0x20/0x40
[   18.437086]  kasan_save_alloc_info+0x40/0x58
[   18.437193]  __kasan_kmalloc+0xd4/0xd8
[   18.437342]  __kmalloc_noprof+0x198/0x4c8
[   18.437449]  kunit_kmalloc_array+0x34/0x88
[   18.437601]  copy_user_test_oob+0xac/0xec8
[   18.437708]  kunit_try_run_case+0x170/0x3f0
[   18.437751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.437918]  kthread+0x328/0x630
[   18.438014]  ret_from_fork+0x10/0x20
[   18.438101] 
[   18.438125] The buggy address belongs to the object at fff00000c77faa00
[   18.438125]  which belongs to the cache kmalloc-128 of size 128
[   18.438185] The buggy address is located 0 bytes inside of
[   18.438185]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.438418] 
[   18.438533] The buggy address belongs to the physical page:
[   18.438660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.438764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.439036] page_type: f5(slab)
[   18.439086] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.439159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.439205] page dumped because: kasan: bad access detected
[   18.439337] 
[   18.439546] Memory state around the buggy address:
[   18.439829]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.439909]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440250] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.440340]                                                                 ^
[   18.440418]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440697]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440745] ==================================================================
[   18.466057] ==================================================================
[   18.466131] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.466440] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.466592] 
[   18.466629] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.466932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.467103] Hardware name: linux,dummy-virt (DT)
[   18.467500] Call trace:
[   18.467640]  show_stack+0x20/0x38 (C)
[   18.467725]  dump_stack_lvl+0x8c/0xd0
[   18.467832]  print_report+0x118/0x608
[   18.468075]  kasan_report+0xdc/0x128
[   18.468327]  kasan_check_range+0x100/0x1a8
[   18.468509]  __kasan_check_write+0x20/0x30
[   18.468686]  copy_user_test_oob+0x434/0xec8
[   18.468900]  kunit_try_run_case+0x170/0x3f0
[   18.468968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.469275]  kthread+0x328/0x630
[   18.469720]  ret_from_fork+0x10/0x20
[   18.469879] 
[   18.470031] Allocated by task 288:
[   18.470129]  kasan_save_stack+0x3c/0x68
[   18.470239]  kasan_save_track+0x20/0x40
[   18.470412]  kasan_save_alloc_info+0x40/0x58
[   18.470461]  __kasan_kmalloc+0xd4/0xd8
[   18.470503]  __kmalloc_noprof+0x198/0x4c8
[   18.470543]  kunit_kmalloc_array+0x34/0x88
[   18.470803]  copy_user_test_oob+0xac/0xec8
[   18.470935]  kunit_try_run_case+0x170/0x3f0
[   18.471226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471423]  kthread+0x328/0x630
[   18.471578]  ret_from_fork+0x10/0x20
[   18.471739] 
[   18.471798] The buggy address belongs to the object at fff00000c77faa00
[   18.471798]  which belongs to the cache kmalloc-128 of size 128
[   18.472233] The buggy address is located 0 bytes inside of
[   18.472233]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.472417] 
[   18.472526] The buggy address belongs to the physical page:
[   18.472717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.472774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.472884] page_type: f5(slab)
[   18.473022] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.473075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.473118] page dumped because: kasan: bad access detected
[   18.473173] 
[   18.473200] Memory state around the buggy address:
[   18.473233]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.473288]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473347] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.473388]                                                                 ^
[   18.473431]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473475]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473515] ==================================================================

[   15.234676] ==================================================================
[   15.234981] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   15.235287] Write of size 121 at addr ffff888103151e00 by task kunit_try_catch/305
[   15.235604] 
[   15.235717] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   15.235768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.235781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.235804] Call Trace:
[   15.235824]  <TASK>
[   15.235844]  dump_stack_lvl+0x73/0xb0
[   15.235871]  print_report+0xd1/0x650
[   15.235895]  ? __virt_addr_valid+0x1db/0x2d0
[   15.235919]  ? copy_user_test_oob+0x557/0x10f0
[   15.235940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.235964]  ? copy_user_test_oob+0x557/0x10f0
[   15.235985]  kasan_report+0x141/0x180
[   15.236009]  ? copy_user_test_oob+0x557/0x10f0
[   15.236036]  kasan_check_range+0x10c/0x1c0
[   15.236058]  __kasan_check_write+0x18/0x20
[   15.236080]  copy_user_test_oob+0x557/0x10f0
[   15.236103]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.236123]  ? finish_task_switch.isra.0+0x153/0x700
[   15.236150]  ? __switch_to+0x5d9/0xf60
[   15.236173]  ? dequeue_task_fair+0x166/0x4e0
[   15.236198]  ? __schedule+0x10cc/0x2b60
[   15.236233]  ? __pfx_read_tsc+0x10/0x10
[   15.236255]  ? ktime_get_ts64+0x86/0x230
[   15.236282]  kunit_try_run_case+0x1a5/0x480
[   15.236307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.236356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.236381]  ? __kthread_parkme+0x82/0x180
[   15.236405]  ? preempt_count_sub+0x50/0x80
[   15.236431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.236506]  kthread+0x337/0x6f0
[   15.236525]  ? trace_preempt_on+0x20/0xc0
[   15.236550]  ? __pfx_kthread+0x10/0x10
[   15.236568]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.236592]  ? calculate_sigpending+0x7b/0xa0
[   15.236614]  ? __pfx_kthread+0x10/0x10
[   15.236634]  ret_from_fork+0x41/0x80
[   15.236656]  ? __pfx_kthread+0x10/0x10
[   15.236675]  ret_from_fork_asm+0x1a/0x30
[   15.236707]  </TASK>
[   15.236718] 
[   15.244678] Allocated by task 305:
[   15.244821]  kasan_save_stack+0x45/0x70
[   15.244973]  kasan_save_track+0x18/0x40
[   15.245262]  kasan_save_alloc_info+0x3b/0x50
[   15.245472]  __kasan_kmalloc+0xb7/0xc0
[   15.245659]  __kmalloc_noprof+0x1c9/0x500
[   15.245802]  kunit_kmalloc_array+0x25/0x60
[   15.245946]  copy_user_test_oob+0xab/0x10f0
[   15.246091]  kunit_try_run_case+0x1a5/0x480
[   15.246309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.246569]  kthread+0x337/0x6f0
[   15.246739]  ret_from_fork+0x41/0x80
[   15.246927]  ret_from_fork_asm+0x1a/0x30
[   15.247143] 
[   15.247249] The buggy address belongs to the object at ffff888103151e00
[   15.247249]  which belongs to the cache kmalloc-128 of size 128
[   15.247632] The buggy address is located 0 bytes inside of
[   15.247632]  allocated 120-byte region [ffff888103151e00, ffff888103151e78)
[   15.248190] 
[   15.248293] The buggy address belongs to the physical page:
[   15.248472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   15.248716] flags: 0x200000000000000(node=0|zone=2)
[   15.248951] page_type: f5(slab)
[   15.249128] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.249486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.250051] page dumped because: kasan: bad access detected
[   15.250335] 
[   15.250434] Memory state around the buggy address:
[   15.250638]  ffff888103151d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.250943]  ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.251185] >ffff888103151e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.251517]                                                                 ^
[   15.252596]  ffff888103151e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.252972]  ffff888103151f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253354] ==================================================================
[   15.255570] ==================================================================
[   15.255864] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   15.256109] Read of size 121 at addr ffff888103151e00 by task kunit_try_catch/305
[   15.256735] 
[   15.256947] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   15.256999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.257013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.257038] Call Trace:
[   15.257058]  <TASK>
[   15.257080]  dump_stack_lvl+0x73/0xb0
[   15.257110]  print_report+0xd1/0x650
[   15.257136]  ? __virt_addr_valid+0x1db/0x2d0
[   15.257161]  ? copy_user_test_oob+0x604/0x10f0
[   15.257182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.257207]  ? copy_user_test_oob+0x604/0x10f0
[   15.257241]  kasan_report+0x141/0x180
[   15.257265]  ? copy_user_test_oob+0x604/0x10f0
[   15.257291]  kasan_check_range+0x10c/0x1c0
[   15.257313]  __kasan_check_read+0x15/0x20
[   15.257334]  copy_user_test_oob+0x604/0x10f0
[   15.257358]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.257379]  ? finish_task_switch.isra.0+0x153/0x700
[   15.257405]  ? __switch_to+0x5d9/0xf60
[   15.257428]  ? dequeue_task_fair+0x166/0x4e0
[   15.257454]  ? __schedule+0x10cc/0x2b60
[   15.257480]  ? __pfx_read_tsc+0x10/0x10
[   15.257501]  ? ktime_get_ts64+0x86/0x230
[   15.257528]  kunit_try_run_case+0x1a5/0x480
[   15.257560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.257609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.257634]  ? __kthread_parkme+0x82/0x180
[   15.257658]  ? preempt_count_sub+0x50/0x80
[   15.257684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.257759]  kthread+0x337/0x6f0
[   15.257776]  ? trace_preempt_on+0x20/0xc0
[   15.257802]  ? __pfx_kthread+0x10/0x10
[   15.257820]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.257843]  ? calculate_sigpending+0x7b/0xa0
[   15.257866]  ? __pfx_kthread+0x10/0x10
[   15.257886]  ret_from_fork+0x41/0x80
[   15.257907]  ? __pfx_kthread+0x10/0x10
[   15.257926]  ret_from_fork_asm+0x1a/0x30
[   15.257959]  </TASK>
[   15.257971] 
[   15.267312] Allocated by task 305:
[   15.267599]  kasan_save_stack+0x45/0x70
[   15.268035]  kasan_save_track+0x18/0x40
[   15.268741]  kasan_save_alloc_info+0x3b/0x50
[   15.269420]  __kasan_kmalloc+0xb7/0xc0
[   15.269586]  __kmalloc_noprof+0x1c9/0x500
[   15.269838]  kunit_kmalloc_array+0x25/0x60
[   15.270235]  copy_user_test_oob+0xab/0x10f0
[   15.270536]  kunit_try_run_case+0x1a5/0x480
[   15.270888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.271216]  kthread+0x337/0x6f0
[   15.271406]  ret_from_fork+0x41/0x80
[   15.271786]  ret_from_fork_asm+0x1a/0x30
[   15.272090] 
[   15.272320] The buggy address belongs to the object at ffff888103151e00
[   15.272320]  which belongs to the cache kmalloc-128 of size 128
[   15.273023] The buggy address is located 0 bytes inside of
[   15.273023]  allocated 120-byte region [ffff888103151e00, ffff888103151e78)
[   15.273603] 
[   15.273856] The buggy address belongs to the physical page:
[   15.274238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   15.274584] flags: 0x200000000000000(node=0|zone=2)
[   15.274986] page_type: f5(slab)
[   15.275276] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.275675] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.276066] page dumped because: kasan: bad access detected
[   15.276424] 
[   15.276510] Memory state around the buggy address:
[   15.276879]  ffff888103151d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.277306]  ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.277677] >ffff888103151e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.277983]                                                                 ^
[   15.278236]  ffff888103151e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.278565]  ffff888103151f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.279098] ==================================================================
[   15.190206] ==================================================================
[   15.190568] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   15.190935] Write of size 121 at addr ffff888103151e00 by task kunit_try_catch/305
[   15.191275] 
[   15.191399] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   15.191450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.191462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.191487] Call Trace:
[   15.191501]  <TASK>
[   15.191523]  dump_stack_lvl+0x73/0xb0
[   15.191573]  print_report+0xd1/0x650
[   15.191598]  ? __virt_addr_valid+0x1db/0x2d0
[   15.191621]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.191643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.191668]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.191703]  kasan_report+0x141/0x180
[   15.191727]  ? copy_user_test_oob+0x3fd/0x10f0
[   15.191754]  kasan_check_range+0x10c/0x1c0
[   15.191775]  __kasan_check_write+0x18/0x20
[   15.191796]  copy_user_test_oob+0x3fd/0x10f0
[   15.191819]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.191840]  ? finish_task_switch.isra.0+0x153/0x700
[   15.191865]  ? __switch_to+0x5d9/0xf60
[   15.191907]  ? dequeue_task_fair+0x166/0x4e0
[   15.191933]  ? __schedule+0x10cc/0x2b60
[   15.191958]  ? __pfx_read_tsc+0x10/0x10
[   15.191979]  ? ktime_get_ts64+0x86/0x230
[   15.192005]  kunit_try_run_case+0x1a5/0x480
[   15.192031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192055]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.192082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.192106]  ? __kthread_parkme+0x82/0x180
[   15.192130]  ? preempt_count_sub+0x50/0x80
[   15.192156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.192205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.192241]  kthread+0x337/0x6f0
[   15.192258]  ? trace_preempt_on+0x20/0xc0
[   15.192283]  ? __pfx_kthread+0x10/0x10
[   15.192303]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.192326]  ? calculate_sigpending+0x7b/0xa0
[   15.192349]  ? __pfx_kthread+0x10/0x10
[   15.192368]  ret_from_fork+0x41/0x80
[   15.192389]  ? __pfx_kthread+0x10/0x10
[   15.192408]  ret_from_fork_asm+0x1a/0x30
[   15.192439]  </TASK>
[   15.192451] 
[   15.200062] Allocated by task 305:
[   15.200257]  kasan_save_stack+0x45/0x70
[   15.200457]  kasan_save_track+0x18/0x40
[   15.200597]  kasan_save_alloc_info+0x3b/0x50
[   15.200905]  __kasan_kmalloc+0xb7/0xc0
[   15.201127]  __kmalloc_noprof+0x1c9/0x500
[   15.201324]  kunit_kmalloc_array+0x25/0x60
[   15.201472]  copy_user_test_oob+0xab/0x10f0
[   15.201622]  kunit_try_run_case+0x1a5/0x480
[   15.201955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.202394]  kthread+0x337/0x6f0
[   15.202555]  ret_from_fork+0x41/0x80
[   15.202682]  ret_from_fork_asm+0x1a/0x30
[   15.202816] 
[   15.202910] The buggy address belongs to the object at ffff888103151e00
[   15.202910]  which belongs to the cache kmalloc-128 of size 128
[   15.203582] The buggy address is located 0 bytes inside of
[   15.203582]  allocated 120-byte region [ffff888103151e00, ffff888103151e78)
[   15.203950] 
[   15.204023] The buggy address belongs to the physical page:
[   15.204192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   15.204559] flags: 0x200000000000000(node=0|zone=2)
[   15.204839] page_type: f5(slab)
[   15.205029] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.205405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.205699] page dumped because: kasan: bad access detected
[   15.205929] 
[   15.206022] Memory state around the buggy address:
[   15.206242]  ffff888103151d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.206486]  ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206695] >ffff888103151e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.206977]                                                                 ^
[   15.207324]  ffff888103151e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207648]  ffff888103151f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207886] ==================================================================
[   15.208534] ==================================================================
[   15.209242] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   15.209506] Read of size 121 at addr ffff888103151e00 by task kunit_try_catch/305
[   15.210323] 
[   15.210444] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   15.210491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.210526] Call Trace:
[   15.210544]  <TASK>
[   15.210563]  dump_stack_lvl+0x73/0xb0
[   15.210590]  print_report+0xd1/0x650
[   15.210614]  ? __virt_addr_valid+0x1db/0x2d0
[   15.210637]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.210659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.210683]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.210704]  kasan_report+0x141/0x180
[   15.210728]  ? copy_user_test_oob+0x4aa/0x10f0
[   15.210755]  kasan_check_range+0x10c/0x1c0
[   15.210776]  __kasan_check_read+0x15/0x20
[   15.210797]  copy_user_test_oob+0x4aa/0x10f0
[   15.210821]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.210842]  ? finish_task_switch.isra.0+0x153/0x700
[   15.210867]  ? __switch_to+0x5d9/0xf60
[   15.210889]  ? dequeue_task_fair+0x166/0x4e0
[   15.210915]  ? __schedule+0x10cc/0x2b60
[   15.210939]  ? __pfx_read_tsc+0x10/0x10
[   15.210960]  ? ktime_get_ts64+0x86/0x230
[   15.210987]  kunit_try_run_case+0x1a5/0x480
[   15.211012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.211061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.211086]  ? __kthread_parkme+0x82/0x180
[   15.211109]  ? preempt_count_sub+0x50/0x80
[   15.211135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.211183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.211208]  kthread+0x337/0x6f0
[   15.211236]  ? trace_preempt_on+0x20/0xc0
[   15.211261]  ? __pfx_kthread+0x10/0x10
[   15.211280]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.211303]  ? calculate_sigpending+0x7b/0xa0
[   15.211325]  ? __pfx_kthread+0x10/0x10
[   15.211345]  ret_from_fork+0x41/0x80
[   15.211366]  ? __pfx_kthread+0x10/0x10
[   15.211384]  ret_from_fork_asm+0x1a/0x30
[   15.211417]  </TASK>
[   15.211428] 
[   15.221633] Allocated by task 305:
[   15.221951]  kasan_save_stack+0x45/0x70
[   15.222144]  kasan_save_track+0x18/0x40
[   15.222333]  kasan_save_alloc_info+0x3b/0x50
[   15.222527]  __kasan_kmalloc+0xb7/0xc0
[   15.223006]  __kmalloc_noprof+0x1c9/0x500
[   15.223264]  kunit_kmalloc_array+0x25/0x60
[   15.223572]  copy_user_test_oob+0xab/0x10f0
[   15.223961]  kunit_try_run_case+0x1a5/0x480
[   15.224292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224877]  kthread+0x337/0x6f0
[   15.225052]  ret_from_fork+0x41/0x80
[   15.225240]  ret_from_fork_asm+0x1a/0x30
[   15.225427] 
[   15.225518] The buggy address belongs to the object at ffff888103151e00
[   15.225518]  which belongs to the cache kmalloc-128 of size 128
[   15.226433] The buggy address is located 0 bytes inside of
[   15.226433]  allocated 120-byte region [ffff888103151e00, ffff888103151e78)
[   15.227254] 
[   15.227359] The buggy address belongs to the physical page:
[   15.227599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   15.228184] flags: 0x200000000000000(node=0|zone=2)
[   15.228597] page_type: f5(slab)
[   15.228928] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.229269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.229599] page dumped because: kasan: bad access detected
[   15.230088] 
[   15.230187] Memory state around the buggy address:
[   15.230636]  ffff888103151d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.231121]  ffff888103151d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231554] >ffff888103151e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.232332]                                                                 ^
[   15.232845]  ffff888103151e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233344]  ffff888103151f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233958] ==================================================================