Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   62.852955] ==================================================================
[   62.859959] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   62.866986] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   62.874448] 
[   62.875935] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.875989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.876007] Hardware name: WinLink E850-96 board (DT)
[   62.876030] Call trace:
[   62.876043]  show_stack+0x20/0x38 (C)
[   62.876076]  dump_stack_lvl+0x8c/0xd0
[   62.876114]  print_report+0x118/0x608
[   62.876146]  kasan_report+0xdc/0x128
[   62.876178]  kasan_check_range+0x100/0x1a8
[   62.876213]  __kasan_check_read+0x20/0x30
[   62.876248]  copy_user_test_oob+0x728/0xec8
[   62.876277]  kunit_try_run_case+0x170/0x3f0
[   62.876312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.876350]  kthread+0x328/0x630
[   62.876384]  ret_from_fork+0x10/0x20
[   62.876421] 
[   62.942069] Allocated by task 334:
[   62.945458]  kasan_save_stack+0x3c/0x68
[   62.949273]  kasan_save_track+0x20/0x40
[   62.953093]  kasan_save_alloc_info+0x40/0x58
[   62.957346]  __kasan_kmalloc+0xd4/0xd8
[   62.961079]  __kmalloc_noprof+0x198/0x4c8
[   62.965072]  kunit_kmalloc_array+0x34/0x88
[   62.969151]  copy_user_test_oob+0xac/0xec8
[   62.973231]  kunit_try_run_case+0x170/0x3f0
[   62.977398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.982867]  kthread+0x328/0x630
[   62.986080]  ret_from_fork+0x10/0x20
[   62.989637] 
[   62.991115] The buggy address belongs to the object at ffff0008018e7500
[   62.991115]  which belongs to the cache kmalloc-128 of size 128
[   63.003614] The buggy address is located 0 bytes inside of
[   63.003614]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.016026] 
[   63.017505] The buggy address belongs to the physical page:
[   63.023060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.031045] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.038684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.045626] page_type: f5(slab)
[   63.048762] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.056485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.064210] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.072021] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.079834] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.087646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.095453] page dumped because: kasan: bad access detected
[   63.101007] 
[   63.102482] Memory state around the buggy address:
[   63.107263]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.114466]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.121674] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.128871]                                                                 ^
[   63.135993]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.143198]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.150400] ==================================================================
[   62.542566] ==================================================================
[   62.554927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   62.561955] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   62.569505] 
[   62.570992] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.571046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.571063] Hardware name: WinLink E850-96 board (DT)
[   62.571087] Call trace:
[   62.571102]  show_stack+0x20/0x38 (C)
[   62.571138]  dump_stack_lvl+0x8c/0xd0
[   62.571176]  print_report+0x118/0x608
[   62.571207]  kasan_report+0xdc/0x128
[   62.571237]  kasan_check_range+0x100/0x1a8
[   62.571273]  __kasan_check_write+0x20/0x30
[   62.571307]  copy_user_test_oob+0x234/0xec8
[   62.571341]  kunit_try_run_case+0x170/0x3f0
[   62.571378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.571417]  kthread+0x328/0x630
[   62.571453]  ret_from_fork+0x10/0x20
[   62.571491] 
[   62.637212] Allocated by task 334:
[   62.640601]  kasan_save_stack+0x3c/0x68
[   62.644417]  kasan_save_track+0x20/0x40
[   62.648238]  kasan_save_alloc_info+0x40/0x58
[   62.652490]  __kasan_kmalloc+0xd4/0xd8
[   62.656222]  __kmalloc_noprof+0x198/0x4c8
[   62.660215]  kunit_kmalloc_array+0x34/0x88
[   62.664295]  copy_user_test_oob+0xac/0xec8
[   62.668375]  kunit_try_run_case+0x170/0x3f0
[   62.672541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.678010]  kthread+0x328/0x630
[   62.681223]  ret_from_fork+0x10/0x20
[   62.684781] 
[   62.686258] The buggy address belongs to the object at ffff0008018e7500
[   62.686258]  which belongs to the cache kmalloc-128 of size 128
[   62.698760] The buggy address is located 0 bytes inside of
[   62.698760]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   62.711169] 
[   62.712649] The buggy address belongs to the physical page:
[   62.718206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   62.726188] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.733828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.740770] page_type: f5(slab)
[   62.743910] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.751627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.759354] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.767166] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.774978] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   62.782789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.790595] page dumped because: kasan: bad access detected
[   62.796151] 
[   62.797626] Memory state around the buggy address:
[   62.802407]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.809609]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.816817] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.824015]                                                                 ^
[   62.831138]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.838343]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.845543] ==================================================================
[   64.072900] ==================================================================
[   64.079732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   64.086757] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   64.094222] 
[   64.095706] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   64.095759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.095778] Hardware name: WinLink E850-96 board (DT)
[   64.095798] Call trace:
[   64.095812]  show_stack+0x20/0x38 (C)
[   64.095845]  dump_stack_lvl+0x8c/0xd0
[   64.095882]  print_report+0x118/0x608
[   64.095912]  kasan_report+0xdc/0x128
[   64.095943]  kasan_check_range+0x100/0x1a8
[   64.095974]  __kasan_check_read+0x20/0x30
[   64.096008]  copy_user_test_oob+0x4a0/0xec8
[   64.096037]  kunit_try_run_case+0x170/0x3f0
[   64.096071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.096109]  kthread+0x328/0x630
[   64.096142]  ret_from_fork+0x10/0x20
[   64.096176] 
[   64.161842] Allocated by task 334:
[   64.165231]  kasan_save_stack+0x3c/0x68
[   64.169046]  kasan_save_track+0x20/0x40
[   64.172866]  kasan_save_alloc_info+0x40/0x58
[   64.177120]  __kasan_kmalloc+0xd4/0xd8
[   64.180852]  __kmalloc_noprof+0x198/0x4c8
[   64.184845]  kunit_kmalloc_array+0x34/0x88
[   64.188925]  copy_user_test_oob+0xac/0xec8
[   64.193005]  kunit_try_run_case+0x170/0x3f0
[   64.197171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.202640]  kthread+0x328/0x630
[   64.205851]  ret_from_fork+0x10/0x20
[   64.209411] 
[   64.210886] The buggy address belongs to the object at ffff0008018e7500
[   64.210886]  which belongs to the cache kmalloc-128 of size 128
[   64.223387] The buggy address is located 0 bytes inside of
[   64.223387]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   64.235799] 
[   64.237277] The buggy address belongs to the physical page:
[   64.242835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   64.250818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.258457] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.265400] page_type: f5(slab)
[   64.268536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.276257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.283983] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.291795] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.299608] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.307420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.315225] page dumped because: kasan: bad access detected
[   64.320781] 
[   64.322256] Memory state around the buggy address:
[   64.327036]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.334239]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.341444] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.348645]                                                                 ^
[   64.355767]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.362972]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.370174] ==================================================================
[   63.158048] ==================================================================
[   63.164816] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   63.171841] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.179391] 
[   63.180878] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.180931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.180948] Hardware name: WinLink E850-96 board (DT)
[   63.180970] Call trace:
[   63.180985]  show_stack+0x20/0x38 (C)
[   63.181019]  dump_stack_lvl+0x8c/0xd0
[   63.181056]  print_report+0x118/0x608
[   63.181088]  kasan_report+0xdc/0x128
[   63.181121]  kasan_check_range+0x100/0x1a8
[   63.181155]  __kasan_check_write+0x20/0x30
[   63.181187]  copy_user_test_oob+0x35c/0xec8
[   63.181215]  kunit_try_run_case+0x170/0x3f0
[   63.181252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.181292]  kthread+0x328/0x630
[   63.181325]  ret_from_fork+0x10/0x20
[   63.181360] 
[   63.247099] Allocated by task 334:
[   63.250486]  kasan_save_stack+0x3c/0x68
[   63.254304]  kasan_save_track+0x20/0x40
[   63.258123]  kasan_save_alloc_info+0x40/0x58
[   63.262377]  __kasan_kmalloc+0xd4/0xd8
[   63.266109]  __kmalloc_noprof+0x198/0x4c8
[   63.270102]  kunit_kmalloc_array+0x34/0x88
[   63.274182]  copy_user_test_oob+0xac/0xec8
[   63.278263]  kunit_try_run_case+0x170/0x3f0
[   63.282428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.287897]  kthread+0x328/0x630
[   63.291109]  ret_from_fork+0x10/0x20
[   63.294668] 
[   63.296143] The buggy address belongs to the object at ffff0008018e7500
[   63.296143]  which belongs to the cache kmalloc-128 of size 128
[   63.308644] The buggy address is located 0 bytes inside of
[   63.308644]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.321056] 
[   63.322535] The buggy address belongs to the physical page:
[   63.328092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.336075] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.343716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.350658] page_type: f5(slab)
[   63.353792] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.361513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369240] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.377051] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.384864] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.392676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.400482] page dumped because: kasan: bad access detected
[   63.406037] 
[   63.407513] Memory state around the buggy address:
[   63.412295]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.419496]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.426702] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.433902]                                                                 ^
[   63.441023]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.448228]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.455431] ==================================================================
[   63.462784] ==================================================================
[   63.469841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   63.476870] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.484335] 
[   63.485820] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.485870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.485887] Hardware name: WinLink E850-96 board (DT)
[   63.485907] Call trace:
[   63.485921]  show_stack+0x20/0x38 (C)
[   63.485954]  dump_stack_lvl+0x8c/0xd0
[   63.485991]  print_report+0x118/0x608
[   63.486021]  kasan_report+0xdc/0x128
[   63.486049]  kasan_check_range+0x100/0x1a8
[   63.486079]  __kasan_check_read+0x20/0x30
[   63.486111]  copy_user_test_oob+0x3c8/0xec8
[   63.486140]  kunit_try_run_case+0x170/0x3f0
[   63.486174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.486213]  kthread+0x328/0x630
[   63.486245]  ret_from_fork+0x10/0x20
[   63.486276] 
[   63.551955] Allocated by task 334:
[   63.555343]  kasan_save_stack+0x3c/0x68
[   63.559160]  kasan_save_track+0x20/0x40
[   63.562979]  kasan_save_alloc_info+0x40/0x58
[   63.567233]  __kasan_kmalloc+0xd4/0xd8
[   63.570966]  __kmalloc_noprof+0x198/0x4c8
[   63.574958]  kunit_kmalloc_array+0x34/0x88
[   63.579038]  copy_user_test_oob+0xac/0xec8
[   63.583118]  kunit_try_run_case+0x170/0x3f0
[   63.587285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.592753]  kthread+0x328/0x630
[   63.595965]  ret_from_fork+0x10/0x20
[   63.599524] 
[   63.601000] The buggy address belongs to the object at ffff0008018e7500
[   63.601000]  which belongs to the cache kmalloc-128 of size 128
[   63.613500] The buggy address is located 0 bytes inside of
[   63.613500]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.625913] 
[   63.627388] The buggy address belongs to the physical page:
[   63.632947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.640932] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.648570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.655514] page_type: f5(slab)
[   63.658647] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.666370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.674096] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.681908] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.689723] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.697533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.705338] page dumped because: kasan: bad access detected
[   63.710894] 
[   63.712369] Memory state around the buggy address:
[   63.717149]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.724353]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.731557] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.738758]                                                                 ^
[   63.745880]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.753085]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.760286] ==================================================================
[   63.767599] ==================================================================
[   63.774700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   63.781728] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.789278] 
[   63.790762] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.790816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.790833] Hardware name: WinLink E850-96 board (DT)
[   63.790854] Call trace:
[   63.790868]  show_stack+0x20/0x38 (C)
[   63.790903]  dump_stack_lvl+0x8c/0xd0
[   63.790939]  print_report+0x118/0x608
[   63.790970]  kasan_report+0xdc/0x128
[   63.791000]  kasan_check_range+0x100/0x1a8
[   63.791032]  __kasan_check_write+0x20/0x30
[   63.791065]  copy_user_test_oob+0x434/0xec8
[   63.791094]  kunit_try_run_case+0x170/0x3f0
[   63.791129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.791167]  kthread+0x328/0x630
[   63.791199]  ret_from_fork+0x10/0x20
[   63.791233] 
[   63.856985] Allocated by task 334:
[   63.860373]  kasan_save_stack+0x3c/0x68
[   63.864190]  kasan_save_track+0x20/0x40
[   63.868010]  kasan_save_alloc_info+0x40/0x58
[   63.872263]  __kasan_kmalloc+0xd4/0xd8
[   63.875996]  __kmalloc_noprof+0x198/0x4c8
[   63.879988]  kunit_kmalloc_array+0x34/0x88
[   63.884068]  copy_user_test_oob+0xac/0xec8
[   63.888148]  kunit_try_run_case+0x170/0x3f0
[   63.892315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.897783]  kthread+0x328/0x630
[   63.900995]  ret_from_fork+0x10/0x20
[   63.904555] 
[   63.906030] The buggy address belongs to the object at ffff0008018e7500
[   63.906030]  which belongs to the cache kmalloc-128 of size 128
[   63.918530] The buggy address is located 0 bytes inside of
[   63.918530]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.930943] 
[   63.932420] The buggy address belongs to the physical page:
[   63.937979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.945962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.953600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.960544] page_type: f5(slab)
[   63.963679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.971400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.979126] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.986938] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.994752] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.002565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.010370] page dumped because: kasan: bad access detected
[   64.015924] 
[   64.017399] Memory state around the buggy address:
[   64.022179]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.029383]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.036587] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.043788]                                                                 ^
[   64.050910]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.058116]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.065317] ==================================================================

[   18.690706] ==================================================================
[   18.690812] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.691752] Write of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.692008] 
[   18.692366] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.692548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.692692] Hardware name: linux,dummy-virt (DT)
[   18.692790] Call trace:
[   18.692932]  show_stack+0x20/0x38 (C)
[   18.693437]  dump_stack_lvl+0x8c/0xd0
[   18.693539]  print_report+0x118/0x608
[   18.693693]  kasan_report+0xdc/0x128
[   18.693823]  kasan_check_range+0x100/0x1a8
[   18.693937]  __kasan_check_write+0x20/0x30
[   18.694251]  copy_user_test_oob+0x234/0xec8
[   18.694363]  kunit_try_run_case+0x170/0x3f0
[   18.694432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.694516]  kthread+0x328/0x630
[   18.694584]  ret_from_fork+0x10/0x20
[   18.694670] 
[   18.694694] Allocated by task 290:
[   18.694749]  kasan_save_stack+0x3c/0x68
[   18.694803]  kasan_save_track+0x20/0x40
[   18.694840]  kasan_save_alloc_info+0x40/0x58
[   18.694881]  __kasan_kmalloc+0xd4/0xd8
[   18.694926]  __kmalloc_noprof+0x198/0x4c8
[   18.694974]  kunit_kmalloc_array+0x34/0x88
[   18.695030]  copy_user_test_oob+0xac/0xec8
[   18.695080]  kunit_try_run_case+0x170/0x3f0
[   18.695128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.695185]  kthread+0x328/0x630
[   18.695235]  ret_from_fork+0x10/0x20
[   18.695271] 
[   18.695293] The buggy address belongs to the object at fff00000c793a500
[   18.695293]  which belongs to the cache kmalloc-128 of size 128
[   18.695359] The buggy address is located 0 bytes inside of
[   18.695359]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.695429] 
[   18.695455] The buggy address belongs to the physical page:
[   18.695500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.695569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.695888] page_type: f5(slab)
[   18.696255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.696345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.696587] page dumped because: kasan: bad access detected
[   18.697063] 
[   18.697106] Memory state around the buggy address:
[   18.697163]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.698028]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.698278] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.698663]                                                                 ^
[   18.698719]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.699054]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.699489] ==================================================================
[   18.725038] ==================================================================
[   18.725206] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.725307] Write of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.725363] 
[   18.725399] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.725765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.725815] Hardware name: linux,dummy-virt (DT)
[   18.725848] Call trace:
[   18.725901]  show_stack+0x20/0x38 (C)
[   18.725956]  dump_stack_lvl+0x8c/0xd0
[   18.726015]  print_report+0x118/0x608
[   18.726086]  kasan_report+0xdc/0x128
[   18.726135]  kasan_check_range+0x100/0x1a8
[   18.726186]  __kasan_check_write+0x20/0x30
[   18.726235]  copy_user_test_oob+0x35c/0xec8
[   18.726295]  kunit_try_run_case+0x170/0x3f0
[   18.726347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.726402]  kthread+0x328/0x630
[   18.726461]  ret_from_fork+0x10/0x20
[   18.726510] 
[   18.726539] Allocated by task 290:
[   18.726571]  kasan_save_stack+0x3c/0x68
[   18.726620]  kasan_save_track+0x20/0x40
[   18.726671]  kasan_save_alloc_info+0x40/0x58
[   18.726710]  __kasan_kmalloc+0xd4/0xd8
[   18.726748]  __kmalloc_noprof+0x198/0x4c8
[   18.726784]  kunit_kmalloc_array+0x34/0x88
[   18.726825]  copy_user_test_oob+0xac/0xec8
[   18.726869]  kunit_try_run_case+0x170/0x3f0
[   18.726910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.726956]  kthread+0x328/0x630
[   18.726992]  ret_from_fork+0x10/0x20
[   18.727030] 
[   18.727059] The buggy address belongs to the object at fff00000c793a500
[   18.727059]  which belongs to the cache kmalloc-128 of size 128
[   18.727119] The buggy address is located 0 bytes inside of
[   18.727119]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.727188] 
[   18.727212] The buggy address belongs to the physical page:
[   18.727250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.727303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.727350] page_type: f5(slab)
[   18.727400] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.727450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.727501] page dumped because: kasan: bad access detected
[   18.727544] 
[   18.727565] Memory state around the buggy address:
[   18.727599]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.727924]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.728385] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.729085]                                                                 ^
[   18.729528]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.729722]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.730047] ==================================================================
[   18.744950] ==================================================================
[   18.745013] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.745218] Write of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.745288] 
[   18.745492] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.745588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.745772] Hardware name: linux,dummy-virt (DT)
[   18.746040] Call trace:
[   18.746084]  show_stack+0x20/0x38 (C)
[   18.746137]  dump_stack_lvl+0x8c/0xd0
[   18.746524]  print_report+0x118/0x608
[   18.746599]  kasan_report+0xdc/0x128
[   18.746655]  kasan_check_range+0x100/0x1a8
[   18.746791]  __kasan_check_write+0x20/0x30
[   18.747090]  copy_user_test_oob+0x434/0xec8
[   18.747158]  kunit_try_run_case+0x170/0x3f0
[   18.747209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.747489]  kthread+0x328/0x630
[   18.747559]  ret_from_fork+0x10/0x20
[   18.747752] 
[   18.747981] Allocated by task 290:
[   18.748053]  kasan_save_stack+0x3c/0x68
[   18.748245]  kasan_save_track+0x20/0x40
[   18.748556]  kasan_save_alloc_info+0x40/0x58
[   18.748684]  __kasan_kmalloc+0xd4/0xd8
[   18.748848]  __kmalloc_noprof+0x198/0x4c8
[   18.748895]  kunit_kmalloc_array+0x34/0x88
[   18.748935]  copy_user_test_oob+0xac/0xec8
[   18.749132]  kunit_try_run_case+0x170/0x3f0
[   18.749358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.749543]  kthread+0x328/0x630
[   18.749828]  ret_from_fork+0x10/0x20
[   18.749988] 
[   18.750068] The buggy address belongs to the object at fff00000c793a500
[   18.750068]  which belongs to the cache kmalloc-128 of size 128
[   18.750147] The buggy address is located 0 bytes inside of
[   18.750147]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.750395] 
[   18.750651] The buggy address belongs to the physical page:
[   18.750701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.750758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.750807] page_type: f5(slab)
[   18.750962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.751050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.751095] page dumped because: kasan: bad access detected
[   18.751140] 
[   18.751179] Memory state around the buggy address:
[   18.751229]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.751291]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751336] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.751391]                                                                 ^
[   18.751436]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751501]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751547] ==================================================================
[   18.753528] ==================================================================
[   18.753592] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.753891] Read of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.754204] 
[   18.754251] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.754583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.754746] Hardware name: linux,dummy-virt (DT)
[   18.754943] Call trace:
[   18.755078]  show_stack+0x20/0x38 (C)
[   18.755303]  dump_stack_lvl+0x8c/0xd0
[   18.755514]  print_report+0x118/0x608
[   18.755621]  kasan_report+0xdc/0x128
[   18.755917]  kasan_check_range+0x100/0x1a8
[   18.756054]  __kasan_check_read+0x20/0x30
[   18.756160]  copy_user_test_oob+0x4a0/0xec8
[   18.756333]  kunit_try_run_case+0x170/0x3f0
[   18.756450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.756655]  kthread+0x328/0x630
[   18.756968]  ret_from_fork+0x10/0x20
[   18.757236] 
[   18.757311] Allocated by task 290:
[   18.757487]  kasan_save_stack+0x3c/0x68
[   18.757603]  kasan_save_track+0x20/0x40
[   18.757655]  kasan_save_alloc_info+0x40/0x58
[   18.757885]  __kasan_kmalloc+0xd4/0xd8
[   18.758242]  __kmalloc_noprof+0x198/0x4c8
[   18.758425]  kunit_kmalloc_array+0x34/0x88
[   18.758555]  copy_user_test_oob+0xac/0xec8
[   18.758782]  kunit_try_run_case+0x170/0x3f0
[   18.758830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.759096]  kthread+0x328/0x630
[   18.759450]  ret_from_fork+0x10/0x20
[   18.759948] 
[   18.759986] The buggy address belongs to the object at fff00000c793a500
[   18.759986]  which belongs to the cache kmalloc-128 of size 128
[   18.760055] The buggy address is located 0 bytes inside of
[   18.760055]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.760378] 
[   18.760512] The buggy address belongs to the physical page:
[   18.760793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.760949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.761185] page_type: f5(slab)
[   18.761296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.761398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.761444] page dumped because: kasan: bad access detected
[   18.761511] 
[   18.761680] Memory state around the buggy address:
[   18.761912]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.761986]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762032] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.762092]                                                                 ^
[   18.762140]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762186]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762227] ==================================================================
[   18.706712] ==================================================================
[   18.706802] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.707102] Read of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.707207] 
[   18.707244] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.707328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.707702] Hardware name: linux,dummy-virt (DT)
[   18.708013] Call trace:
[   18.708070]  show_stack+0x20/0x38 (C)
[   18.708183]  dump_stack_lvl+0x8c/0xd0
[   18.708276]  print_report+0x118/0x608
[   18.708462]  kasan_report+0xdc/0x128
[   18.708724]  kasan_check_range+0x100/0x1a8
[   18.708986]  __kasan_check_read+0x20/0x30
[   18.709141]  copy_user_test_oob+0x728/0xec8
[   18.709331]  kunit_try_run_case+0x170/0x3f0
[   18.709480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.709565]  kthread+0x328/0x630
[   18.710113]  ret_from_fork+0x10/0x20
[   18.710488] 
[   18.710559] Allocated by task 290:
[   18.710812]  kasan_save_stack+0x3c/0x68
[   18.711007]  kasan_save_track+0x20/0x40
[   18.711198]  kasan_save_alloc_info+0x40/0x58
[   18.711447]  __kasan_kmalloc+0xd4/0xd8
[   18.711659]  __kmalloc_noprof+0x198/0x4c8
[   18.711862]  kunit_kmalloc_array+0x34/0x88
[   18.712089]  copy_user_test_oob+0xac/0xec8
[   18.712232]  kunit_try_run_case+0x170/0x3f0
[   18.712445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.712616]  kthread+0x328/0x630
[   18.712687]  ret_from_fork+0x10/0x20
[   18.712737] 
[   18.712761] The buggy address belongs to the object at fff00000c793a500
[   18.712761]  which belongs to the cache kmalloc-128 of size 128
[   18.712831] The buggy address is located 0 bytes inside of
[   18.712831]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.712894] 
[   18.712933] The buggy address belongs to the physical page:
[   18.712979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.713037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.713093] page_type: f5(slab)
[   18.713141] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.713203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.713244] page dumped because: kasan: bad access detected
[   18.713279] 
[   18.713318] Memory state around the buggy address:
[   18.713371]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.713418]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713482] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.713523]                                                                 ^
[   18.713575]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713619]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713819] ==================================================================
[   18.731539] ==================================================================
[   18.731948] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.732177] Read of size 121 at addr fff00000c793a500 by task kunit_try_catch/290
[   18.732408] 
[   18.732596] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.732736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.732977] Hardware name: linux,dummy-virt (DT)
[   18.733383] Call trace:
[   18.733570]  show_stack+0x20/0x38 (C)
[   18.733835]  dump_stack_lvl+0x8c/0xd0
[   18.734007]  print_report+0x118/0x608
[   18.734248]  kasan_report+0xdc/0x128
[   18.734435]  kasan_check_range+0x100/0x1a8
[   18.734782]  __kasan_check_read+0x20/0x30
[   18.734846]  copy_user_test_oob+0x3c8/0xec8
[   18.734895]  kunit_try_run_case+0x170/0x3f0
[   18.735222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.735609]  kthread+0x328/0x630
[   18.736166]  ret_from_fork+0x10/0x20
[   18.736480] 
[   18.736586] Allocated by task 290:
[   18.736812]  kasan_save_stack+0x3c/0x68
[   18.736877]  kasan_save_track+0x20/0x40
[   18.736918]  kasan_save_alloc_info+0x40/0x58
[   18.736965]  __kasan_kmalloc+0xd4/0xd8
[   18.737003]  __kmalloc_noprof+0x198/0x4c8
[   18.737447]  kunit_kmalloc_array+0x34/0x88
[   18.737824]  copy_user_test_oob+0xac/0xec8
[   18.737930]  kunit_try_run_case+0x170/0x3f0
[   18.738143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.738195]  kthread+0x328/0x630
[   18.738711]  ret_from_fork+0x10/0x20
[   18.738804] 
[   18.738969] The buggy address belongs to the object at fff00000c793a500
[   18.738969]  which belongs to the cache kmalloc-128 of size 128
[   18.739131] The buggy address is located 0 bytes inside of
[   18.739131]  allocated 120-byte region [fff00000c793a500, fff00000c793a578)
[   18.739297] 
[   18.739535] The buggy address belongs to the physical page:
[   18.739983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   18.740217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.740588] page_type: f5(slab)
[   18.740659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.740712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.741518] page dumped because: kasan: bad access detected
[   18.741656] 
[   18.741904] Memory state around the buggy address:
[   18.741986]  fff00000c793a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.742387]  fff00000c793a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.742446] >fff00000c793a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.742782]                                                                 ^
[   18.743260]  fff00000c793a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743351]  fff00000c793a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743503] ==================================================================

[   19.764604] ==================================================================
[   19.765021] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   19.765597] Write of size 121 at addr ffff888102b20500 by task kunit_try_catch/306
[   19.766202] 
[   19.766457] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.766573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.766603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.766649] Call Trace:
[   19.766684]  <TASK>
[   19.766729]  dump_stack_lvl+0x73/0xb0
[   19.766798]  print_report+0xd1/0x650
[   19.766853]  ? __virt_addr_valid+0x1db/0x2d0
[   19.766903]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.766936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.766971]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.767002]  kasan_report+0x141/0x180
[   19.767035]  ? copy_user_test_oob+0x3fd/0x10f0
[   19.767082]  kasan_check_range+0x10c/0x1c0
[   19.767123]  __kasan_check_write+0x18/0x20
[   19.767147]  copy_user_test_oob+0x3fd/0x10f0
[   19.767172]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.767194]  ? finish_task_switch.isra.0+0x153/0x700
[   19.767222]  ? __switch_to+0x5d9/0xf60
[   19.767245]  ? dequeue_task_fair+0x166/0x4e0
[   19.767273]  ? __schedule+0x10cc/0x2b60
[   19.767299]  ? __pfx_read_tsc+0x10/0x10
[   19.767321]  ? ktime_get_ts64+0x86/0x230
[   19.767403]  kunit_try_run_case+0x1a5/0x480
[   19.767443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.767483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.767533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.767585]  ? __kthread_parkme+0x82/0x180
[   19.767639]  ? preempt_count_sub+0x50/0x80
[   19.767699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.767757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.767809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.767838]  kthread+0x337/0x6f0
[   19.767858]  ? trace_preempt_on+0x20/0xc0
[   19.767886]  ? __pfx_kthread+0x10/0x10
[   19.767907]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.767932]  ? calculate_sigpending+0x7b/0xa0
[   19.767958]  ? __pfx_kthread+0x10/0x10
[   19.767980]  ret_from_fork+0x41/0x80
[   19.768003]  ? __pfx_kthread+0x10/0x10
[   19.768023]  ret_from_fork_asm+0x1a/0x30
[   19.768057]  </TASK>
[   19.768092] 
[   19.779175] Allocated by task 306:
[   19.779541]  kasan_save_stack+0x45/0x70
[   19.779925]  kasan_save_track+0x18/0x40
[   19.780140]  kasan_save_alloc_info+0x3b/0x50
[   19.780378]  __kasan_kmalloc+0xb7/0xc0
[   19.780696]  __kmalloc_noprof+0x1c9/0x500
[   19.780911]  kunit_kmalloc_array+0x25/0x60
[   19.781109]  copy_user_test_oob+0xab/0x10f0
[   19.781404]  kunit_try_run_case+0x1a5/0x480
[   19.781599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.781813]  kthread+0x337/0x6f0
[   19.781974]  ret_from_fork+0x41/0x80
[   19.782135]  ret_from_fork_asm+0x1a/0x30
[   19.782429] 
[   19.782605] The buggy address belongs to the object at ffff888102b20500
[   19.782605]  which belongs to the cache kmalloc-128 of size 128
[   19.783042] The buggy address is located 0 bytes inside of
[   19.783042]  allocated 120-byte region [ffff888102b20500, ffff888102b20578)
[   19.783475] 
[   19.783607] The buggy address belongs to the physical page:
[   19.783840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   19.784088] flags: 0x200000000000000(node=0|zone=2)
[   19.784277] page_type: f5(slab)
[   19.784455] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.784693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.784938] page dumped because: kasan: bad access detected
[   19.785227] 
[   19.785408] Memory state around the buggy address:
[   19.785790]  ffff888102b20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.790555]  ffff888102b20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791666] >ffff888102b20500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.792502]                                                                 ^
[   19.793551]  ffff888102b20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794016]  ffff888102b20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794414] ==================================================================
[   19.858994] ==================================================================
[   19.859823] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   19.860546] Read of size 121 at addr ffff888102b20500 by task kunit_try_catch/306
[   19.860971] 
[   19.861700] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.861797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.861814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.861842] Call Trace:
[   19.861871]  <TASK>
[   19.861903]  dump_stack_lvl+0x73/0xb0
[   19.861943]  print_report+0xd1/0x650
[   19.861970]  ? __virt_addr_valid+0x1db/0x2d0
[   19.861999]  ? copy_user_test_oob+0x604/0x10f0
[   19.862023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.862049]  ? copy_user_test_oob+0x604/0x10f0
[   19.862115]  kasan_report+0x141/0x180
[   19.862199]  ? copy_user_test_oob+0x604/0x10f0
[   19.862307]  kasan_check_range+0x10c/0x1c0
[   19.862355]  __kasan_check_read+0x15/0x20
[   19.862382]  copy_user_test_oob+0x604/0x10f0
[   19.862410]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.862432]  ? finish_task_switch.isra.0+0x153/0x700
[   19.862462]  ? __switch_to+0x5d9/0xf60
[   19.862487]  ? dequeue_task_fair+0x166/0x4e0
[   19.862515]  ? __schedule+0x10cc/0x2b60
[   19.862541]  ? __pfx_read_tsc+0x10/0x10
[   19.862563]  ? ktime_get_ts64+0x86/0x230
[   19.862592]  kunit_try_run_case+0x1a5/0x480
[   19.862621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.862646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.862673]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.862698]  ? __kthread_parkme+0x82/0x180
[   19.862724]  ? preempt_count_sub+0x50/0x80
[   19.862750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.862777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.862803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.862829]  kthread+0x337/0x6f0
[   19.862849]  ? trace_preempt_on+0x20/0xc0
[   19.862876]  ? __pfx_kthread+0x10/0x10
[   19.862897]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.862920]  ? calculate_sigpending+0x7b/0xa0
[   19.862944]  ? __pfx_kthread+0x10/0x10
[   19.862965]  ret_from_fork+0x41/0x80
[   19.862988]  ? __pfx_kthread+0x10/0x10
[   19.863008]  ret_from_fork_asm+0x1a/0x30
[   19.863043]  </TASK>
[   19.863056] 
[   19.873584] Allocated by task 306:
[   19.873966]  kasan_save_stack+0x45/0x70
[   19.874352]  kasan_save_track+0x18/0x40
[   19.874759]  kasan_save_alloc_info+0x3b/0x50
[   19.875105]  __kasan_kmalloc+0xb7/0xc0
[   19.875380]  __kmalloc_noprof+0x1c9/0x500
[   19.875765]  kunit_kmalloc_array+0x25/0x60
[   19.876019]  copy_user_test_oob+0xab/0x10f0
[   19.876353]  kunit_try_run_case+0x1a5/0x480
[   19.876746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.877146]  kthread+0x337/0x6f0
[   19.877518]  ret_from_fork+0x41/0x80
[   19.877718]  ret_from_fork_asm+0x1a/0x30
[   19.878111] 
[   19.878315] The buggy address belongs to the object at ffff888102b20500
[   19.878315]  which belongs to the cache kmalloc-128 of size 128
[   19.879058] The buggy address is located 0 bytes inside of
[   19.879058]  allocated 120-byte region [ffff888102b20500, ffff888102b20578)
[   19.879883] 
[   19.880123] The buggy address belongs to the physical page:
[   19.880480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   19.881057] flags: 0x200000000000000(node=0|zone=2)
[   19.881321] page_type: f5(slab)
[   19.881718] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.882444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.882872] page dumped because: kasan: bad access detected
[   19.883413] 
[   19.883647] Memory state around the buggy address:
[   19.883909]  ffff888102b20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.884447]  ffff888102b20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.884728] >ffff888102b20500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.885400]                                                                 ^
[   19.885951]  ffff888102b20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886561]  ffff888102b20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.887010] ==================================================================
[   19.826488] ==================================================================
[   19.826998] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   19.827697] Write of size 121 at addr ffff888102b20500 by task kunit_try_catch/306
[   19.828144] 
[   19.828435] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.828549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.828579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.828658] Call Trace:
[   19.828719]  <TASK>
[   19.828769]  dump_stack_lvl+0x73/0xb0
[   19.828812]  print_report+0xd1/0x650
[   19.828841]  ? __virt_addr_valid+0x1db/0x2d0
[   19.828868]  ? copy_user_test_oob+0x557/0x10f0
[   19.828892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.828929]  ? copy_user_test_oob+0x557/0x10f0
[   19.828967]  kasan_report+0x141/0x180
[   19.829025]  ? copy_user_test_oob+0x557/0x10f0
[   19.829145]  kasan_check_range+0x10c/0x1c0
[   19.829214]  __kasan_check_write+0x18/0x20
[   19.829262]  copy_user_test_oob+0x557/0x10f0
[   19.829351]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.829414]  ? finish_task_switch.isra.0+0x153/0x700
[   19.829470]  ? __switch_to+0x5d9/0xf60
[   19.829513]  ? dequeue_task_fair+0x166/0x4e0
[   19.829553]  ? __schedule+0x10cc/0x2b60
[   19.829590]  ? __pfx_read_tsc+0x10/0x10
[   19.829614]  ? ktime_get_ts64+0x86/0x230
[   19.829644]  kunit_try_run_case+0x1a5/0x480
[   19.829675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.829700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.829729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.829756]  ? __kthread_parkme+0x82/0x180
[   19.829783]  ? preempt_count_sub+0x50/0x80
[   19.829811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.829839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.829865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.829892]  kthread+0x337/0x6f0
[   19.829912]  ? trace_preempt_on+0x20/0xc0
[   19.829940]  ? __pfx_kthread+0x10/0x10
[   19.829962]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.829987]  ? calculate_sigpending+0x7b/0xa0
[   19.830012]  ? __pfx_kthread+0x10/0x10
[   19.830034]  ret_from_fork+0x41/0x80
[   19.830057]  ? __pfx_kthread+0x10/0x10
[   19.830101]  ret_from_fork_asm+0x1a/0x30
[   19.830138]  </TASK>
[   19.830153] 
[   19.844024] Allocated by task 306:
[   19.844284]  kasan_save_stack+0x45/0x70
[   19.844527]  kasan_save_track+0x18/0x40
[   19.844889]  kasan_save_alloc_info+0x3b/0x50
[   19.845457]  __kasan_kmalloc+0xb7/0xc0
[   19.845702]  __kmalloc_noprof+0x1c9/0x500
[   19.846017]  kunit_kmalloc_array+0x25/0x60
[   19.846410]  copy_user_test_oob+0xab/0x10f0
[   19.846680]  kunit_try_run_case+0x1a5/0x480
[   19.847088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.847323]  kthread+0x337/0x6f0
[   19.847641]  ret_from_fork+0x41/0x80
[   19.847987]  ret_from_fork_asm+0x1a/0x30
[   19.848283] 
[   19.848469] The buggy address belongs to the object at ffff888102b20500
[   19.848469]  which belongs to the cache kmalloc-128 of size 128
[   19.849102] The buggy address is located 0 bytes inside of
[   19.849102]  allocated 120-byte region [ffff888102b20500, ffff888102b20578)
[   19.849976] 
[   19.850218] The buggy address belongs to the physical page:
[   19.850752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   19.852009] flags: 0x200000000000000(node=0|zone=2)
[   19.852313] page_type: f5(slab)
[   19.852642] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.852974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.853462] page dumped because: kasan: bad access detected
[   19.853837] 
[   19.853962] Memory state around the buggy address:
[   19.854216]  ffff888102b20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.854829]  ffff888102b20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855436] >ffff888102b20500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.855894]                                                                 ^
[   19.856209]  ffff888102b20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.856755]  ffff888102b20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.857505] ==================================================================
[   19.796097] ==================================================================
[   19.796614] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   19.796936] Read of size 121 at addr ffff888102b20500 by task kunit_try_catch/306
[   19.797535] 
[   19.797747] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.797848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.797880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.797932] Call Trace:
[   19.797980]  <TASK>
[   19.798022]  dump_stack_lvl+0x73/0xb0
[   19.798106]  print_report+0xd1/0x650
[   19.798149]  ? __virt_addr_valid+0x1db/0x2d0
[   19.798188]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.798222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.798293]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.798401]  kasan_report+0x141/0x180
[   19.798453]  ? copy_user_test_oob+0x4aa/0x10f0
[   19.798512]  kasan_check_range+0x10c/0x1c0
[   19.798564]  __kasan_check_read+0x15/0x20
[   19.798644]  copy_user_test_oob+0x4aa/0x10f0
[   19.798701]  ? __pfx_copy_user_test_oob+0x10/0x10
[   19.798744]  ? finish_task_switch.isra.0+0x153/0x700
[   19.798793]  ? __switch_to+0x5d9/0xf60
[   19.798860]  ? dequeue_task_fair+0x166/0x4e0
[   19.798918]  ? __schedule+0x10cc/0x2b60
[   19.798973]  ? __pfx_read_tsc+0x10/0x10
[   19.799014]  ? ktime_get_ts64+0x86/0x230
[   19.799117]  kunit_try_run_case+0x1a5/0x480
[   19.799182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.799233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.799282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.799358]  ? __kthread_parkme+0x82/0x180
[   19.799412]  ? preempt_count_sub+0x50/0x80
[   19.799490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.799541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.799597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.799637]  kthread+0x337/0x6f0
[   19.799660]  ? trace_preempt_on+0x20/0xc0
[   19.799689]  ? __pfx_kthread+0x10/0x10
[   19.799710]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.799735]  ? calculate_sigpending+0x7b/0xa0
[   19.799763]  ? __pfx_kthread+0x10/0x10
[   19.799801]  ret_from_fork+0x41/0x80
[   19.799828]  ? __pfx_kthread+0x10/0x10
[   19.799848]  ret_from_fork_asm+0x1a/0x30
[   19.799884]  </TASK>
[   19.799898] 
[   19.811854] Allocated by task 306:
[   19.812275]  kasan_save_stack+0x45/0x70
[   19.812542]  kasan_save_track+0x18/0x40
[   19.812757]  kasan_save_alloc_info+0x3b/0x50
[   19.813191]  __kasan_kmalloc+0xb7/0xc0
[   19.813636]  __kmalloc_noprof+0x1c9/0x500
[   19.813943]  kunit_kmalloc_array+0x25/0x60
[   19.814441]  copy_user_test_oob+0xab/0x10f0
[   19.814756]  kunit_try_run_case+0x1a5/0x480
[   19.815211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.815586]  kthread+0x337/0x6f0
[   19.815774]  ret_from_fork+0x41/0x80
[   19.816152]  ret_from_fork_asm+0x1a/0x30
[   19.816583] 
[   19.816774] The buggy address belongs to the object at ffff888102b20500
[   19.816774]  which belongs to the cache kmalloc-128 of size 128
[   19.817461] The buggy address is located 0 bytes inside of
[   19.817461]  allocated 120-byte region [ffff888102b20500, ffff888102b20578)
[   19.818281] 
[   19.818441] The buggy address belongs to the physical page:
[   19.818860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   19.819649] flags: 0x200000000000000(node=0|zone=2)
[   19.819968] page_type: f5(slab)
[   19.820197] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.820497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.821208] page dumped because: kasan: bad access detected
[   19.821460] 
[   19.821585] Memory state around the buggy address:
[   19.821995]  ffff888102b20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.822636]  ffff888102b20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823260] >ffff888102b20500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.823786]                                                                 ^
[   19.824321]  ffff888102b20580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824757]  ffff888102b20600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.825347] ==================================================================